Publications

Found 4120 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Widom, M., & Shenker S. (1984).  Topological Phase Transitions. 46-51.
Fillmore, C. J. (1977).  Topics in Lexical Semantics. 79-138.
Gildea, D., & Hofmann T. (1999).  Topic-Based Language Models Using EM. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Chen, B. Y., Zhu Q., & Morgan N. (2005).  Tonotopic Multi-Layered Perceptron: A Neural Network for Learning. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 945-948.
Michaelis, L.., Chang N., & Narayanan S. (2005).  Together at Last: The Tense-Aspect Interface in Simulation Semantics. Proceedings of the First Conference on New Directions in Cognitive Linguistics.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Fortino, G., Nigro L., & Albanese A. (1999).  A Time-Sensitive Actor Framework in Java for the Development of Multimedia Systems over the Internet MBone.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Feldman, J. (1988).  Time, Space and Form in Vision.
Feldman, J. (1988).  Time, Space, and Form in Vision.
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Herrtwich, R. Guido (1990).  Time Dated Streams in Continuous-Media Systems.
Fillmore, C. J. (1971).  Time. 28-37.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., & Naor S.. (2004).  Tight Lower Bounds for the Asymetric k-Center Problem. Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04).
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Chun, B-G., Maniatis P., Shenker S., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Hadziosmanovic, D., Sommer R., Zambon E., & Hartel P. (2013).  Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems.
Karp, R. M. (2009).  Three Combinatorial Problems in Computational and Genomic Biology.
Holtkamp, M. (1997).  Thread Migration with Active Threads.

Pages