Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
P. Godfrey, B., Shenker S. J., & Stoica I. (2008).  Pathlet Routing. 97-102.
P. Godfrey, B., & Karp R. M. (2009).  On the Price of Heterogeneity in Parallel Systems. Theory of Computing Systems. 45(2), 280-301.
P. Godfrey, B., Caesar M., Haken I., Singer Y., Shenker S. J., & Stoica I. (2015).  Stabilizing Route Selection in BGP. IEEE/ACM Transactions on Networking. 23(1), 282-299.
P. Godfrey, B., Karp R. M., Lakshminarayanan K., Surana S., & Stoica I. (2004).  Load Balancing in Dynamic Structured P2P Systems. Proceedings of INFOCOMM.
P. Godfrey, B., Ganichev I., Shenker S. J., & Stoica I. (2009).  Pathlet Routing. 111-122.
P. Godfrey, B., Shenker S. J., & Stoica I. (2005).  Minimizing Churn in Distributed Systems.
Goebel, C., Tribowski C., Günther O., & Tröger R.. (2009).  RFID in the Supply Chain: How to Obtain a Positive ROI – The Case of Gerry Weber.
Goebel, C., & Günther O. (2009).  The Value of Visibility and RFID in Transshipment Operations—A Simulation Study. 129-138.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Goebel, C., Tribowski C., & Günther O. (2009).  EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures. 494-499.
Goebel, C., Krasnova H., Syllwasschy H.., & Günther O. (2009).  Vertical Integration and Information Sharing—An Empirical Investigation in the German Apparel Industry. 399-408.
Goebel, C., Krasnova H., Hildebrand T., Günther O., & Bidault F. (2008).  Enterprise Software Adoption and Perceived Business Performance—An Empirical Investigation in Germany and the U.S..
Goga, O., Perito D., Lei H., Teixeira R., & Sommer R. (2013).  Large-scale Correlation of Accounts Across Social Networks.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Göhring, D., Hoffman J., Rodner E., Saenko K., & Darrell T. (2014).  Interactive Adaptation of Real-Time Object Detectors.
Göhring, D., Latotzky D., Wang M., & Rojas R. (2012).  Semi-Autonomous Car Control Using Brain Computer Interfaces. 393-408.
Gold, B., Morgan N., & Ellis D. P. W. (2011).  Speech and Audio Signal Processing: Processing and Perception of Speech and Music, 2nd Edition.
Gold, B., & Morgan N. (1999).  Speech and Audio Signal Processing.
Goldmann, M., & Karpinski M. (1992).  Simulating Threshold Circuits by Majority Circuits.
Goldmann, M., & Karpinski M. (1994).  Simulating Threshold Circuits by Majority Circuits (Extended Version).
Goldreich, O. (1989).  A Note on Computational Indistinguishability.
Goldreich, O., Ostrovsky R., & Petrank E. (1994).  Computational Complexity and Knowledge Complexity.
Goldreich, O., & Ostrovsky R. (1993).  Software Protection and Simulation on Oblivious RAMs.
Goldwasser, S., & Ostrovsky R. (1992).  Invariant Signatures and Non-Interactive Zero-Knowledge Proofs Are Equivalent.

Pages