Publications

Found 4139 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Taylor, M.. E., Kulis B., & Sha F.. (2011).  Metric Learning for Reinforcement Learning Agents.
Tejeda, H., Chávez E., Sanchez J. A., & Ruiz P. M. (2006).  Energy-Efficient Routing on the Virtual Spanner. Lecture Notes in Computer Science. 4104,
Tejeda, H., Chávez E., Sanchez J. A., & Ruiz P. M. (2006).  A Virtual Spanner for Efficient Face Routing in Multihop Wireless Networks. Lecture Notes in Computer Science. 4217,
Tenenbaum, J.. M., Kay A.. C., Binford T.. O., Falk G., Feldman J., Grape G.., et al. (1971).  A Laboratory for Hand-Eye Research. Proceedings of IFIP Congress 71. 1, 206-210.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Fast Cell Select for Mobility Robustness in Intra-frequency 5G Ultra Dense Networks. Proceedings of International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Cyclic Prefix Configuration on Mobility Performance of Multi-Connectivity in 5G Networks. Conference on Standards for Communications and Networking (CSCN) 17.
Thaler, D., Handley M., & Estrin D. (2000).  The Internet Multicast Address Allocation Architecture.
Thaler, D., & Handley M. (2000).  On the Aggregatability of Multicast Forwarding State. Proceedings of Infocom 2000.
Thaw, D., Feldman J., & Li J. (2008).  CoPE: Democratic CSCW in Support of e-Learning. 481-486.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Thiagarajan, V., & Shapiro V. (2016).  Adaptively Weighted Numerical Integration in the Finite Cell Method. Computer Methods in Applied Mechanics and Engineering. 311, 250-279.
Thiagarajan, V., & Shapiro V. (2018).  Shape Aware Quadratures. Journal of Computational Physics. 374, 1239-1260.
Thiébaux, S., Hertzberg J., Shoaff W., & Schneider M. (1993).  A Stochastic Model of Actions and Plans for Anytime Planning Under Uncertainty.
Thielscher, M. (1996).  Ramification and Causality.
Thielscher, M. (1996).  Qualification and Causality.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.

Pages