51. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
52. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech: Powerpoint Poster Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
53. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
54. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
55. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
56. Active Databases for Communication Network Management Wolfson, Ouri; Sengupta, Soumitra; Yemini, Yechiam 1990 Reports Computer science
57. A Cure for Pathological Behavior in Games That Use Minimax Abramson, Bruce 1985 Reports Computer science
58. Adapting Automatic Summarization to New Sources of Information Ouyang, Jessica Jin 2019 Theses Computer scienceFirst person narrativeNatural language processing (Computer science)Machine translatingCross-language information retrieval
59. Adapting Materialized Views after Redefinitions: Techniques and a Performance Study Gupta, Ashish; Mumick, Inderpal S.; Rao, Jun; Ross, Kenneth A. 1997 Reports Computer science
60. Adapting Materialized Views after Redifinitions Gupta, Ashish; Mumick, Inderpal S.; Ross, Kenneth A. 1995 Reports Computer science
61. Adaptive and Effective Fuzzing: a Data-Driven Approach She, Dongdong 2023 Theses Computer scienceComputer security--Computer programsMalware (Computer software)Machine learningGoogle (Firm)Microsoft Corporation
62. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
63. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
64. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
65. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
66. Adaptive Sampling for Targeted Software Testing Shah, Abhishek 2024 Theses Computer scienceComputer software--TestingComputer algorithmsAdaptive sampling (Statistics)
67. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
68. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
69. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
70. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
71. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
72. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
73. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
74. A description of the CIDR system as used for TDT-2 Radev, Dragomir R.; McKeown, Kathleen; Hatzivassiloglou, Vasileios 1999 Presentations (Communicative Events) Computer scienceInformation technology
75. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
77. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
78. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
79. A Distributed Algorithm for Adaptive Replication of Data Wolfson, Ouri 1990 Reports Computer science
80. A Distributed Signal Processing Facility for Speech Research Polish, Nathaniel 1988 Reports Computer science
81. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
82. A Domain-Specific Language for Generating Dataflow Analyzers Zheng, Jia; Mitchell, Chuck; Edwards, Stephen A. 2006 Articles Computer science
83. Advancing Multimedia: Application Sharing, Latency Measurements and User-Created Services Boyaci, Omer 2012 Theses Computer science
84. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
85. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
86. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
87. A Family of Window Protocols for Time-Constrained Applications in CSMA Networks Kurose, James F.; Schwartz, Mischa 1983 Reports Computer science
90. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
91. A Flexible and Efficient Protocol for Multi-Scope Service Registry Replication Zhao, Weibin; Schulzrinne, Henning G. 2002 Reports Computer science
92. A Flexible Transaction Model for Software Engineering Kaiser, Gail E. 1989 Reports Computer science
93. A Formal Characterization of Epsilon Serializability Ramamritham, Krithi; Pu, Calton 1991 Reports Computer science
94. A Formal Model for Information Selection in Multi-Sentence Text Extraction Filatova, Elena; Hatzivassiloglou, Vasileios 2004 Presentations (Communicative Events) Information technologyComputer science
95. A Framework for 3D Pushbroom Imaging Ichimura, Naoyuki; Nayar, Shree K. 2003 Reports Computer science
96. A Framework for Eliciting Emotional Speech: Capitalizing on the Actor’s Process Hirschberg, Julia Bell; Enos, Frank 2006 Presentations (Communicative Events) Computer scienceInformation technology
97. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science
98. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
99. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
100. A General Framework for Designing Catadioptric Imaging and Projection Systems Swaminathan, Rahul; Grossberg, Michael D.; Nayar, Shree K. 2003 Reports Computer science