Publications

Found 1117 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Technical Report
Klas, W., Fischer G., & Aberer K. (1992).  Integrating a Relational Database System into VODAK Using Its Metaclass Concept.
Koch, T. (1992).  Inductive Learning of Compact Rule Sets by Using Effcient Hypotheses Reduction.
Zhang, M., Karp B., Floyd S., & Peterson L. (2002).  Improving TCP's Performance Under Reordering with DSACK.
Lamparter, B., & Kalfane M. (1995).  The Implementation of PET.
Aberer, K., & Klas W. (1992).  The Impact of Multimedia Data on Database Management Systems.
Narasimhan, P., Kruse H., Ostermann S., & Allman M. (2004).  On the Impact of BER on Realistic TCP Traffic in Satellite Networks.
Sharan, R., Ideker T. E., Kelley B. P., Shamir R., & Karp R. M. (2003).  Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data.
Sharan, R., Ideker T. E., Kelley B. P., Shamir R., & Karp R. M. (2003).  Identification of Protein Complexes by Comparative Analysis of Yeast and Bacterial Protein Interaction Data.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Krieger, R., Becker B., & Keim M. (1994).  A Hybrid Fault Simulator for Synchronous Sequential Circuits.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Knightly, E. W. (1995).  H-BIND: A New Approach to Providing Statistical Performance Guarantees to VBR Traffic.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Konig, Y., Morgan N., & Chandra C. (1991).  GDNN: A Gender-Dependent Neural Network for Continuous Speech Recognition.
Konig, Y., Morgan N., & Chandra C. (1991).  GDNN: A Gender-Dependent Neural Network for Continuous Speech Recognition.
Knightly, E. W., & Ventre G. (1993).  Galileo: a Tool for Simulation and Analysis of Real-Time Networks.
Knightly, E. W., Wrege D. E., Liebeherr J., & Zhang H. (1994).  Fundamental Limits and Tradeoffs of Providing Deterministic Guarantees to VBR Video Traffic.
Parris, C., Keshav S., & Ferrari D. (1992).  A Framework for the Study of Pricing in Integrated Networks.
Kim, S., Fonseca R., Dutta P., Tavakoli A., Culler D. E., Levis P., et al. (2006).  Flush: A Reliable Bulk Transport Protocol for Multihop Wireless Network.

Pages