Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Adler, M., Byers J. W., & Karp R. M. (2000).  Parallel Sorting with Limited Bandwidth. 29(6), 1997-2015.
Adler, I., Ahn H-S., Karp R. M., & Ross S. M. (2005).  A Probabilistic Model for the Survivability of Cells. Journal of Applied Probability. 42(4), 919-931.
Adler, I., Karp R. M., & Shamir R. (1986).  A family of simplex variants solving an m*d linear program in expected number of pivot steps depending on d only. Mathematics of Operations Research. 11(4), 570-590.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Adler, I., Karp R. M., & Shamir R. (1987).  A Simplex variant solving an m*d linear program in O(min(m2, d2)) expected number of pivot steps. Journal of Complexity. 3(4), 372-387.
Adler, M., Halperin E., Karp R. M., & Vazirani V. V. (2003).  A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks. Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC).
Adler, M., Bartal Y., Byers J. W., Luby M., & Raz D. (1997).  A Modular Analysis of Network Transmission Protocols.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Ahmad, S., & Omohundro S. (1990).  A Network for Extracting the Locations of Point Clusters Using Selective Attention.
Ahmad, S., & Omohundro S. (1991).  Efficient Visual Search: A Connectionist Solution.
Ahmad, S. (1991).  VISIT: An Efficient Computational Model Of Human Visual Attention.
Aho, A. V., Johnson D. S., Karp R. M., & S. Kosaraju R. (1997).  Emerging Opportunities for Theoretical Computer Science. 28,
Ajjanagadde, V., & Shastri L. (1991).  Rules and variables in neural nets. 3,
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Ajmera, J., Bourlard H., Lapidot I., & McCowan I. (2002).  Unknown-Multiple Speaker Clustering Using HMM. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Ajwani, D.., & Friedrich T. (2010).  Average-Case Analysis of Incremental Topological Ordering. Discrete Applied Mathematics. 158(4), 240-250.
Akbacak, M., Vergyri D., Stolcke A., Scheffer N., & Mandal A. (2011).  Effective Arabic Dialect Classification Using Diverse Phonotactic Models. 737-740.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. ACM SIGCOMM Computer Communication Review. 32(4), 117-130.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.

Pages