Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Schnorr, C. P., & Vaudenay S. (1994).  Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Scholl, M.., & Voisard A. (2009).  Spatial Operations and Map Operations. 2719-2725.
Scholz, R., & Ziem A. (2013).  Lexikometrie Meets FrameNet. 155-184.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2013).  On Measuring the Client-Side DNS Infrastructure. 77-90.
Schröder-Preikschat, W. (1993).  Design Principles of Parallel Operating Systems: ?A PEACE Case Study?.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Schwarm, S.., Bulyko I., & Ostendorf M. (2004).  Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items. IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Schwenk, H.. (1999).  Using Boosting to Improve a Hybrid HMM/Neural Network Speech Recognizer. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2006).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Journal of Computational Biology. 13, 133-144.

Pages