Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Piccolboni, A.., & Schindelhauer C. (2000).  Discrete Prediction Games with Arbitrary Feedback and Loss.
Pieraccini, R. (2012).  From AUDREY to Siri: Is Speech Recognition A Solved Problem?.
Pietracaprina, A., Pucci G., & Sibeyn J. Frederik (1993).  Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer.
Pietzowski, A., Satzger B., Trumler W.., & Ungerer T. (2010).  A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques.
Pinotti, M. Cristina, & Pucci G. (1991).  Parallel Priority Queues.
Pinsdorf, U.., & Roth V. (2002).  Mobile Agent Interoperability Patterns and Practice. Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Pitsillidis, A., Levchenko K., Kreibich C., Kanich C., Voelker G. M., Paxson V., et al. (2010).  Botnet Judo: Fighting Spam with Itself.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Plaskota, L. (1995).  How to Benefit From Noise.
Plaskota, L. (1995).  Noisy Information and Computational Complexity: A Short Survey.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Plauché, M., & Prabaker M.. (2006).  Tamil Market: A spoken dialog system for rural India.
Plauché, M., Nallasam U., Wooters C., Pal J., & Ramachandran D. (2006).  Speech Recognition for Illiterate Access to Information and Technology. Proceedings of the First International Conference on Information and Communication Technologies and Development (ICTD '06). 83-92.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S. J., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Polimenis, V. G. (1991).  The Design of a File System that Supports Multimedia.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Popa, L., Ratnasamy S., Iannaccone G., Krishnamurthy A., & Stoica I. (2010).  A Cost Comparison of Datacenter Network Architectures.
Porat, S., & Feldman J. (1991).  Learning Automata from Ordered Examples. 7, 109-138.
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).

Pages