Publications

Found 317 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is T  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Shamir, R., Sharan R., & Tsur D.. (2004).  Cluster Graph Modification Problems.
Caballé, S., Feldman J., & Thaw D. (2009).  CoLPE: Support for Communities of Learning Practice by the Effective Embedding of Information and Knowledge About Group Activity. 113-127.
Yaman, S., Hakkani-Tür D., & Tur G. (2009).  Combining Semantic and Syntactic Information Sources for 5-W Question Answering. 2707-2710.
Zaslavsky, N., Kemp C., Tishby N., & Regier T. (2019).  Communicative need in colour naming. Cognitive Neuropsychology.
Thaw, D., Feldman J., Li J., & Caballé S. (2009).  Communities of Practice Environment (CoPE): Democratic CSCW for Group Production and e-Learning. 65-81.
Medina, A., Taft N., Salamatian K., Bhattacharyya S., & Diot C. (2002).  Comparative Analysis of Traffic Matrix Estimation Methods.
Thiem, S., & Lässig J. (2010).  Comparative Study of Different Approaches to Particle Swarm Optimization in Theory and Practice.
Tantau, T. (2004).  Comparing Verboseness for Finite Automata and Turing Machines. Theory of Computing Systems. 31(1), 95-109.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive Analysis of Financial Games.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive analysis of financial games. Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
Gramm, J., Nierhoff T., Sharan R., & Tantau T. (2004).  On the Complexity of Haplotyping via Perfect Phylogeny. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 35-46.
Tsai, T.. J., & Janin A. (2013).  Confidence-Based Scoring: A Useful Diagnostic Tool for Detection Tasks.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Tiwari, M., Mohan P., Osheroff A., Alkaff H., Shi E., Love E., et al. (2012).  Context-Centric Security.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Tootoonchian, A., Gorbunov S., Ganjali Y., Casado M., & Sherwood R. (2012).  On Controller Performance in Software-Defined Networks.
Medina, A., Salamatian K., Taft N., Matta I., Tsang Y., & Diot C. (2003).  On the Convergence of Statistical Techniques for Estimating Network Traffic Demands.
Medina, A., Salamatian K., Taft N., Matta I., Tsang Y., & Diot C. (2003).  On the Convergence of Statistical Techniques for Estimating Network Traffic Demands.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.
Thaw, D., Feldman J., & Li J. (2008).  CoPE: Democratic CSCW in Support of e-Learning. 481-486.
Katz, R. H., Porter G. Manning, Shenker S., Stoica I., & Tsai M. (2005).  COPS: Quality of Service Vs. Any Service at All. Proceedings of the 13th International Workshop on Quality of Service 2005 (IWQoS 2005). 3-15.
Bensel, P., Günther O., Tribowski C., & Vogeler S. (2008).  Cost-Benefit Sharing in Cross-Company RFID Applications.
Guz, U., Cuendet S., Hakkani-Tür D., & Tur G. (2007).  Co-training Using Prosodic and Lexical Information for Sentence Segmentation. 2597-2600.

Pages