1. 3-D model construction using range and image data Stamos, Ioannis; Allen, Peter K. 2000 Articles Computer science
2. 3-D modeling from range imagery: an incremental method with a planning component Reed, Michael K.; Allen, Peter K.; Stamos, Ioannis 1997 Articles Computer science
3. 3D modeling of historic sites using range and image data Allen, Peter K.; Stamos, Ioannis; Troccoli, Alejandro; Smith, Benjamin; Leordeanu, Marius; Hsu, Y. C. 2003 Articles Computer scienceArchitecture
4. 3D Object Understanding from RGB-D Data Feng, Jie 2017 Theses Artificial intelligenceComputer scienceComputer visionThree-dimensional imaging
5. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
7. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science
8. A 3-level Atomicity Model for Decentralized Workflow Management Systems Ben-Shaul, Israel Z.; Heineman, George T. 1996 Reports Computer science
9. A Behavior-Based Approach To Securing Email Systems Stolfo, Salvatore; Hershkop, Shlomo; Wang, Ke; Nimeskern, Olivier; Hu, Chia-wei 2003 Articles Computer science
10. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization Song, Yingbo 2012 Theses Computer science
11. A Behavior-based Approach Towards Statistics-Preserving Network Trace Anonymization: Supporting Data Song, Yingbo 2012 Data (Information) Computer science
13. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
14. A Better Key Schedule for DES-like Ciphers Blumenthal, Uri; Bellovin, Steven Michael 1996 Articles Computer science
15. About SparseLab Donoho, David L.; Stodden, Victoria C.; Tsaig, Yaakov 2007 Reports Communication of technical informationComputer science
16. A Brief History of the Reproducibility Movement Stodden, Victoria C. 2012 Presentations (Communicative Events) Communication of technical informationComputer science
17. Abstractions for Probabilistic Programming to Support Model Development Bernstein, Ryan 2023 Theses Computer scienceStatisticsArtificial intelligenceProbabilities--Mathematical modelsComputer simulation
18. A "Bump in the Stack" Encryptor for MS-DOS Systems Wagner, David A.; Bellovin, Steven Michael 1996 Articles Computer science
19. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
20. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
21. A Case Study In Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
22. Accelerating Application-Level Security Protocols Burnside, Matthew Spindel; Keromytis, Angelos D. 2003 Articles Computer science
23. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
24. Accelerating Similarly Structured Data Wu, Lisa K. 2014 Theses Computer scienceComputer engineering
25. Access Control Prefix Router Advertisement Option for IPv6 Bellovin, Steven Michael 2003 Reports Computer science
26. Accounting for prosodic information to improve ASR-based topic tracking for TV Broadcast News Guinaudeau, Camille; Hirschberg, Julia Bell 2011 Presentations (Communicative Events) Computer scienceInformation technologyCommunication
27. A Class of Globally Convergent Iterations for the Solution of Polynomial Equations Traub, Joseph F. 1966 Articles Iterative methods (Mathematics)Polynomials--Study and teachingComputer science
28. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
29. A Collection of Four Transcripts of Long Conversations through Computers Including the Experiments Protocols Elhadad, Michael 1987 Reports Computer science
30. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
31. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
32. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
33. A Comparative Study of Divergence Control Algorithms Kawaguchi, Akira; Mok, Kui W.; Pu, Calton 1994 Reports Computer science
34. A Comparison of Cache Performance in Server-Based and Symmetric Database Architectures Leff, Avraham; Pu, Calton; Korz, Frederick 1990 Reports Computer science
35. A Comparison of Storage Optimisations in Automatically-Generated Attribute Evaluators Farrow, Rodney; Yellin, Daniel 1985 Reports Computer science
36. A Comparison of Thin-Client Computing Architectures Nieh, Jason; Yang, S. Jae; Novik, Naomi 2000 Reports Computer science
37. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
38. A Complexity-Theoretic Perspective on Convex Geometry Nadimpalli, Shivam 2024 Theses Computer scienceMathematicsGeometryConvex setsGaussian measuresAlgebra, Boolean
39. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
40. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
41. A Computational Perspective of Causal Inference and the Data Fusion Problem Correa, Juan David 2021 Theses Artificial intelligenceComputer scienceStochastic control theory--Statistical methodsStatisticsMachine learning
42. A Configuration Process for a Distributed Software Development Environment Ben-Shaul, Israel Z.; Kaiser, Gail E. 1993 Reports Computer science
43. A Continuous Model of Computation Traub, Joseph F. 1999 Articles Computer scienceTuring machinesPhysicsComputational complexity
44. A Contrastive Study of Functional Unification Grammar for Surface Language Generation: A Case Study in Choice of Connectives McKeown, Kathleen; Elhadad, Michael 1989 Reports Computer science
45. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
46. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
47. A Cooperative Immunization System for an Untrusting Internet Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D.; Li, Dekai 2003 Articles Computer science
48. Acoustic and Prosodic Correlates of Social Behavior Gravano, Agustín; Levitan, Rivka; Willson, Laura; Beòuš, Štefan; Hirschberg, Julia Bell; Nenkova, Ani 2011 Presentations (Communicative Events) Computer scienceLinguisticsInformation technology
49. Acoustic/Prosodic and Lexical Correlates of Charismatic Speech Hirschberg, Julia Bell; Rosenberg, Andrew 2005 Presentations (Communicative Events) Information technologyComputer science
50. Acoustic-Prosodic Entrainment in Human-Human and Human-Computer Dialogue Levitan, Rivka 2014 Theses Computer scienceHuman-computer interactionSocial interactionLanguage and languages--Rhythm