Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Suchan, J., Bhatt M., & Yu S. X. (2016).  The Perception of Symmetry in the Moving Image -- Multi-Level Computational Analysis of Cinematographic Scene Structure and Its Visual Reception. Proceedings of ACM Symposium on Applied Perception.
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Sudholt, D. (2010).  General Lower Bounds for the Running Time of Evolutionary Algorithms. 124-133.
Sudholt, D. (2011).  Using Markov-Chain Mixing Time Estimates for the Analysis of Ant Colony Optimization. 139-150.
Sun, B., Peng X., Yu S. X., & Saenko K. (2017).  Ground2Sky Label Transfer for Fine-grained Aerial Car Recognition. Proceedings of the International Conference on Image Processing 2017.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Surana, S., Patra R., Nedevschi S., Ramos M., Subramanian L., Ben-David Y., et al. (2008).  Beyond Pilots: Keeping Rural Wireless Networks Alive.
Suthram, S.., Beyer A.., Karp R. M., Eldar Y.., & Ideker T. E. (2008).  E-QED: An Efficient Method for Interpreting eQTL Associations Using Protein Networks. Molecular Systems Biology.
Szyperski, C., & Ventre G. (1993).  A Characterization of Multi-Party Interactive Multimedia Applications.
Szyperski, C., Omohundro S., & Murer S. (1993).  Engineering a Programming Language: The Type and Class System of Sather.
Szyperski, C., & Ventre G. (1993).  Efficient Multicasting for Interactive Multimedia Applications.
T
Taber, A., Kumar G., Freytag M., & Shapiro V. (2018).  A moment-vector approach to interoperable analysis. Computer-Aided Design. 102, 139-147.
Tahaei, M., Frik A., & Vaniea K. (2021).  Privacy Champions in Sofware Teams: Understanding Their Motivations, Strategies, and Challenges. CHI Conference on Human Factors in Computing Systems. 2021,
Tahaei, M., Bernd J., & Rashid A. (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC. 117-130.
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Tajchman, G., Jurafsky D., & Fosler-Lussier E. (1995).  Learning Phonological Rule Probabilities from Speech Corpora with Exploratory Computational Phonology. Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics (ACL 1995). 1-5.
Tan, Z., Waterman A., Avižienis R., Lee Y., Cook H., Patterson D., et al. (2010).  RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors.
Tan, Z., Asanović K., & Patterson D. (2010).  An FPGA-Based Simulator for Datacenter Networks.
Tan, Z., Asanović K., & Patterson D. (2011).  Datacenter-Scale Network Research on FPGAs.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Tan, Z., Asanović K., & Patterson D. (2008).  An FPGA Host-Multithreaded Functional Model for SPARC v8.
Tanay, A., Sharan R., Kupiec M., & Shamir R. (2004).  Revealing Modularity and Organization in the Yeast Molecular Network by Integrated Analysis of Highly Heterogeneous Genome-Wide Data. Proceedings of the National Academy of Sciences of the United States of America. 101(9), 2981-2986.
Tandon, N., Rajagopal D., & de Melo G. (2012).  Markov Chains for Robust Graph-Based Commonsense Information Extraction.
Tang, L.., Li J., Li Y.., & Shenker S. J. (2009).  An Investigation of the Internet’s IP-Layer Connectivity. Computer Communications. 32(5), 913-926.

Pages