Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Feldman, J., Dodge E., & Bryant J. (2009).  A Neural Theory of Language and Embodied Construction Grammar. 111-138.
Pellegrini, M. (1992).  A New Algorithm for Counting Circular Arc Intersections.
Guz, U., Gurkan H., & B. Yarman S. (2007).  A New Algorithm for High Speed Speech and Audio Coding. Proceedings of the European Conference on Circuit Theory and Design.
Guibas, L. J., & Pellegrini M. (1992).  New Algorithmic Results for Lines-in-3-Space Problems.
Pan, V., Sadikou A., Landowne E., & Tiga O. (1992).  A New Approach to Fast Polynomial Interpolation and Multipoint Evaluation.
Gupta, D., Segal A., Panda A., Segev G., Schapira M., Feigenbaum J., et al. (2012).  A New Approach to Interdomain Routing Based on Secure Multi-Party Computation. 37-42.
Lässig, J., & Trommler U.. (2010).  New Approaches to Enterprise Cooperation Generation and Management. Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS 2010).
Karpinski, M., & Zelikovsky A. (1995).  New Approximation Algorithms for the Steiner Tree Problems.
Academies, N. Research C. (2010).  A New Biology for the 21st Century.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  A New Communications API.
Lönneker-Rodman, B., Baker C. F., & Hong J. (2008).  The New FrameNet Desktop: A Usage Scenario for Slovenian. 147-154.
Regli, W., Rossignac J., Shapiro V., & Srinivasan V. (2016).  The new frontiers in computational modeling of material structures. Computer-Aided Design. 77, 73-85.
Gergen, S., Zeiler S., Abdelaziz A. Hussen, & Kolossa D. (2016).  New Insights into Turbo-Decoding-Based AVSR with Dynamic Stream Weights. Proceedings of ITG Conference on Speech Communication.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
Adami, A., Kajarekar S., & Hermansky H. (2002).  A New Speaker Change Detection Method for Two-Speaker Segmentation. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Mahoney, M. (2014).  A New Spin on an Old Algorithm: Technical Perspective on "Communication Costs of Strassen's Matrix Multiplication". Communications of the ACM. 57(2), 106.
Eddy, W. M., Ostermann S., & Allman M. (2004).  New Techniques for Making Transport Protocols Robust to Corruption-Based Loss. ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
Ranganath, C., Shastri L., & D'Esposito M. (2002).  A New View of the Medial Temporal Lobes and the Structure of Memory.
Zhou, K., Mo L., Kay P., Kwok V.. P. Y., Ip T. N. M., & Tan L. Hai (2010).  Newly Trained Lexical Categories Produce Lateralized Categorical Perception of Color. 107(22), 9974-9978.
Floyd, S., & Henderson T. (1999).  The NewReno Modification to TCP's Fast Recovery Algorithm.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Shenker S. J., et al. (2009).  Nexus: A Common Substrate for Cluster Computing.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Lampikoski, T.. (2009).  Nintendo Yes Wii Can.
Amann, J., Sommer R., Vallentin M., & Hall S. (2013).  No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships.
Eisenhofer, T., Quiring E., Möller J., Riepel D., Holz T., & Rieck K. (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proceedings of 32nd USENIX Security Symposium.

Pages