Publications

Export 853 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Anwer M B, Feamster N.  2010.  Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
Oard D, Soergel D, Doermann D, Huang X, Murray CG, Wang J, Ramabhadran B, Franz M, Gustman S, Mayfield J et al..  2004.  Building an information retrieval test collection for spontaneous conversational speech. Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval. :41-48.
Tsui C, Wang P, Fleischmann KR, Sayeed AB, Weinberg A.  2010.  Building an IT Taxonomy with Co-occurrence Analysis, Hierarchical Clustering, and Multidimensional Scaling.
C
Frangiadakis N, Roussopoulos N.  2007.  Caching in Mobile Environments: A New Analysis and the Mobile-Cache System. IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, 2007. PIMRC 2007. :1-5.
Ramachandran A, Dagon D, Feamster N.  2006.  Can DNS-based blacklists keep up with bots. Conference on email and anti-spam.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N.  2006.  Can Information from End Systems Improve Routing. Proceedings of the Workshop on Internet Routing Evolution and Design.
Feamster N, Balakrishnan H, Rexford J, Shaikh A, van der Merwe J.  2004.  The case for separating routing from routers. Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture. :5-12.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Chipman G, Druin A, Beer D, Fails JA, Guha ML, Simms S.  2006.  A case study of tangible flags: a collaborative technology to enhance field trips. Proceedings of the 2006 conference on Interaction design and children. :1-8.
Andersen DG, Feamster N.  2006.  Challenges and Opportunities in Internet Data Mining. CMU-PDL-06-102:44-44.
Blake-Hall J, Walker O, Fushman D.  2004.  Characterization of the Overall Rotational Diffusion of a Protein From 15N Relaxation Measurements and Hydrodynamic Calculations. Protein NMR Techniques. 278:139-159.
Bin Tariq M, Mansy A, Feamster N, Ammar M.  2009.  Characterizing VLAN-induced sharing in a campus network. Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. :116-121.
Aiken A, Foster JS, Kodumal J, Terauchi T.  2003.  Checking and inferring local non-aliasing. ACM SIGPLAN Notices. 38:129-140.
Furr M, Foster JS.  2005.  Checking type safety of foreign function calls. ACM SIGPLAN Notices. 40:62-72.
Furr M, Foster JS.  2008.  Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 30(4):18-18.
Furr M, Foster JS.  2005.  Checking type safety of foreign function calls. ACM SIGPLAN Notices. 40:62-72.
Furr M, Foster JS.  2008.  Checking type safety of foreign function calls. ACM Transactions on Programming Languages and Systems (TOPLAS). 30(4):18-18.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Druin A, Fast C.  2002.  The child as learner, critic, inventor, and technology design partner: An analysis of three years of Swedish student journals. International Journal of Technology and Design Education. 12(3):189-213.
Druin A, Foss E, Hutchinson H, Golub E, Hatley L.  2010.  Children's roles using keyword search interfaces at home. Proceedings of the 28th international conference on Human factors in computing systems. :413-422.
Fails JA, Druin A, Guha ML, Chipman G, Simms S, Churaman W.  2005.  Child's play: a comparison of desktop and physical interactive environments. Proceedings of the 2005 conference on Interaction design and children. :48-55.
Burnett S, Feamster N, Vempala S.  2010.  Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.
Aloimonos Y, Fermüller C.  2005.  Chromatic Induction and Perspective Distortion. Journal of VisionJ Vis. 5(8):1026-1026.
Burnett S, Feamster N, Vempala S.  2010.  Circumventing censorship with collage. Proceedings of the ACM SIGCOMM 2010 conference. :471-472.

Pages