Publications

Found 358 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Krishnan, R., Allman M., Partridge C., Sterbenz J. P. G., & Ivancic W.. (2002).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks - Summary.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks.
Krell, M. Michael, Bernd J., Li Y., Ma D., Choi J., Ellsworth M., et al. (2017).  Field Studies with Multimedia Big Data: Opportunities and Challenges.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating The Edge Network. 246-259.
Kreibich, C., & Jahnke M. (2010).  Proceedings of the 7th International Conference on Detection of Intrusions and Malware (DIMVA 2010), Bonn, Germany.
Kreibich, C., Weaver N., Nechaev B., & Paxson V. (2010).  Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2009).  Spamcraft: An Inside Look At Spam Campaign Orchestration.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Krawczyk, J.., Kohl T. A., Goesmann A.., Kalinowski J.., & Baumbach J. (2009).  From Corynebacterium Glutamicum to Mycobacterium Tuberculosis - Towards Transfers of Gene Regulatory Networks and Integrated Data Analyses with MycoRegNet. Nucleic Acids Research. 37(14), 
Krauthgamer, R., & Lee J. R. (2002).  The Intrinsic Dimensionality of Graphs.
Krauss, L.. M., Moody J., & Wilczek F. (1984).  A Stellar Energy Loss Mechanism Involving Axions. 144B,
Krauss, L.., Moody J., Wilczek F., & Morris D.. (1985).  Calculations for Cosmic Axion Detection. 55(17), 1797-1800.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Krasnova, H., Kolesnikova E.., & Günther O. (2009).  "It Wont't Happen to Me!": Self-Disclosure in Online Social Networks.
Krashinsky, R., Batten C., & Asanović K. (2008).  Implementing the Scale Vector-Thread Processor. ACM Transactions on Design Automation of Electronic Systems. 13(3), 
Krashinsky, R., Batten C., & Asanović K. (2007).  The Scale Vector-Thread Processor.

Pages