Export 47 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Internet  [Clear All Filters]
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
Narayanan I, Sarangan V, Vasan A, Srinivasan A, Sivasubramaniam A.  2012.  Networking lessons: From computers to water. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). :1-6.
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2011.  Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
Medem A, Teixeira R, Feamster N, Meulle M.  2010.  Joint analysis of network incidents and intradomain routing changes. Network and Service Management (CNSM), 2010 International Conference on. :198-205.
Shroff N, Turaga P, Chellappa R.  2010.  Video Précis: Highlighting Diverse Aspects of Videos. IEEE Transactions on Multimedia. 12(8):853-868.
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Roitman H, Gal A, Raschid L.  2009.  Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1215-1218.
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Dachman-Soled D, Sreedhar V.C..  2007.  Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Wang F, Feamster N, Gao L.  2007.  Measuring the Contributions of Routing Dynamics to Prolonged End-to-End Internet Path Failures. Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE. :1855-1859.
Dumitras T, Lee M., Quinones P., Smailagic A., Siewiorek D, Narasimhan P..  2006.  Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired. 2006 10th IEEE International Symposium on Wearable Computers. :145-146.
Le Moigne J, Cole-Rhodes A, Eastman R, Jain P, Joshua A, Memarsadeghi N, Mount D, Netanyahu N, Morisette J, Uko-Ozoro E.  2006.  Image Registration and Fusion Studies for the Integration of Multiple Remote Sensing Data. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Bavier A, Feamster N, Huang M, Peterson L, Rexford J.  2006.  In VINI veritas: realistic and controlled network experimentation. SIGCOMM Comput. Commun. Rev.. 36(4):3-14.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
Feamster N, Johari R, Balakrishnan H.  2005.  Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
Vasan A, Memon AM.  2004.  ASPIRE: automated systematic protocol implementation robustness evaluation. Software Engineering Conference, 2004. Proceedings. 2004 Australian. :241-250.