Publications

Found 4085 results
Author Title [ Type(Asc)] Year
Technical Report
Helbig, H. (1997).  User-Friendly Information Retrieval in Data Bases and in the World Wide Web.
Sokol, J., & Widmer J. (2001).  USAIA: Ubiquitous Service Access Internet Architecture.
Hofmann, T., & Puzicha J. (1998).  Unsupervised Learning from Dyadic Data.
Kurfess, F. (1991).  Unification with ICSIM.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Schirra, J. R. J. (1995).  Understanding Radio Broadcasts On Soccer: The Concept 'Mental Image' and Its Use in Spatial Reasoning.
Gomes, B., Stoutamire D., & Weissman B. (1997).  Type-Safety and Overloading in Sather.
Irani, S. (1990).  Two Results on the List Update Problem.
Hertzberg, J., & Thiébaux S. (1993).  Turning an Action Formalism Into a Planner–A Case Study.
Stolcke, A., & Wu D. (1992).  Tree Matching with Recursive Distributed Representations.
Adcock, A. B., Sullivan B. D., & Mahoney M. W. (2014).  Tree Decompositions and Social Graphs.
Isenburg, M. (1996).  Transmission of Multimedia Data Over Lossy Networks (Thesis).
Karp, R. M. (1989).  The Transitive Closure of a Random Digraph.
Colombetti, M., & Dorigo M. (1993).  Training Agents to Perform Sequential Behavior.
Knightly, E. W., & Zhang H. (1994).  Traffic Characterization and Switch Utilization Using a Deterministic Bounding Interval Dependent Traffic Model.
Bonzon, P. E. (1995).  A Tower Architecture for Meta-Level Inference Systems Based on Omega-OrderedHorn Theories.
Ermolinskiy, A., Katti S., Shenker S., Fowler L. L., & McCauley M. (2010).  Towards Practical Taint Tracking.
Cleve, R. (1990).  Towards Optimal Simulations of Formulas by Bounded-Width Programs.
Sander, T., & Tschudin C. F. (1997).  Towards Mobile Cryptography.
Nechaev, B., Paxson V., Allman M., Bennett M., & Gurtov A. (2013).  Towards Methodical Calibration: A Case Study of Enterprise Switch Measurements.
Ben-David, S., Chor B., Goldreich O., & Luby M. (1989).  Towards a Theory of Average Case Complexity.
Ellsworth, M. (2011).  Towards a Representation for Understanding the Structure of Multiparty Conversations.
Aberer, K., & Codenotti B. (1992).  Towards a Complexity Theory for Approximation.
Kaiser, M. (1993).  Towards a Cognitively Based Approach of a Description of Spatial Deixis.
Asanović, K., & Johnson D. (1996).  Torrent Architecture Manual.

Pages