Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
I
Braden, R., Clark D. D., & Shenker S. J. (1994).  Integrated Services in the Internet Architecture: An Overview.
Ruiz, P. M., & Gómez-Skarmeta A. (2004).  Integrated IP Multicast in Mobile Ad Hoc Networks with Multiple Attachments to Wired IP Networks. Proceedings of the 15th IEEE Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC 2004).
Baumbach, J., Wittkop T., Kleindt C. Katja, & Tauch A. (2009).  Integrated Analysis and Reconstruction of Microbial Transcriptional Gene Regulatory Networks Using CoryneRegNet. Nature Protocols. 4(6), 992-1005.
Halperin, E., Kortsarz G., Krauthgamer R., Srinivasan A., & Wang N.. (2003).  Integrality Ratio for Group Steiner Trees and Directed Steiner Trees. Proceedings of the Twelfth Symposium on Discrete Algorithms (SODA).
Greenberg, S., Hollenback J., & Ellis D. P. W. (1996).  Insights Into Spoken Language Gleaned from Phonetic Transcriptions of the Switchboard Corpus. Proceedings of the Fourth International Conference on Spoken Language Processing (CSLP-96).
Ravanelli, M., Elizalde B. Martinez, Bernd J., & Friedland G. (2015).  Insights into Audio-Based Multimedia Event Classification with Neural Networks. 19-23.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.
Moore, D., Paxson V., Savage S., Shannon C., Staniford S., & Weaver N. (2003).  Inside the Slammer Worm. IEEE Magazine of Security and Privacy. 1(4), 33-39.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Fillmore, C. J. (1979).  Innocence: A Second Idealization for Linguistics. Proceedings of the Fifth Annual Meeting of the Berkeley Linguistics Society (BLS 5). 63-76.
Abdi, N., Despres T., Abu-Salma R., & Bernd J. (2022).   In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations. Symposium on Applications of Contextual Integrity. 4,
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Chang, S-Y., & Morgan N. (2013).  Informative Spectro-Temporal Bottleneck Features for Noise-Robust Speech Recognition.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Ghodsi, A., Koponen T., Raghavan B., Shenker S. J., Singla A., & Wilcox J. (2011).  Information-Centric Networking: Seeing the Forest for the Trees. 1-6.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Evans, W. S. (1994).  Information Theory and Noisy Computation.
Himanen, P., & Castells M. (2002).  The Information Society and the Welfare State: The Finnish Model.
Hopfgartner, F., Ren R., Urruty T., & Jose J. M. (2011).  Information Organisation Issues in Multimedia Retrieval using Low-Level Features. 241-260.
Kirchner, M., & Ghosal D. (2012).  Information Hiding.
Ronen, B.., & Karp R. M. (1994).  An information entropy approach to the small-lot concept. IEEE Transactions on Engineering Management. 41(1), 89-92.
Lee, L., Lee JH., Egelman S., & Wagner D. (2016).  Information Disclosure Concerns in The Age of Wearable Computing. Proceedings of the NDSS Workshop on Usable Security (USEC ’16).
Nurgalieva, L., Frik A., Ceschel F., Egelman S., & Marchese M. (2019).  Information Design in An Aged Care Context. Proceedings of Pervasive Health ’19.
Lee-Goldman, R. (2009).  Infinitives in Comparatives: Canonical Syntax Meets Quirky Semantics.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2001).  Inferring Link Loss Using Striped Unicast Probes. Proceedings of IEEE INFOCOM.

Pages