Found 4040 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Adler, I., Karp R. M., & Shamir R. (1987).  A Simplex variant solving an m*d linear program in O(min(m2, d2)) expected number of pivot steps. Journal of Complexity. 3(4), 372-387.
Adler, M., Bartal Y., Byers J. W., Luby M., & Raz D. (1997).  A Modular Analysis of Network Transmission Protocols.
Adler, M., Byers J. W., & Karp R. M. (2000).  Parallel Sorting with Limited Bandwidth. 29(6), 1997-2015.
Adler, M., Gemmell P., Harchol-Balter M., Karp R. M., & Kenyon C. (1994).  Selection in the presence of noise: the design of playoff systems. Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 564-572.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling Parallel Communication: The h-Relation Problem.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Ahmad, S., & Omohundro S. (1991).  Efficient Visual Search: A Connectionist Solution.
Ahmad, S. (1991).  VISIT: An Efficient Computational Model Of Human Visual Attention.
Ahmad, S., & Omohundro S. (1990).  A Network for Extracting the Locations of Point Clusters Using Selective Attention.
Aho, A. V., Johnson D. S., Karp R. M., & S. Kosaraju R. (1997).  Emerging Opportunities for Theoretical Computer Science. 28,
Ajjanagadde, V., & Shastri L. (1991).  Rules and variables in neural nets. 3,
Ajmera, J., Bourlard H., Lapidot I., & McCowan I. (2002).  Unknown-Multiple Speaker Clustering Using HMM. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Ajwani, D.., & Friedrich T. (2010).  Average-Case Analysis of Incremental Topological Ordering. Discrete Applied Mathematics. 158(4), 240-250.
Akbacak, M., Vergyri D., Stolcke A., Scheffer N., & Mandal A. (2011).  Effective Arabic Dialect Classification Using Diverse Phonotactic Models. 737-740.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. ACM SIGCOMM Computer Communication Review. 32(4), 117-130.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.