Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Thiébaux, S., Hertzberg J., Shoaff W., & Schneider M. (1993).  A Stochastic Model of Actions and Plans for Anytime Planning Under Uncertainty.
Thielscher, M. (1996).  Qualification and Causality.
Thielscher, M. (1996).  Ramification and Causality.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Thom, A.., & Kramer O. (2010).  Acceleration of DBSCAN-Based Clustering with Reduced Neighborhood Evaluations. 195-202.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Thomas, K., Grier C., & Paxson V. (2012).  Adapting Social Spam Infrastructure for Political Censorship.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Thomee, B., Borth D., & Bernd J. (2016).  Multimedia COMMONS Workshop 2016 (MMCommons'16): Datasets, Evaluation, and Reproducibility. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 1485-1486.
Thomee, B., Shamma D. A., Elizalde B. Martinez, Friedland G., Ni K., Poland D., et al. (2015).  YFCC100M: The New Data in Multimedia Research.
Thompson, C.., Levy R.., & Manning C.. (2003).  A Generative Model for Semantic Role Labeling. Proceedings of the 14th European Conference on Machine Learning (ECML 2006). 397-408.
Titus, A. J., Hamilton K. E., & Holko M. (2023).  Cyber and Information Security in the Bioeconomy. Cyberbiosecurity. 17-36.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Tombros, T., & Crestani F. (1999).  A Study of Users' Perception of Relevance of Spoken Documents.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Töpfer, A., Zagordi O., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2013).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. Journal of Computational Biology. 20(2), 113-123.
Torrent, T. Timponi, & Ellsworth M. (2013).  Behind the Labels: Criteria for Defining Analytical Categories in FrameNet Brazil. 17(1), 44-65.

Pages