301. Computing D-Optimum Weighing Designs: Where Statistics, Combinatorics, and Computation Meet Galil, Zvi 1983 Reports Computer scienceMathematics
302. Computing Geographical Scopes of Web Resources Ding, Junyan; Gravano, Luis; Shivakumar, Narayanan 2000 Reports Computer science
303. Concept Learning in a Rich Input Domain: Generalization-Based Memory Lebowitz, Michael 1984 Reports Computer science
304. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
305. Concurrency Control in Advanced Database Applications Barghouti, Naser S.; Kaiser, Gail E. 1989 Reports Computer science
306. Concurrency Control in Rule-Based Software Development Environments Barghouti, Naser S. 1992 Reports Computer science
307. Concurrency-Oriented Optimization for Low-Power Asynchronous Systems Plana, Luis A.; Nowick, Steven M. 1996 Reports Computer science
309. Concurrent Execution of Mutually Exclusive Alternatives Smith, Jonathan M. 1989 Reports Computer science
310. Configuration Fuzzing for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
311. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
312. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning 2010 Reports Computer science
313. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
314. Consistency and Automation in Multi-User Rule-Based Development Environments Barghouti, Naser S.; Kaiser, Gail E. 1990 Reports Computer science
315. Constraint-based Text Generation Using Local Constraints and Argumentation to Generate a Turn in Conversation Elhadad, Michael 1990 Reports Computer science
316. Constructing Subtle Concurrency Bugs Using Synchronization-CentricSecond-Order Mutation Operators Wu, Leon Li; Kaiser, Gail E. 2011 Reports Computer science
317. Construction Through Decomposition: A Linear Time Algorithm for the N-queens Problem Abramson, Bruce; Yung, Mordechai M. 1984 Reports Computer science
318. Contributions to Information-Based Complexity, Image Understanding,and Logic Circuit Design Lee, David 1985 Reports Computer science
319. Contributions to information-based complexity, image understanding and logic circuit design. Lee, David 1985 Reports Computer science
320. Contributions to the Design of Asynchronous Macromodular Systems Plana, Luis A. 1999 Reports Computer science
321. Control in Functional Unification Grammars for Text Generation Elhadad, Michael; Robin, Jacques 1991 Reports Computer science
322. Controlling Window Protocols for Time-Constrained Communication in a Multiple Access Environment Kurose, James F.; Schwartz, Mischa; Yemini, Yechiam 1983 Reports Computer science
324. Converting from Spherical to Parabolic Coordinates Ben-Artzi, Aner 2006 Reports Computer science
325. Cooperation Between Stations in Wireless Networks Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
326. Cooperative Transactions for Multi-User Environments Kaiser, Gail E. 1993 Reports Computer science
327. Coordinating a Robot Arm and: Multi-finger Hand Using the Quaternion Representation Roberts, Kenneth S. 1989 Reports Computer science
329. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
330. Cost Function Error in Asynchronous Parallel Simulated Annealing Algorithms Durand, M. D. 1989 Reports Computer science
331. Counterexamples in Optimal Quadrature Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
332. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2003 Reports Computer science
333. Covers of Attribute Grammars and Sub-Protocol .Attribute Evaluators Farrow, Rodney 1983 Reports Computer science
334. CPU Torrent -- CPU Cycle Offloading to Reduce User Wait Time and Provider Resource Requirements Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2008 Reports Computer science
335. Creating a Story-Telling Universe Lebowitz, Michael 1983 Reports Computer scienceArtificial intelligence
336. Creating Characters in a Story-Telling Universe Lebowitz, Michael 1984 Reports Computer scienceInformation scienceLiterature
337. crep: a regular expression-matching textual corpus tool Duford, Darrin 1993 Reports Computer science
338. Cross-Dimensional Gestural Interaction Techniques for Hybrid Immersive Environments Benko, Hrvoje; Ishak, Edward W.; Feiner, Steven K. 2004 Reports Computer science
339. Cryptfs: A Stackable Vnode Level Encryption File System Badulescu, Ion; Shender, Alex; Zadok, Erez 1998 Reports Computer science
340. Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game Yung, Mordechai M. 1984 Reports Computer science
342. CUPID: A Protocol Development Environment Yemini, Yechiam; Nounou, Nihal 1983 Reports Computer science
345. DADO: A Parallel Computer for Artificial Intelligence Stolfo, Salvatore 1985 Reports Computer scienceArtificial intelligence
346. DADO: A Parallel Processor for Expert Systems Stolfo, Salvatore; Miranker, Daniel P. 1984 Reports Computer science
347. DADO: A Tree-Structured Machine Architecture for Production Systems Stolfo, Salvatore; Shaw, David Elliot 1982 Reports Computer science
348. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
349. Data Migration in an Object-Oriented Software Development Environment Sokolsky, Michael 1989 Reports Computer science
350. Data Quality Assurance and Performance Measurement of Data Mining for Preventive Maintenance of Power Grid Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Anderson, Roger N. 2011 Reports Computer science
351. Data structures and algorithms for approximate string matchingZvi Galil, Raffaele Giancarlo Galil, Zvi; Giancarlo, Raffaele 1987 Reports Computer science
352. Data Structures and Algorithms for Disjoint Set Union Problems Galil, Zvi; Italiano, Giuseppe F. 1989 Reports Computer science
353. Debugging Woven Code Eaddy, Marc; Aho, Alfred V.; Hu, Weiping; McDonald, Paddy; Burger, Julian 2006 Reports Computer science
354. Decomposability and Its Role in Parallel Logic-Program Evaluation Wolfson, Ouri; Silberschatz, Avi 1990 Reports Computer science
355. Depth-First Iterative Deepening: An Optimal Admissible Tree Search Korf, Richard E. 1985 Reports Computer science
356. Deriving shape from shadows: A Hilbert space setting Hatzitheodorou, Michael 1987 Reports Computer science
357. Deriving Utility from a Self-Healing Benchmark Report Virmani, Ritika; Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
358. Description strategies for naive and expert users Paris, Cecile L. 1985 Reports Computer science
360. Design, Implementation, and Validation of a New Class of Interface Circuits for Latency-Insensitive Design Li, Cheng-Hong; Collins, Rebecca L.; Sonalkar, Sampada; Carloni, Luca 2007 Reports Computer science
362. Detecting and Measuring Asymmetric Links in an IP Network Jiang, Wenyu 1999 Reports Computer scienceComputer networks--Quality controlComputer science--MathematicsAsymmetric digital subscriber lines
363. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
364. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
365. Detection and Exploitation of File Working Sets Tait, Carl D.; Duchamp, Dan 1990 Reports Computer science
366. Determining Interfaces Using Type Inference Li, Chun; Edwards, Stephen A. 2004 Reports Computer science
367. Determining the Level of Expertise of a User of a Question Answering System Paris, Cecile L. 1984 Reports Computer science
368. Deux: Autonomic Testing System for Operating System Upgrades Wu, Leon L.; Kaiser, Gail E.; Nieh, Jason; Murphy, Christian 2008 Reports Computer science
369. Development Tools For Communication Protocols Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
370. Development Tools for Communication Protocols: An Overview Nounou, Nihal; Yemini, Yechiam 1984 Reports Computer science
371. DFLOPS: A Data Flow Machine for Production Systems Cheng, Fu-Chiung; Wu, Mei-Yi 1993 Reports Computer science
372. DIAL: DIagrammatic Animation Language Tutorial and Reference Manual Feiner, Steven K. 1987 Reports Computer science
373. Dictionaries for Language Generation Accounting for Co-occurrence Knowledge Smadja, Frank A. 1989 Reports Computer science
374. Director: An Interpreter for Rule-based Programs Moerdler, Galina Datskovsky; Ensor, J. Robert 1986 Reports Computer science
375. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
376. Disconnected Operation in a Multi-User Software Development Environment Skopp, Peter D.; Kaiser, Gail E. 1993 Reports Computer science
377. Discourse Strategies for Using Natural-Language Text McKeown, Kathleen 1985 Reports Computer scienceArtificial intelligence
378. Discovery and Hot Replacement of Replicated Read-Only File Systems, with Application to Mobile Computing Zadok, Erez 1994 Reports Computer science
379. Disk Response Time Measurements Johnson, Thomas D.; Jonathan, Smith; Wilson, Eric S. 1986 Reports Computer science
380. Distributed Algorithms in Synchronous Broadcasting Networks Galil, Zvi; Landau, Gad M.; Yung, Moti 1985 Reports Computer science
381. Distributed Data Mining: The JAM system architecture Prodromidis, Andreas L.; Stolfo, Salvatore; Tselepis, Shelley; Truta, Terrance; Sherwin, Jeffrey; Kalina, David 2001 Reports Computer science
382. Distributed eXplode: A High-Performance Model Checking Engine to Scale Up State-Space Coverage Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2008 Reports Computer science
383. Distributed Firewall For MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2008 Reports Computer science
384. Distributed In Vivo Testing of Software Applications Chu, Matt; Murphy, Christian; Kaiser, Gail E. 2007 Reports Computer science
385. Distributed Multiple Access Protocols and Real-Time Communication Kurose, James F.; Yemini, Yechiam; Schwartz, Mischa 1983 Reports Computer science
386. Distributed Search over the Hidden Web: Hierarchical Database Sampling and Selection Ipeirotis, Panagiotis G.; Gravano, Luis 2002 Reports Computer science
387. Distributed Tool Services via the World Wide Web Dossick, Stephen E.; Kaiser, Gail E.; Yang, Jack Jingshuang 1996 Reports Computer science
388. Diversity Maximization Under Matroid Constraints Abbassi, Zeinab; Mirrokni, Vahab S.; Thakur, Mayur 2013 Reports Computer science
390. DOM-based Content Extraction of HTML Documents Gupta, Suhit; Neistadt, David; Kaiser, Gail E.; Grimm, Peter 2002 Reports Computer science
391. Do Negative Results from Formal Systems Limit Scientific Knowledge? Traub, Joseph F. 1997 Reports Computer science
392. DotSlash: A Scalable and Efficient Rescue System for Handling Web Hotspots Zhao, Weibin; Schulzrinne, Henning G. 2004 Reports Computer science
393. DotSlash: Providing Dynamic Scalability to Web Applications with On-demand Distributed Query Result Caching Zhao, Weibin; Schulzrinne, Henning G. 2005 Reports Computer science
394. Dynamic Adaptation of Rules for Temporal Event Correlation in Distributed Systems Griffith, Rean; Hellerstein, Joseph L.; Diao, Yixin; Kaiser, Gail E. 2005 Reports Computer science
395. Dynamic Adaptation of Temporal Event Correlation Rules Griffith, Rean; Kaiser, Gail E.; Hellerstein, Joseph; Diao, Yixin 2005 Reports Computer science
397. Dynamic Data Structures for Series Parallel Digraphs Italiano, Giuseppe F.; Spaccamela, Alberto Marchetti; Nanni, Umberto 1989 Reports Computer science
398. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
399. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
400. DYSWIS: Collaborative Network Fault Diagnosis - Of End-users, By End-users, For End-users Kim, Kyung Hwa; Singh, Vishal; Schulzrinne, Henning G. 2011 Reports Computer science