1. XR Development with the Relay and Responder Pattern Elvezio, Carmine 2021 Theses Computer scienceVirtual realityAugmented realityComputer gamesThree-dimensional imaging
2. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
3. WWW-based Collaboration Environments with Distributed Tool Services Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang; Ye, Sonny Xi 1997 Reports Computer science
4. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
5. WordsEye: An Automatic Text-to-Scene Conversion System Coyne, Robert Eric; Sproat, Richard 2001 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
6. Word informativeness and automatic pitch accent modeling Pan, Shimei; McKeown, Kathleen 1999 Presentations (Communicative Events) Information technologyComputer science
7. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
9. Why a Single Parallelization Strategy Is Not Enough in Knowledge Bases Cohen, Simona Rabinovici; Wolfson, Ouri 1990 Reports Computer science
10. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
11. Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task Parton, Kristen; McKeown, Kathleen; Coyne, Robert Eric; Diab, Mona T.; Grishman, Ralph; Hakkani-Tür, Dilek; Harper, Mary; Ji, Heng; Ma, Wei Yun; Meyers, Adam; Rosenthal, Sara; Sun, Ang; Tur, Gokhan; Xu, Wei; Yaman, Sibel 2009 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
12. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
13. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
14. Where's the Verb? Correcting Machine Translation During Question Answering Ma, Wei-Yun; McKeown, Kathleen 2009 Presentations (Communicative Events) Computer science
15. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
16. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
17. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
18. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
19. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
20. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
21. What's yours and what's mine: Determining intellectual attribution in scientific text Teufel, Simone; Moens, Marc 2000 Presentations (Communicative Events) Information technologyComputer science
22. What’s in a Translation Rule? Galley, Michel; Hopkins, Mark; Knight, Kevin; Marcu, Daniel 2004 Presentations (Communicative Events) Information technologyComputer science
23. What is the complexity of volume calculation? Werschulz, Arthur G.; Wozniakowski, Henryk 2000 Reports Computer science
24. What is the Complexity of the Fredholm Problem of the Second Kind? Werschulz, Arthur G. 1984 Reports Computer science
25. What is the complexity of surface integration? Wozniakowski, Henryk; Werschulz, Arthur G. 1999 Reports Computer science
26. What Is the Complexity of Stieltjes Integration? Werschulz, Arthur G. 1998 Reports Computer science
27. What Is the Complexity of Solution-Restricted Operator Equations? Werschulz, Arthur G. 1995 Reports Computer science
28. What Is the Complexity of Related Elliptic, Parabolic, and Hyperbolic Problems? Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
30. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
31. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
32. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
33. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
34. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
35. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
36. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
37. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
38. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
40. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
41. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
42. VMVM: Unit Test Virtualization for Java (System Implementation) Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Software Computer science
43. V-Measure: A conditional entropy-based external cluster evaluation Hirschberg, Julia Bell; Rosenberg, Andrew 2007 Presentations (Communicative Events) Computer scienceInformation technology
44. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
45. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
46. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
47. VigNet: Grounding Language in Graphics using Frame Semantics Coyne, Robert Eric; Bauer, Daniel; Rambow, Owen C. 2011 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
48. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
49. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
50. Very Short Utterances in Conversation Heldner, Mattias; Edlund, Jens; Al Moubayed, Samer; Gravano, Agustín; Hirschberg, Julia Bell 2010 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics