1151. Unifying Representation and Generalization: Understanding Hierarchically Structured Objects Wasserman, Kenneth 1985 Reports Computer science
1152. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
1153. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
1155. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
1156. Usenetfs: A Stackable File System for Large Article Directories Zadok, Erez; Badulescu, Ion 1998 Reports Computer science
1157. User-Defined Predicates in OPS5: A Needed Language Extension for Financial Expert Systems Pasik, Alexander J.; Miranker, Daniel P.; Stolfo, Salvatore; Kresnicka, Thomas 1989 Reports Computer science
1159. User's Manual for Pyramid Emulation on The Connection Machine Brown, Lisa Gottesfeld; Ju, Qifan; Norman, Cynthia 1988 Reports Computer science
1160. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
1161. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science
1162. Using an External DHT as a SIP Location Service Singh, Kundan; Schulzrinne, Henning G. 2006 Reports Computer science
1163. Using Angle of Arrival (Bearing) Information in Network Localization Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
1164. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science
1165. Using Density Estimation to Improve Text Categorization Sable, Carl; McKeown, Kathleen; Hatzivassiloglou, Vasileios 2002 Reports Computer science
1166. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
1167. Using Focus to Generate Complex and Simple Sentences Derr, Marcia A.; McKeown, Kathleen 1983 Reports Computer science
1168. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
1169. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
1171. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
1172. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2003 Reports Computer science
1173. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
1174. Using Prosodic Features of Speech and Audio Localization in Graphical User Interfaces Olwal, Alex; Feiner, Steven K. 2003 Reports Computer science
1175. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
1176. Valued Redundancy Pu, Calton; Leff, Avraham; Chen, Shu-Wie; Korz, Frederick; Wha, Jae M. 1989 Reports Computer science
1177. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
1178. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
1179. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
1181. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
1182. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
1183. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
1184. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
1185. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
1187. What Is the Complexity of Related Elliptic, Parabolic, and Hyperbolic Problems? Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
1188. What Is the Complexity of Solution-Restricted Operator Equations? Werschulz, Arthur G. 1995 Reports Computer science
1189. What Is the Complexity of Stieltjes Integration? Werschulz, Arthur G. 1998 Reports Computer science
1190. What is the complexity of surface integration? Wozniakowski, Henryk; Werschulz, Arthur G. 1999 Reports Computer science
1191. What is the Complexity of the Fredholm Problem of the Second Kind? Werschulz, Arthur G. 1984 Reports Computer science
1192. What is the complexity of volume calculation? Werschulz, Arthur G.; Wozniakowski, Henryk 2000 Reports Computer science
1193. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
1194. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
1195. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
1196. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
1197. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
1198. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
1199. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
1200. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science