1. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
3. A 3-level Atomicity Model for Decentralized Workflow Management Systems Ben-Shaul, Israel Z.; Heineman, George T. 1996 Reports Computer science
4. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
5. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
6. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
7. A Case Study In Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
8. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
9. A Collection of Four Transcripts of Long Conversations through Computers Including the Experiments Protocols Elhadad, Michael 1987 Reports Computer science
10. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
11. A Comparative Study of Divergence Control Algorithms Kawaguchi, Akira; Mok, Kui W.; Pu, Calton 1994 Reports Computer science
12. A Comparison of Cache Performance in Server-Based and Symmetric Database Architectures Leff, Avraham; Pu, Calton; Korz, Frederick 1990 Reports Computer science
13. A Comparison of Storage Optimisations in Automatically-Generated Attribute Evaluators Farrow, Rodney; Yellin, Daniel 1985 Reports Computer science
14. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
15. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
16. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
17. A Configuration Process for a Distributed Software Development Environment Ben-Shaul, Israel Z.; Kaiser, Gail E. 1993 Reports Computer science
18. A Contrastive Study of Functional Unification Grammar for Surface Language Generation: A Case Study in Choice of Connectives McKeown, Kathleen; Elhadad, Michael 1989 Reports Computer science
19. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
20. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
21. Acquisition and Interpretation of 3-D Sensor Data from Touch Allen, Peter K.; Michelman, Paul 1989 Reports Computer science
22. A Critique of the llc Parallel Language and Some Solutions Mills, Russell C. 1989 Reports Computer science
23. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
24. Active Databases for Communication Network Management Wolfson, Ouri; Sengupta, Soumitra; Yemini, Yechiam 1990 Reports Computer science
25. A Cure for Pathological Behavior in Games That Use Minimax Abramson, Bruce 1985 Reports Computer science
26. Adapting Materialized Views after Redefinitions: Techniques and a Performance Study Gupta, Ashish; Mumick, Inderpal S.; Rao, Jun; Ross, Kenneth A. 1997 Reports Computer science
27. Adapting Materialized Views after Redifinitions Gupta, Ashish; Mumick, Inderpal S.; Ross, Kenneth A. 1995 Reports Computer science
28. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
29. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
30. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
31. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
32. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
33. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
34. A Distributed Algorithm for Adaptive Replication of Data Wolfson, Ouri 1990 Reports Computer science
35. A Distributed Signal Processing Facility for Speech Research Polish, Nathaniel 1988 Reports Computer science
36. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
37. A Family of Window Protocols for Time-Constrained Applications in CSMA Networks Kurose, James F.; Schwartz, Mischa 1983 Reports Computer science
40. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
41. A Flexible and Efficient Protocol for Multi-Scope Service Registry Replication Zhao, Weibin; Schulzrinne, Henning G. 2002 Reports Computer science
42. A Flexible Transaction Model for Software Engineering Kaiser, Gail E. 1989 Reports Computer science
43. A Formal Characterization of Epsilon Serializability Ramamritham, Krithi; Pu, Calton 1991 Reports Computer science
44. A Framework for 3D Pushbroom Imaging Ichimura, Naoyuki; Nayar, Shree K. 2003 Reports Computer science
45. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science
46. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
47. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
48. A General Framework for Designing Catadioptric Imaging and Projection Systems Swaminathan, Rahul; Grossberg, Michael D.; Nayar, Shree K. 2003 Reports Computer science
49. A Generalization of Band Joins and the Merge-Purge Problem Hernandez, Mauricio A. 1995 Reports Computer science
50. A Generic Framework for Expert Data Analysis Systems Burns, Luanne; Pasik, Alexander J. 1985 Reports Computer science
51. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
52. Agent-Based Distributed Learning Applied to Fraud Detection Prodromidis, Andreas L.; Stolfo, Salvatore 1999 Reports Computer scienceCredit card fraudLaw enforcement--Technological innovationsAlgorithmsMachine learning
53. Agnostically Learning Halfspaces Kalai, Adam; Klivans, Adam; Mansour, Yishay; Servedio, Rocco Anthony 2005 Reports Computer science
54. A Hierarchical Associative Architecture for the Parallel Evaluation of Relational Algebraic Database Primitives Shaw, David Elliot 1979 Reports Computer storage devices--Mathematical modelsComputer scienceComputer science--MathematicsDatabase management--Mathematical models
55. A Highly Parallel VLSI-Based Subsystem of the NON-VON Database Machine Shaw, David Elliot; Ibrahim, Hussein; Andrews, Jim; Wiederhold, Gio 1981 Reports Computer scienceInformation scienceParallel processing (Electronic computers)Database management--Computer programs
56. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
57. A Hybrid Approach for Answering Definitional Questions Blair-Goldensohn, Sasha; McKeown, Kathleen; Schlaikjer, Andrew Hazen 2003 Reports Computer science
58. A Hybrid Approach to Topological Mobile Robot Localization Blaer, Paul S.; Allen, Peter K. 2005 Reports Computer science
59. A Hybrid Hierarchical and Peer-to-Peer Ontology-based Global Service Discovery System Arabshian, Knarig; Schulzrinne, Henning G. 2005 Reports Computer science
60. AIM Encrypt: A Case Study of the Dangers of Cryptographic Urban Legends Locasto, Michael E. 2003 Reports Computer science
63. A Knowledge-Based Expert Systems Primer and Catalog Hillyer, Bruce K. 1985 Reports Computer scienceArtificial intelligence
64. A Large-Scale, Longitudinal Study of Player Achievements in World of Warcraft Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
65. Algebraic Specification-Based Performance Analysis or Communication Protocols Nounou, Nihal; Yemini, Yechiam 1984 Reports Computer science
66. Algorithm Based Fault Tolerance in Massively Parallel Systems Lerner, Mark D. 1988 Reports Computer science
67. A Linear-Time Algorithm for Concave One-Dimensional Dynamic Programming Galil, Zvi; Park, Kunsoo 1989 Reports Computer science
68. A LISP Compiler for the DADO Parallel Computer Lerner, Mark D.; Biema, Michael van; Maguire, Gerald Q. 1985 Reports Computer science
69. Allocation and Manipulation of Records in the NON-VON Supercomputer Shaw, David Elliot; Hillyer, Bruce K. 1983 Reports Computer science
71. A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer Bessen, Arvid J. 2005 Reports Computer science
72. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
73. A Measurement Methodology for Wide Area Internets Pu, Calton; Korz, Frederick; Lehman, Robert C. 1990 Reports Computer science
74. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
75. A Metalinguistic Approach to Process Enactment Extensibility Kaiser, Gail E.; Ben-Shaul, Israel Z.; Popovich, Steven S.; Dossick, Stephen E. 1996 Reports Computer science
76. A Methodology for Programming Production Systems and its Implications on Parallelism Pasik, Alexander J. 1988 Reports Computer science
77. A Methodology for Specification-Based Performance Analysis of Protocols Nounou, Nihal 1986 Reports Computer science
78. A Methodology tor Specification-Based Performance Analysis of Communication Protocols Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
79. A Microrobotic System For Protein Streak Seeding Georgiev, Atanas; Allen, Peter K.; Song, Ting; Laine, Andrew F.; Edstrom, William; Hunt, John F. 2004 Reports Computer science
80. A Mobile Agent Approach to Lightweight Process Workflow Kaiser, Gail E.; Stone, Adam; Dossick, Stephen E. 1999 Reports Computer science
81. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
83. A Multi-resolution Block Storage Model for Database Design Zhou, Jingren; Ross, Kenneth A. 2003 Reports Computer science
84. An Abort Mechanism for Nested Distributed Transactions Duchamp, Dan 1989 Reports Computer science
85. An Active Events Model for Systems Monitoring Gross, Philip N.; Gupta, Suhit; Kaiser, Gail E.; Kc, Gaurav S.; Parekh, Janak J. 2001 Reports Computer science
86. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
87. An Algorithmic Taxonomy of Production System Machines Mills, Russell C. 1988 Reports Computer science
88. An Algorithm to Recover Generalized Cylinders from a Single Intensity View Gross, Ari D.; Boult, Terrance E. 1989 Reports Computer science
89. Analysis of Clocks in X10 Programs (Extended) Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2008 Reports Computer science
90. Analysis of Routing Algorithms for Secure Overlay Service Cook, Debra L. 2002 Reports Computer science
91. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
93. Analyzing User Plans to Produce Informative Responses by a Programmer's Consultant Wolz, Ursula 1985 Reports Computer science
95. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Baset, Salman Abdul; Schulzrinne, Henning G. 2004 Reports Computer science
97. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
98. An Approach for Distributed Query Processing in Marvel: Concepts and Implementation Bunter, Toni A. 1993 Reports Computer science
99. An Approach to Autonomizing Legacy Systems Kaiser, Gail E.; Gross, Philip N.; Kc, Gaurav S.; Valetto, Giuseppe; Parekh, Janak J. 2002 Reports Computer science
100. An Approach to Software Testing of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science