Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Journal Article
Chiesa, M., Nikolaevskiy I., Mitrovic S., Gurtov A., Madry A., Schapira M., et al. (2017).  On the Resiliency of Static Forwarding Tables. IEEE/ACM Transactions on Networking. 25(2), 
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
Ben-Dor, A., Karp R. M., Schwikowski B., & Shamir R. (2003).  The Restriction Scaffold Problem. Journal of Computational Biology. 10(3-4), 385-398.
Casado, M., Freedman M. J., Pettit J., Luo J.., Gude N. S., McKeown N., et al. (2009).  Rethinking Enterprise Network Control. IEEE/ACM Transactions on Networking. 17(4), 1270-1283.
Fillmore, C. J. (2009).  Review Article: A Valency Dictionary of English. International Journal of Lexicography. 22(1), 55-85.
Mnich, M. (2011).  Review of F. V. Fomin and D. Kratsch, "Exact Exponential Algorithms". Operations Research Letters. 39(3), 229-230.
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2015).  Robotic Learning of Haptic Adjectives Through Physical Interaction. Robot. Auton. Syst.. 63(P3), 279–292.
Nishimura, J., & Friedman E. (2011).  Robust Convergence in Pulse Coupled Oscillators with Delays. Physical Review Letters. 106(19), 
Kingsbury, B., Morgan N., & Greenberg S. (1998).  Robust Speech Recognition Using the Modulation Spectrogram. Speech Communication. 25, 117-132.
Feldman, J., Lantz K.., Gradischnig K. D., & Rashid R. F. (1982).  Rochester's Intelligent Gateway. Computer. 15,
Lantz, K.. A., Gradischnig K. D., Feldman J., & Rashid R. F. (1982).  Rochester's Intelligent Gateway. IEEE Computer. 15(10), 54-68.
Narayanan, S. (2003).  The role of cortico-basal-thalamic loops in cognition: a computational model and preliminary results. Neurocomputing. 52-54, 605-614.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Ryu, S-J., Kirchner M., Lee M-J., & Lee H-K. (2013).  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security. 8(8), 1355-1370.
Zhang, L., Deering S., Estrin D., Shenker S. J., & Zappala D. (1993).  RSVP: A Resource ReSerVation Protocol. IEEE Network Magazine. 7(5), 8-18.
Elsässer, R., & Sauerwald T. (2009).  On the Runtime and Robustness of Randomized Broadcasting. Theoretical Computer Science. 410(36), 3414-3427.
Liu, X., & Shapiro V. (2017).  Sample-based synthesis of two-scale structures with anisotropy. Computer-Aided Design. 90, 199-209.
Ratnasamy, S., Francis P., Handley M., Karp R. M., & Shenker S. J. (2001).  A Scalable Content-Addressable Network. ACM SIGCOMM Computer Communication Review. 31(4), 161-172.
Gonina, E., Friedland G., Battenberg E., Koanantakool P., Driscoll M., Georganas E., et al. (2014).  Scalable Multimedia Content Analysis on Parallel Platforms Using Python. ACM Transactions on Multimedia Computing. 10(2), 
Shenker, S. J. (1982).  Scaling Behavior in a Map of a Circle onto Itself: Empirical Results. Physica D: Nonlinear Phenomena. 5(2-3), 405-411.
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Gat-Viks, I., Sharan R., & Shamir R. (2003).  Scoring Clustering Solutions by Their Biological Relevance. Bioinformatics. 2381-2389.
Conde, L., Bracci P. M., Halperin E., & Skibola C. F. (2011).  A Search for Overlapping Genetic Susceptibility Loci Between Non-Hodgkin Lymphoma and Autoimmune Diseases. Genomics. 98(1), 9-14.
Karp, R. M., & Pearl J.. (1983).  Searching for an optimal path in a tree with random costs. Artificial Intelligence. 21(1-2), 99-116.

Pages