Publications

Found 94 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Tejeda, H., Chávez E., Sanchez J. A., & Ruiz P. M. (2006).  A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks. Lecture Notes in Computer Science. 4217,
Tenenbaum, J.. M., Kay A.. C., Binford T.. O., Falk G., Feldman J., Grape G.., et al. (1971).  A Laboratory for Hand-Eye Research. Proceedings of IFIP Congress 71. 1, 206-210.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Cyclic Prefix Configuration on Mobility Performance of Multi-Connectivity in 5G Networks. Conference on Standards for Communications and Networking (CSCN) 17.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Fast Cell Select for Mobility Robustness in Intra-frequency 5G Ultra Dense Networks. Proceedings of International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016.
Thaler, D., & Handley M. (2000).  On the Aggregatability of Multicast Forwarding State. Proceedings of Infocom 2000.
Thaler, D., Handley M., & Estrin D. (2000).  The Internet Multicast Address Allocation Architecture.
Thaw, D., Feldman J., & Li J. (2008).  CoPE: Democratic CSCW in Support of e-Learning. 481-486.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Thiagarajan, V., & Shapiro V. (2016).  Adaptively Weighted Numerical Integration in the Finite Cell Method. Computer Methods in Applied Mechanics and Engineering. 311, 250-279.
Thiébaux, S., Hertzberg J., Shoaff W., & Schneider M. (1993).  A Stochastic Model of Actions and Plans for Anytime Planning Under Uncertainty.
Thielscher, M. (1996).  Ramification and Causality.
Thielscher, M. (1996).  Qualification and Causality.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.

Pages