Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Suchan, J., Bhatt M., & Yu S. X. (2016).  The Perception of Symmetry in the Moving Image -- Multi-Level Computational Analysis of Cinematographic Scene Structure and Its Visual Reception. Proceedings of ACM Symposium on Applied Perception.
Sudholt, D. (2011).  Using Markov-Chain Mixing Time Estimates for the Analysis of Ant Colony Optimization. 139-150.
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Sudholt, D. (2010).  General Lower Bounds for the Running Time of Evolutionary Algorithms. 124-133.
Sun, B., Peng X., Yu S. X., & Saenko K. (2017).  Ground2Sky Label Transfer for Fine-grained Aerial Car Recognition. Proceedings of the International Conference on Image Processing 2017.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Surana, S., Patra R., Nedevschi S., Ramos M., Subramanian L., Ben-David Y., et al. (2008).  Beyond Pilots: Keeping Rural Wireless Networks Alive.
Suthram, S.., Beyer A.., Karp R. M., Eldar Y.., & Ideker T. E. (2008).  E-QED: An Efficient Method for Interpreting eQTL Associations Using Protein Networks. Molecular Systems Biology.
Szyperski, C., & Ventre G. (1993).  Efficient Multicasting for Interactive Multimedia Applications.
Szyperski, C., Omohundro S., & Murer S. (1993).  Engineering a Programming Language: The Type and Class System of Sather.
Szyperski, C., & Ventre G. (1993).  A Characterization of Multi-Party Interactive Multimedia Applications.
T
Taber, A., Kumar G., Freytag M., & Shapiro V. (2018).  A moment-vector approach to interoperable analysis. Computer-Aided Design. 102, 139-147.
Tahaei, M., Frik A., & Vaniea K. (2021).  Privacy Champions in Sofware Teams: Understanding Their Motivations, Strategies, and Challenges. CHI Conference on Human Factors in Computing Systems. 2021,
Tahaei, M., Bernd J., & Rashid A. (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC. 117-130.
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.
Tajchman, G., Jurafsky D., & Fosler-Lussier E. (1995).  Learning Phonological Rule Probabilities from Speech Corpora with Exploratory Computational Phonology. Proceedings of the 33rd Annual Meeting of the Association for Computational Linguistics (ACL 1995). 1-5.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Tan, Z., Asanović K., & Patterson D. (2011).  Datacenter-Scale Network Research on FPGAs.
Tan, Z., Waterman A., Avižienis R., Lee Y., Cook H., Patterson D., et al. (2010).  RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors.
Tan, Z., Asanović K., & Patterson D. (2010).  An FPGA-Based Simulator for Datacenter Networks.
Tan, Z., Asanović K., & Patterson D. (2008).  An FPGA Host-Multithreaded Functional Model for SPARC v8.
Tanay, A., Sharan R., Kupiec M., & Shamir R. (2004).  Revealing Modularity and Organization in the Yeast Molecular Network by Integrated Analysis of Highly Heterogeneous Genome-Wide Data. Proceedings of the National Academy of Sciences of the United States of America. 101(9), 2981-2986.
Tandon, N., Rajagopal D., & de Melo G. (2012).  Markov Chains for Robust Graph-Based Commonsense Information Extraction.
Tang, L.., Li J., Li Y.., & Shenker S. J. (2009).  An Investigation of the Internet’s IP-Layer Connectivity. Computer Communications. 32(5), 913-926.

Pages