Publications

Export 223 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Fermüller C, Kropatsch W.  1992.  Hierarchical curve representation. , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.III. Conference C: Image, Speech and Signal Analysis, Proceedings. :143-146.
Fermüller C, Aloimonos Y.  1995.  Qualitative egomotion. International Journal of Computer Vision. 15(1):7-29.
Fermin DR, Barac A, Lee S, Polster SP, Hannenhalli S, Bergemann TL, Grindle S, Dyke DB, Pagani F, Miller LW et al..  2008.  Sex and Age Dimorphism of Myocardial Gene Expression in Nonischemic Human Heart Failure. Circulation: Cardiovascular Genetics. 1(2):117-125.
Fekete J-D, Plaisant C.  2002.  Interactive information visualization of a million items. Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on. :117-124.
Fekete JD, Wang D, Dang N, Aris A, Plaisant C.  2003.  Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).
Fekete SP, Khuller S, Klemmstein M, Raghavachari B, Young N.  1997.  A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees. Journal of Algorithms. 24(2):310-324.
Fekete J-D, Plaisant C.  1999.  Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
Fekete J-D, Plaisant C.  2004.  Les leçons tirées des deux compétitions de visualisation d'information. Proceedings of the 16th conference on Association Francophone d'Interaction Homme-Machine. :7-12.
Feige U, Halldórsson MM, Kortsarz G, Srinivasan A.  2003.  Approximating the domatic number. SIAM Journal on Computing. 32(1):172-195.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Fedder GK, Blanton S, Carley LR, Gupta SK, Koester D.  2001.  Integrated Microelectromechanical System (MEMS) Inertial Measurement Unit (IMIMU).
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Feamster N, Dingledine R.  2004.  Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
Feamster N, Rexford J.  2002.  Network-wide BGP route prediction for traffic engineering. Proceedings of ITCOM.
Feamster N, Balakrishnan H.  2004.  Verifying the Correctness of Wide-Area Internet Routing. MIT-CSAIL-TR-2004-031
Feamster N, Voellmy A, Agarwal A, Hudak P, Burnett S, Launchbury J.  2010.  Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. YALEU/DCS/RR-1432
Feamster N, Balakrishnan H.  2002.  Packet loss recovery for streaming video. 12th International Packet Video Workshop.
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Feamster N, Rexford J.  2004.  Modeling BGP route selection within an AS. IEEE/ACM Transactions on Networking.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Feamster N, Wee S.  1999.  An MPEG-2 to H. 263 transcoder. SPIE Voice, Video, and Data Communications Conference.
Feamster N, Balakrishnan H.  2003.  Towards a logic for wide-area Internet routing. SIGCOMM Comput. Commun. Rev.. 33(4):289-300.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Defeating Web censorship with untrusted messenger discovery. Workshop on Privacy Enhancing Technologies.
Feamster N.  2008.  Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.

Pages