Publications

Found 4214 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Holtkamp, M. (1997).  Thread Migration with Active Threads.
Karp, R. M. (2009).  Three Combinatorial Problems in Computational and Genomic Biology.
Hadziosmanovic, D., Sommer R., Zambon E., & Hartel P. (2013).  Through the Eye of the PLC: Towards Semantic Security Monitoring for Industrial Control Systems.
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2009).  Tiered Fault Tolerance for Long-Term Integrity. 267-282.
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., & Naor S.. (2004).  Tight Lower Bounds for the Asymetric k-Center Problem. Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC04).
Fillmore, C. J. (1971).  Time. 28-37.
Herrtwich, R. Guido (1990).  Time Dated Streams in Continuous-Media Systems.
Pirinen, T., & Yli-Hietanen J. (2004).  Time Delay Based Failure-Robust Direction of Arrival Estimation. Proceedings of IEEE SAM 2004.
Feldman, J. (1988).  Time, Space and Form in Vision.
Feldman, J. (1988).  Time, Space, and Form in Vision.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Fortino, G., Nigro L., & Albanese A. (1999).  A Time-Sensitive Actor Framework in Java for the Development of Multimedia Systems over the Internet MBone.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Michaelis, L.., Chang N., & Narayanan S. (2005).  Together at Last: The Tense-Aspect Interface in Simulation Semantics. Proceedings of the First Conference on New Directions in Cognitive Linguistics.
Chen, B. Y., Zhu Q., & Morgan N. (2005).  Tonotopic Multi-Layered Perceptron: A Neural Network for Learning. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 945-948.
Agarwal, D.., & Floyd S. (1994).  A Tool for Debugging Internet Multicast Routing. Proceedings of the 22nd Annual ACM Computer Science Conference (CSC '94).
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Gildea, D., & Hofmann T. (1999).  Topic-Based Language Models Using EM. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Fillmore, C. J. (1977).  Topics in Lexical Semantics. 79-138.
Widom, M., & Shenker S. J. (1984).  Topological Phase Transitions. 46-51.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,

Pages