Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Technical Report
Baraldi, A., Blonda P., Parmiggiani F., & Satalino G. (1998).  Image Segmentation Through Contextual Clustering.
Padhye, J., & Floyd S. (2001).  Identifying the TCP Behavior of Web Servers.
Sharan, R., Ideker T. E., Kelley B. P., Shamir R., & Karp R. M. (2003).  Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data.
Schmidt, H. W. (1990).  ICSIM: Initial Design of An Object-Oriented Net Simulator.
Schmidt, H. W., & Gomes B. (1991).  ICSIM: An Object-Oriented Connectionist Simulator.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S. J., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Makin, J., & Narayanan S. (2008).  Hybrid-System Modeling of Human Blood Clotting.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Plaskota, L. (1995).  How to Benefit From Noise.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next Generation Inter-domain Routing Protocol.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Gelbart, D. (2009).  Hill-Climbing Ensemble Feature Selection with a Larger Ensemble.
Maresca, M., & Li H. (1991).  Hierarchical Node Clustering in Polymorphic Processor Arrays.
Leicher, C. (1994).  Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET).
Knightly, E. W. (1995).  H-BIND: A New Approach to Providing Statistical Performance Guarantees to VBR Traffic.
Pfennigschmidt, S.., & Voisard A. (2009).  Handling Temporal Granularity in Situation-Based Services.

Pages