1. XR Development with the Relay and Responder Pattern Elvezio, Carmine 2021 Theses Computer scienceVirtual realityAugmented realityComputer gamesThree-dimensional imaging
2. xPF: Packet Filtering for Low-Cost Network Monitoring Ioannidis, Sotiris; Anagnostakis, Kostas G.; Ioannidis, John; Keromytis, Angelos D. 2002 Articles Computer science
3. WWW-based Collaboration Environments with Distributed Tool Services Kaiser, Gail E.; Dossick, Stephen E.; Jiang, Wenyu; Yang, Jack Jingshuang; Ye, Sonny Xi 1997 Reports Computer science
4. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
5. WordsEye: An Automatic Text-to-Scene Conversion System Coyne, Robert Eric; Sproat, Richard 2001 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
6. Word informativeness and automatic pitch accent modeling Pan, Shimei; McKeown, Kathleen 1999 Presentations (Communicative Events) Information technologyComputer science
7. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
9. Why a Single Parallelization Strategy Is Not Enough in Knowledge Bases Cohen, Simona Rabinovici; Wolfson, Ouri 1990 Reports Computer science
10. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
11. Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task Parton, Kristen; McKeown, Kathleen; Coyne, Robert Eric; Diab, Mona T.; Grishman, Ralph; Hakkani-Tür, Dilek; Harper, Mary; Ji, Heng; Ma, Wei Yun; Meyers, Adam; Rosenthal, Sara; Sun, Ang; Tur, Gokhan; Xu, Wei; Yaman, Sibel 2009 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
12. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
13. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science
14. Where's the Verb? Correcting Machine Translation During Question Answering Ma, Wei-Yun; McKeown, Kathleen 2009 Presentations (Communicative Events) Computer science
15. Where does smoothness count the most for two-point boundary-value problems? Werschulz, Arthur G. 1997 Reports Computer science
16. Where Does Smoothness Count the Most For Fredholm Equations of the Second Kind With Noisy Information? Werschulz, Arthur G. 2001 Reports Computer science
17. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science
18. When Is Nonadaptive Information as Powerful as Adaptive Information? Traub, Joseph F.; Wasilkowski, Grzegorz W.; Wozniakowski, Henryk 1984 Reports Computer science
19. When Firmware Modifications Attack: A Case Study of Embedded Exploitation Cui, Ang; Costello, Michael; Stolfo, Salvatore 2013 Presentations (Communicative Events) Malware (Computer software)Computer securityComputer firmwareComputer science
20. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science