1. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
3. A 3-level Atomicity Model for Decentralized Workflow Management Systems Ben-Shaul, Israel Z.; Heineman, George T. 1996 Reports Computer science
4. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
5. "Abstract" Understanding: The Relation between Language and Memory Lebowitz, Michael 1981 Reports Memory management (Computer science)Database managementElectronic data processing
6. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
7. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
8. A Case Study In Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
9. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
10. ACE: An Expert System Supporting Analysis and Management Decision Making Stolfo, Salvatore; Vesonder, Gregg T. 1982 Reports Database managementTelephone cables--Maintenance and repair
11. A Collection of Four Transcripts of Long Conversations through Computers Including the Experiments Protocols Elhadad, Michael 1987 Reports Computer science
12. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
13. A Comparative Study of Divergence Control Algorithms Kawaguchi, Akira; Mok, Kui W.; Pu, Calton 1994 Reports Computer science
14. A Comparison of Cache Performance in Server-Based and Symmetric Database Architectures Leff, Avraham; Pu, Calton; Korz, Frederick 1990 Reports Computer science
15. A Comparison of Storage Optimisations in Automatically-Generated Attribute Evaluators Farrow, Rodney; Yellin, Daniel 1985 Reports Computer science
16. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
17. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
18. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
19. A Configuration Process for a Distributed Software Development Environment Ben-Shaul, Israel Z.; Kaiser, Gail E. 1993 Reports Computer science
20. A Contrastive Study of Functional Unification Grammar for Surface Language Generation: A Case Study in Choice of Connectives McKeown, Kathleen; Elhadad, Michael 1989 Reports Computer science
21. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
22. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
23. Acquisition and Interpretation of 3-D Sensor Data from Touch Allen, Peter K.; Michelman, Paul 1989 Reports Computer science
24. A Critique of the llc Parallel Language and Some Solutions Mills, Russell C. 1989 Reports Computer science
25. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
26. Active Databases for Communication Network Management Wolfson, Ouri; Sengupta, Soumitra; Yemini, Yechiam 1990 Reports Computer science
27. A Cure for Pathological Behavior in Games That Use Minimax Abramson, Bruce 1985 Reports Computer science
28. Adapting Materialized Views after Redefinitions: Techniques and a Performance Study Gupta, Ashish; Mumick, Inderpal S.; Rao, Jun; Ross, Kenneth A. 1997 Reports Computer science
29. Adapting Materialized Views after Redifinitions Gupta, Ashish; Mumick, Inderpal S.; Ross, Kenneth A. 1995 Reports Computer science
30. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
31. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
32. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
33. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
34. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
35. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
36. A Distributed Algorithm for Adaptive Replication of Data Wolfson, Ouri 1990 Reports Computer science
37. A Distributed Signal Processing Facility for Speech Research Polish, Nathaniel 1988 Reports Computer science
38. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
39. A Family of Window Protocols for Time-Constrained Applications in CSMA Networks Kurose, James F.; Schwartz, Mischa 1983 Reports Computer science
42. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
43. A Flexible and Efficient Protocol for Multi-Scope Service Registry Replication Zhao, Weibin; Schulzrinne, Henning G. 2002 Reports Computer science
44. A Flexible Transaction Model for Software Engineering Kaiser, Gail E. 1989 Reports Computer science
45. A Formal Characterization of Epsilon Serializability Ramamritham, Krithi; Pu, Calton 1991 Reports Computer science
46. A Framework for 3D Pushbroom Imaging Ichimura, Naoyuki; Nayar, Shree K. 2003 Reports Computer science
47. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science
48. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
49. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
50. A General Framework for Designing Catadioptric Imaging and Projection Systems Swaminathan, Rahul; Grossberg, Michael D.; Nayar, Shree K. 2003 Reports Computer science
51. A Generalization of Band Joins and the Merge-Purge Problem Hernandez, Mauricio A. 1995 Reports Computer science
52. A Generic Framework for Expert Data Analysis Systems Burns, Luanne; Pasik, Alexander J. 1985 Reports Computer science
53. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
54. Agent-Based Distributed Learning Applied to Fraud Detection Prodromidis, Andreas L.; Stolfo, Salvatore 1999 Reports Computer scienceCredit card fraudLaw enforcement--Technological innovationsAlgorithmsMachine learning
55. Agnostically Learning Halfspaces Kalai, Adam; Klivans, Adam; Mansour, Yishay; Servedio, Rocco Anthony 2005 Reports Computer science
56. A Hierarchical Associative Architecture for the Parallel Evaluation of Relational Algebraic Database Primitives Shaw, David Elliot 1979 Reports Computer storage devices--Mathematical modelsComputer scienceComputer science--MathematicsDatabase management--Mathematical models
57. A Highly Parallel VLSI-Based Subsystem of the NON-VON Database Machine Shaw, David Elliot; Ibrahim, Hussein; Andrews, Jim; Wiederhold, Gio 1981 Reports Computer scienceInformation scienceParallel processing (Electronic computers)Database management--Computer programs
58. A Holistic Approach to Service Survivability Keromytis, Angelos D.; Parekh, Janak J.; Gross, Philip N.; Kaiser, Gail E.; Misra, Vishal; Nieh, Jason; Rubenstein, Daniel Stuart; Stolfo, Salvatore 2003 Reports Computer science
59. A Hybrid Approach for Answering Definitional Questions Blair-Goldensohn, Sasha; McKeown, Kathleen; Schlaikjer, Andrew Hazen 2003 Reports Computer science
60. A Hybrid Approach to Topological Mobile Robot Localization Blaer, Paul S.; Allen, Peter K. 2005 Reports Computer science
61. A Hybrid Hierarchical and Peer-to-Peer Ontology-based Global Service Discovery System Arabshian, Knarig; Schulzrinne, Henning G. 2005 Reports Computer science
62. AIM Encrypt: A Case Study of the Dangers of Cryptographic Urban Legends Locasto, Michael E. 2003 Reports Computer science
65. A Knowledge-Based Expert Systems Primer and Catalog Hillyer, Bruce K. 1985 Reports Computer scienceArtificial intelligence
66. A Large-Scale, Longitudinal Study of Player Achievements in World of Warcraft Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
67. Algebraic Specification-Based Performance Analysis or Communication Protocols Nounou, Nihal; Yemini, Yechiam 1984 Reports Computer science
68. Algorithm Based Fault Tolerance in Massively Parallel Systems Lerner, Mark D. 1988 Reports Computer science
69. A Linear-Time Algorithm for Concave One-Dimensional Dynamic Programming Galil, Zvi; Park, Kunsoo 1989 Reports Computer science
70. A LISP Compiler for the DADO Parallel Computer Lerner, Mark D.; Biema, Michael van; Maguire, Gerald Q. 1985 Reports Computer science
71. Allocation and Manipulation of Records in the NON-VON Supercomputer Shaw, David Elliot; Hillyer, Bruce K. 1983 Reports Computer science
73. A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer Bessen, Arvid J. 2005 Reports Computer science
74. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
75. A Measurement Methodology for Wide Area Internets Pu, Calton; Korz, Frederick; Lehman, Robert C. 1990 Reports Computer science
76. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
77. A Metalinguistic Approach to Process Enactment Extensibility Kaiser, Gail E.; Ben-Shaul, Israel Z.; Popovich, Steven S.; Dossick, Stephen E. 1996 Reports Computer science
78. A Methodology for Programming Production Systems and its Implications on Parallelism Pasik, Alexander J. 1988 Reports Computer science
79. A Methodology for Specification-Based Performance Analysis of Protocols Nounou, Nihal 1986 Reports Computer science
80. A Methodology tor Specification-Based Performance Analysis of Communication Protocols Nounou, Nihal; Yemini, Yechiam 1985 Reports Computer science
81. A Microrobotic System For Protein Streak Seeding Georgiev, Atanas; Allen, Peter K.; Song, Ting; Laine, Andrew F.; Edstrom, William; Hunt, John F. 2004 Reports Computer science
82. A Mobile Agent Approach to Lightweight Process Workflow Kaiser, Gail E.; Stone, Adam; Dossick, Stephen E. 1999 Reports Computer science
83. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
85. A Multi-resolution Block Storage Model for Database Design Zhou, Jingren; Ross, Kenneth A. 2003 Reports Computer science
86. An Abort Mechanism for Nested Distributed Transactions Duchamp, Dan 1989 Reports Computer science
87. An Active Events Model for Systems Monitoring Gross, Philip N.; Gupta, Suhit; Kaiser, Gail E.; Kc, Gaurav S.; Parekh, Janak J. 2001 Reports Computer science
88. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
89. An Algorithmic Taxonomy of Production System Machines Mills, Russell C. 1988 Reports Computer science
90. An Algorithm to Recover Generalized Cylinders from a Single Intensity View Gross, Ari D.; Boult, Terrance E. 1989 Reports Computer science
91. Analysis of Clocks in X10 Programs (Extended) Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2008 Reports Computer science
92. Analysis of Routing Algorithms for Secure Overlay Service Cook, Debra L. 2002 Reports Computer science
93. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
95. Analyzing User Plans to Produce Informative Responses by a Programmer's Consultant Wolz, Ursula 1985 Reports Computer science
97. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Baset, Salman Abdul; Schulzrinne, Henning G. 2004 Reports Computer science
99. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
100. An Approach for Distributed Query Processing in Marvel: Concepts and Implementation Bunter, Toni A. 1993 Reports Computer science