Found 207 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Hasegawa, Y., Lee-Goldman R., Kong A., & Akita K. (2011).  FrameNet as a Resource for Paraphrase Research. Constructions and Frames. 3(1), 104-127.
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Hasan, S., Ben-David Y., Scott C., Brewer E., & Shenker S. (2012).  Enabling Rural Connectivity with SDN.
Hartman, T., & Sharan R. (2004).  A 1.5-Approximation Algorithm for Sorting by Transpositions and Transversals.
Härtig, H. (1994).  Near or Far.
Harren, M.., Hellerstein J. M., Huebsch R., Loo B. Thau, Shenker S., & Stoica I. (2002).  Complex Queries in DHT-based Peer-to-Peer Networks. Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS '02). 2429, 242-250.
Hardy, J.., Frederick C.., Kay P., & Werner J.. (2005).  Color Naming Lens Aging and Grue: What the Optics of the Aging Eye Can Teach Us About Color Language. Psychological Science. 16(4), 321-327.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Harbach, M., De Luca A., Malkin N., & Egelman S. (2016).  Keep on Lockin’ in the Free World: A Multi-National Comparison of Smartphone Locking. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Hannum, G., Srivas R., Guénolé A., van Attikum H., Krogan N. J., Karp R. M., et al. (2009).  Genome-Wide Association Data Reveal a Global Map of Genetic Interaction Among Protein Complexes. PLoS Genetics. 5(12), 
Handley, M., Hodson O., & Kohler E. (2002).  XORP: An Open Platform for Network Research.
Handley, M., Thaler D., & Kermode R. (2000).  Multicast-Scope Zone Announcement Protocol (MZAP).
Handley, M. (1997).  An Examination of MBone Performance.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Handley, M., Perkins C.., & Whelan E.. (2002).  Session Announcement Protocol.
Handley, M., Floyd S., Padhye J., & Widmer J. (2003).  RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification.
Handley, M., & Floyd S. (1998).  Strawman Specification for TCP Friendly (Reliable) Multicast Congestion Control (TFMCC).
Handley, M., Kreibich C., & Paxson V. (2001).  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). Proceedings of USENIX Security Symposium 2001.
Handley, M., Floyd S., Whetten B., Kermode R., Vicisano L., & Luby M. (2000).  The Reliable Multicast Design Space for Bulk Data Transfer.
Handley, M., Crowcroft J., Bormann C.., & Ott J.. (1998).  Very Large Conferences on the Internet: the Internet Multimedia Conferencing Architecture.
Handley, M., Padhye J., & Floyd S. (1999).  TCP Congestion Window Validation.
Handley, M., & Crowcroft J. (1997).  Network Text Editor (NTE): A scalable shared text editor for the MBone. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM '97).
Handley, M., Floyd S., & Padhye J. (2000).  TCP Congestion Window Validation.