Found 289 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is P  [Clear All Filters]
Conference Paper
Kramer, O., Satzger B., & Lässig J. (2010).  Power Prediction in Smart Grids with Evolutionary Local Kernel Regression. 262-269.
Ben-David, S., Borodin A., Karp R. M., Tardos G., & Wigderson A. (1990).  On the power of randomization in online algorithms. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.
Sargent, M., Czyz J., Allman M., & Bailey M. (2015).  On The Power and Limitations of Detecting Network Filtering via Passive Observation. Proceedings of the Passive and Active Management Conference (PAM 2015).
Perfors, A., Tenenbaum J., & Regier T. (2006).  Poverty of the Stimulus? A Rational Approach. Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
Felegyhazi, M., Kreibich C., & Paxson V. (2010).  On the Potential of Proactive Domain Blacklisting.
Zhang, N., Farrell R., & Darrell T. (2012).  Pose Pooling Kernels for Sub-Category Recognition. 3665-3672.
Bernardis, E., & Yu S. X. (2011).  Pop Out Many Small Structures from a Very Large Microscopic Image. Medical Image Analysis. 690-707.
Gramm, J. (2004).  A Polynomial-Time Algorithm for the Matching of Crossing Contact-Map Patterns. Proceedings of the Fourth International Workshop on Algorithms in Bioinformatics (WABI 2004).
Halperin, E., & Krauthgamer R. (2003).  Polylogarithmic Inapproximability. Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC).
Althaus, E., & Fink C.. (2002).  A Polyhedral Approach to Surface Reconstruction from Planar Contours. Proceedings of the Ninth Conference on Integer Programming and Combinatorial Optimization.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. (2009).  A Policy Framework for the Future Internet. 1-6.
Lokshtanov, D., Mnich M., & Saurabh S. (2011).  Planar k-Path in Subexponential Time and Polynomial Space.
Choi, J., Thomee B., Friedland G., Cao L., Ni K., Borth D., et al. (2014).  The Placing Task: A Large-Scale Geo-Estimation Challenge for Social-Media Videos and Images. 27-31.
Gonzalez, J. Maria, & Paxson V. (2003).  Pktd: A Packet Capture and Injection Daemon. Proceedings of Passive and Active Measurement Workshop (PAM-2003). 87-96.
Kim, Y-J., Govindan R., Karp B., & Shenker S. (2005).  On the Pitfalls of Geographic Face Routing. Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
Kennedy, L.., & Ellis D. P. W. (2003).  Pitch-Based Emphasis Detection for Characterization of Meeting Recordings. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2003).
Alizadeh, F., Karp R. M., Weisser D. K., & Zweig G. (1994).  Physical mapping of chromosomes using unique probes. Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 489-500.
Favre, B., & Hakkani-Tür D. (2009).  Phrase and Word Level Strategies for Detecting Appositions in Speech. 2711-2714.
Yeh, T., Lee J. J., & Darrell T. (2008).  Photo-Based Question Answering. 389-398.
Bourlard, H., Cohen M., Kohn P., Morgan N., & Wooters C. (1991).  Phonetic Context in Hybrid HMM/MLP Continuous Speech Recognition. Proceedings of the Second European Conference on Speech Communication and Technology (Eurospeech '91). 109-112.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Alizadeh, M., Yang S., Sharif M., Katti S., McKeown N., Prabhakar B., et al. (2013).  pFabric: Minimal Near-Optimal Datacenter Transport. 435-446.
Moody, J. (1987).  Perspectives on Associative Memories. Proceedings of the IEEE First International Conference on Neural Networks.
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).