Publications

Found 642 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Technical Report
Ouyang, T., Ray S., Allman M., & Rabinovich M. (2010).  A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics.
Ouyang, T., Ray S., Allman M., & Rabinovich M. (2010).  A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics.
Reardon, J., Good N., Richter R., Vallina-Rodriguez N., Egelman S., & Palfrey Q. (2020).  JPush Away Your Privacy: A Case Study of Jiguang’s Android SDK.
Reardon, J., Good N., Richter R., Vallina-Rodriguez N., Egelman S., & Palfrey Q. (2020).  JPush Away Your Privacy: A Case Study of Jiguang’s Android SDK.
Bernini, C.., Codenotti B., Leoncini M., & Resta G. (1991).  Incomplete Factorizations for Certain Toeplitz Matrices.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Richter, M. M. (1997).  Generalized Planning and Information Retrieval.
Pan, V., & Reif J. (1992).  Generalized Compact Multigrid (REVISED).
Johnson, C. R., Fillmore C. J., Petruck M. R. L., Baker C. F., Ellsworth M., Ruppenhofer J., et al. (2002).  FrameNet: Theory and Practice.
Rao, A., Lakshminarayanan K., Stoica I., & Shenker S. J. (2002).  Flexible and Robust Large Scale Multicast Using i3.
Gupta, A., & Rothermel K. (1995).  Fault Handling for Multi-Party Real-Time Communication.
Reischuk, R. (1989).  Fast Evaluation of Boolean Formulas by CREW-PRAMs.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  Digital Fountain Approach to Reliable Distribution of Bulk Data.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  A Digital Fountain Approach to Reliable Distribution of Bulk Data.
Rüttgers, M. (1997).  Differential Evolution: A Method for Optimization of Real Scheduling Problems.
Rubinfeld, R. (1990).  Designing Checkers for Programs that Run in Parallel.
Randall, D. (1994).  Counting in Lattices: Combinatorial Problems from Statistical Mechanics.
Karpinski, M., Larmore L. L., & Rytter W. (1996).  Correctness of Constructing Optimal Alphabetic Trees Revisited.
Alfano, M., & Radouniklis N. (1996).  A Cooperative Multimedia Environment with QOS Control: Architectural and Implementation Issues.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Connectionist Speech Recognition: Status and Prospects.
Renals, S., & Morgan N. (1992).  Connectionist Probability Estimation in HMM Speech Recognition.
Berman, P., Karpinski M., Larmore L. L., Plandowski W., & Rytter W. (1996).  The Complexity of Two-Dimensional Compressed Pattern Matching.
He, X., Papadopoulos C., Radoslavov P., & Govindan R. (2001).  A Comparison of Incremental Deployment Strategies for Router-Assisted Reliable Multicast.

Pages