Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Technical Report
Blum, L. (1990).  The Goedel Incompleteness Theorem and Decidability over a Ring.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Parris, C. J., Ventre G., & Zhang H. (1993).  Graceful Adaptation of Guaranteed Performance Service Connections.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Bauer, H-U., & Villmann T. (1995).  Growing a Hypercubical Output Space in a Self-Organizing Map.
Fritzke, B. (1993).  Growing Cell Structures - a Self-Organizing Network for Unsupervised and Supervised Learning.
Ferrari, D. (1989).  Guaranteeing Performance for Real-Time Communication in Wide-Area Networks.
Behandish, M., & Shapiro V. (2017).  A Guide to Property-Based Interoperability.
Pfennigschmidt, S.., & Voisard A. (2009).  Handling Temporal Granularity in Situation-Based Services.
Knightly, E. W. (1995).  H-BIND: A New Approach to Providing Statistical Performance Guarantees to VBR Traffic.
Leicher, C. (1994).  Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET).
Maresca, M., & Li H. (1991).  Hierarchical Node Clustering in Polymorphic Processor Arrays.
Gelbart, D. (2009).  Hill-Climbing Ensemble Feature Selection with a Larger Ensemble.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next Generation Inter-domain Routing Protocol.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.
Plaskota, L. (1995).  How to Benefit From Noise.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.

Pages