851. Tree Dependent Identically Distributed Learning Jebara, Tony; Long, Philip M. 2005 Reports Computer science
852. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
853. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
854. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
855. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science
857. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
858. An Implementation of a Renesas H8/300 Microprocessor with a Cycle-Level Timing Extension Huang, Chen-Chun; Coca, Javier; Gupta, Yashket; Edwards, Stephen A. 2006 Reports Computer science
859. Arrays in SHIM: A Proposal Thapar, Smridh; Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
860. A Runtime Adaptation Framework for Native C and Bytecode Applications Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
861. A Survey of Security Issues and Solutions in Presence Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
862. A Survey on Service Creation by End Users Wu, Xiaotao; Schulzrinne, Henning G. 2006 Reports Computer science
863. A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency Mahajan, Dhruv 2006 Reports Computer science
864. A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding Shen, Charles; Schulzrinne, Henning G. 2006 Reports Computer science
865. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
866. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
867. Complexity and tractability of the heat equation Werschulz, Arthur G. 2006 Reports Computer science
868. Converting from Spherical to Parabolic Coordinates Ben-Artzi, Aner 2006 Reports Computer science
869. Cooperation Between Stations in Wireless Networks Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
870. Debugging Woven Code Eaddy, Marc; Aho, Alfred V.; Hu, Weiping; McDonald, Paddy; Burger, Julian 2006 Reports Computer science
871. Deriving Utility from a Self-Healing Benchmark Report Virmani, Ritika; Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
872. Embedded uClinux, the Altera DE2, and the SHIM Compiler Hsu, Wei-Chung; Edwards, Stephen A.; Lariviere, David 2006 Reports Computer science
873. Evaluating an Evaluation Method: The Pyramid Method Applied to 2003 Document Understanding Conference (DUC) Data Passonneau, Rebecca 2006 Reports Computer science
874. Feasibility of Voice over IP on the Internet Sherman, Alex; Nieh, Jason; Freund, Yoav 2006 Reports Computer science
875. Grouped Distributed Queues: Distributed Queue, Proportional Share Multiprocessor Scheduling Caprita, Bogdan; Nieh, Jason; Stein, Clifford S. 2006 Reports Computer science
876. High Quality, Efficient Hierarchical Document Clustering Using Closed Interesting Itemsets Malik, Hassan H.; Kender, John R. 2006 Reports Computer science
877. Linear Approximation of Optimal Attempt Rate in Random Access Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
878. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2006 Reports Computer science
879. MacShim: Compiling MATLAB to a Scheduling-Independent Concurrent Language Subramaniam, Neesha; Edwards, Stephen A.; Ohan, Oda 2006 Reports Computer science
880. Measurement and Evaluation of ENUM Server Performance Shen, Charles; Schulzrinne, Henning G. 2006 Reports Computer science
881. Measurements of DNS Stability Boyaci, Omer; Schulzrinne, Henning G. 2006 Reports Computer science
882. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
883. Passive Duplicate Address Detection for Dynamic Host Configuration Protocol (DHCP) Forte, Andrea G.; Shin, Sangho; Schulzrinne, Henning G. 2006 Reports Computer science
884. PBS: A Unified Priority-Based CPU Scheduler Feng, Hanhua; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
885. Practical Preference Relations for Large Data Sets Ross, Kenneth A.; Stuckey, Peter; Marian, Amelie 2006 Reports Computer science
886. Presence Traffic Optimization Techniques Singh, Vishal; Schulzrinne, Henning G.; Isomaki, Markus; Boni, Piotr 2006 Reports Computer science
887. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Reports Computer science
888. Projection Volumetric Display using Passive Optical Scatterers Nayar, Shree K.; Anand, Vijay N. 2006 Reports Computer science
889. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
890. Rigid Formations with Leader-Follower Architecture Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
891. Seamless Layer-2 Handoff using Two Radios in IEEE 802.11 Wireless Networks Shin, Sangho; Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
892. SHIM: A Deterministic Approach to Programming with Threads Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
893. SIMPLEstone: Benchmarking Presence Server Performance Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
894. Specifying Confluent Processes Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
895. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
896. Streak Seeding Automation Using Silicon Tools Georgiev, Atanas; Vorobiev, Sergeui M.; Edstrom, William; Song, Ting; Laine, Andrew F.; Hunt, John F.; Allen, Peter K. 2006 Reports Computer science
897. Synthesis of On-Chip Interconnection Structures:From Point-to-Point Links to Networks-on-Chip Pinto, Alessandro; Carloni, Luca; Sangiovanni-Vincentelli, Alberto L. 2006 Reports Computer science
898. Theoretical Bounds on Control-Plane Self-Monitoring in Routing Protocols Rajendran, Raj Kumar; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
899. Throughput and Fairness in CSMA/CA Wireless Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
900. Throughput and Fairness in Random Access Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science