Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Althaus, E., Kohlbacher O., Lenhof H-P., & Müller P. (2000).  A Branch and Cut Algorithm for the Optimal Solution of the Side Chain Placement Problem.
Feldman, J. (1984).  Brains and Robots, Two Weak Attempts at the Grand Synthesis.
Ferber, M., Hunold S., & Rauber T. (2010).  BPEL Remote Objects: Integrating BPEL Processes into Object-Oriented Applications.
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.
Karp, R. M., & Zhang Y. (1995).  Bounded branching process and AND/OR tree evaluation. Random Structures and Algorithms. 7(2), 97-116.
Pitsillidis, A., Levchenko K., Kreibich C., Kanich C., Voelker G. M., Paxson V., et al. (2010).  Botnet Judo: Fighting Spam with Itself.
Schuett, D.., Eckhardt U.., & Suda P.. (1992).  Boot Algebras.
Karpinski, M. (1989).  Boolean Circuit Complexity of Algebraic Interpolation Problems.
Feldman, J. (1996).  Book Review, Crangle and Suppes, “Language Learning".
Fifield, D., Lan C., Hynes R., Wegmann P., & Paxson V. (2015).  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Schnorr, C. P. (1992).  Block Korkin-Zolotarev Bases and Successive Minima.
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Huijbregts, M., & Wooters C. (2007).  The Blame Game: Performance Analysis of Speaker Diarization System Components. 1857-1860.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Schnorr, C. P., & Vaudenay S. (1994).  Black Box Cryptanalysis of Hash Networks Based on Multipermutations.
Halvorson, T., Szurdi J., Maier G., Felegyhazi M., Kreibich C., Weaver N., et al. (2012).  The BIZ Top-Level Domain: Ten Years Later.
Karp, R. M., Waarts O., & Zweig G. (1995).  The bit vector intersection problem. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 621-630.
Farrell, R., Oza O., Zhang N., Morariu V. I., Darrell T., & Davis L. S. (2011).  Birdlets: Subordinate Categorization Using Volumetric Primitives and Pose-Normalized Appearance. 161-168.
Graciarena, M., Delplanche M., Shriberg E., & Stolcke A. (2011).  Bird Species Recognition Combining Acoustic and Sequence Modeling. 341-344.
Shastri, L. (1999).  A Biological Grounding of Recruitment Learning and Vicinal Algorithms.
Shastri, L. (2001).  Biological grounding of recruitment learning and vicinal algorithms in long-term potentiation. 348-367.
Bermant, P. C., Brickson L., & Titus A. J. (2023).  Bioacoustic Event Detection with Self-Supervised Contrastive Learning. bioRxiv.
Pang, R., Paxson V., Sommer R., & Peterson L. (2006).  binpac: A yacc for Writing Application Protocol Parsers. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.

Pages