Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Chen, B. Y., Zhu Q., & Morgan N. (2005).  Tonotopic Multi-Layered Perceptron: A Neural Network for Learning. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 945-948.
Michaelis, L.., Chang N., & Narayanan S. (2005).  Together at Last: The Tense-Aspect Interface in Simulation Semantics. Proceedings of the First Conference on New Directions in Cognitive Linguistics.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Fortino, G., Nigro L., & Albanese A. (1999).  A Time-Sensitive Actor Framework in Java for the Development of Multimedia Systems over the Internet MBone.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Feldman, J. (1988).  Time, Space and Form in Vision.
Feldman, J. (1988).  Time, Space, and Form in Vision.
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Herrtwich, R. Guido (1990).  Time Dated Streams in Continuous-Media Systems.
Fillmore, C. J. (1971).  Time. 28-37.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., & Naor S.. (2004).  Tight Lower Bounds for the Asymetric k-Center Problem. Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04).
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Hadziosmanovic, D., Sommer R., Zambon E., & Hartel P. (2013).  Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems.
Karp, R. M. (2009).  Three Combinatorial Problems in Computational and Genomic Biology.
Holtkamp, M. (1997).  Thread Migration with Active Threads.
Allman, M. (2008).  Thoughts on Reviewing. ACM Computer Communication Review. 38(2), 47-50.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Egelman, S., Kannavara R., & Chow R. (2015).  Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Jeub, L. G. S., Balachandran P., Porter M. A., Mucha P. J., & Mahoney M. (2014).  Think Locally, Act Locally: The Detection of Small, Medium-Sized, and Large Communities in Large Networks.
Friedland, G., Elizalde B. Martinez, Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media.
Elizalde, B. Martinez, Friedland G., Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media. 27-32.
Arnold, O.., & Jantke K.. P. (1994).  Therapy Plan Generation in Complex Dynamic Environments.
Karp, R. M. (2012).  Theory of Computation as an Enabling Tool for the Sciences.

Pages