Found 4184 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Wendelken, C. (2003).  Shruti-agent: A structured connectionist architecture for reasoning and decision-making.
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Weissman, B., Gomes B., Quittek J. W., & Holtkamp M. (1997).  A Performance Evaluation of Fine Grain Thread Migration with Active Threads.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weber, S. (2004).  The Success of Open Source.
Weber, F.., Manganaro L.., Peskin B., & Shriberg E. (2002).  Using Prosodic and Lexical Information for Speaker Identification. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.