1. XR Development with the Relay and Responder Pattern Elvezio, Carmine 2021 Theses Computer scienceVirtual realityAugmented realityComputer gamesThree-dimensional imaging
2. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
3. WWW-based Collaboration Environments with Distributed Tool Services Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang; Ye, Sonny Xi 1997 Reports Computer science
4. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
5. WordsEye: An Automatic Text-to-Scene Conversion System Coyne, Robert Eric; Sproat, Richard 2001 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
6. Word informativeness and automatic pitch accent modeling Pan, Shimei; McKeown, Kathleen 1999 Presentations (Communicative Events) Information technologyComputer science
7. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
9. Why a Single Parallelization Strategy Is Not Enough in Knowledge Bases Cohen, Simona Rabinovici; Wolfson, Ouri 1990 Reports Computer science
10. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
11. Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task Parton, Kristen; McKeown, Kathleen; Coyne, Robert Eric; Diab, Mona T.; Grishman, Ralph; Hakkani-Tür, Dilek; Harper, Mary; Ji, Heng; Ma, Wei Yun; Meyers, Adam; Rosenthal, Sara; Sun, Ang; Tur, Gokhan; Xu, Wei; Yaman, Sibel 2009 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
12. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
13. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
14. Where's the Verb? Correcting Machine Translation During Question Answering Ma, Wei-Yun; McKeown, Kathleen; Parton, Kristen; Coyne, Bob; Diab, Mona; Grishman, Ralph; Hakkani-Tür, Dilek; Harper, Mary; Ji, Heng; Ma, Wei Yun; Meyers, Adam; Stolbach, Sara; Sun, Ang; Tur, Gokhan; Xu, Wei; Yaman, Sibel 2009 Presentations (Communicative Events) Computer science
15. Where's the Verb? Correcting Machine Translation During Question Answering Ma, Wei-Yun; McKeown, Kathleen 2009 Presentations (Communicative Events) Computer science
16. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
17. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
18. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
19. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
20. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
21. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
22. What's yours and what's mine: Determining intellectual attribution in scientific text Teufel, Simone; Moens, Marc 2000 Presentations (Communicative Events) Information technologyComputer science
23. What’s in a Translation Rule? Galley, Michel; Hopkins, Mark; Knight, Kevin; Marcu, Daniel 2004 Presentations (Communicative Events) Information technologyComputer science
24. What is the complexity of volume calculation? Werschulz, Arthur G.; Wozniakowski, Henryk 2000 Reports Computer science
25. What is the Complexity of the Fredholm Problem of the Second Kind? Werschulz, Arthur G. 1984 Reports Computer science
26. What is the complexity of surface integration? Wozniakowski, Henryk; Werschulz, Arthur G. 1999 Reports Computer science
27. What Is the Complexity of Stieltjes Integration? Werschulz, Arthur G. 1998 Reports Computer science
28. What Is the Complexity of Solution-Restricted Operator Equations? Werschulz, Arthur G. 1995 Reports Computer science
29. What Is the Complexity of Related Elliptic, Parabolic, and Hyperbolic Problems? Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
31. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
32. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
33. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
34. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
35. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
36. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
37. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
38. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
39. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
41. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
42. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
43. VMVM: Unit Test Virtualization for Java (System Implementation) Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Software Computer science
44. V-Measure: A conditional entropy-based external cluster evaluation Hirschberg, Julia Bell; Rosenberg, Andrew 2007 Presentations (Communicative Events) Computer scienceInformation technology
45. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
46. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
47. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
48. VigNet: Grounding Language in Graphics using Frame Semantics Coyne, Robert Eric; Bauer, Daniel; Rambow, Owen C. 2011 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
49. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
50. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
51. Very Short Utterances in Conversation Heldner, Mattias; Edlund, Jens; Al Moubayed, Samer; Gravano, Agustín; Hirschberg, Julia Bell 2010 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
52. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
53. Verbalization of high-level formal proofs Holland-Minkley, Amanda M.; Barzilay, Regina; Constable, Robert L. 1999 Presentations (Communicative Events) Information technologyComputer science
54. VastMM-Tag: Semantic Indexing and Browsing of Videos for E-Learning Morris, Mitchell Joseph 2012 Theses Computer science
55. Varying Input Segmentation for Story Boundary Detection in English, Arabic and Mandarin Broadcast News: Presentation Powerpoint Slides Hirschberg, Julia Bell; Rosenberg, Andrew; Sharifi, Mehrbod 2007 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
56. Varying Input Segmentation for Story Boundary Detection in English, Arabic and Mandarin Broadcast News Hirschberg, Julia Bell; Rosenberg, Andrew; Sharifi, Mehrbod 2007 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
57. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics Moretti, Antonio Khalil 2021 Theses Computer scienceStatisticsBayesian statistical decision theorySpatial analysis (Statistics)
58. Valued Redundancy Pu, Calton; Leff, Avraham; Chen, Shu-Wie; Korz, Frederick; Wha, Jae M. 1989 Reports Computer science
59. Using word class for part-of-speech disambiguation Radev, Dragomir R.; Tzoukermann, Evelyne 1996 Presentations (Communicative Events) Computer scienceInformation technology
60. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
61. Using the Annotated Bibliography as a Resource for Indicative Summarization Kan, Min-yen; McKeown, Kathleen; Klavans, Judith L. 2002 Presentations (Communicative Events) Computer scienceInformation technology
62. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
63. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
64. Using Prosody and Phonotactics in Arabic Dialect Identification Biadsy, Fadi; Hirschberg, Julia Bell 2009 Presentations (Communicative Events) Computer science
65. Using Prosodic Features of Speech and Audio Localization in Graphical User Interfaces Olwal, Alex; Feiner, Steven K. 2003 Reports Computer science
66. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
67. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2003 Reports Computer science
68. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
69. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
70. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
72. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
73. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
74. Using librarian techniques in automatic text summarization for information retrieval Klavans, Judith L.; Kan, Min-yen 2002 Presentations (Communicative Events) Computer scienceInformation technology
75. Using lexical chains for text summarization Barzilay, Regina; Elhadad, Michael 1997 Presentations (Communicative Events) Computer scienceInformation technology
76. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
77. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
78. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
79. Using Focus to Generate Complex and Simple Sentences Derr, Marcia A.; McKeown, Kathleen 1983 Reports Computer science
80. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
81. Using density estimation to improve text categorization McKeown, Kathleen; Sable, Carl; Hatzivassiloglou, Vasileios 2002 Presentations (Communicative Events) Information technologyComputer science
82. Using Density Estimation to Improve Text Categorization Sable, Carl; McKeown, Kathleen; Hatzivassiloglou, Vasileios 2002 Reports Computer science
83. Using Context to Improve Emotion Detection in Spoken Dialog Systems Liscombe, Jackson; Riccardi, Giuseppe; Hakkani-Tur, Dilek 2005 Presentations (Communicative Events) Information technologyComputer science
84. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science
85. Using Bloom Filters for Authenticated Yes/No Answers in the DNS Bellovin, Steven Michael 2001 Reports Computer science
86. Using Bins to Empirically Estimate Term Weights for Text Categorization Sable, Carl; Church, Kenneth W. 2001 Presentations (Communicative Events) Computer scienceInformation technology
87. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
88. Using Angle of Arrival (Bearing) Information in Network Localization Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
89. Using an External DHT as a SIP Location Service Singh, Kundan; Schulzrinne, Henning G. 2006 Reports Computer science
90. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science
91. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
92. User's Manual for Pyramid Emulation on The Connection Machine Brown, Lisa Gottesfeld; Ju, Qifan; Norman, Cynthia 1988 Reports Computer science
93. User-Sensitive Text Summarization - Thesis Summary Elhadad, Noemie 2004 Presentations (Communicative Events) Computer scienceInformation technology
95. User-Needs Analysis and Design Methodology for an Automated Documentation Generator Kukich, Karen; McKeown, Kathleen; Shaw, James; Robin, Jacques; Lim, J.; Morgan, N.; Phillips, J. 1993 Presentations (Communicative Events) Computer scienceInformation technology
96. User Interfaces for Patient-Centered Communication of Health Status and Care Progress Wilcox-Patterson, Lauren 2013 Theses Computer scienceHealth services administrationMedical care
97. User-Defined Predicates in OPS5: A Needed Language Extension for Financial Expert Systems Pasik, Alexander J.; Miranker, Daniel P.; Stolfo, Salvatore; Kresnicka, Thomas 1989 Reports Computer science
98. Use of Fast Multipole to Accelerate Discrete Circulation-Preserving Vortex Sheets for Soap Films and Foams Da, Fang; Batty, Christopher; Wotjan, Chris; Grinspun, Eitan 2015 Reports Computer science
99. Use of deep linguistic features for the recognition and labeling of semantic arguments Chen, John; Rambow, Owen 2003 Presentations (Communicative Events) Information technologyComputer science
100. Usenetfs: A Stackable File System for Large Article Directories Zadok, Erez; Badulescu, Ion 1998 Reports Computer science