Publications
Export 1389 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is P [Clear All Filters]
2011. Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
2011. Approximation algorithms for throughput maximization in wireless networks with delay constraints. 2011 Proceedings IEEE INFOCOM. :1116-1124.
1998. AQuA: an adaptive architecture that provides dependable distributed objects. Seventeenth IEEE Symposium on Reliable Distributed Systems. :245-253.
2009. Arabic Cross-Document Coreference Resolution. Proceedings of the ACL-IJCNLP 2009 Conference Short Papers$}$. :357-360.
2006. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. Proceedings of the 15th conference on USENIX Security Symposium. :20-20.
2005. Are GSM phones THE solution for localization? Mobile Computing Systems and Applications, 2006. WMCSA'06. Proceedings. 7th IEEE Workshop on. :34-42.
1989. Assessing others' knowledge and ignorance. Proceedings of the 4th International Symposium on Methodologies for Intelligent Systems.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2007. Automated detection of persistent kernel control-flow attacks. Proceedings of the 14th ACM conference on Computer and communications security. :103-115.
2010. Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation. 2010 Conference on Design and Architectures for Signal and Image Processing (DASIP). :265-272.
2010. Automatic target recognition based on simultaneous sparse representation. Image Processing (ICIP), 2010 17th IEEE International Conference on. :1377-1380.
2002. Automatic transcription of Czech language oral history in the MALACH project: resources and initial experiments. Proceedings of the The 5th International Conference on Text, Speech and Dialogue. :57-64.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
2011. AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
1981. Bayesian classification in medicine: The transferability question. Proceedings of the Fifth Annual Symposium on Computer Applications in Medical Care. :250-252.
2010. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
2008. BELIV'08: Beyond time and errors: novel evaluation methods for information visualization. CHI '08 extended abstracts on Human factors in computing systems. :3913-3916.
1997. Better approximation guarantees for job-shop scheduling. Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms. :599-608.
2011. Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
1997. Bringing treasures to the surface: iterative design for the Library of Congress National Digital Library Program. Proceedings of the SIGCHI conference on Human factors in computing systems. :518-525.
1998. Bringing treasures to the surface: previews and overviews in a prototype for the Library of Congress National Digital Library. CHI 98 conference summary on Human factors in computing systems. :187-188.
2008. Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.