Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Domingo-Pascual, J., Albanese A., & Holfelder W. (1995).  Emulation of Traffic Congestion on ATM Gigabit Networks.
Domin, C., Pohl H., & Krause M. (2016).  Improving Plagiarism Detection in Coding Assignments by Dynamic Removal of Common Ground. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 1173-1179.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Dokas, P., Jones K., Kasza A., Nadji Y., & Paxson V. (2021).  Corelight Sensors detect the ChaChi RAT. Security Boulevard.
Doerr, B., Jansen T., Sudholt D., Winzen C., & Zarges C. (2010).  Optimizing Monotone Functions Can Be Difficult. 42-51.
Doerr, B., Friedrich T., Künneman M.., & Sauerwald T. (2009).  Quasirandom Rumor Spreading: An Experimental Analysis. 145-153.
Doerr, B., Friedrich T., & Sauerwald T. (2009).  Quasirandom Rumor Spreading: Expanders, Push vs. Pull, and Robustness. 366-377.
Dodge, E., & Petruck M. R. L. (2014).  Representing Caused Motion in Embodied Construction Grammar. 39-44.
Dodge, E., Sweetser E., David O., Hong J., & Stickles E. (2014).  Constructions and Metaphor: Integrating MetaNet and Embodied Construction Grammar.
Dodge, E., Trott S., Gilardi L., & Stickles E. (2017).  Grammar Scaling: Leveraging FrameNet Data to Increase Embodied Construction Grammar Coverage. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Dodge, E. (2016).  A deep semantic corpus-based approach to metaphor analysis: A case study of metaphoric conceptualizations of poverty. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Docio, L.., Gelbart D., & Morgan N. (2003).  Far-Field ASR on Inexpensive Microphones. Proceedings of Eighth European Conference on Speech Communication and Technology (EUROSPEECH 2003). 2141-2144.
Diederich, J. (1989).  Spreading Activation and Connectionist Models for Natural Language Processing.
Diederich, J. (1989).  Explanation and Connectionist Systems.
Diederich, J. (1988).  Knowledge-Intensive Recruitment Learning.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Di Gesu, V., & Isgro F. (1995).  Context and Vision.
di Genova, P., & Ventre G. (1995).  Efficiency Comparison of Real-Time Transport Protocols.
Dhillon, R., Bhagat S., Carvey H., & Shriberg E. (2004).  Meeting Recorder Project: Dialog Act Labeling Guide.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Dharmar, M., Simon A., Sadorra C., Friedland G., Sherwood J., Morrow H., et al. (2016).  Reducing Loss to Follow-Up with Tele-audiology Diagnostic Evaluations. 22,
Dharmapurikar, S., & Paxson V. (2005).  Robust TCP Reassembly in the Presence of Adversaries. Proceedings of the 14th Conference on USENIX Security Symposium (Security '05). 65-80.

Pages