David Cheriton
#83,385
Most Influential Person Now
Canadian businessman and computer scientist
David Cheriton's AcademicInfluence.com Rankings
David Cheritoncomputer-science Degrees
Computer Science
#3190
World Rank
#3343
Historical Rank
Database
#1334
World Rank
#1406
Historical Rank
Download Badge
Computer Science
Why Is David Cheriton Influential?
(Suggest an Edit or Addition)According to Wikipedia, David Ross Cheriton is a Canadian computer scientist, businessman, philanthropist, and venture capitalist. He is a computer science professor at Stanford University, where he founded and leads the Distributed Systems Group.
David Cheriton's Published Works
Published Works
- Multicast routing in datagram internetworks and extended LANs (1990) (1407)
- Leases: an efficient fault-tolerant mechanism for distributed file cache consistency (1989) (573)
- The V distributed system (1988) (550)
- Preemptable remote execution facilities for the V-system (1985) (442)
- Finding Minimum Spanning Trees (1976) (436)
- Log-based receiver-reliable multicast for distributed interactive simulation (1995) (429)
- Distributed process groups in the V Kernel (1985) (415)
- Detecting identity-based attacks in wireless networks using signalprints (2006) (387)
- The V Kernel: A Software Base for Distributed Systems (1984) (368)
- IP multicast channels: EXPRESS support for large-scale single-source applications (1999) (354)
- An Architecture for Content Routing Support in the Internet (2001) (320)
- Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler (1999) (276)
- The distributed V kernel and its performance for diskless workstations (1983) (259)
- Understanding the limitations of causally and totally ordered communication (1994) (258)
- VMTP: a transport protocol for the next generation of communication systems (1986) (241)
- Active Internet Traffic Filtering: Real-Time Response to Denial-of-Service Attacks (2003) (206)
- Application-controlled physical memory using external page-cache management (1992) (204)
- From doc2query to docTTTTTquery (2019) (200)
- The VMP network adapter board (NAB): high-performance network communication for multiprocessors (1988) (182)
- Thoth, a portable real-time operating system (1979) (176)
- File access performance of diskless workstations (1986) (171)
- The synergy between non-blocking synchronization and operating system structure (1996) (148)
- Host groups: a multicast extension for datagram internetworks (1985) (140)
- VMTP as the transport layer for high-performance distributed systems (1989) (136)
- Pyserini: A Python Toolkit for Reproducible Information Retrieval Research with Sparse and Dense Representations (2021) (125)
- Exploiting Position History for Efficient Remote Rendering in Networked Virtual Reality (1995) (124)
- A caching model of operating system kernel functionality (1994) (123)
- Feedback based routing (2003) (116)
- TRIAD: A Scalable Deployable NAT-based Internet Architecture (2000) (110)
- Host groups: A multicast extension to the Internet Protocol (1985) (109)
- Comparing the performance of web server architectures (2007) (104)
- VMTP: Versatile Message Transaction Protocol (1988) (102)
- Software-controlled caches in the VMP multiprocessor (1986) (102)
- Network Capabilities : The Good , the Bad and the Ugly Katerina (96)
- DoS and authentication in wireless public access networks (2002) (93)
- Paradigm: a highly scalable shared-memory multicomputer architecture (1991) (90)
- Decentralizing a global naming service for improved performance and fault tolerance (1989) (89)
- Amaze: A Multiplayer Computer Game (1985) (88)
- VMTP: Versatile Message Transaction Protocol: Protocol specification (1988) (79)
- Problem-oriented Shared Memory: A Decentralized Approach to Distributed System Design (1986) (78)
- Scalable Network-Layer Defense Against Internet Bandwidth-Flooding Attacks (2009) (74)
- OTERS (on-tree efficient recovery using subcasting): a reliable multicast protocol (1998) (69)
- Using projection aggregations to support scalability in distributed simulation (1996) (65)
- On-line spam filter fusion (2006) (63)
- Using a Position History-Based Protocol for Distributed Object Visualization (1994) (61)
- The Thoth system : multi-process structuring and portability (1982) (60)
- Log files: an extended file service exploiting write-once storage (1987) (58)
- Loose source routing as a mechanism for traffic policies (2004) (57)
- Multi-level Shared Caching Techniques For Scalability In VMP-MC (1989) (57)
- The VMP multiprocessor: initial experience, refinements, and performance evaluation (1988) (56)
- Borrowed-virtual-time (BVT) scheduling: supporting latency-sensitive threads in a general-purpose scheduler (2000) (55)
- Scalable Web Caching of Frequently Updated Objects Using Reliable Multicast (1999) (54)
- UIO: a uniform I/O system interface for distributed systems (1987) (52)
- Providing Packet Obituaries (2004) (51)
- Sirpent: a high-performance internetworking approach (1989) (48)
- SI-TM: reducing transactional memory abort rates through snapshot isolation (2014) (46)
- TCP-RTM: Using TCP for Real Time Multimedia Applications (2002) (45)
- A caching model of operating system kernel functionality (1995) (45)
- Dissemination-Oriented Communication Systems. (1996) (42)
- A Personalized Approach to Address Unfair Ratings in Multiagent Reputation Systems (2006) (42)
- Network measurement of the VMTP request-response protocol in the V distributed system (1987) (40)
- Privacy Enhancing Technologies for the Internet III : Ten Years Later ∗ (1997) (40)
- A market approach to operating system memory allocation (1996) (40)
- Binary Emulation of UNIX Using the V Kernel (1990) (39)
- Loss-load curves: support for rate-based congestion control in high-speed datagram networks (1991) (38)
- An experiment using registers for fast message-based interprocess communication (1984) (37)
- HICAMP: architectural support for efficient concurrency-safe shared structured data access (2012) (35)
- Preliminary thoughts on problem-oriented shared memory: a decentralized approach to distributed systems (1985) (34)
- Evaluating the utility of FEC with reliable multicast (1999) (33)
- Designing an academic firewall: policy, practice, and experience with SURF (1996) (32)
- Man-machine interface design for timesharing systems (1976) (32)
- The Thoth System (1982) (31)
- TCP-SMO: extending TCP to support medium-scale multicast applications (2002) (31)
- Blazenet: a packet-switched wide-area network with photonic data path (1990) (28)
- Local networking and internetworking in the V-system (1983) (27)
- Uniform Access to Distributed Name Interpretation in the V-System (1984) (27)
- THE VECTOR RATIONAL FUNCTION RECONSTRUCTION PROBLEM (2007) (27)
- The Crowd vs . the Lab : A Comparison of Crowd-Sourced and University Laboratory Participant Behavior (2011) (26)
- Architecture and evolution of the modern web browser (2006) (23)
- A case for packet switching in high-performance wide-area networks (1987) (23)
- Computing Popov Form of General Ore Polynomial Matrices (2007) (23)
- Multi-process Structuring and the THOTH Operating System (1978) (23)
- A Decentralized Naming Facility (1986) (23)
- Exploring Listwise Evidence Reasoning with T5 for Fact Verification (2021) (22)
- One-to-many interprocess communication in the V-system (1984) (21)
- Request- Response and Multicast Interprocess Communication in the V Kernel (1986) (20)
- Restructuring a parallel simulation to improve cache behavior in a shared-memory multiprocessor: the value of distributed synchronization (1993) (20)
- H2oloo at TREC 2020: When all you got is a hammer... Deep Learning, Health Misinformation, and Precision Medicine (2020) (20)
- Performance of the V storage server: a preliminary report (1985) (18)
- Logged virtual memory (1995) (18)
- Specializing object-oriented RPC for functionality and performance (1996) (18)
- Efficient Correction of Anomalies in Snapshot Isolation Transactions (2015) (14)
- Amaze: A Distributed Multi-Player Game Program using the Distributed V Kernel (1984) (14)
- Pricing Hydroelectric Power Plants with / without Operational Restrictions : a Stochastic Control Approach 3 1 . 1 Previous work (2008) (13)
- Vera: Prediction Techniques for Reducing Harmful Misinformation in Consumer Health Search (2021) (13)
- Relational-Complete Private Information Retrieval (2007) (13)
- The VMP multiprocessor: initial experience, refinements and performance evaluation (1988) (13)
- Using dynamic buffer limiting to protect against belligerent flows in high-speed networks (2001) (12)
- Opportunistic Scheduling in Ferry-Based Networks (2006) (12)
- Extensions for multi-module records in conventional programming languages (1987) (12)
- Toward an ontology of rhetorical figures (2010) (11)
- MAXSM: A Multi-Heuristic Approach to XML Schema Matching (2006) (11)
- A preliminary report on the MathBrush pen-math system (2006) (11)
- Extending Typestate Analysis to Multiple Interacting Objects (2008) (11)
- Critical Path Heuristic for Automatic Parallelization (2008) (11)
- Exploiting recursion to simplify RPC communication architectures (1988) (11)
- Monte-Carlo Planning for Socially Aligned Agents using Bayesian Affect Control Theory (2015) (10)
- Anserini at TREC 2018 : CENTRE , Common Core , and News Tracks (2019) (10)
- Modular Computation for Matrices of Ore Polynomials (2007) (10)
- Using Conversational Agents To Support Learning By Teaching (2019) (9)
- Proceedings of the tenth ACM symposium on Operating systems principles (1985) (9)
- Sparse matrix-vector multiply on the HICAMP architecture (2012) (9)
- AN ONTOLOGICAL APPROACH TO DATA MINING FOR EMERGENCY MEDICINE (2011) (9)
- Revisiting the CLBlood Model : Formulation Enhancements and Online Deployment (2017) (9)
- COMPLEXITY OF ATOMS OF REGULAR LANGUAGES (2014) (9)
- Problem-oriented shared memory revisited (1992) (9)
- Making Exceptions Simplify the Rule (and Justify their Handling) (1986) (8)
- We Could, but Should We?: Ethical Considerations for Providing Access to GeoCities and Other Historical Digital Collections (2020) (8)
- Enhancing User Privacy in Location-Based Services (2006) (8)
- A Scalable Peer-to-peer Protocol Enabling Efficient and Flexible Search (2006) (8)
- An overview of the VMTP transport protocol (1989) (7)
- Third Generation Graphics for Distributed Systems (1983) (7)
- Big-Step Semantics (2009) (7)
- SAIMD : A Novel False Congestion Detection Scheme in TCP over OBS Networks (2007) (7)
- EXCITE-VM: Extending the virtual memory system to support snapshot isolation transactions (2016) (7)
- Improving Server Application Performance via Pure TCP ACK Receive Optimization (2013) (7)
- BLAZENET: A HIGH PERFORMANCE WIDE-AREA PACKET-SWITCHED NETWORK USING OPTICAL FIBERS. (1987) (6)
- Optimized Memory-Based Messaging: Leveraging the Memory System for High-Performance Communication (1994) (6)
- H2oloo at TREC 2019: Combining Sentence and Document Evidence in the Deep Learning Track (2021) (6)
- A Survey of Mobile Database Caching Strategies (2008) (6)
- On the Modeling of Light Interactions with Human Blood (2011) (6)
- May 26, 2013 12:31 WSPC/INSTRUCTION FILE brzozowski IN SEARCH OF MOST COMPLEX REGULAR LANGUAGES (2013) (6)
- Reproducibility is a Process, not an Achievement: The Replicability of IR Reproducibility Experiments (2020) (6)
- New Bounds for Generalized Separating Hash Families (2007) (6)
- Applications of Orthogonal Arrays to Computer Science (2006) (6)
- Succinct Encodings for XPath Location Steps (2006) (6)
- KleeQ : Asynchronous Key Management for Dynamic Ad-Hoc Networks (2007) (6)
- List Update with Locality of Reference : MTF Outperforms All Other Algorithms (2006) (6)
- Recognizing handwritten mathematics via fuzzy parsing (2010) (6)
- Chiron parallel program performance visualization system (1994) (5)
- Comments on the Respones by Birman, van Renesse and Cooper (1994) (5)
- Mathematics for Cryptography (2016) (5)
- An Evaluation of Shape/Split Grammars for Architecture (2009) (5)
- SI-WF 2 Q : WF 2 Q Approximation with Small Constant Execution Overhead-Extended Version (5)
- Differentially Private Algorithms for Learning Mixtures of Separated Gaussians (2019) (5)
- Comprehending Object-Oriented Software Frameworks API Through Dynamic Analysis (2007) (5)
- Universal network device interface protocol (UNDIP) (1988) (5)
- Document Expansions and Learned Sparse Lexical Representations for MS MARCO V1 and V2 (2022) (4)
- A combinatorial approach to the peptide feature matching problem for label-free quantification (2013) (4)
- Mitigating GPS Error in Mobile Environments (2008) (4)
- Voting with Social Networks : Truth Springs from Argument Amongst Friends (2015) (4)
- Promoting Effective Exchanges Between Vehicular Agents in Traffic Through Transportation-Oriented Trust Modeling (2010) (4)
- HICAMP bitmap: space-efficient updatable bitmap index for in-memory databases (2014) (4)
- Performance Analysis of Packet Forwarding on IXP 2400 Network Processor (2006) (4)
- Low and High Risk Operating System Architectures (Panel Statement) (1994) (4)
- Frobenius form in expected matrix multiplication time over sufficiently large fields (2007) (4)
- Optimizing distributed XML queries through localization and pruning (2009) (3)
- Metro: An Analysis Toolkit for Template Semantics (2006) (3)
- Towards Modularization and Composition in Distributed Event Based Systems (2009) (3)
- A Web-based Toolkit for Collaborative Innovation (2012) (3)
- Big Open Data for Environmental Information Systems (2015) (3)
- The Validation of an Annotations Approach to Peer Tutoring Through Simulation Incorporating the Modeling of Reputation (2011) (3)
- Enabling the Next Frontier in Mobile Applications (2009) (3)
- The Node-weighted Steiner Problem in Graphs of Restricted Node Weights (3)
- Adaptive Search Algorithm for Patterns , in Succinctly Encoded XML (2006) (3)
- Rethinking Network Stack Design with Memory Snapshots (2013) (3)
- Caspian : A QoS-Aware Deployment Approach for Channel-based Component-based Applications (2006) (3)
- POMDP Planning by Marginal-MAP Probabilistic Inference in Generative Models (2014) (3)
- Distributed I/O Using an Object-Based Protocol (1981) (3)
- Implementation of Parallel Set Intersection for Keyword Search using RapidMind (2007) (3)
- Revisiting the SPLITS Model: Towards an Enhanced Implementation (2020) (3)
- Complexity of Suffix-Free Regular Languages⋆ (2015) (3)
- Faster Set Intersection Algorithms for Text Searching ? University of Waterloo Technical Report CS-2007-13 (2007) (3)
- Evaluating Call Graph Construction for JVM-hosted Language Implementations (2015) (2)
- Simulation of Distributed Search Engines : Comparing Term , Document and Hybrid Distribution 1 (2009) (2)
- TRIAD (2000) (2)
- A survey of sequence alignment (2006) (2)
- An Experimental Investigation on Understanding the Difficulties and Challenges of Software Modellers When Using Modelling Tools (2018) (2)
- Vehicular Opportunistic Communication Under the Microscope, MobiSys 2007 (2007) (2)
- Track 2 Paper: The Future of Metadata-Oriented Testing of Research Software: Automated Generation of Test Regimes and Other Benefits (2017) (2)
- SMURFEN : A Knowledge Sharing Intrusion Detection Network (2011) (2)
- Process Identification in THOTH (1979) (2)
- Chatty Goose: A Python Framework for Conversational Search (2021) (2)
- A Risk Management Approach for Distributed Event-Based Systems (2014) (2)
- Integer Programming Model for Automated Structure-based NMR Assignment (2009) (2)
- Collaborative and Coordinated Product Configuration (2006) (2)
- Towards More Effective E-Marketplaces : A Novel Incentive Mechanism (2007) (2)
- Support for Collaborative Feature-Based Product Configuration in Software Product Lines (2007) (2)
- JTop Algorithms for Top-k Join Queries (2008) (2)
- TRIAD: Translating Relaying Internetwork Architecture Integrating Active Directories: Final Report (1999) (2)
- Using A-patches to Tessellate Algebraic Curves and Surfaces (2009) (2)
- Context-Awareness and Adaptation in Distributed Event-Based Systems (2011) (2)
- Content-Based Exploration of Archival Images Using Neural Networks (2020) (2)
- Categorization of Implicit Invocation Systems (2007) (2)
- Specializing Object-Oriented RPC for Performance and Functionality (1996) (2)
- Semantics and Encoding of the kell-m Calculus (2011) (2)
- Best Paper Awards (2022) (1)
- WiFi Overcast: Enabling True Mobility for Realtime Applications in the Enterprise (2009) (1)
- Designing an Operating System to be Verifiable (1979) (1)
- Automated topic naming to support analysis of softwaremaintenance activities (2010) (1)
- Comparison of Foveated Downsampling Techniques in Image Recognition (2021) (1)
- The ( 3 , 1 )-ordering for 4-connected planar triangulations (2016) (1)
- Determining precise distance in a highly mobile environment using imprecise GPS measurements (2007) (1)
- Title: Measuring life space in older adults with mild-to-moderate Alzheimer's disease using (2014) (1)
- Representation of Programming Constructs with the Kell-m Calculus (2009) (1)
- Pippenger's Multiproduct and Multiexponentiation Algorithms (Extended Version) (2010) (1)
- Stronger lower bounds for text searching and polynomial evaluation (2007) (1)
- Neural Query Synthesis and Domain-Specific Ranking Templates for Multi-Stage Clinical Trial Matching (2022) (1)
- Gesturing in the Wild : Understanding the Effects and Implications of Gesture-Based Interaction for Dynamic Presentations (2010) (1)
- Activity Recognition for Users of Rolling Walker Mobility Aids (2010) (1)
- Unrestricted State Complexity of Binary Operations on Regular Languages⋆ (2018) (1)
- The V distributed System was developed at Stanford University as ,part of a research project to explore issues in distributed systems. Aspects 'of the design suggest important directions for the design of future operating systems and communication systems. (1988) (1)
- Creating Artistic Compositions Using Coalition-Forming Intelligent Agents (2008) (1)
- The Case for Redundant Arrays of Internet Links (RAIL) (2007) (1)
- Towards Automated Structure-based NMR Assignment (2009) (1)
- Scalable defense against internet bandwidth flooding attacks (2006) (1)
- The V distributed operating system: principles and principal experiences (1986) (1)
- Comments on “ `Coherency for multiprocessor virtual addresses caches' by James R. Goodman" (1988) (1)
- Using Sphinx to Improve Onion Routing Circuit Construction ( short paper ) ⋆ (2009) (1)
- Online pattern matching in sparse matrices and contact maps (2010) (1)
- Digital Marbling a Gpu Approach with Precomputed Velocity Field (2014) (1)
- DOCUMENTS CLUSTERING BASED ON MAX-CORRENTROPY (2014) (1)
- The design of a distributed kernel (1981) (1)
- A Feature-Oriented Requirements Modelling Language ( FORML ) (2012) (1)
- An Evaluation of Metro Express (2005) (1)
- Predicting the Performance of Shared Multiprocessor Caches (1990) (1)
- Design and Implementation of a Short Message Service Data Channel for Mobile Systems (2008) (1)
- A Semantics for the Essence of React David R. Cheriton School of Computer Science Technical Report CS-2020-03 (2020) (1)
- Traffic-Driven Implicit Buffer Management ( Extended Version ) (2016) (1)
- Energy Efficient Indexing On Air (1994) (1)
- Maestro : Direct Manipulation Through Gesture Alone (2009) (1)
- DASH : Declarative Modelling with Control State Hierarchy ( Preliminary Version ) (2018) (1)
- Using Bayesian Learning to Estimate How Hot an Execution Path is (2010) (1)
- Clone Detection : How accurate is your data set ? (2006) (1)
- Seed optimization for i.i.d. similarities is no easier than optimal (2009) (1)
- Modelling Distributed Event-Based Systems Using the kell-m Calculus (2011) (1)
- Resource Management in Softwarized Networks (2022) (0)
- Convergent Fitted Value Iteration with Linear Function Approximation (2011) (0)
- Introduction to Reconfiguration (2017) (0)
- Generalized Labeled LCA (2007) (0)
- Closing the Gap: Improved Bounds on Optimal POMDP Solutions (2011) (0)
- An Efficient Storeless Heap Abstraction Using SSA Form ∗ (2008) (0)
- Joint Bi-Affine Parsing and Semantic Role Labeling (2018) (0)
- Robust Multimodality Image Registration Based on the Joint Intensity Scatter Plot (2006) (0)
- Software Product Lines, Service-oriented Architectures and Multi-agent Systems (2009) (0)
- Blazenet: A Phototonic Implementable Wide-Area Network (1987) (0)
- Protecting Public-Access Sites Against Distributed Denial-of-Service Attacks (2004) (0)
- Specifying Anomalous Data Spaces (2015) (0)
- Points-To Analysis with Efficient Strong Updates 1 (2010) (0)
- Dynamic Sum-Product Networks (2013) (0)
- MobiCom poster: public-key-based secure Internet access (2003) (0)
- Computational Affective Model of Human Action in a Social Dilemma (2017) (0)
- Memory Contexts : Supporting Selectable Cache and TLB Contexts (2011) (0)
- Report of the Program Committee for the 10th SOSP (1985) (0)
- Collaborative Product Configuration: Formalization and Efficient Algorithms for Dependency Analysis (2008) (0)
- An Evaluation of Storage Load Balancing Alternatives for Database Systems (2008) (0)
- Recovering Maintainability Effort in the Presence of Global Data Usage (2008) (0)
- State of the Art: Solution Concepts for Coalitional Games (2010) (0)
- A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage (2021) (0)
- Supplementary Material : Bayesian Affect Control Theory of Self (2014) (0)
- C O ] 5 S ep 2 01 6 Combinatorial Repairability for Threshold Schemes ∗ (2018) (0)
- Studying Professional Software Designers and their Use of Abstraction (2009) (0)
- Energy Modeling for KioskNet (2007) (0)
- Simulation of Gate Circuits with Feedback in Multi-Valued Algebras (2008) (0)
- Factored HMMs for Bimanual , Context-Dependent Gestures (2010) (0)
- TRIAD (2000) (0)
- A Narad Rampersad (2007) (0)
- C Y ] 2 1 D ec 2 01 8 Cluster Lifecycle Analysis : Challenges , Techniques , and Framework Ivens Portugal (2019) (0)
- 3-D Reconstruction from Few Projections : Structural Assumptions for Graceful Degradation University of Waterloo Technical Report CS-2014-07 (2014) (0)
- Leveraging Crowdsourced Technical Documentation: Building a Command Thesaurus (2011) (0)
- T . Biedl and P . Kindermann 23 : 3 Hamiltonian paths and Tutte paths (2019) (0)
- L G ] 1 0 O ct 2 01 8 Semi-supervised clustering for deduplication (2018) (0)
- Provably noise-robust k-means clustering (2018) (0)
- Emulating an Infrastructure with EASE Arup (2016) (0)
- Comprehensive Stage II Report (2007) (0)
- Impress : Towards Next-Generation Ubiquitous and Pervasive Computing Systems ∗ (2007) (0)
- Ada (Trade Name) Foundation Technology. Volume 6. Software Requirements for WIS (WWMCCS (World Wide Military Command and Control System) Information System) Operating System Prototypes. (1986) (0)
- A Scalable Stream-Oriented Framework for Cluster Applications (2005) (0)
- The TRaCaR Ratio: Selecting the Right Storage Technology for Active Dataset-Serving Databases (2020) (0)
- 2 Heston Model , Volatility Surface and Static Arbitrage (2023) (0)
- EXPECT-K: Expanding Predictive Endpoint Cued Tablet Keyboard (2009) (0)
- A caching model of operating system kernel functionality (1994) (0)
- A Hybrid Approach to Identifying Unknown Unknowns of Predictive Models (2019) (0)
- F L ] 2 3 M ay 2 01 5 Quotient Complexities of Atoms in Regular Ideal Languages ⋆ (2018) (0)
- S C ] 8 M ar 2 01 9 Quadratic Probabilistic Algorithms for Normal Bases (2019) (0)
- Message-Passing, Spaces and Agents (1979) (0)
- Bag-of-Words Baselines for Semantic Code Search (2021) (0)
- Blazenef : A Phototonic Implementable Wide-Area Network (1998) (0)
- Application-Only Call Graph Construction (2012) (0)
- An Efficient On-Line Algorithm for Edge-Ranking of Trees (2008) (0)
- On the Predictability of Object-Oriented Analysis Models : Semantic Similarity and Completeness Analysis (2008) (0)
- Viewpoints (computing in the 1990s) (1991) (0)
- Brzozowski ̇Li ̇Ye ON THE COMPLEXITY OF THE EVALUATION OF TRANSIENT EXTENSIONS OF BOOLEAN FUNCTIONS (2011) (0)
- Finally , a Downloadable Test Collection of Tweets Royal Sequiera and (2017) (0)
- Evaluating the Semantic Similarity of Object-Oriented Domain Models : Achieving Greater Predictability by Performing Behavioral Analysis First (2006) (0)
- August 21, 2013 14:25 WSPC/INSTRUCTION FILE BrzozowskiTamm COMPLEXITY OF ATOMS OF REGULAR LANGUAGES (2013) (0)
- Requirements Engineering for General Recommender Systems Ivens Portugal (2015) (0)
- Operating Systems: A Vision of the Year 2000 (1991) (0)
- 61 16 v 1 [ qu an tph ] 24 S ep 2 01 3 Optimal parallel quantum query algorithms ∗ (2013) (0)
- Designing Progressive Dinner Parties (2020) (0)
- Application-Controlled Physical Memory using External Page-Cache Management (1992) (0)
- Ph.D. Comprehensive Stage II Report (2007) (0)
- Motivating a Distributed System of Commodity Machines 1 (2009) (0)
- Thoth, a portable real-time operating system (Extended Abstract) (1977) (0)
- Gate Circuits with Feedback in Finite Algebras of Transients (2006) (0)
- Assignment for Clustered Processors using Constraint Programming (2011) (0)
- A I ] 1 9 S ep 2 01 6 Online and Distributed learning of Gaussian Mixture Models by Bayesian Moment Matching (2018) (0)
- Scaleability Panel Review (1993) (0)
- A Think-Aloud Study about Medical Misinformation in Search Results (2019) (0)
- A GPU APPROACH WITH PRECOMPUTED VELOCITY FIELD (2013) (0)
- Talk is Cheap(er): Mitigating DoS and Byzantine Attacks in Sensor Networks (2010) (0)
- Evasive Attack on Stateful Signature-based Network Intrusion Detection Systems ( Technical Report CS-2008-18 ) (2008) (0)
- Restricted Boltzmann Machine and Deep Belief Network: Tutorial and Survey (2021) (0)
- 61 16 v 2 [ qu an tph ] 20 F eb 2 01 5 Optimal parallel quantum query algorithms ∗ (2015) (0)
- Distributed Control of Situated Assistance in Large Domains with Many Tasks (2011) (0)
- A Characterization of Linkage-Based Clustering: An Extended Abstract (2010) (0)
- Workform Processing: A New Paradigm for Fault-Tolerant Distributed Parallel Computation (1993) (0)
- A Robust and Effective Strategy for Combining Results of Multiple Peptide Identification Engines (2010) (0)
- Improving the Semantic Similarity of Object-Oriented Domain Models (2008) (0)
- Coalition Detection and Identification ( Extended Abstract ) (2010) (0)
- The role of domains in large-scale distributed systems (1988) (0)
- TRAJECTORY CAPTURE IN FRONTAL PLANE GEOMETRY FOR VISUALLY IMPAIRED Martin Talbot and Bill Cowan (2006) (0)
- Classification of REA Patterns using Formal Specifications (2008) (0)
- D B ] 8 D ec 2 01 7 Developing a Spatial-Temporal Contextual and Semantic Trajectory Clustering Framework Ivens Portugal (2018) (0)
- Enforcing Bulk Mail Classification (2005) (0)
- Warnings Program Factbase Relational Queries Software Artifact Fact Extractor Grok Query Engine Identifying Symptoms (2018) (0)
- Randomized Backtracking : Next Steps (2011) (0)
- BIOINFORMATICS Designing succinct structural alphabets (2008) (0)
- Leveraging Domain Knowledge to Learn Normative Behavior : A Bayesian Approach (2011) (0)
- Symmetry for the Analysis of Dynamic Systems Zarrin (0)
- The VLMP Multiprocessor : Initial Experience , Refinements and Performance Eva 1 uation (1998) (0)
- pWeb : A P 2 P Web Hosting Framework (2013) (0)
- Presentation and Visualization of Redundant Code: Working Session Summary (2007) (0)
- Sigops(Paper Session) (1976) (0)
- TCP-SMO : ExtendingTCPto Support Medium - (2001) (0)
- Addressing Preemption Costs in Multi-Agent Resource Allocation for Medical Applications (2013) (0)
- Work-Stealing, Locality-Aware Actor Scheduling (2018) (0)
- Sudoku art (2011) (0)
- Content-Neutral Video-Speed Ubiquituous Residential Gigabit Ethernet ( CONVURGE ) : The True Next-Generation Broadband Last-mile Network (2000) (0)
- The Neural Hype and Comparisons Against Weak Baselines (2018) (0)
- Guided Locally Linear Embedding Babak (2011) (0)
- Persistence Service for Non-Persistent P 2 P Systems (2012) (0)
- A Name-Based Architecture for Source-Specific Multicast Service (2002) (0)
- Towards Theoretical Foundations of Clustering : Thesis Highlights (2011) (0)
- TCP-RTM : UsingTCPfor RealTimeMultimediaApplications SamLiang (2002) (0)
- Textured Agreements : Re-envisioning electronic Consent (0)
- Comparing Call Graphs Ondřej Lhoták (2007) (0)
- The Use of Computational Tools within Mathematical Work Practices (2010) (0)
- Representing Behavioural Models with Rich Control Structures in SMT-LIB (2015) (0)
- Combinatorial Aspects of Key Distribution for Sensor Networks (2013) (0)
- Senior Living Communities: Made Safer by AI (2020) (0)
- An extension to on-line multiplication lower bound results (1974) (0)
- Kill Spam: Vol 1 (2005) (0)
- Bayesian Affect Control Theory of Self (2014) (0)
- Poster : Atoms of Style : Identifying the Authors of Program Binaries (2016) (0)
- Lfl 0 Blazenet : A Phototonic Implemnentable Wide-Area Network (0)
- Progress and Tradeoffs in Neural Language Models (2018) (0)
- Ranking for Impact-Ordered Indexes (2015) (0)
- A Naming Scheme for P 2 P Web Hosting (2012) (0)
- antization in Append-Only Collections (2017) (0)
This paper list is powered by the following services:
Other Resources About David Cheriton
What Schools Are Affiliated With David Cheriton?
David Cheriton is affiliated with the following schools: