Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Allman, M., Balakrishnan H., & Floyd S. (2001).  RFC 3042: Enhancing TCP's Loss Recovery Using Limited Transmit.
Floyd, S. (2000).  RFC 2914: Congestion Control Principles.
Mathis, M., Mahdavi J., Floyd S., & Romanow A. (1996).  RFC 2018: TCP Selective Acknowledgment Options.
Alpaydin, E. (1997).  REx: Learning A Rule and Exceptions.
Raya, M.., Manshaei M.. H., Felegyhazi M., & Hubaux J.-P.. (2008).  Revocation Games in Ephemeral Networks. 199-210.
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Ratnasamy, S., Ermolinskiy A., & Shenker S. J. (2006).  Revisiting IP Multicast. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 15-26.
Vinyals, O., Friedland G., & Mirghafori N. (2007).  Revisiting a Basic Function on Current CPUs: A Fast Logarithm Implementation with Adjustable Accuracy.
Pan, V. (1992).  [REVISED:] New Resultant Inequalities and Complex Polynomial Factorization.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Feldman, J. (1984).  Review of The Architecture of Cognition, by John R. Anderson.
Friedland, G. (2009).  Review of P. Dev and W. Heinrichs, "Learning Medicine Through Collaboration and Action: Collaborative, Experimental, Networked Learning Environments".
Friedland, G. (2009).  Review of L. Cairco, et al., "AVARI: Animated Virtual Agent Retrieving Information".
Friedland, G. (2010).  Review of J. Nichols and B. Myers, "Creating a Lightweight User Interface Description Language: An Overview and Analysis of the Personal Universal Controller Project".
Friedland, G. (2011).  Review of J. Ajmera, et al., "Two-Stream Indexing for Spoken Web Search".
Sap, D. (2019).  A Review of Geometric Integrity Criteria for Military Standards – 31000A.
Friedland, G. (2009).  Review of G. Welch, "History: The Use of the Kalman Filter for Human Motion Tracking in Virtual Reality".
Mnich, M. (2011).  Review of F. V. Fomin and D. Kratsch, "Exact Exponential Algorithms". Operations Research Letters. 39(3), 229-230.
Friedland, G. (2009).  Review of E. Villalon, “High-Dimensionality Data Reduction in Java”.
Friedland, G. (2010).  Review of E. Aguilar, "Animation and Performance Capture Using Digitized Models".
Friedland, G. (2009).  Review of Cattelan, et al, "Watch-and-Comment as a Paradigm Toward Ubiquitous Interactive Video Editing".
Friedland, G. (2011).  Review of C. Simon, et al., "Visual Event Recognition Using Decision Trees".
Friedland, G. (2010).  Review of C. Mueller-Tomfelder, "Tabletops - Horizontal Interactive Displays".

Pages