Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Karp, R. M., Saks M., & Wigderson A. (1986).  On a Search Problem Related to Branch-and-Bound Procedures. Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
Conde, L., Bracci P. M., Halperin E., & Skibola C. F. (2011).  A Search for Overlapping Genetic Susceptibility Loci Between Non-Hodgkin Lymphoma and Autoimmune Diseases. Genomics. 98(1), 9-14.
Yang, H. Hua, & Hermansky H. (2000).  Search for Information Bearing Components in Speech. 12,
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Seamless Multimedia Communications in Heterogeneous Mobile Access Networks. Proceedings of the TERENA Networking Conference (TNC 2004).
Gat-Viks, I., Sharan R., & Shamir R. (2003).  Scoring Clustering Solutions by Their Biological Relevance. Bioinformatics. 2381-2389.
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. J. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Feldman, J. (1977).  The Science of Artificial Intelligence.
Ferrari, D., & Verma D. C. (1989).  A Scheme for Real-Time Channel Establishment in Wide-Area Networks.
Freksa, C., Moratz R., & Barkowsky T. (1999).  Schematic Maps for Robot Navigation.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Schmidt, G. (1998).  Scheduling with Limited Machine Availability.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling Parallel Communication: The h-Relation Problem.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Yao, F., Demers A. J., & Shenker S. J. (1995).  A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Fillmore, C. J. (1977).  Scenes-and-frames semantics, Linguistic Structures Processing. 55-88.
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Baraldi, A. (1998).  Scatter-Partitioning RBF Network for Function Regression and Image Segmentation: Preliminary Results.
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks. Special Workshop in Maui(SWIM).
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2003).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks.
Mok, E., Bryant J., & Feldman J. (2004).  Scaling Understanding Up to Mental Spaces. Proceedings of ScaNaLU-2004.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).

Pages