2201. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
2202. An Eight-Processor Chip for a Massively Parallel Machine Shaw, David Elliot; Sabety, Theodore M. 1984 Reports Computer science
2203. An Efficient Algorithm for the Analysis of Cyclic Circuits Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2006 Articles Computer science
2204. A Nearest-Neighbor Approach to Indicative Web Summarization Petinot, Yves 2016 Theses Information retrievalWeb search enginesInternet searchingComputer science
2205. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
2206. An Automated Performance Analysis of a Two Phase Locking Protocol Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
2207. An Automated Consultant for Interactive Environments Wolz, Ursula; Kaiser, Gail E. 1988 Reports Computer science
2208. An Attack on the Interlock Protocol When Used for Authentication Bellovin, Steven Michael; Merritt, Michael 1993 Articles Computer science
2209. An Architecture for WWW-based Hypercode Environments Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang 1996 Reports Computer science
2210. An Architecture for Multi-User Software Development Environments Ben-Shaul, Israel Z.; Kaiser, Gail E.; Heineman, George E. 1992 Reports Computer science
2211. An Architecture for Integrating OODBs with WWW Yang, Jack Jingshuang; Kaiser, Gail E. 1996 Reports Computer science
2212. An Architecture for Integrating Concurrency Control into Environment Frameworks Heineman, George T.; Kaiser, Gail E. 1994 Reports Computer science
2213. An Architecture for Dynamic Reconfiguration in a Distributed Object-Based Programming Language Hailpern, Brent; Kaiser, Gail E. 1991 Reports Computer science
2214. An Architecture for Distributed Natural Language Summarization Radev, Dragomir R. 1996 Presentations (Communicative Events) Computer scienceInformation technology
2215. An architecture for aggregation in text generation McKeown, Kathleen; Shaw, James 1997 Presentations (Communicative Events) Computer scienceInformation technology
2216. An Architectural Framework for Object Management Systems Popovich, Steven S. 1991 Reports Computer science
2217. An Approach to Software Testing of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science
2218. An Approach to Autonomizing Legacy Systems Kaiser, Gail E.; Gross, Philip N.; Kc, Gaurav S.; Valetto, Giuseppe; Parekh, Janak J. 2002 Reports Computer science
2219. An Approach for Distributed Query Processing in Marvel: Concepts and Implementation Bunter, Toni A. 1993 Reports Computer science
2220. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Articles Computer science
2221. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
2222. An Analytical Approach to File Prefetching Lei, Hui; Duchamp, Dan 1996 Reports Computer science
2223. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Baset, Salman Abdul; Schulzrinne, Henning G. 2004 Reports Computer science
2224. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
2226. Analyzing User Plans to Produce Informative Responses by a Programmer's Consultant Wolz, Ursula 1985 Reports Computer science
2227. Analyzing and Securing Software via Robust and Generalizable Learning Pei, Kexin 2023 Theses Computer scienceComputer software--Security measuresComputer security--Computer programsDeep learning (Machine learning)Neural networks (Computer science)
2229. Analytical Query Execution Optimized for all Layers of Modern Hardware Polychroniou, Orestis 2018 Theses Computer scienceDatabasesQuerying (Computer science)Hardware
2231. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
2232. Analysis of strain and regional variation in gene expression in mouse brain Pavlidis, Paul; Noble, William 2001 Articles Analysis of varianceGene expression--ResearchDNA microarrays--Data processingGeneticsNeurosciencesComputer science
2233. Analysis of Routing Algorithms for Secure Overlay Service Cook, Debra L. 2002 Reports Computer science
2234. Analysis of Clocks in X10 Programs (Extended) Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2008 Reports Computer science
2235. An Algorithm to Recover Generalized Cylinders from a Single Intensity View Gross, Ari D.; Boult, Terrance E. 1989 Reports Computer science
2236. An Algorithmic Taxonomy of Production System Machines Mills, Russell C. 1988 Reports Computer science
2237. An Algebra for Integration and Analysis of Ponder2 Policies Zhao, Hang; Lobo, Jorge; Bellovin, Steven Michael 2008 Articles Computer science
2238. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
2239. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
2240. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
2241. An Active Events Model for Systems Monitoring Gross, Philip N.; Gupta, Suhit; Kaiser, Gail E.; Kc, Gaurav S.; Parekh, Janak J. 2001 Reports Computer science
2242. An Abort Mechanism for Nested Distributed Transactions Duchamp, Dan 1989 Reports Computer science
2243. A Multi-resolution Block Storage Model for Database Design Zhou, Jingren; Ross, Kenneth A. 2003 Reports Computer science
2244. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
2245. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
2247. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
2248. A Mobile Agent Approach to Lightweight Process Workflow Kaiser, Gail E.; Stone, Adam; Dossick, Stephen E. 1999 Reports Computer science
2249. A Microrobotic System For Protein Streak Seeding Georgiev, Atanas; Allen, Peter K.; Song, Ting; Laine, Andrew F.; Edstrom, William; Hunt, John F. 2004 Reports Computer science
2250. A Methodology tor Specification-Based Performance Analysis of Communication Protocols Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
2251. A Methodology for Specification-Based Performance Analysis of Protocols Nounou, Nihal 1986 Reports Computer science
2252. A Methodology for Programming Production Systems and its Implications on Parallelism Pasik, Alexander J. 1988 Reports Computer science
2253. A method for automatically building and evaluating dictionary resources Klavans, Judith L.; Muresan, Smaranda 2002 Presentations (Communicative Events) Computer scienceInformation technology
2254. A Metalinguistic Approach to Process Enactment Extensibility Kaiser, Gail E.; Ben-Shaul, Israel Z.; Popovich, Steven S.; Dossick, Stephen E. 1996 Reports Computer science
2255. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
2256. A Measurement Methodology for Wide Area Internets Pu, Calton; Korz, Frederick; Lehman, Robert C. 1990 Reports Computer science
2257. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
2258. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
2259. A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer Bessen, Arvid J. 2005 Reports Computer science
2261. A Look Back at "Security Problems in the TCP/IP Protocol Suite" Bellovin, Steven Michael 2004 Articles Computer science
2263. Allocation and Manipulation of Records in the NON-VON Supercomputer Shaw, David Elliot; Hillyer, Bruce K. 1983 Reports Computer science
2264. A LISP Compiler for the DADO Parallel Computer Lerner, Mark D.; Biema, Michael van; Maguire, Gerald Q. 1985 Reports Computer science
2265. A Linear-Time Algorithm for Concave One-Dimensional Dynamic Programming Galil, Zvi; Park, Kunsoo 1989 Reports Computer science
2266. Alignment using an uncalibrated camera system Yoshimi, Billibon; Allen, Peter K. 1995 Articles Robotics
2267. A Lightweight Intelligent Virtual Cinematography System for Machinima Production Elson, David K.; Riedl, Mark 2007 Presentations (Communicative Events) Computer scienceMotion pictures--Production and directionArtificial intelligence
2268. Algorithms for Solvents of Matrix Polynomials Dennis Jr., J.E.; Traub, Joseph F.; Weber, R.P. 1978 Articles Computer science--MathematicsComputer algorithmsPolynomials--Mathematical modelsBernoulli polynomialsMatrices
2269. Algorithms for Minimum Risk Chunking Jansche, Martin 2005 Presentations (Communicative Events) Information technologyComputer science
2270. Algorithmic Design for Social Networks: Inequality, Bias, and Diversity Stoica, Ana-Andreea 2022 Theses Computer scienceSocial networks--Computer network resourcesMinoritiesAlgorithms--Computer programsResource allocation--Mathematical models
2271. Algorithm Based Fault Tolerance in Massively Parallel Systems Lerner, Mark D. 1988 Reports Computer science
2272. Algebraic Specification-Based Performance Analysis or Communication Protocols Nounou, Nihal; Yemini, Yechiam 1984 Reports Computer science
2273. A learning algorithm for visual pose estimation of continuum robots Reiter, Austin David; Goldman, Roger Eric; Bajo, Andrea; Iliopoulos, Konstantinos; Simaan, Nabil; Allen, Peter K. 2011 Articles Robotics
2274. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
2275. Alcohol Interacts with Genetic Alteration of the Hippo Tumor Suppressor Pathway to Modulate Tissue Growth in Drosophila Ilanges, Anoj; Jahanshahi, Maryam; Balobin, Denis M.; Pfleger, Cathie M. 2013 Articles Cancer--EtiologyDrosophilaTumor suppressor proteinsAlcohol--Physiological effectOncology
2276. A Large-Scale, Longitudinal Study of Player Achievements in World of Warcraft Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
2277. A Knowledge-Based Expert Systems Primer and Catalog Hillyer, Bruce K. 1985 Reports Computer scienceArtificial intelligence
2279. A Joint Phrasal and Dependency Model for Paraphrase Alignment Martin, Scott; White, Michael; Thadani, Kapil 2012 Presentations (Communicative Events) Computer science
2281. AIM Encrypt: A Case Study of the Dangers of Cryptographic Urban Legends Locasto, Michael E. 2003 Reports Computer science
2282. AI and the Writer: How Language Models Support Creative Writers Gero, Katy Ilonka 2023 Theses Computer scienceArtificial intelligenceWriting--Technological innovationsCreative writing
2283. A Hybrid Hierarchical and Peer-to-Peer Ontology-based Global Service Discovery System Arabshian, Knarig; Schulzrinne, Henning G. 2005 Reports Computer science
2284. A Hybrid Approach to Topological Mobile Robot Localization Blaer, Paul S.; Allen, Peter K. 2005 Reports Computer science
2285. A Hybrid Approach for Answering Definitional Questions Blair-Goldensohn, Sasha; McKeown, Kathleen; Schlaikjer, Andrew Hazen 2003 Reports Computer science
2286. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Articles Computer science
2287. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
2288. A highly-underactuated robotic hand with force and joint angle sensors Wang, Long; DelPreto, Joseph Jeffrey; Weisz, Jonathan; Bhattacharyya, Sam; Allen, Peter K. 2011 Articles Robotics
2289. A Highly Parallel VLSI-Based Subsystem of the NON-VON Database Machine Shaw, David Elliot; Ibrahim, Hussein; Andrews, Jim; Wiederhold, Gio 1981 Reports Computer scienceInformation scienceParallel processing (Electronic computers)Database management--Computer programs
2290. A Hierarchical Model of Web Summaries Petinot, Yves; McKeown, Kathleen; Thadani, Kapil 2011 Presentations (Communicative Events) Computer science
2291. A Hierarchical Associative Architecture for the Parallel Evaluation of Relational Algebraic Database Primitives Shaw, David Elliot 1979 Reports Computer storage devices--Mathematical modelsComputer scienceComputer science--MathematicsDatabase management--Mathematical models
2292. Agnostically Learning Halfspaces Kalai, Adam; Klivans, Adam; Mansour, Yishay; Servedio, Rocco Anthony 2005 Reports Computer science
2293. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
2294. Age Prediction in Blogs: A Study of Style, Content, and Online Behavior in Pre- and Post-Social Media Generations McKeown, Kathleen; Rosenthal, Sara 2011 Presentations (Communicative Events) Computer science
2295. A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data Eskin, Eleazar; Arnold, Andrew; Prerau, Michael; Portnoy, Leonid; Stolfo, Salvatore 2002 Articles Computer science
2296. A Geometric Approach to Dynamical System: Global Analysis for Non-Convex Optimization Xu, Ji 2020 Theses Computer scienceStatisticsMathematicsAlgorithms--EvaluationComputer algorithms
2297. Agent-Based Distributed Learning Applied to Fraud Detection Prodromidis, Andreas L.; Stolfo, Salvatore 1999 Reports Computer scienceCredit card fraudLaw enforcement--Technological innovationsAlgorithmsMachine learning
2298. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
2299. A Generic Framework for Expert Data Analysis Systems Burns, Luanne; Pasik, Alexander J. 1985 Reports Computer science
2300. A Generalization of Band Joins and the Merge-Purge Problem Hernandez, Mauricio A. 1995 Reports Computer science