Publications

Found 265 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. J. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
Calle, E., Jové T., Vilà P., & Marzo J. L. (2001).  A Dynamic Multilevel MPLS Protection Domain. Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
Cantone, D., & Cutello V. (1992).  Decision Procedures for Flat Set-Theorectical Syllogistics.I. General Union, Powerset and Singleton Operators.
Cantone, D., & Cutello V. (1991).  On the Decidability Problem for a Topological Syllogistic Involving the Notion of Topological Product.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Choi, J., & Friedland G. (2011).  Data-Driven vs. Semantic-Technology-Driven Tag-Based Video Location Estimation. 243-246.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2006).  The Design and Implementation of a Declarative Sensor Network System.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Chun, B-G., Maniatis P., & Shenker S. J. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.
Chun, B-G., Chen K., Lee G., Katz R. H., & Shenker S. J. (2008).  D3: Declarative Distributed Debugging.
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).

Pages