Publications

Found 4166 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Fillmore, C. J. (2007).  Valency Issues in FrameNet. 128-160.
Wang, H.., Gelbart D., Hirsch H-G., & Hemmert W. (2008).  The Value of Auditory Offset Adaptation and Appropriate Acoustic Modeling. 902-905.
Goebel, C., & Günther O. (2009).  The Value of Visibility and RFID in Transshipment Operations—A Simulation Study. 129-138.
Huckenbeck, U. (1993).  On Valve Adjustments that Interrupt all s-t-Paths in a Digraph.
Becker, B., Drechsler R., & Theobald M. (1994).  On Variable Ordering of Ordered Functional Decision Diagrams.
Vasallo, P. Reviriego (2000).  Variable Packet Size Equation Based Congestion Control.
Shenker, S., Kadanoff L. P., & Pruisken A.. M. M. (1979).  A Variational Real Space Renormalization Group Transformation Based on the Cumulant Expansion. Journal of Physics A: Mathematical and General. 12(1), 91-97.
Kay, P., & Webster M. A. (2005).  Variations in Color Naming Within and Across Populations. Behavioral and Brain Sciences. 28(4), 512-513.
Malkoc, G., Kay P., & Webster M. A. (2005).  Variations in Normal Color Vision. IV. Binary Hues and Hue Scaling. Journal of the Optical Society of America A. 22(10), 2154-2168.
Karp, R. M. (1998).  Variations on the Theme of "Twenty Questions". Proceedings of the 1998 IEEE International Symposium on Information Theory. 3.
Fillmore, C. J. (1986).  Varieties of Conditional Sentences. Proceedings of the Third Eastern States Conference on Linguistics. 163-182.
Vallentin, M., Paxson V., & Sommer R. (2016).  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Karpinski, M., & Werther T. (1989).  VC Dimension and Learnability of Sparse Polynomials and Rational Functions.
Karpinski, M., & Werther T. (1991).  VC Dimension and Sampling Complexity of Learning Sparse Polynomials and Rational Functions.
Karpinski, M., & Macintyre A. (1995).  VC Dimension of Sigmoidal and General Pfaffian Neural Networks.
Asanović, K. (1998).  Vector processing system with multi-operation, run-time configurable pipelines.
Bürgisser, P., & Lickteig T. Michael (1991).  Verification Complexity of Linear Prime Ideals.
Panda, A., Sagiv M., & Shenker S. (2017).  Verification in the Age of Microservices. Proceedings of the 16th Workshop on Hot Topics in Operating Systems HotOS'17.
Sap, D., & Shapiro V. (2019).  On Verification of Interoperability of CAD Systems with a Focus on Invariant Properties. Computer-Aided Design. 115, 256-266.
Panda, A., Lahav O., Argyraki K. J., Sagiv M., & Shenker S. (2017).  Verifying Reachability in Networks with Mutable Datapaths. Proceedings of NSDI '17.
Goebel, C., Krasnova H., Syllwasschy H.., & Günther O. (2009).  Vertical Integration and Information Sharing—An Empirical Investigation in the German Apparel Industry. 399-408.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Handley, M., Crowcroft J., Bormann C.., & Ott J.. (1998).  Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture.
Amann, J., & Sommer R. (2017).   Viable Protection of High-Performance Networks through Hardware/Software Co-Design. Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.

Pages