Publications

Found 199 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Pfaff, B., Pettit J., Amidon K., Casado M., Koponen T., & Shenker S. J. (2009).  Extending Networking into the Virtualization Layer. 1-6.
Pfau, T., Ellis D. P. W., & Stolcke A. (2001).  Multispeaker Speech Activity Detection for the ICSI Meeting Recorder. Proceedings of Automatic Speech Recognition and Understanding Workshop (ASRU 2001). 107-110.
Pfennig, S., & Kirchner M. (2012).  Spectral Methods to Determine the Exact Scaling Factor of Resample Digital Images.
Pfennigschmidt, S.., & Voisard A. (2009).  Handling Temporal Granularity in Situation-Based Services.
Pfennigschmidt, S., & Voisard A. (2009).  Handling Temporal Granularity in Mobile Services. 295-300.
Pfennigschmidt, S., & Voisard A. (2008).  A Situation-Centric Approach to Meteorological Services in the SITUMET Platform.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Philippsen, M. (1995).  Imperative Concurrent Object-Oriented Languages.
Philippsen, M. (1994).  Automatic Alignment of Array Data and Processes To Reduce Communication Time on DMPPs.
Philippsen, M. (1995).  Imperative Concurrent Object-Oriented Languages: An Annotated Bibliography.
Philippsen, M. (1994).  Sather 1.0 Tutorial.
Philippsen, M. (1995).  Enabling Compiler Transformations for pSather 1.1.
Phillips, G., Shenker S. J., & Tangmunarunkit H. (1999).  Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
Piccolboni, A.., & Schindelhauer C. (2000).  Discrete Prediction Games with Arbitrary Feedback and Loss.
Pieraccini, R. (2012).  From AUDREY to Siri: Is Speech Recognition A Solved Problem?.
Pietracaprina, A., Pucci G., & Sibeyn J. Frederik (1993).  Constructive Deterministic PRAM Simulation on a Mesh-Connected Computer.
Pietzowski, A., Satzger B., Trumler W.., & Ungerer T. (2010).  A Practical Computer Immunology Approach for Self-Protection Enhanced by Optimization Techniques.
Pinotti, M. Cristina, & Pucci G. (1991).  Parallel Priority Queues.
Pinsdorf, U.., & Roth V. (2002).  Mobile Agent Interoperability Patterns and Practice. Proceedings Ninth Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Pitsillidis, A., Levchenko K., Kreibich C., Kanich C., Voelker G. M., Paxson V., et al. (2010).  Botnet Judo: Fighting Spam with Itself.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Plaskota, L. (1995).  How to Benefit From Noise.

Pages