Found 4169 results
Author Title [ Type(Desc)] Year
Technical Report
Sander, T., & Tschudin C. F. (1997).  Towards Mobile Cryptography.
Cleve, R. (1990).  Towards Optimal Simulations of Formulas by Bounded-Width Programs.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Knightly, E. W., & Zhang H. (1994).  Traffic Characterization and Switch Utilization Using a Deterministic Bounding Interval Dependent Traffic Model.
Colombetti, M., & Dorigo M. (1993).  Training Agents to Perform Sequential Behavior.
Karp, R. M. (1989).  The Transitive Closure of a Random Digraph.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Adcock, A. B., Sullivan B. D., & Mahoney M. W. (2014).  Tree Decompositions and Social Graphs.
Stolcke, A., & Wu D. (1992).  Tree Matching with Recursive Distributed Representations.
Hertzberg, J., & Thiébaux S. (1993).  Turning an Action Formalism Into a Planner–A Case Study.
Irani, S. (1990).  Two Results on the List Update Problem.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Schirra, J. R. J. (1995).  Understanding Radio Broadcasts On Soccer: The Concept 'Mental Image' and Its Use in Spatial Reasoning.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Kurfess, F. (1991).  Unification with ICSIM.
Hofmann, T., & Puzicha J. (1998).  Unsupervised Learning from Dyadic Data.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Helbig, H. (1997).  User-Friendly Information Retrieval in Data Bases and in the World Wide Web.
Friedland, G. (2012).  Using a GPU, Online Diarization = Offline Diarization.
Knox, M. Tai, Friedland G., & R. Smith P. (2012).  Using Acoustic Diarization for Duplicate Detection.
Chang, S-Y., Morgan N., Raju A., Alwan A., & Kreiman J. (2015).  Using Fast and Slow Modulations to Model Human Hearing of Fast and Slow Speech.
Blanton, J., Blanton E., & Allman M. (2008).  Using Spurious Retransmissions to Adapt the Retransmission Timeout.
Gomes, B., Stoutamire D., Weissman B., & Feldman J. (1997).  Using Value Semantic Abstractions to Guide Strongly Typed Library Design.
Huckenbeck, U. (1993).  On Valve Adjustments that Interrupt all s-t-Paths in a Digraph.