Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Stoica, I., Zhang H., & Shenker S. J. (2002).  Self-Verifying CSFQ. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 1, 21-30.
Lässig, J., Satzger B., & Kramer O. (2011).  Self-Stabilization in Hierarchically Structured Energy Markets. Proceedings of the 8th International Conference on Information Technology: New Generations (ITNG 2011). 803-809.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Qiu, L., Yang Y. Richard, Zhang Y., & Shenker S. J. (2003).  On Selfish Routing in Internet-Like Environments. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM). 151-162.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Adler, M., Gemmell P., Harchol-Balter M., Karp R. M., & Kenyon C. (1994).  Selection in the presence of noise: the design of playoff systems. Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 564-572.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Utans, J., & Moody J. (1991).  Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction. Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
Utans, J., Moody J., Rehfuss S., & Siegelmann H.. (1995).  Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Shastri, L., & Wendelken C. (2000).  Seeking coherent explanations - a fusion of structured connectionism, temporal synchrony, and evidential reasoning. Proceedings of the 22nd Annual Conference of the Cognitive Science Society (CogSci 2000).
Fillmore, C. J., Baker C. F., & Sato H. (2002).  Seeing Arguments Through Transparent Structures. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). 787-791.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
de Melo, G., & Hose K. (2012).  Searching the Web of Data (Tutorial Abstract).
Karp, R. M., Saks M., & Wigderson A. (1986).  On a Search Problem Related to Branch-and-Bound Procedures. Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Seamless Multimedia Communications in Heterogeneous Mobile Access Networks. Proceedings of the TERENA Networking Conference (TNC 2004).
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. J. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Yao, F., Demers A. J., & Shenker S. J. (1995).  A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.

Pages