Publications

Found 92 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tribowski, C., Goebel C., & Günther O. (2009).  RFID Context Data Management: The Missing Link to EPCIS-Based Supply Chain Monitoring.
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Unternehmensübergreifende RFID-Anwendungen – Eine Fallstudie aus der Möbelindustrie zur RFID-basierten Auftragsabwicklung. Proceedings of the 11th Paderborner Frühjahrstagung (PBFT 2009).
Tribowski, C., Spin K., Günther O., & Sielemann O. (2009).  Storing Data on RFID Tags: A Standards-Based Approach.
Tresp, V., Moody J., & Delong W.. R. (1993).  Neural Network Modeling of Physiological Processes. 2, 363-378.
Tresp, V., Briegel T., & Moody J. (1999).  Predicting Blood Glucose Metabolism in Diabetics -- A Machine Learning Solution.
Traub, J. F., & Wozniakowski H. (1990).  The Monte Carlo Algorithm with a Pseudo-Random Generator.
Traub, J. F., & Wozniakowski H. (1990).  Information-Based Complexity: New Questions for Mathematicians.
Traub, J. F., & Wozniakowski H. (1993).  Recent Progress in Information-Based Complexity.
Toth, B.., Hakkani-Tür D., & Yaman S. (2010).  Summarization- and Learning-Based Approaches to Information Distillation. 5306-5309.
Torres, E.., Ibáñez P.., Viñals-Yúfera V.., & J. Llaberia M. (2009).  Store Buffer Design for Multibanked Data Caches. IEEE Transactions on Computers. 58(10), 1307-1320.
Torrent, T. Timponi, Ellsworth M., Baker C. F., & Matos E. Edison da (2018).  The Multilingual FrameNet Shared Annotation Task: a Preliminary Report.
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.
Töpfer, A., Zagordi O., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2013).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. Journal of Computational Biology. 20(2), 113-123.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.

Pages