Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Seehra, A.., Naous J.., Walfish M., Mazieres D.., Nicolosi A.., & Shenker S. J. (2009).  A Policy Framework for the Future Internet. 1-6.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2006).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Journal of Computational Biology. 13, 133-144.
Scott, J., & Karp R. M. (2004).  Achieving Fairness Through Selective Early Dropping.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2005).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 133-144.
Schwenk, H.. (1999).  Using Boosting to Improve a Hybrid HMM/Neural Network Speech Recognizer. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Schwarz, C., Teich J., Welzl E., & Evans B. (1994).  On Finding a Minimal Enclosing Parallelgram.
Schwarm, S.., Bulyko I., & Ostendorf M. (2004).  Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items. IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Schulz, P., Matthé M., Klessig H., Simsek M., Fettweis G., Ansari J., et al. (2017).  Latency Critical IoT Applications in 5G: Perspective on the Design of Radio Interface and Network Architecture. IEEE Communications Magazine. 55(2), 
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Schryen, G., & Kadura R.. (2009).  Open Source vs. Closed Source Software: Towards Measuring Security. 2016-2023.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Schröder-Preikschat, W. (1993).  Design Principles of Parallel Operating Systems: ?A PEACE Case Study?.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2013).  On Measuring the Client-Side DNS Infrastructure. 77-90.
Scholz, R., & Ziem A. (2013).  Lexikometrie Meets FrameNet. 155-184.
Scholl, M.., & Voisard A. (2009).  Spatial Operations and Map Operations. 2719-2725.

Pages