Berkeley

Results: 29543



#Item
41Programming language theory / Computing / Software engineering / Graph connectivity / Peephole optimization / Algorithm / Search algorithm / Google Search / Connected component / ALGOL 68

Scaling up Superoptimization Phitchaya Mangpo Phothilimthana Aditya Thakur

Add to Reading List

Source URL: pl.eecs.berkeley.edu

Language: English - Date: 2016-01-28 03:12:38
42Computing / Information and communications technology / Computer architecture / Network architecture / Networking hardware / Distributed computing architecture / Software architecture / Edge computing / Network performance / Computer network / Internet protocol suite / Clientserver model

v46n1703a-choffnes_v45n1a1-sommers.qxd

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2016-02-01 13:36:05
43Computer vision / Applications of computer vision / Gesture recognition / Surveillance / Feature detection / Bag-of-words model in computer vision / Conference on Computer Vision and Pattern Recognition / Object detection

Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition Tim Althoff UC Berkeley EECS/ICSI

Add to Reading List

Source URL: www.timalthoff.com

Language: English - Date: 2012-11-20 09:30:54
44Network performance / Network management / Computing / Management / TCP congestion control / Transmission Control Protocol / Packet loss / Bufferbloat / Throughput / CUBIC TCP / Bandwidth-delay product / Quality of service

How to Improve your Network Performance by Asking your Provider for Worse Service Radhika Mittal Justine Sherry

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2014-07-17 19:32:10
45Computing / Internet architecture / Network architecture / Information and communications technology / Routing / Computer networking / Internet protocols / Border Gateway Protocol / IP routing / Route reflector / Open Shortest Path First / Router

A New Approach to Interdomain Routing Based on Secure Multi-Party Computation Debayan Gupta∗, Aaron Segal∗, Aurojit Panda†, Gil Segev‡, Michael Schapira§, Joan Feigenbaum∗, Jennifer Rexford††, Scott Shenke

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2012-10-14 18:59:05
46Internet censorship / Privacy / Censorship

A Look at the Consequences of Internet Censorship through an ISP Lens Sheharbano Khattak (University of Cambridge)! Mobin Javed (UC Berkeley) Syed Ali Khayam (PLUMgrid)

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:53
47Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-04-03 15:56:26
48Technology / Information and communications technology / Wireless / Mobile telecommunications / UMTS / Planning / Scheduling / PDCP / C-RAN / Medium access control / Multi-core processor / LTE

∗ PRAN: Programmable Radio Access Networks Wenfei Wu ? Li Erran Li? Aurojit Panda† Scott Shenker† Bell Labs, Alcatel-Lucent? UW-Madison UC Berkeley†

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-03-17 14:29:27
49

PDF Document

Add to Reading List

Source URL: archive.bampfa.berkeley.edu

- Date: 2014-02-05 11:55:09
    50

    PDF Document

    Add to Reading List

    Source URL: arthistory.berkeley.edu

    - Date: 2018-08-26 22:25:37
      UPDATE