Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Wendelken, C. (2003).  Shruti-agent: A structured connectionist architecture for reasoning and decision-making.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Weissman, B., Gomes B., Quittek J. W., & Holtkamp M. (1997).  A Performance Evaluation of Fine Grain Thread Migration with Active Threads.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Weber, S. (2004).  The Success of Open Source.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weber, F.., Manganaro L.., Peskin B., & Shriberg E. (2002).  Using Prosodic and Lexical Information for Speaker Identification. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Weaver, N. (2020).  The SolarWinds Breach: Why Your Work Computers Are Down Today.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Weaver, N., & Ellis D. (2004).  Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine. 29(3), 34-37.
Weaver, N., & Wawrzynek J. (2000).  A Comparison of the AES Candidates Amenability to FPGA Implementation.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.

Pages