Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2009
Allman, M. (2009).  Comments on Selecting Ephemeral Ports. ACM SIGCOMM Computer Communication Review. 39(2), 13-19.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Shetty, N., Schwartz G., Felegyhazi M., & Walrand J. (2009).  Competitive Cyber-Insurance and Internet Security.
Schryen, G. (2009).  A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors. 153-168.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Baswana, S., Biswas S., Doerr B., Friedrich T., Kurur P., & Neumann F. (2009).  Computing Single Source Shortest Paths Using Single-Objective Fitness Functions. 59-66.
Pauls, A., DeNero J., & Klein D. (2009).  Consensus Training for Consensus Decoding in Machine Translation. 1418-1427.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Chang, N. (2009).  Constructing Grammar: A Computational Model of the Emergence of Early Constructions.
Mok, E. (2009).  Contextual Bootstrapping for Grammar Learning.
Kulis, B., Sra S., & Dhillon I. (2009).  Convex Perturbations for Scalable Semidefinite Programming. 296-303.
Lee-Goldman, R., & Rhodes R. (2009).  Corpus-Based Analysis and Annotation of Constructions.
C. Christoudias, M., Urtasun R., Kapoor A., & Darrell T. (2009).  Co-Training with Noisy Perceptual Observations. 2844-2851.
C. Christoudias, M., Urtasun R., Kapoor A., & Darrell T. (2009).  Co-Training with Noisy Perceptual Observations.
Gairing, M. (2009).  Covering Games: Approximation Through Non-Cooperation. 184-195.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
Voisard, A., & Ziekow H. (2009).  Designing Sensor-Based Event Processing Infrastructures: A Tradeoff Analysis.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Vinyals, O., Deng L., Yu D., & Acero A. (2009).  Discriminative Pronunciation Learning Using Phonetic Decoder and Minimum-Classification-Error Criterion. 4445-4448.
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Shriberg, E., Kajarekar S., & Scheffer N. (2009).  Does Session Variability Compensation in Speaker Recognition Model Intrinsic Variation Under Mismatched Conditions?. 1551-1554.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.

Pages