Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2009
Floyd, S., & Kohler E. (2009).  RFC 5622: Profile for DCCP Congestion Control ID 4: TCP-Friendly Rate Control for Small Packets (TFRC-SP).
Allman, M., Paxson V., & Blanton E. (2009).  RFC 5681: TCP Congestion Control.
Tribowski, C., Goebel C., & Günther O. (2009).  RFID Context Data Management: The Missing Link to EPCIS-Based Supply Chain Monitoring.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Goebel, C., Tribowski C., Günther O., & Tröger R.. (2009).  RFID in the Supply Chain: How to Obtain a Positive ROI – The Case of Gerry Weber.
Imseng, D., & Friedland G. (2009).  Robust Speaker Diarization for Short Speech Recordings. 432-437.
Horoba, C., & Sudholt D. (2009).  Running Time Analysis of ACO Systems for Shortest Path Problems. 76-91.
Elsässer, R., & Sauerwald T. (2009).  On the Runtime and Robustness of Randomized Broadcasting. Theoretical Computer Science. 410(36), 3414-3427.
Gillick, D., & Favre B. (2009).  A Scalable Global Model for Summarization. 10-18.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Fabian, B., & Günther O. (2009).  Security Challenges of the EPC Network. 121-125.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
[Anonymous] (2009).  Selected Papers from the Third IEEE International Conference on Semantic Computing (ICSC2009). (Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
Ruppenhofer, J., Sporleder C., Morante R., Baker C. F., & Palmer M. (2009).  SemEval-2010 Task 10: Linking Events and their Participants in Discourse. 106-111.
Joshi, A., Batten C., Kwon Y-J., Beamer S., Shamim I., Asanović K., et al. (2009).  Silicon-Photonic Clos Networks for Global On-Chip Communication. 124-133.
Nedevschi, S., Chandrashenkar J., Nordman B., Ratnasamy S., & Taft N. (2009).  Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. 381-394.
Friedrich, T., Sauerwald T., & Vilenchik D. (2009).  Smoothed Analysis of Balancing Networks. 472-483.
Halperin, E., & Stephan D. A. (2009).  SNP Imputation in Association Studies. Nature Biotechnology. 27(4), 349-351.
Daskalakis, C., Karp R. M., Mossel E., Riesenfeld S., & Verbin E.. (2009).  Sorting and Selection in Posets. 392-401.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 52(9), 99-107.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Subirats-Rüggeberg, C. (2009).  Spanish FrameNet: A Frame Semantic Analysis of the Spanish Lexicon. 135-162.
Subirats-Rüggeberg, C., Ferrandez O.., & Ortega M. (2009).  Spanish FrameNet in Question Answering.

Pages