Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Gomes, B., Löwe W., Quittek J. W., & Weissman B. (1997).  Sather 2: A Language Design for Safe, High-Performance Computing.
Stoutamire, D., & Omohundro S. (1996).  The Sather 1.1 Specification.
Philippsen, M. (1994).  Sather 1.0 Tutorial.
Stoutamire, D., & Omohundro S. (1995).  The Sather 1.0 Specification.
Kruse, H., Allman M., Griner J., Ostermann S., & Helvey E.. (1999).  Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic. Proceedings of the Seventh International Conference on Telecommunication Systems.
Baraldi, A., & Parmiggiani F. (1998).  SAR Image Segmentation Exploiting No Background Knowledge on Speckled Radiance: A Feasibility Study.
Ee, C. Tien, Shenker S. J., & Subramanian L. (2006).  Sapheniea: Simplifying Configuration Using Classes.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
DeNero, J., Bouchard-Côté A.., & Klein D. (2008).  Sampling Alignment Structure Under a Bayesian Translation Model. 314-323.
Liu, X., & Shapiro V. (2017).  Sample-based synthesis of two-scale structures with anisotropy. Computer-Aided Design. 90, 199-209.
Liu, X., & Shapiro V. (2016).  Sample-Based Design of Functionally Graded Material Structures. Proceedings of the ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
R
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
Elsässer, R., & Sauerwald T. (2009).  On the Runtime and Robustness of Randomized Broadcasting. Theoretical Computer Science. 410(36), 3414-3427.
Horoba, C., & Sudholt D. (2009).  Running Time Analysis of ACO Systems for Shortest Path Problems. 76-91.
Ajjanagadde, V., & Shastri L. (1991).  Rules and variables in neural nets. 3,
Zhang, L., Deering S., Estrin D., Shenker S. J., & Zappala D. (1993).  RSVP: A Resource ReSerVation Protocol. IEEE Network Magazine. 7(5), 8-18.
Lakshminarayanan, K., Stoica I., Shenker S. J., & Rexford J. (2006).  Routing as a Service.
Lakshminarayanan, K., Stoica I., & Shenker S. J. (2004).  Routing as a Service. Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004).
Ratnasamy, S., Stoica I., & Shenker S. J. (2002).  Routing Algorithms for DHTs: Some Open Questions. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
Mao, Z. Morley, Govindan R., Varghese G., & Katz R. H. (2002).  Route Flap Dampening Exacerbates Internet Routing Convergence. Proceedings of the ACM SIGCOMM 2002.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Ryu, S-J., Kirchner M., Lee M-J., & Lee H-K. (2013).  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security. 8(8), 1355-1370.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Garg, N. P., Favre S.., Salamin H.., Hakkani-Tür D., & Vinciarelli A.. (2008).  Role Recognition for Meeting Participants: An Approach Based on Lexical Information and Social Network Analysis. 693-696.
Pötzsch, S., & Boehme R. (2010).  The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395.

Pages