501. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
502. Trajectory filtering and prediction for automated tracking and grasping of a moving object Allen, Peter K.; Timcenko, Aleksandar; Yoshimi, Billibon; Michelman, Paul 1992 Articles Robotics
503. Transient Addressing for Related Processes: Improved Firewalling by Using IPV6 and Multiple Addresses per Host Gleitz, Peter M.; Bellovin, Steven Michael 2001 Articles Computer science
504. Translating Collocations for Bilingual Lexicons: A Statistical Approach McKeown, Kathleen; Smadja, Frank; Hatzivassiloglou, Vasileios 1996 Articles Computer science
505. Trust Management for IPsec Blaze, Matt; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
506. Tutorial: Compiling Concurrent Languages for Sequential Processors Edwards, Stephen A. 2003 Articles Computer science
507. Two-Person Control Administration: Preventing Administration Faults through Duplication Potter, Shaya; Bellovin, Steven Michael; Nieh, Jason 2009 Articles Computer science
508. Two-stage robotic crystal mounting of protein crystals for X-ray data collection Georgiev, Atanas; Allen, Peter K. 2008 Articles Robotics
509. Two Stage View Planning for Large-Scale Site Modeling Blaer, Paul S.; Allen, Peter K. 2007 Articles RoboticsArtificial intelligence
511. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
512. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
513. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
514. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
515. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
516. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
517. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
518. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
519. Using Tactile and Visual Sensing with a Robotic Hand Allen, Peter K.; Miller, Andrew T.; Oh, Paul Y.; Leibowitz, Brian S. 1997 Articles Robotics
520. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science