Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. J. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Gat-Viks, I., Sharan R., & Shamir R. (2003).  Scoring Clustering Solutions by Their Biological Relevance. Bioinformatics. 2381-2389.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Seamless Multimedia Communications in Heterogeneous Mobile Access Networks. Proceedings of the TERENA Networking Conference (TNC 2004).
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Yang, H. Hua, & Hermansky H. (2000).  Search for Information Bearing Components in Speech. 12,
Conde, L., Bracci P. M., Halperin E., & Skibola C. F. (2011).  A Search for Overlapping Genetic Susceptibility Loci Between Non-Hodgkin Lymphoma and Autoimmune Diseases. Genomics. 98(1), 9-14.
Karp, R. M., Saks M., & Wigderson A. (1986).  On a Search Problem Related to Branch-and-Bound Procedures. Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Beamer, S., Asanović K., & Patterson D. (2011).  Searching for a Parent Instead of Fighting Over Children: A Fast Breadth-First Search Implementation for Graph500.
Karp, R. M., & Pearl J.. (1983).  Searching for an optimal path in a tree with random costs. Artificial Intelligence. 21(1-2), 99-116.
de Melo, G., & Hose K. (2012).  Searching the Web of Data (Tutorial Abstract).
Rojas, R. (1993).  Second Order Backpropagation - Efficient Computation of the Hessian Matrix for Neural Networks.
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Oppliger, R., Gupta A., Moran M., & Bettati R. (1995).  A Security Architecture for Tenet Scheme 2.
Fabian, B., & Günther O. (2009).  Security Challenges of the EPC Network. 121-125.
Galera, F.. J., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Security Extensions to MMARP Through Cryptographically Generated Addresses. Lecture Notes on Informatics. P-68,
Unger, H. (1998).  A Security Mechanism for the Resource Management in a Web Operating System.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.
Fillmore, C. J., Baker C. F., & Sato H. (2002).  Seeing Arguments Through Transparent Structures. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). 787-791.
Shastri, L., & Wendelken C. (2000).  Seeking coherent explanations - a fusion of structured connectionism, temporal synchrony, and evidential reasoning. Proceedings of the 22nd Annual Conference of the Cognitive Science Society (CogSci 2000).

Pages