1. WWW-based Collaboration Environments with Distributed Tool Services Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang; Ye, Sonny Xi 1997 Reports Computer science
2. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
3. Why a Single Parallelization Strategy Is Not Enough in Knowledge Bases Cohen, Simona Rabinovici; Wolfson, Ouri 1990 Reports Computer science
4. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
5. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
6. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
7. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
8. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
9. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
10. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
11. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
12. What is the complexity of volume calculation? Werschulz, Arthur G.; Wozniakowski, Henryk 2000 Reports Computer science
13. What is the Complexity of the Fredholm Problem of the Second Kind? Werschulz, Arthur G. 1984 Reports Computer science
14. What is the complexity of surface integration? Wozniakowski, Henryk; Werschulz, Arthur G. 1999 Reports Computer science
15. What Is the Complexity of Stieltjes Integration? Werschulz, Arthur G. 1998 Reports Computer science
16. What Is the Complexity of Solution-Restricted Operator Equations? Werschulz, Arthur G. 1995 Reports Computer science
17. What Is the Complexity of Related Elliptic, Parabolic, and Hyperbolic Problems? Werschulz, Arthur G. 1983 Reports Computer scienceMathematics
19. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
20. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
21. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
22. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
23. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
25. Visual Surface Interpolation: A Comparison of Two Methods Boult, Terrance E. 1985 Reports Computer science
26. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
27. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
28. Valued Redundancy Pu, Calton; Leff, Avraham; Chen, Shu-Wie; Korz, Frederick; Wha, Jae M. 1989 Reports Computer science
29. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
30. Using Prosodic Features of Speech and Audio Localization in Graphical User Interfaces Olwal, Alex; Feiner, Steven K. 2003 Reports Computer science
31. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2003 Reports Computer science
32. Using Process Technology to Control and Coordinate Software Adaptation Valetto, Giuseppe; Kaiser, Gail E. 2002 Reports Computer science
33. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
35. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
36. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
37. Using Focus to Generate Complex and Simple Sentences Derr, Marcia A.; McKeown, Kathleen 1983 Reports Computer science
38. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
39. Using Density Estimation to Improve Text Categorization Sable, Carl; McKeown, Kathleen; Hatzivassiloglou, Vasileios 2002 Reports Computer science
40. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science
41. Using Angle of Arrival (Bearing) Information in Network Localization Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
42. Using an External DHT as a SIP Location Service Singh, Kundan; Schulzrinne, Henning G. 2006 Reports Computer science
43. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science
44. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
45. User's Manual for Pyramid Emulation on The Connection Machine Brown, Lisa Gottesfeld; Ju, Qifan; Norman, Cynthia 1988 Reports Computer science
47. User-Defined Predicates in OPS5: A Needed Language Extension for Financial Expert Systems Pasik, Alexander J.; Miranker, Daniel P.; Stolfo, Salvatore; Kresnicka, Thomas 1989 Reports Computer science
48. Usenetfs: A Stackable File System for Large Article Directories Zadok, Erez; Badulescu, Ion 1998 Reports Computer science
49. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
51. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
52. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
53. Unifying Representation and Generalization: Understanding Hierarchically Structured Objects Wasserman, Kenneth 1985 Reports Computer science
54. Unified Messaging using SIP and RTSP Singh, Kundan; Schulzrinne, Henning G. 2000 Reports Computer science
55. Unification in a Parallel Environment Taylor, Stephen; Tzoar, Daphne; Stolfo, Salvatore 1984 Reports Computer science
57. Understanding Data Refinement Using Procedural Refinement Kearns, Steven M. 1990 Reports Computer science
58. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
60. Two Nonlinear Bounds for On-Line Computations Duris, Pavol; Galil, Zvi; Paul, Wolfgang; Reischuk, Ruediger 1983 Reports Computer science
61. Two Lower Bounds In Asynchronous Distributed Computation Duris, Pavol; Galil, Zvi 1987 Reports Computer science
62. Tutoring That Responds to User Questions and Provides Enrichment Wolz, Ursula 1988 Reports Computer science
63. Turn-Taking and Affirmative Cue Words in Task-Oriented Dialogue Gravano, Agustin 2009 Reports Computer science
64. β-trees, γ-systems, and a Theorem on F-heaps Galil, Zvi; Spencer, Thomas 1984 Reports Computer science
65. Tree Machines: Architectures and Algorithms A Survey Paper Ibrahim, Hussein 1984 Reports Computer science
66. Tree Dependent Identically Distributed Learning Jebara, Tony; Long, Philip M. 2005 Reports Computer science
67. Transparent Concurrent Execution of Mutually Exclusive Alternatives Smith, Jonathan M.; Maguire, Gerald Q. 1988 Reports Computer science
68. Translating Between Programming Languages Using A Canonical Representation And Attribute Grammar Inversion Farrow, Rodney; Yellin, Daniel 1986 Reports Computer science
69. Transaction Management in Collaborative Virtual Environments Yang, Jack Jingshuang; Kaiser, Gail E.; Dossick, Stephen E. 1999 Reports Computer science
70. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
71. Tractable Reasoning in Knowledge Representation Systems Dalal, Mukesh 1995 Reports Computer science
72. Tractability of the Helmholtz equation with non-homogeneous Neumann boundary conditions: Relation to L2-approximation Werschulz, Arthur G. 2007 Reports Computer science
73. Tractability of the Fredholm problem of the second kind Werschulz, Arthur G.; Wozniakowski, Henryk 2010 Reports Computer science
74. Tractability of quasilinear problems. II: Second-order elliptic problems Werschulz, Arthur G.; Wozniakowski, Henryk 2005 Reports Computer science
75. Tractability of Quasilinear Problems. I: General Results Werschulz, Arthur G.; Wozniakowski, Henryk 2005 Reports Computer science
76. Tractability of multivariate approximation over a weighted unanchored Sobolev space: Smoothness sometimes hurts Werschulz, Arthur G.; Wozniakowski, Henryk 2008 Reports Computer science
77. Towards Using Cached Data Mining for Large Scale Recommender Systems Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2010 Reports Computer science
78. Towards the Unification of the Functional and Performance Analysis of Protocols or, Is the Alternating-Bit Protocol Really Correct? Yemini, Yechiam; Kurose, James F. 1982 Reports Computer science
79. Towards the Quality of Service for VoIP traffic in IEEE 802.11 Wireless Networks Shin, Sangho; Schulzrinne, Henning G. 2008 Reports Computer science
80. Towards the Parallel Execution of Rules in Production System Programs Ishida, Toru; Stolfo, Salvatore 1985 Reports Computer science
81. Towards More Graceful Interaction: A Survey of Question-Answering Programs Paris, Cecile L. 1985 Reports Computer scienceArtificial intelligence
82. Towards In Vivo Testing of Software Applications Murphy, Christian; Kaiser, Gail E.; Chu, Matt 2007 Reports Computer science
83. Towards Dynamic Network Condition-Aware Video Server Selection Algorithms over Wireless Networks Nam, Hyunwoo; Kim, Kyung Hwa; Schulzrinne, Henning G.; Calin, Doru 2013 Reports Computer science
84. Towards Diversity in Recommendations Using Social Networks Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Arora, Nipun; Kaiser, Gail E. 2011 Reports Computer science
85. Towards Distributed Sensor Networks: An Extended Abstract Yemini, Yechiam; Lazar, Aurel A. 1982 Reports Computer scienceComputer engineering
86. Toward Scalable and Parallel Inductive Learning: A Case Study in Splice Junction Prediction Chan, Philip K.; Stolfo, Salvatore 1994 Reports Computer science
87. Towards a Framework for Comparing Object-Oriented Systems Wu, Shyhtsun Felix 1989 Reports Computer science
88. Towards A Dynamic QoS-aware Over-The-Top Video Streaming in LTE Nam, Hyunwoo; Kim, Kyung Hwa; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
89. Toward Cost-Sensitive Modeling for Intrusion Detection Lee, Wenke; Miller, Matthew; Stolfo, Salvatore; Jallad, Kahil; Park, Christopher T.; Zadok, Erez; Prabhakar, Vijay 2000 Reports Computer science
90. Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems Collins, Rebecca L.; Carloni, Luca 2008 Reports Computer science
91. Topology-Based Optimization of Maximal Sustainable Throughput in a Latency-Insensitive System Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
92. Topic Shift Detection - finding new information in threaded news Radev, Dragomir R. 1999 Reports Computer science
95. Time-Varying Textures Enrique, Sebastian; Koudelka, Melissa; Belhumeur, Peter N.; Dorsey, Julie; Nayar, Shree K.; Ramamoorthi, Ravi 2005 Reports Computer science
96. Time-Constrained Communication in Multiple Access Networks Kurose, James F. 1984 Reports Computer science
97. Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values Li, Wei-Jen; Stolfo, Salvatore 2009 Reports Computer science
98. Throughput and Fairness in Random Access Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
99. Throughput and Fairness in CSMA/CA Wireless Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
100. THINC: A Remote Display Architecture for Thin-Client Computing Baratto, Ricardo A.; Nieh, Jason; Kim, Leo 2004 Reports Computer science