Publications

Found 232 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is E  [Clear All Filters]
Technical Report
Minenko, V. (1998).  Enabling Synchronous Joint-Working In Java.
Szyperski, C., Omohundro S., & Murer S. (1993).  Engineering a Programming Language: The Type and Class System of Sather.
Shastri, L. (2001).  Episodic Memory Trace Formation in the Hippocampal System: A Model of Cortico-Hippocampal Interaction.
Karpinski, M., & Lhotzky B. (1991).  An (epsilon, delta)--Approximation Algorithm of the Number of Zeros for a Multilinear Polynomial over GF[q].
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
Kay, R. (1989).  The Establishment of the International Computer Science Institute in Berkeley, California: Venturing with Norbert.
Hirsch, H-G. (1993).  Estimation of Noise Spectrum and its Application to SNR-Estimation and Speech Enhancement.
Hinze, A., & Voisard A. (2009).  EVA: An EVent Algebra Supporting Adaptivity and Collaboration in Event‐Based Systems.
Yoshida, M., Ikeda C., & Suzuki H. (1994).  An Evaluation of Burst-level Bandwidth Reservation Methods in WANEnvironments.
Verma, D. C., & Ferrari D. (1991).  Evaluation of Overflow Probabilities in Resource Management.
Gupta, A., Howe W., Moran M., & Nguyen Q. (1994).  Evaluation of Resource Sharing Benefits.
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Asanović, K., & Morgan N. (1991).  Experimental Determination of Precision Requirements for Back-Propagation Training of Artificial Neural Networks.
Crestani, F. (1999).  An Experimental Study of the Effects of Word Recognition Errors in Spoken Queries on the Effectiveness of an Information Retrieval System.
Trompf, M. (1992).  Experiments with Noise Reduction Neural Networks for Robust Speech Recognition.
Banerjea, A., Knightly E. W., Templin F. L., & Zhang H. (1994).  Experiments with the Tenet Real-Time Protocol Suite on the Sequoia 2000 Wide Area Network.
Diederich, J. (1989).  Explanation and Connectionist Systems.
Bornscheuer, S-E., & Thielscher M. (1996).  Explicit and Implicit Indeterminism: Reasoning About Uncertain and Contradictory Specifications of Dynamic Systems.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Sperduti, A. (1993).  Exploitation of Structured Gating Connections for the Normalization of a Visual Pattern.
Sommer, R., & Paxson V. (2004).  Exploiting Independent State For Network Intrusion Detection.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.

Pages