Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2016 | Augmenting wide-band 802.11 transmissions via unequal packet bit protection | Xie, Yaxiong; Li, Zhenjiang; Li, Mo; Jamieson, Kyle |
2011 | Vsys: A Programmable sudo | Bhatia, Sapan; Di Stasi, Giovanni; Haddow, Thom; Bavier, Andy; Muir, Steve, et al |
2013 | Wanted: Systems Abstractions for SDN | Bhatia, Sapan; Bavier, Andy; Peterson, Larry |
2021 | Patterns and Interactions in Network Security | Zave, Pamela; Rexford, Jennifer |
2018 | Clustering gene expression time series data using an infinite Gaussian process mixture model | McDowell, Ian C; Manandhar, Dinesh; Vockley, Christopher M; Schmid, Amy K; Reddy, Timothy E, et al |
2015 | ModNet: A Modular Approach to Network Stack Extension | Pathak, Sharvanath; Pai, Vivek S |
2021 | Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset | Amos, Ryan; Acar, Gunes; Lucherini, Elena; Kshirsagar, Mihir; Narayanan, Arvind, et al |
2009 | Object Storage on CRAQ: High-Throughput Chain Replication for Read-Mostly Workloads | Terrace, Jeff; Freedman, Michael J |
2020 | Optimization of Simultaneous Measurement for Variational Quantum Eigensolver Applications | Gokhale, Pranav; Angiuli, Olivia; Ding, Yongshan; Gui, Kaiwen; Tomesh, Teague, et al |
2020 | PerpLE: Improving the Speed and Effectiveness of Memory Consistency Testing | Melissaris, Themis; Markakis, Markos; Shaw, Kelly; Martonosi, Margaret |