Publications

Found 1845 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Kay, P., & Sag I. A. (2012).  Cleaning up the Big Mess: Discontinuous Dependencies and Complex Determiners.
Sharan, R., Maron-Katz A., & Shamir R. (2003).  CLICK and EXPANDER: A System for Clustering and Visualizing Gene Expression Data. Bioinformatics. 1787-1799.
Sharan, R., Maron-Katz A., & Shamir R. (2003).  CLICK and EXPANDER: A System for Clustering and Visualizing Gene Expression Data. Bioinformatics. 1787-1799.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Schmidt, H. W., & Omohundro S. (1991).  CLOS, Eiffel, and Sather: A Comparison.
McGillivary, A.., Fornasa M., Baglietto P., Stecca M., Caprino G., & Maresca M. (2014).  Cloud Computing Goes To Sea: Ship Design Around Software Defined Networking (SDN) Systems. Ocean News and Technology.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Shamir, R., Sharan R., & Tsur D.. (2004).  Cluster Graph Modification Problems.
Shamir, R., Sharan R., & Tsur D.. (2004).  Cluster Graph Modification Problems.
Asanović, K., Beck J., Callahan T. J., Feldman J., Irissou B., Kingsbury B., et al. (1993).  CNS-1 Architecture Specification: A Connectionist Network Supercomputer.
Seredynski, F. (1996).  Coevolutionary Game-Theoretic Multi-Agent Systems: the Application to Mapping and Scheduling Problems.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Nelaturi, S., de Kleer J., & Shapiro V. (2016).  Combinatorial models for heterogeneous system composition and analysis. Proceedings of 2016 11th System of Systems Engineering Conference (SoSE).
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Salzmann, M., & Urtasun R. (2010).  Combining Discriminative and Generative Methods for 3D Deformable Surface and Articulated Pose Reconstruction. 647-654.
Zheng, J., etin Ö. Ç., Huang M.-Y.., Lei X., Stolcke A., & Morgan N. (2007).  Combining Discriminative Feature, Transform, and Model Training for Large Vocabulary Speech Recognition. 4, 633-636.
Hatch, A., Stolcke A., & Peskin B. (2005).  Combining Feature Sets with Support Vector Machines: Application to Speaker Recognition. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 75-79.
Demers, A. J., Weiser M., Hayes B., Boehm H-J.., Bobrow D., & Shenker S. (1990).  Combining Generational and Conservative Garbage Collection: Framework and Implementations. Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 261-269.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms. Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2000). 3, 1233-1242.
Breslau, L., Jamin S., & Shenker S. (2000).  Comments on the Performance of Measurement-Based Admission Control Algorithms.
Slager, S.. L., Skibola C. F., & Halperin E. (2012).  Common Variation at 6p21.31 (BAK1) Influences the Risk of Chronic Lymphocytic Leukemia. Blood. 120(4), 843-846.

Pages