Publications

Found 199 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Plaskota, L. (1995).  Noisy Information and Computational Complexity: A Short Survey.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Plauché, M., & Prabaker M.. (2006).  Tamil Market: A spoken dialog system for rural India.
Plauché, M., Nallasam U., Wooters C., Pal J., & Ramachandran D. (2006).  Speech Recognition for Illiterate Access to Information and Technology. Proceedings of the First International Conference on Information and Communication Technologies and Development (ICTD '06). 83-92.
Polastre, J., Hui J., Levis P., Zhao J., Culler D. E., Shenker S. J., et al. (2005).  A Unifying Link Abstraction for Wireless Sensor Networks. Proceedings of the Third ACM Conference on Embedded Networked Sensor Systems (Sensys 2005). 76-89.
Polimenis, V. G. (1991).  The Design of a File System that Supports Multimedia.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Popa, L., Ratnasamy S., Iannaccone G., Krishnamurthy A., & Stoica I. (2010).  A Cost Comparison of Datacenter Network Architectures.
Porat, S., & Feldman J. (1991).  Learning Automata from Ordered Examples. 7, 109-138.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Posch, S. (1991).  Detecting Skewed Symmetries.
Pötzsch, S., & Boehme R. (2010).  The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395.
Prechelt, L. (1995).  Adaptive Parameter Pruning in Neural Networks.
Preuss, M., König I. R., Thompson J. R., Erdmann J., Absher D., Assimes T. L., et al. (2010).  Design of the Coronary Artery Disease Genome-Wide Replication and Meta-Analysis (CARDIoGRAM) Study--A Genome-Wide Association Meta-Analysis Involving More than 22,000 Cases and 60,000 Controls. Circulation: Cardiovascular Genetics. 3, 475-483.
Privitera, C. M., & Shastri L. (1996).  A DSOM Hierarchical Model for Reflexive Processing: An Application to Visual Trajectory Classification.
Privitera, C. M. (1995).  A Cognitive Off-line Model for Motor Interpretation of Handwritten Words.
Pucci, G., & Zimmermann W. (1991).  On the Average Case Complexity of Parallel Sublist Selection.
Puder, A., & Römer K. (1998).  MICO: A CORBA 2.2 Compliant Implementation.
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.

Pages