1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
3. 3D modeling of historic sites using range and image data Allen, Peter K.; Stamos, Ioannis; Troccoli, Alejandro; Smith, Benjamin; Leordeanu, Marius; Hsu, Y. C. 2003 Articles Computer scienceArchitecture
4. 3D Object Understanding from RGB-D Data Feng, Jie 2017 Theses Artificial intelligenceComputer scienceComputer visionThree-dimensional imaging
5. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
7. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
8. A 3-level Atomicity Model for Decentralized Workflow Management Systems Ben-Shaul, Israel Z.; Heineman, George T. 1996 Reports Computer science
9. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
10. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization Song, Yingbo 2012 Theses Computer science
11. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization: Supporting Data Song, Yingbo 2012 Data (Information) Computer science
13. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
14. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
15. Abstractions for Probabilistic Programming to Support Model Development Bernstein, Ryan 2023 Theses Computer scienceStatisticsArtificial intelligenceProbabilities--Mathematical modelsComputer simulation
16. "Abstract" Understanding: The Relation between Language and Memory Lebowitz, Michael 1981 Reports Memory management (Computer science)Database managementElectronic data processing
17. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
18. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
19. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
20. A Case Study In Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
21. Accelerated parallel algorithm for gene network reverse engineering He, Jing; Zhou, Zhou; Reed, Michael K.; Califano, Andrea 2017 Articles Parallel programming (Computer science)Gene regulatory networksGene expression--Data processingSystems biology
22. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
23. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
24. Accelerating Similarly Structured Data Wu, Lisa K. 2014 Theses Computer scienceComputer engineering
25. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
26. Accounting for prosodic information to improve ASR-based topic tracking for TV Broadcast News Guinaudeau, Camille; Hirschberg, Julia Bell 2011 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
27. ACE: An Expert System Supporting Analysis and Management Decision Making Stolfo, Salvatore; Vesonder, Gregg T. 1982 Reports Database managementTelephone cables--Maintenance and repair
28. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
29. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
30. A Collection of Four Transcripts of Long Conversations through Computers Including the Experiments Protocols Elhadad, Michael 1987 Reports Computer science
31. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
32. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
33. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
34. A Comparative Study of Divergence Control Algorithms Kawaguchi, Akira; Mok, Kui W.; Pu, Calton 1994 Reports Computer science
35. A Comparison of Cache Performance in Server-Based and Symmetric Database Architectures Leff, Avraham; Pu, Calton; Korz, Frederick 1990 Reports Computer science
36. A Comparison of Storage Optimisations in Automatically-Generated Attribute Evaluators Farrow, Rodney; Yellin, Daniel 1985 Reports Computer science
37. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
38. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
39. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
40. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
41. A Computational Perspective of Causal Inference and the Data Fusion Problem Correa, Juan David 2021 Theses Artificial intelligenceComputer scienceStochastic control theory--Statistical methodsStatisticsMachine learning
42. A Configuration Process for a Distributed Software Development Environment Ben-Shaul, Israel Z.; Kaiser, Gail E. 1993 Reports Computer science
43. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
44. A Contrastive Study of Functional Unification Grammar for Surface Language Generation: A Case Study in Choice of Connectives McKeown, Kathleen; Elhadad, Michael 1989 Reports Computer science
45. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
46. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
47. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
48. Acoustic and Prosodic Correlates of Social Behavior Gravano, Agustín; Levitan, Rivka; Willson, Laura; Beòuš, Štefan; Hirschberg, Julia Bell; Nenkova, Ani 2011 Presentations (Communicative Events) Computer scienceLinguisticsInformation technology
49. Acoustic/Prosodic and Lexical Correlates of Charismatic Speech Hirschberg, Julia Bell; Rosenberg, Andrew 2005 Presentations (Communicative Events) Information technologyComputer science
50. Acoustic-Prosodic Entrainment in Human-Human and Human-Computer Dialogue Levitan, Rivka 2014 Theses Computer scienceHuman-computer interactionSocial interactionLanguage and languages--Rhythm
51. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
52. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
53. Acquisition and Interpretation of 3-D Sensor Data from Touch Allen, Peter K.; Michelman, Paul 1989 Reports Computer science
54. A Critique of the llc Parallel Language and Some Solutions Mills, Russell C. 1989 Reports Computer science
55. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
56. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech: Powerpoint Poster Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
57. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
58. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
59. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
60. Active Databases for Communication Network Management Wolfson, Ouri; Sengupta, Soumitra; Yemini, Yechiam 1990 Reports Computer science
62. A Cure for Pathological Behavior in Games That Use Minimax Abramson, Bruce 1985 Reports Computer science
63. Adapting Automatic Summarization to New Sources of Information Ouyang, Jessica Jin 2019 Theses Computer scienceFirst person narrativeNatural language processing (Computer science)Machine translatingCross-language information retrieval
64. Adapting Materialized Views after Redefinitions: Techniques and a Performance Study Gupta, Ashish; Mumick, Inderpal S.; Rao, Jun; Ross, Kenneth A. 1997 Reports Computer science
65. Adapting Materialized Views after Redifinitions Gupta, Ashish; Mumick, Inderpal S.; Ross, Kenneth A. 1995 Reports Computer science
66. Adaptive and Effective Fuzzing: a Data-Driven Approach She, Dongdong 2023 Theses Computer scienceComputer security--Computer programsMalware (Computer software)Machine learningGoogle (Firm)Microsoft Corporation
67. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
68. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
69. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
70. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
71. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
72. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
73. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
74. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
75. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
76. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
77. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
78. A description of the CIDR system as used for TDT-2 Radev, Dragomir R.; McKeown, Kathleen; Hatzivassiloglou, Vasileios 1999 Presentations (Communicative Events) Computer scienceInformation technology
79. A design and analysis tool for underactuated compliant hands Ciocarlie, Matei; Allen, Peter K. 2009 Articles Robotics
80. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
82. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
83. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
84. A Distributed Algorithm for Adaptive Replication of Data Wolfson, Ouri 1990 Reports Computer science
85. A Distributed Signal Processing Facility for Speech Research Polish, Nathaniel 1988 Reports Computer science
86. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
87. A Domain-Specific Language for Generating Dataflow Analyzers Zheng, Jia; Mitchell, Chuck; Edwards, Stephen A. 2006 Articles Computer science
88. Advancing Multimedia: Application Sharing, Latency Measurements and User-Created Services Boyaci, Omer 2012 Theses Computer science
89. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
90. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
91. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
92. A Family of Window Protocols for Time-Constrained Applications in CSMA Networks Kurose, James F.; Schwartz, Mischa 1983 Reports Computer science
95. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
96. A Flexible and Efficient Protocol for Multi-Scope Service Registry Replication Zhao, Weibin; Schulzrinne, Henning G. 2002 Reports Computer science
97. A Flexible Transaction Model for Software Engineering Kaiser, Gail E. 1989 Reports Computer science
98. A Formal Characterization of Epsilon Serializability Ramamritham, Krithi; Pu, Calton 1991 Reports Computer science
99. A Formal Model for Information Selection in Multi-Sentence Text Extraction Filatova, Elena; Hatzivassiloglou, Vasileios 2004 Presentations (Communicative Events) Information technologyComputer science
100. A Framework for 3D Pushbroom Imaging Ichimura, Naoyuki; Nayar, Shree K. 2003 Reports Computer science