Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Lässig, J., & Sudholt D. (2010).  Experimental Supplements to the Theoretical Analysis of Migration in the Island Model. 224-233.
Crestani, F. (1999).  An Experimental Study of the Effects of Word Recognition Errors in Spoken Queries on the Effectiveness of an Information Retrieval System.
Asanović, K., & Morgan N. (1991).  Experimental Determination of Precision Requirements for Back-Propagation Training of Artificial Neural Networks.
Gramm, J., Ben-Dor A., & Sharan R. (2004).  Experimental Design for Multiplexed SNP Genotyping.
Friedman, E., Shor M.., Shenker S. J., & Sopher B.. (2004).  An Experiment on Learning with Limited Information: Nonconvergence, Experimentation Cascades, and the Advantage of Being Slow. Games and Economic Behavior. 47(2), 325-352.
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of Passive & Active Measurement.
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of the Passive & Active Measurement (PAM 2000).
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Bretones, C., Cristóbal M., & Ibarretxe-Antuñano I. (2001).  Exiting Events in Spanish: Boundary I-Schema and Move X-Schema.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Pal, J. (2007).  Examining e-literacy Using Telecenters as Public Spending: The Case of Akshaya. 59-67.
Handley, M. (1997).  An Examination of MBone Performance.
Raabe, A., Tietjen J., & Anlauf J. K. (2009).  An Exact and Efficient Triangle Intersection Test Hardware. 355-360.
Kohler, E., Poletto M., & Montgomery D. R. (1999).  Evolving Software with an Application-Specific Language.
Zaslavsky, N., Garvin K., Kemp C., Tishby N., & Regier T. (2019).  Evolution and efficiency in color naming: The case of Nafaanra. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Shastri, L., & Feldman J. (1985).  Evidential Reasoning in Semantic Networks: A Formal Theory. Proceedings of the 9th International Joint Conference on Artificial Intelligence. 465-474.
Feldman, J., & Shastri L. (1984).  Evidential Inference in Activation Networks. Proceedings of the 6th Cognitive Science Conference.
Allman, M. (2003).  An Evaluation of XML-RPC. ACM Performance Evaluation Review.
Allman, M., Hayes C., & Ostermann S. (1998).  An Evaluation of TCP with Larger Initial Windows. ACM Computer Communication Review. 28,
Favre, B., Bohnet B., & Hakkani-Tür D. (2010).  Evaluation of Semantic Role Labeling and Dependency Parsing of Automatic Speech Recognition Output. 5342-5345.
Gupta, A., Howe W., Moran M., & Nguyen Q. (1994).  Evaluation of Resource Sharing Benefits.
Verma, D. C., & Ferrari D. (1991).  Evaluation of Overflow Probabilities in Resource Management.
Yoshida, M., Ikeda C., & Suzuki H. (1994).  An Evaluation of Burst-level Bandwidth Reservation Methods in WANEnvironments.
Adams, O., Cohn T., Neubig G., Cruz H., Bird S., & Michaud A. (2018).  Evaluating phonemic transcription of low-resource tonal languages for language documentation. Proceedings of the LREC 2018 Workshop.

Pages