Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Journal Article
Feigenbaum, J., Archer A.., Krishnamurthy A., Sami R., & Shenker S. J. (2004).  Approximation and Collusion in Multicast Cost Sharing. Games and Economic Behavior. 47(1), 36-71.
Bringmann, K., & Friedrich T. (2010).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. Computational Geometry. 43(6-7), 601-610.
Friedrich, T., He J., Hebbinghaus N., Neumann F., & Witt C. (2010).  Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models. Evolutionary Computation. 18(4), 617-633.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2001).  Application-Level Multicast Using Content-Addressable Networks. 2233, 14-29.
Fernández-Iglesias, M. J., González-Castaño F. J., Llamas-Nistal M., Pousada-Carballo J. M., & Vales-Alonso J. (2002).  On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals. Journal of Systems and Software. 60(1), 49-56.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Ferrer, L., Sönmez K., & Shriberg E. (2009).  An Anticorrelation Kernel for Subsystem Training in Multiple Classifier Systems. Journal of Machine Learning Research. 10, 2079-2114.
Friedland, G., & Rojas R. (2008).  Anthropocentric Video Segmentation for Lecture Webcasts. EURASIP Journal on Image and Video Processing. 8(2), 
Friedland, G. (2009).  Analytics for Experts. Featured paper in ACM SIGMM Records. 1,
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 
Vasudeva, K., Simsek M., & López-Pérez D. (2017).  Analysis of Handover Failures in Heterogeneous Networks With Fading. IEEE Transactions on Vehicular Technology. 66(7), 
Friedrich, T., Oliveto P.. S., Sudholt D., & Witt C. (2009).  Analysis of Diversity-Preserving Mechanisms for Global Exploration. Evolutionary Computation. 17(4), 455-476.
Jansen, T., & Sudholt D. (2010).  Analysis of an Asymmetric Mutation Operator. Evolutionary Computation. 18(1), 1-26.
Narayanan, S., & McIlraith S. (2003).  Analysis and Simulation of Web Services. Computer Networks. 42, 675-693.
Demers, A. J., Keshav S., & Shenker S. J. (1990).  Analysis and Simulation of a Fair Queuing Algorithm. Journal of Internetworking: Research and Experience. 1(1), 3-26.
Emig, D., Salomonis N., Baumbach J., Lengauer T., Conklin B. R., & Albrecht M. (2010).  AltAnalyze and DomainGraph: Analyzing and Visualizing Exon Expression Data. Nucleic Acids Research. 38, W755-W762.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Karp, R. M., & Shamir R. (2000).  Algorithms for Optical Mapping.
Feldman, J., & Rovner P. D. (1969).  An ALGOL-based Associative Language. Communications of the ACM. 12(8), 439-449.
Gittens, A.., Rothauge K.., Mahoney M., Wang S.., Gerhardt L.., Prabhat, et al. (2018).  Alchemist: An Apache Spark <=> MPI Interface. Concurrency and Computation: Practice and Experience (Special Issue of the Cray User Group, CUG 2018), e5026.
Mahajan, R., Bellovin S. M., Floyd S., Ioannidis J., Paxson V., & Shenker S. J. (2002).  Aggregate Congestion Control. ACM SIGCOMM Computer Communication Review. 32(1), 69.
Donahue, J., Krahenbuhl P., & Darrell T. (2016).  Adversarial Feature Learning. CoRR. abs/1605.09782,
Shastri, L. (1999).  Advances in Shruti - A Neurally Motivated Model of Relational Knowledge Representation and Rapid Inference Using Temporal Synchrony. Applied Intelligence. 11(1), 79-108.
Breslau, L. (2000).  Advances in Network Simulation. IEEE Computer. 59-67.
Petruck, M. R. L. (2011).  Advances in Frame Semantics. Constructions and Frames. 3(1), 1-8.

Pages