Publications

Found 802 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Brewka, G. (1992).  An Abductive Framework for Generalized Logic Programs: Preliminary Report.
Herrtwich, R. Guido, & Brandenburg U. Wolfgang (1989).  Accessing and Customizing Services in Distributed Systems.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. (2008).  Accountable Internet Protocol (AIP). 339-350.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Schwarm, S.., Bulyko I., & Ostendorf M. (2004).  Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items. IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Fritz, M., Black M., Bradski G., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition. 558-566.
Fritz, M., Black M., Bradski G., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition. 558-566.
Fritz, M., Black M., Bradski G., Karayev S., & Darrell T. (2009).  An Additive Latent Feature Model for Transparent Object Recognition.
Fàbrega, L., Jové T., Bueno A., & Marzo J. L. (2001).  An Admission Control Approach for Elastic Flows in the Internet. Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Advances in Connectionist Speech Recognition.
Breslau, L. (1999).  Advances in Network Simulation.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. (2002).  Aggregate Congestion Control. ACM SIGCOMM Computer Communication Review. 32(1), 69.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Feldman, J., Finkel R. A., Taylor R. H., Bolles R. C., & Paul R. P. (1974).  AL, A Programming System for Automation.
Blum, L., Cucker F., Shub M., & Smale S. (1996).  Algebraic Settings for the Problem.
Bshouty, N. H., Hancock T. R., Hellerstein L., & Karpinski M. (1993).  An Algorithm to Learn Read-Once Threshold Formulas, and Some Generic Transformations Between Learning Models (Revised Version).
Ferrandez, O.., Ellsworth M., Muñoz R., & Baker C. F. (2010).  Aligning FrameNet and WordNet Based on Semantic Neighborhoods. 310-314.
Petruck, M. R. L., & Boas H. C. (2003).  All in a Day's Week. Proceedings of the Workshop on Frame Semantics.
Emig, D., Salomonis N., Baumbach J., Lengauer T., Conklin B. R., & Albrecht M. (2010).  AltAnalyze and DomainGraph: Analyzing and Visualizing Exon Expression Data. Nucleic Acids Research. 38, W755-W762.
Bertasius, G., Yu S. X., Park H. Soo, & Shi J. (2016).  Am I a Baller? Basketball Skill Assessment using First-Person Cameras.

Pages