Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Feldman, J. (1988).  Time, Space and Form in Vision.
Feldman, J. (1988).  Time, Space, and Form in Vision.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Fortino, G., Nigro L., & Albanese A. (1999).  A Time-Sensitive Actor Framework in Java for the Development of Multimedia Systems over the Internet MBone.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Michaelis, L.., Chang N., & Narayanan S. (2005).  Together at Last: The Tense-Aspect Interface in Simulation Semantics. Proceedings of the First Conference on New Directions in Cognitive Linguistics.
Chen, B. Y., Zhu Q., & Morgan N. (2005).  Tonotopic Multi-Layered Perceptron: A Neural Network for Learning. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 945-948.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Gildea, D., & Hofmann T. (1999).  Topic-Based Language Models Using EM. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Fillmore, C. J. (1977).  Topics in Lexical Semantics. 79-138.
Widom, M., & Shenker S. J. (1984).  Topological Phase Transitions. 46-51.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2010).  Topology-Free Querying of Protein Interaction Networks. Journal of Computational Biology. 17(3), 237-252.
Radoslavov, P., Govindan R., & Estrin D. (2001).  Topology-Informed Internet Replica Placement. Proceedings of the Sixth International Workshop on Web Caching and Content Distribution.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2009).  Torque: Topology-Free Querying of Protein Interaction Networks. 74-89.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2010).  Torque: Topology-Free Querying of Protein Interaction Networks. Journal of Computational Biology. 17(3), 237-252.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2009).  Torque: Topology-Free Querying of Protein Interaction Networks. Nucleic Acids Research. 37, 106-108.
Asanović, K., & Johnson D. (1996).  Torrent Architecture Manual.
Feldman, J., & Shields P.. C. (1977).  Total Complexity and the Inference of Best Programs. 10, 181-191.

Pages