Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Mandel, M. I., & Ellis D. P. W. (2009).  The Ideal Interaural Parameter Mask: A Bound on Binaural Separation Systems. 85-88.
Mańdziuk, J., & Shastri L. (1998).  Incremental Class Learning Approach and Its Application to Handwritten Digit Recognition.
Mańdziuk, J. (1997).  Optimization with the Hopfield network based on correlated noises: an empirical approach.
Mani, D.. R., & Shastri L. (1999).  Parallel inference with very large knowledge bases. 2,
Mani, D.. R., & Shastri L. (1994).  Massively Parallel Real-Time Reasoning with Very Large Knowledge Bases: An Interim Report.
Mani, D.. R., & Shastri L. (1993).  Reflexive Reasoning with Multiple-Instantiation in in a Connectionist Reasoning System with a Typed Hierarchy. 5, 205-242.
Mankin, A.., Romanow A., Bradner S.., & Paxson V. (1998).  IETF Criteria for Evaluating Reliable Multicast Transport and Application Protocols.
Manzoni, P. (1994).  Introducing Resources Management in IP-Based Nodes.
Mao, Z. Morley, Govindan R., Varghese G., & Katz R. H. (2002).  Route Flap Dampening Exacerbates Internet Routing Convergence. Proceedings of the ACM SIGCOMM 2002.
Marchetti-Spaccamela, A., Nanni U., & Rohnert H. (1992).  On-Line Graph Algorithms for Incremental Compilation.
Marchini, J., Cutler D., Patterson N., Stephens M., Eskin E., Halperin E., et al. (2006).  A Comparison of Phasing Algorithms for Trios and Unrelated Individuals. American Journal of Human Genetics. 78(3), 437-450.
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Mapping Hacking Team's "Untraceable" Spyware. The Citizen Lab.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Marczak, B., Guarnieri C., Marquis-Boire M., Scott-Railton J., & McKune S. (2014).  Hacking Team's US Nexus. The Citizen Lab.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Marczak, B., Weaver N., Dalek J., Fifield D., McKune S., Rey A., et al. (2015).  China’s Great Cannon. The Citizen Report.
Marczak, B., Scott-Railton J., & McKune S. (2015).  Hacking Team Reloaded? US - Based Ethiopian Journalists Again Targeted with Spyware. The Citizen Lab.
Marczak, B., Scott-Railton J., Senft A., Poetranto I., & McKune S. (2015).  Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation. The Citizen Lab.
Marczak, B. (2016).  Defending Dissidents from Targeted Digital Surveillance.
Marczak, B., & Scott-Railton J. (2016).  Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents. The Citizen Lab.
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Hacking Team and the Targeting of Ethiopian Journalists. The Citizen Lab.
Maresca, M. (1991).  Polymorphic Processor Arrays.
Maresca, M., & Li H. (1991).  Hierarchical Node Clustering in Polymorphic Processor Arrays.
Maresca, M. (2016).  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9), 78-85.

Pages