1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
3. 3D modeling of historic sites using range and image data Allen, Peter K.; Stamos, Ioannis; Troccoli, Alejandro; Smith, Benjamin; Leordeanu, Marius; Hsu, Y. C. 2003 Articles Computer scienceArchitecture
4. 3D Object Understanding from RGB-D Data Feng, Jie 2017 Theses Artificial intelligenceComputer scienceComputer visionThree-dimensional imaging
5. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
7. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
8. A 3-level Atomicity Model for Decentralized Workflow Management Systems Ben-Shaul, Israel Z.; Heineman, George T. 1996 Reports Computer science
9. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
10. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization Song, Yingbo 2012 Theses Computer science
11. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization: Supporting Data Song, Yingbo 2012 Data (Information) Computer science
13. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
14. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
15. "Abstract" Understanding: The Relation between Language and Memory Lebowitz, Michael 1981 Reports Memory management (Computer science)Database managementElectronic data processing
16. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
17. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
18. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
19. A Case Study In Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
20. Accelerated parallel algorithm for gene network reverse engineering He, Jing; Zhou, Zhou; Reed, Michael K.; Califano, Andrea 2017 Articles Parallel programming (Computer science)Gene regulatory networksGene expression--Data processingSystems biology
21. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
22. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
23. Accelerating Similarly Structured Data Wu, Lisa K. 2014 Theses Computer scienceComputer engineering
24. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
25. Accounting for prosodic information to improve ASR-based topic tracking for TV Broadcast News Guinaudeau, Camille; Hirschberg, Julia Bell 2011 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
26. ACE: An Expert System Supporting Analysis and Management Decision Making Stolfo, Salvatore; Vesonder, Gregg T. 1982 Reports Database managementTelephone cables--Maintenance and repair
27. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
28. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
29. A Collection of Four Transcripts of Long Conversations through Computers Including the Experiments Protocols Elhadad, Michael 1987 Reports Computer science
30. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
31. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
32. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
33. A Comparative Study of Divergence Control Algorithms Kawaguchi, Akira; Mok, Kui W.; Pu, Calton 1994 Reports Computer science
34. A Comparison of Cache Performance in Server-Based and Symmetric Database Architectures Leff, Avraham; Pu, Calton; Korz, Frederick 1990 Reports Computer science
35. A Comparison of Storage Optimisations in Automatically-Generated Attribute Evaluators Farrow, Rodney; Yellin, Daniel 1985 Reports Computer science
36. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
37. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
38. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
39. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
40. A Computational Perspective of Causal Inference and the Data Fusion Problem Correa, Juan David 2021 Theses Artificial intelligenceComputer scienceStochastic control theory--Statistical methodsStatisticsMachine learning
41. A Configuration Process for a Distributed Software Development Environment Ben-Shaul, Israel Z.; Kaiser, Gail E. 1993 Reports Computer science
42. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
43. A Contrastive Study of Functional Unification Grammar for Surface Language Generation: A Case Study in Choice of Connectives McKeown, Kathleen; Elhadad, Michael 1989 Reports Computer science
44. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
45. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
46. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
47. Acoustic and Prosodic Correlates of Social Behavior Gravano, Agustín; Levitan, Rivka; Willson, Laura; Beòuš, Štefan; Hirschberg, Julia Bell; Nenkova, Ani 2011 Presentations (Communicative Events) Computer scienceLinguisticsInformation technology
48. Acoustic/Prosodic and Lexical Correlates of Charismatic Speech Hirschberg, Julia Bell; Rosenberg, Andrew 2005 Presentations (Communicative Events) Information technologyComputer science
49. Acoustic-Prosodic Entrainment in Human-Human and Human-Computer Dialogue Levitan, Rivka 2014 Theses Computer scienceHuman-computer interactionSocial interactionLanguage and languages--Rhythm
50. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
51. Acquisition and interpretation of 3-D sensor data from touch Allen, Peter K.; Michelman, Paul 1990 Articles Robotics
52. Acquisition and Interpretation of 3-D Sensor Data from Touch Allen, Peter K.; Michelman, Paul 1989 Reports Computer science
53. A Critique of the llc Parallel Language and Some Solutions Mills, Russell C. 1989 Reports Computer science
54. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
55. A Cross-Cultural Comparison of American, Palestinian, and SwedishPerception of Charismatic Speech: Powerpoint Poster Hirschberg, Julia Bell; Biadsy, Fadi; Rosenberg, Andrew; Carlson, Rolf; Strangert, Eva 2008 Presentations (Communicative Events) Computer scienceCommunicationPsychology
56. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
57. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
58. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
59. Active Databases for Communication Network Management Wolfson, Ouri; Sengupta, Soumitra; Yemini, Yechiam 1990 Reports Computer science
61. A Cure for Pathological Behavior in Games That Use Minimax Abramson, Bruce 1985 Reports Computer science
62. Adapting Automatic Summarization to New Sources of Information Ouyang, Jessica Jin 2019 Theses Computer scienceFirst person narrativeNatural language processing (Computer science)Machine translatingCross-language information retrieval
63. Adapting Materialized Views after Redefinitions: Techniques and a Performance Study Gupta, Ashish; Mumick, Inderpal S.; Rao, Jun; Ross, Kenneth A. 1997 Reports Computer science
64. Adapting Materialized Views after Redifinitions Gupta, Ashish; Mumick, Inderpal S.; Ross, Kenneth A. 1995 Reports Computer science
65. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
66. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
67. Adaptive Model Generation: An Architecture for Deployment of Data Mining-Based Intrusion Detection Systems Honig, Andrew; Howard, Andrew; Eskin, Eleazar; Stolfo, Salvatore 2002 Articles Computer science
68. Adaptive Model Generation for Intrusion Detection Systems Eskin, Eleazar; Miller, Matthew; Zhong, Zhi-Da; Yi, George; Lee, Wei-Ang; Stolfo, Salvatore 2000 Articles Computer science
69. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
70. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
71. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
72. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
73. Adding Trust to P2P Distribution of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Keromytis, Angelos D.; Stein, Clifford S. 2009 Articles Computer science
74. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
75. Addressing the Insider Threat Pfleeger, Shari Lawrence; Stolfo, Salvatore 2009 Articles Computer science
76. A description of the CIDR system as used for TDT-2 Radev, Dragomir R.; McKeown, Kathleen; Hatzivassiloglou, Vasileios 1999 Presentations (Communicative Events) Computer scienceInformation technology
77. A design and analysis tool for underactuated compliant hands Ciocarlie, Matei; Allen, Peter K. 2009 Articles Robotics
78. A Deterministic Multi-Way Rendezvous Library for Haskell Vasudevan, Nalini; Singh, Satnam; Edwards, Stephen A. 2008 Articles Computer science
80. A Disruptive Computer Design Idea: Architectures with Repeatable Timing Edwards, Stephen A.; Kim, Sungjun; Lee, Edward A.; Liu, Isaac; Patel, Hiren D.; Schoeberl, Martin 2009 Articles Computer science
81. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
82. A Distributed Algorithm for Adaptive Replication of Data Wolfson, Ouri 1990 Reports Computer science
83. A Distributed Signal Processing Facility for Speech Research Polish, Nathaniel 1988 Reports Computer science
84. A DNS Filter and Switch for Packet-filtering Gateways Cheswick, Bill; Bellovin, Steven Michael 1996 Articles Computer science
85. A Domain-Specific Language for Generating Dataflow Analyzers Zheng, Jia; Mitchell, Chuck; Edwards, Stephen A. 2006 Articles Computer science
86. Advancing Multimedia: Application Sharing, Latency Measurements and User-Created Services Boyaci, Omer 2012 Theses Computer science
87. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
88. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
89. AES Key Agility Issues in High-Speed IPsec Implementations Whiting, Doug; Schneier, Bruce; Bellovin, Steven Michael 2000 Articles Computer science
90. A Family of Window Protocols for Time-Constrained Applications in CSMA Networks Kurose, James F.; Schwartz, Mischa 1983 Reports Computer science
93. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
94. A Flexible and Efficient Protocol for Multi-Scope Service Registry Replication Zhao, Weibin; Schulzrinne, Henning G. 2002 Reports Computer science
95. A Flexible Transaction Model for Software Engineering Kaiser, Gail E. 1989 Reports Computer science
96. A Formal Characterization of Epsilon Serializability Ramamritham, Krithi; Pu, Calton 1991 Reports Computer science
97. A Formal Model for Information Selection in Multi-Sentence Text Extraction Filatova, Elena; Hatzivassiloglou, Vasileios 2004 Presentations (Communicative Events) Information technologyComputer science
98. A Framework for 3D Pushbroom Imaging Ichimura, Naoyuki; Nayar, Shree K. 2003 Reports Computer science
99. A Framework for Eliciting Emotional Speech: Capitalizing on the Actor’s Process Hirschberg, Julia Bell; Enos, Frank 2006 Presentations (Communicative Events) Computer scienceInformation technology
100. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science