Publications

Found 115 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Title is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
T
Tuytelaars, T., Fritz M., Saenko K., & Darrell T. (2011).  The NBNN Kernel. 1824-1831.
Tresp, V., Moody J., & Delong W.. R. (1993).  Neural Network Modeling of Physiological Processes. 2, 363-378.
Tangmunarunkit, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Network Topology Generators: Degree-Based vs. Structural. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 147-159.
P
Plaskota, L. (1995).  Noisy Information and Computational Complexity: A Short Survey.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Petrov, S., Barrett L., & Klein D. (2006).  Non-Local Modeling with a Mixture of PCFGs. Proceedings of the 10th International Conference on Conference of Computational Natural Language Learning (CoNLL-X '06). 14-20.
Peters, N., Lei H., & Friedland G. (2012).  Name That Room: Room Identification Using Acoustic Features in a Recording. 841-844.
Pellegrini, M. (1992).  A New Algorithm for Counting Circular Arc Intersections.
Parker, A., Reddy S., Schmid T., Chang K., Saurabh G., Srivastava M., et al. (2006).  Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications. Proceedings of the Fifth Workshop on Hot Topics in Networks (Hotnets-V). 37-42.
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. J. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).

Pages