Publications

Found 297 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Feldman, J., Ballard D. Harry, Brown C. M., & Dell G.. S. (1985).  Rochester Connectionist Papers: 1979-1985.
Feldman, J., Ballard D. Harry, Brown C. M., & Small S.. L. (1984).  Rochester Connectionist Papers 1979-84.
Feldman, J., Lantz K.., Gradischnig K. D., & Rashid R. F. (1982).  Rochester's Intelligent Gateway. Computer. 15,
Lantz, K.. A., Gradischnig K. D., Feldman J., & Rashid R. F. (1982).  Rochester's Intelligent Gateway. IEEE Computer. 15(10), 54-68.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S. J., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Narayanan, S. (2003).  The role of cortico-basal-thalamic loops in cognition: a computational model and preliminary results. Neurocomputing. 52-54, 605-614.
Boulis, C., Kahn J. G., & Ostendorf M. (2005).  The Role of Disfluencies on Topic Classification of Human-Human Conversations. Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05).
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Pötzsch, S., & Boehme R. (2010).  The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395.
Garg, N. P., Favre S.., Salamin H.., Hakkani-Tür D., & Vinciarelli A.. (2008).  Role Recognition for Meeting Participants: An Approach Based on Lexical Information and Social Network Analysis. 693-696.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Ryu, S-J., Kirchner M., Lee M-J., & Lee H-K. (2013).  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security. 8(8), 1355-1370.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Mao, Z. Morley, Govindan R., Varghese G., & Katz R. H. (2002).  Route Flap Dampening Exacerbates Internet Routing Convergence. Proceedings of the ACM SIGCOMM 2002.
Ratnasamy, S., Stoica I., & Shenker S. J. (2002).  Routing Algorithms for DHTs: Some Open Questions. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 45-52.
Lakshminarayanan, K., Stoica I., & Shenker S. J. (2004).  Routing as a Service. Proceedings of the Service Architecture for Heterogeneous Access, Resources, and Applications Retreat (SAHARA 2004).
Lakshminarayanan, K., Stoica I., Shenker S. J., & Rexford J. (2006).  Routing as a Service.
Zhang, L., Deering S., Estrin D., Shenker S. J., & Zappala D. (1993).  RSVP: A Resource ReSerVation Protocol. IEEE Network Magazine. 7(5), 8-18.
Ajjanagadde, V., & Shastri L. (1991).  Rules and variables in neural nets. 3,
Horoba, C., & Sudholt D. (2009).  Running Time Analysis of ACO Systems for Shortest Path Problems. 76-91.
Elsässer, R., & Sauerwald T. (2009).  On the Runtime and Robustness of Randomized Broadcasting. Theoretical Computer Science. 410(36), 3414-3427.
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.

Pages