Export 223 results:
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Fermüller C, Aloimonos Y.  1995.  Global rigidity constraints in image displacement fields. , Fifth International Conference on Computer Vision, 1995. Proceedings. :245-250.
Fermüller C, Aloimonos Y.  1992.  Perceptual computational advantages of tracking. , 11th IAPR International Conference on Pattern Recognition, 1992. Vol.I. Conference A: Computer Vision and Applications, Proceedings. :599-602.
Fermin DR, Barac A, Lee S, Polster SP, Hannenhalli S, Bergemann TL, Grindle S, Dyke DB, Pagani F, Miller LW et al..  2008.  Sex and Age Dimorphism of Myocardial Gene Expression in Nonischemic Human Heart Failure. Circulation: Cardiovascular Genetics. 1(2):117-125.
Fekete JD, Wang D, Dang N, Aris A, Plaisant C.  2003.  Overlaying graph links on treemaps. IEEE Symposium on Information Visualization Conference Compendium (demonstration).
Fekete SP, Khuller S, Klemmstein M, Raghavachari B, Young N.  1997.  A Network-Flow Technique for Finding Low-Weight Bounded-Degree Spanning Trees. Journal of Algorithms. 24(2):310-324.
Fekete J-D, Plaisant C.  2004.  Les leçons tirées des deux compétitions de visualisation d'information. Proceedings of the 16th conference on Association Francophone d'Interaction Homme-Machine. :7-12.
Fekete J-D, Plaisant C.  1999.  Excentric labeling: dynamic neighborhood labeling for data visualization. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :512-519.
Fekete J-D, Plaisant C.  2002.  Interactive information visualization of a million items. Information Visualization, 2002. INFOVIS 2002. IEEE Symposium on. :117-124.
Feige U, Halldórsson MM, Kortsarz G, Srinivasan A.  2003.  Approximating the domatic number. SIAM Journal on Computing. 32(1):172-195.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Fedder GK, Blanton S, Carley LR, Gupta SK, Koester D.  2001.  Integrated Microelectromechanical System (MEMS) Inertial Measurement Unit (IMIMU).
Feamster N, Dingledine R.  2004.  Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
Feamster N, Balakrishnan H.  2004.  Verifying the Correctness of Wide-Area Internet Routing. MIT-CSAIL-TR-2004-031
Feamster N, Rexford J.  2002.  Network-wide BGP route prediction for traffic engineering. Proceedings of ITCOM.
Feamster N, Voellmy A, Agarwal A, Hudak P, Burnett S, Launchbury J.  2010.  Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. YALEU/DCS/RR-1432
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Feamster N, Balakrishnan H.  2002.  Packet loss recovery for streaming video. 12th International Packet Video Workshop.
Feamster N, Rexford J.  2004.  Modeling BGP route selection within an AS. IEEE/ACM Transactions on Networking.
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Feamster N, Balakrishnan H.  2003.  Towards a logic for wide-area Internet routing. SIGCOMM Comput. Commun. Rev.. 33(4):289-300.
Feamster N, Wee S.  1999.  An MPEG-2 to H. 263 transcoder. SPIE Voice, Video, and Data Communications Conference.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Defeating Web censorship with untrusted messenger discovery. Workshop on Privacy Enhancing Technologies.
Feamster N.  2008.  Fighting spam, phishing, and online scams at the network level. Proceedings of the 4th Asian Conference on Internet Engineering. :39-40.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.