Publications

Found 4071 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Amirshahi, S. Ali, Pedersen M., & Yu S. X. (2016).  Image Quality Assessment by Comparing CNN Features Between Images. Journal of Imaging Science and Technology.
Amirshahi, S. Ali, Anoosheh A., Yu S. X., Suchan J., Schultz C., & Bhatt M. (2017).  Symmetry in the Eye of the Beholder . Proceedings of Vision Sciences Society Annual Meeting.
Anand, A.., Gupta A., Akella A., Seshan S., & Shenker S. (2008).  Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. 219-230.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Ananthanarayanan, G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S., et al. (2012).  PACMan: Coordinated Memory Caching for Parallel Jobs. 1-14.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2011).  Disk-Locality in Datacenter Computing Considered Irrelevant. 1-5.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  A New Communications API.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Andeani, G.., Di Fabbrizio D.., Gilbert M.., Gillick D., Hakkani-Tür D., & Lemon O.. (2006).  Let's DISCOH: Collecting an Annotated Open Corpus with Dialogue Acts and Reward Signals for Natural Language Helpdesks. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 218-221.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. (2008).  Accountable Internet Protocol (AIP). 339-350.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. (2007).  Holding the Internet Accountable. 1-7.
Andersen, D. G., Du S. S., Mahoney M. W., Melgaard C., Wu K., & Gu M. (2015).  Spectral Gap Error Bounds for Improving CUR Matrix Decomposition and the Nystrom Method.
Anderson, D. P., Delgrossi L., & Herrtwich R. Guido (1990).  Structure and Scheduling in Real-Time Protocol Implementations.
Anderson, D. P., Herrtwich R. Guido, & Schaefer C. (1990).  SRP: A Resource Reservation Protocol for Guaranteed-Performance Communication in the Internet.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2003).  Design Guidelines for Robust Internet Protocols. 33(1), 125-130.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Andor, J.. (2010).  Discussing Frame Semantics: The State of the Art. An Interview with Charles J. Fillmore. Review of Cognitive Linguistics. 8(1), 157-176.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Neural Module Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 39-48.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Deep compositional question answering with neural module networks. IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Learning to Compose Neural Networks for Question Answering. CoRR. abs/1601.01705,
Andrew, L., Marcondes C.., Floyd S., Dunn L., Guillier R., Gang W., et al. (2008).  Towards a Common TCP Evaluation Suite.
Ang, J., Liu Y., & Shriberg E. (2005).  Automatic Dialog Act Segmentation and Classification in Multiparty Meetings. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1061-1064.

Pages