Publications

Found 296 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Rayner, M., Hockey B. Ann, & Bouillon P. (2006).  Putting Linguistics into Speech Recognition: The Regulus Grammar Compiler.
Chang, N., Narayanan S., & Petruck M. R. L. (2002).  Putting Frames in Perspective. Proceedings COLING 2002.
Narayanan, S., Petruck M. R. L., Baker C. F., & Fillmore C. J. (2003).  Putting FrameNet Data into the ISO Linguistic Annotation FrameWork. Proceedings of the ACL 2003 Workshop on Linguistic Annotation: Getting the Model Right.
Chang, N., & Mok E. (2006).  Putting Context in Constructions.
Gottlieb, L., Choi J., Kelm P., Sikora T., & Friedland G. (2012).  Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location. 23-28.
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
Herzberg, A., & Luby M. (1992).  Public Randomness in Cryptography.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Impagliazzo, R., & Luby M. (1989).  Pseudo-Random Number Generator From ANY One-Way Function.
Feldman, J., Lim C-C., & Mazzanti F. (1991).  pSather Monitors: Design, Tutorial, Rationale and Implementation.
Feldman, J., Lim C-C., & Mazzanti F. (1989).  pSather monitors: Design, Tutorial, Rationale and Implementation.
Feldman, J., Lim C-C., & Murer S. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Murer, S., Feldman J., Lim C-C., & Seidel M-M. (1993).  pSather: Layered Extensions to an Object-Oriented Language for Efficient Parallel Computation.
Stoutamire, D. (1995).  The pSather 1.0 Manual.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Rejaie, R., Handley M., Yu H., & Estrin D. (1999).  Proxy Caching Mechanism for Multimedia Playback Streams in the Internet. Proceedings of the Fourth International Web Caching Workshop.
Bergbauer, J., Nieuwenhuis C., Souiai M., & Cremers D. (2013).  Proximity Priors for Variational Semantic Segmentation and Recognition.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications. IEEE Transactions on Systems. 34(3), 1398-1422.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. J. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

Pages