Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Krauss, L.. M., Moody J., & Wilczek F. (1984).  A Stellar Energy Loss Mechanism Involving Axions. 144B,
Krauss, L.., Moody J., Wilczek F., & Morris D.. (1985).  Calculations for Cosmic Axion Detection. 55(17), 1797-1800.
Krauthgamer, R., & Lee J. R. (2002).  The Intrinsic Dimensionality of Graphs.
Krawczyk, J.., Kohl T. A., Goesmann A.., Kalinowski J.., & Baumbach J. (2009).  From Corynebacterium Glutamicum to Mycobacterium Tuberculosis - Towards Transfers of Gene Regulatory Networks and Integrated Data Analyses with MycoRegNet. Nucleic Acids Research. 37(14), 
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Kreibich, C., & Jahnke M. (2010).  Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Krell, M. Michael, Bernd J., Li Y., Ma D., Choi J., Ellsworth M., et al. (2017).  Field Studies with Multimedia Big Data: Opportunities and Challenges.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
Krishnan, R., Allman M., Partridge C., Sterbenz J. P. G., & Ivancic W.. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary.
Krishnan, R., Sterbenz J. P. G., Eddy W. M., Partridge C., & Allman M. (2004).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks. 46(3), 343-362.
Krishnan, R., Allman M., Partridge C., & Sterbenz J. P. G. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks.
Krishnapriyan, A. S., Gholami A., Zhe S., Kirby R. M., & Mahoney M. W. (2021).  Characterizing Possible Failure Modes in Physics-Informed Neural Networks. NeurIPS.
Kruse, H., Allman M., & Mallasch P.. (1998).  Network and User-Perceived Performance of Web Page Retrievals. Proceedings of the First International Conference on Telecommunications and Electronic Commerce (ICTEC).
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.

Pages