1. XR Development with the Relay and Responder Pattern Elvezio, Carmine 2021 Theses Computer scienceVirtual realityAugmented realityComputer gamesThree-dimensional imaging
2. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
3. WWW-based Collaboration Environments with Distributed Tool Services Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang; Ye, Sonny Xi 1997 Reports Computer science
4. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
5. WordsEye: An Automatic Text-to-Scene Conversion System Coyne, Robert Eric; Sproat, Richard 2001 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
6. Word informativeness and automatic pitch accent modeling Pan, Shimei; McKeown, Kathleen 1999 Presentations (Communicative Events) Information technologyComputer science
7. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
9. Why a Single Parallelization Strategy Is Not Enough in Knowledge Bases Cohen, Simona Rabinovici; Wolfson, Ouri 1990 Reports Computer science
10. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
11. Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task Parton, Kristen; McKeown, Kathleen; Coyne, Robert Eric; Diab, Mona T.; Grishman, Ralph; Hakkani-Tür, Dilek; Harper, Mary; Ji, Heng; Ma, Wei Yun; Meyers, Adam; Rosenthal, Sara; Sun, Ang; Tur, Gokhan; Xu, Wei; Yaman, Sibel 2009 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
12. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
13. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
14. Where's the Verb? Correcting Machine Translation During Question Answering Ma, Wei-Yun; McKeown, Kathleen 2009 Presentations (Communicative Events) Computer science
15. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
16. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
17. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
18. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
19. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
20. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
21. What's yours and what's mine: Determining intellectual attribution in scientific text Teufel, Simone; Moens, Marc 2000 Presentations (Communicative Events) Information technologyComputer science
22. What’s in a Translation Rule? Galley, Michel; Hopkins, Mark; Knight, Kevin; Marcu, Daniel 2004 Presentations (Communicative Events) Information technologyComputer science
23. What is the complexity of volume calculation? Werschulz, Arthur G.; Wozniakowski, Henryk 2000 Reports Computer science
24. What is the Complexity of the Fredholm Problem of the Second Kind? Werschulz, Arthur G. 1984 Reports Computer science
25. What is the complexity of surface integration? Wozniakowski, Henryk; Werschulz, Arthur G. 1999 Reports Computer science
26. What Is the Complexity of Stieltjes Integration? Werschulz, Arthur G. 1998 Reports Computer science
27. What Is the Complexity of Solution-Restricted Operator Equations? Werschulz, Arthur G. 1995 Reports Computer science
28. What Is the Complexity of Related Elliptic, Parabolic, and Hyperbolic Problems? Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
30. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
31. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
32. WebSOS: Protecting Web Servers From DDoS Attacks Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
33. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks Stavrou, Angelos; Cook, Debra L.; Morein, William G.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
34. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
35. WebDAVA: An Administrator-Free Approach To Web File-Sharing Levine, Alexander; Prevelakis, Vassilis; Ioannidis, John; Ioannidis, Sotiris; Keromytis, Angelos D. 2003 Articles Computer science
36. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
37. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
38. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
40. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
41. Voice over IP: Risks, Threats and Vulnerabilities Keromytis, Angelos D. 2009 Articles Computer science
42. VMVM: Unit Test Virtualization for Java (System Implementation) Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Software Computer science
43. V-Measure: A conditional entropy-based external cluster evaluation Hirschberg, Julia Bell; Rosenberg, Andrew 2007 Presentations (Communicative Events) Computer scienceInformation technology
44. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
45. Visual servoing by partitioning degrees of freedom Oh, Paul Y.; Allen, Peter K. 2001 Articles Robotics
46. Visual servoed micropositioning for protein manipulation tasks Mezouar, Youcef; Allen, Peter K. 2002 Articles Nanotechnology
47. Visually-guided protein crystal manipulation using micromachined silicon tools Georgiev, Atanas; Allen, Peter K.; Edstrom, William 2004 Articles Nanotechnology
48. Visual control of grasping and manipulation tasks Yoshimi, Billibon; Allen, Peter K. 1994 Articles Robotics
49. Vision for mobile robot localization in urban environments Georgiev, Atanas; Allen, Peter K. 2002 Articles Robotics
50. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
51. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
52. VigNet: Grounding Language in Graphics using Frame Semantics Coyne, Robert Eric; Bauer, Daniel; Rambow, Owen C. 2011 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
53. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
54. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
55. Very Short Utterances in Conversation Heldner, Mattias; Edlund, Jens; Al Moubayed, Samer; Gravano, Agustín; Hirschberg, Julia Bell 2010 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
56. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
57. Verbalization of high-level formal proofs Holland-Minkley, Amanda M.; Barzilay, Regina; Constable, Robert L. 1999 Presentations (Communicative Events) Information technologyComputer science
58. VastMM-Tag: Semantic Indexing and Browsing of Videos for E-Learning Morris, Mitchell Joseph 2012 Theses Computer science
59. Varying Input Segmentation for Story Boundary Detection in English, Arabic and Mandarin Broadcast News: Presentation Powerpoint Slides Hirschberg, Julia Bell; Rosenberg, Andrew; Sharifi, Mehrbod 2007 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
60. Varying Input Segmentation for Story Boundary Detection in English, Arabic and Mandarin Broadcast News Hirschberg, Julia Bell; Rosenberg, Andrew; Sharifi, Mehrbod 2007 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
61. Variational Calculations of the 2³S State of Helium Traub, Joseph F. 1958 Articles Helium ionsElectron configurationChemistry--Mathematical models
62. Variational Calculations of Energy and Fine Structure for the 2³P State of Helium Traub, Joseph F. 1959 Articles ChemistryNumerical calculations--Data processingMicrophysics
63. Variational Bayesian Methods for Inferring Spatial Statistics and Nonlinear Dynamics Moretti, Antonio Khalil 2021 Theses Computer scienceStatisticsBayesian statistical decision theorySpatial analysis (Statistics)
64. Variants in exons and in transcription factors affect gene expression in trans Kreimer, Anat; Pe'er, Itshack G. 2013 Articles Gene regulatory networksGene expressionGeneticsBiology--Classification
65. Valued Redundancy Pu, Calton; Leff, Avraham; Chen, Shu-Wie; Korz, Frederick; Wha, Jae M. 1989 Reports Computer science
66. Utilizing Runtime Information for Accurate Root Cause Identification in Performance Diagnosis Weng, Lingmei 2023 Theses Computer scienceDebugging in computer science--Computer programsComputer software--Evaluation
67. Using word class for part-of-speech disambiguation Radev, Dragomir R.; Tzoukermann, Evelyne 1996 Presentations (Communicative Events) Computer scienceInformation technology
68. Using the Domain Name System for System Break-ins Bellovin, Steven Michael 1995 Articles Computer science
69. Using the Annotated Bibliography as a Resource for Indicative Summarization Kan, Min-yen; McKeown, Kathleen; Klavans, Judith L. 2002 Presentations (Communicative Events) Computer scienceInformation technology
70. Using Tactile and Visual Sensing with a Robotic Hand Allen, Peter K.; Miller, Andrew T.; Oh, Paul Y.; Leibowitz, Brian S. 1997 Articles Robotics
71. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
72. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
73. Using Prosody and Phonotactics in Arabic Dialect Identification Biadsy, Fadi; Hirschberg, Julia Bell 2009 Presentations (Communicative Events) Computer science
74. Using Prosodic Features of Speech and Audio Localization in Graphical User Interfaces Olwal, Alex; Feiner, Steven K. 2003 Reports Computer science
75. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
76. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2003 Reports Computer science
77. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
78. Using Overlays to Improve Network Security Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2002 Articles Computer science
79. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
81. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
82. Using Link Cuts to Attack Internet Routing Bellovin, Steven Michael; Gansner, Emden R. 2003 Articles Computer science
83. Using Linguistic Features to Improve Prosody for Text-to-Speech Sloan, Rose 2023 Theses Computer scienceText-to-speech softwareVersificationConversationRadio programs
84. Using librarian techniques in automatic text summarization for information retrieval Klavans, Judith L.; Kan, Min-yen 2002 Presentations (Communicative Events) Computer scienceInformation technology
85. Using lexical chains for text summarization Barzilay, Regina; Elhadad, Michael 1997 Presentations (Communicative Events) Computer scienceInformation technology
86. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
87. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers Morein, William G.; Stavrou, Angelos; Cook, Debra L.; Keromytis, Angelos D.; Misra, Vishal; Rubenstein, Daniel Stuart 2003 Articles Computer science
88. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
89. Using Focus to Generate Complex and Simple Sentences Derr, Marcia A.; McKeown, Kathleen 1983 Reports Computer science
90. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
91. Using density estimation to improve text categorization McKeown, Kathleen; Sable, Carl; Hatzivassiloglou, Vasileios 2002 Presentations (Communicative Events) Information technologyComputer science
92. Using Density Estimation to Improve Text Categorization Sable, Carl; McKeown, Kathleen; Hatzivassiloglou, Vasileios 2002 Reports Computer science
93. Using Context to Improve Emotion Detection in Spoken Dialog Systems Liscombe, Jackson; Riccardi, Giuseppe; Hakkani-Tur, Dilek 2005 Presentations (Communicative Events) Information technologyComputer science
94. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science
95. Using Bloom Filters for Authenticated Yes/No Answers in the DNS Bellovin, Steven Michael 2001 Reports Computer science
96. Using Bins to Empirically Estimate Term Weights for Text Categorization Sable, Carl; Church, Kenneth W. 2001 Presentations (Communicative Events) Computer scienceInformation technology
97. Using argumentation in text generation Elhadad, Michael 1995 Articles Computer scienceInformation technology
98. Using Angle of Arrival (Bearing) Information in Network Localization Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
99. Using an External DHT as a SIP Location Service Singh, Kundan; Schulzrinne, Henning G. 2006 Reports Computer science
100. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science