Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Govindan, R., & Radoslavov P. (2002).  An Analysis of The Internal Structure of Large Autonomous Systems.
Stoutamire, D., Zimmermann W., & Trapp M. (1996).  An Analysis of the Divergence of Two Sather Dialects.
Cuendet, S., Shriberg E., Favre B., Fung J., & Hakkani-Tür D. (2007).  An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings. 43-59.
Luby, M., Mitzenmacher M., & M. Shokrollahi A. (1997).  Analysis of Random Processes via And-Or Tree Evaluation.
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (2020).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Vasudeva, K., Simsek M., & López-Pérez D. (2017).  Analysis of Handover Failures in Heterogeneous Networks With Fading. IEEE Transactions on Vehicular Technology. 66(7), 
Friedrich, T., Oliveto P.. S., Sudholt D., & Witt C. (2009).  Analysis of Diversity-Preserving Mechanisms for Global Exploration. Evolutionary Computation. 17(4), 455-476.
Nakamura, T., & Berlekamp E. (2002).  Analysis of Composite Corridors.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Jansen, T., & Sudholt D. (2010).  Analysis of an Asymmetric Mutation Operator. Evolutionary Computation. 18(1), 1-26.
Narayanan, S., & McIlraith S. (2003).  Analysis and Simulation of Web Services. Computer Networks. 42, 675-693.
Demers, A. J., Keshav S., & Shenker S. J. (1990).  Analysis and Simulation of a Fair Queuing Algorithm. Journal of Internetworking: Research and Experience. 1(1), 3-26.
Demers, A. J., Keshav S., & Shenker S. J. (1989).  Analysis and Simulation of a Fair Queuing Algorithm. Proceedings of the 1989 SIGCOMM Symposium on Communications Architectures & Protocols. 1-12.
Chiang, H-L., Kadur T., & Fettweis G. (2016).  Analyses of orthogonal and non-orthogonal steering vectors at millimeter wave systems. 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). 1-6.
Song, X., Hälsig T., Rave W., Lankl B., & Fettweis G. (2016).  Analog equalization and low resolution quantization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Song, X., Rave W., & Fettweis G. (2016).  Analog and successive channel equalization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Petruck, M. R. L. (2013).  Ambitions for FrameNet. 17(1), 5-10.
Richter, D. (1992).  Ambiguities in Object Specifications in View of Data Testing.
Bertasius, G., Yu S. X., Park H. Soo, & Shi J. (2016).  Am I a Baller? Basketball Skill Assessment using First-Person Cameras.
Fillmore, C. J. (1975).  An Alternative to Checklist Theories of Meaning. 123-131.
Emig, D., Salomonis N., Baumbach J., Lengauer T., Conklin B. R., & Albrecht M. (2010).  AltAnalyze and DomainGraph: Analyzing and Visualizing Exon Expression Data. Nucleic Acids Research. 38, W755-W762.
Karpinski, M., & Rytter W. (1993).  An Alphabet-Independent Optimal Parallel Search for Three Dimensional Patterns.

Pages