Princeton

Results: 12523



#Item
21Modeling and simulation / Simulation / Logic simulation

Getting to Work with OpenPiton Princeton University http://openpiton.org OpenPit

Add to Reading List

Source URL: parallel.princeton.edu

Language: English - Date: 2017-02-16 15:26:32
22Design of experiments / Causal inference / Observational study / Metaphysics / Statistics / Estimation theory / Probability and statistics / Regression analysis / Propensity score matching / Matching / Confounding / Average treatment effect

Adjusting for Confounding with Text Matching∗ Margaret E. Roberts†, Brandon M. Stewart‡, and Richard A. Nielsen§ February 27, 2018¶ Abstract We identify situations in which conditioning on text can address confou

Add to Reading List

Source URL: scholar.princeton.edu

Language: English - Date: 2018-02-27 08:48:12
23Women's Islamic Games

Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’16) Errata Slip In the paper “Be Fast, Cheap and in Control with SwitchKV” by Xiaozhou Li and Raghav Sethi, Princeton

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
    24Internet architecture / Computing / Internet / Network architecture / Border Gateway Protocol / Forwarding plane / IP routing / Routing / Control plane / Cyclone Sidr / Forwarding / Peering

    SDX-Based Flexibility or Internet Correctness? Pick Two! R¨udiger Birkner, Arpit Gupta?, Nick Feamster?, Laurent Vanbever  ETH Z¨urich ?Princeton University

    Add to Reading List

    Source URL: nsg.ee.ethz.ch

    Language: English - Date: 2017-04-17 08:02:50
    25Computing / Network architecture / Data transmission / Computer networking / Multiprotocol Label Switching / P4 / Packet processing / Computer network / Internet Protocol / Internet protocol suite / IPv6 / Packet radio

    ALLOY AND THE FUTURE OF NETWORKING (MAYBE) Pamela Zave Princeton University

    Add to Reading List

    Source URL: alloytools.org

    Language: English - Date: 2018-06-13 06:07:43
    26Computer network security / Cyberwarfare / Computer security / Computing / Computer security software / Idle scan / Denial-of-service attack / Transmission Control Protocol / Stateful firewall / Internet censorship / Great Firewall / Internet protocol suite

    Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-04-03 15:56:26
    27

    PDF Document

    Add to Reading List

    Source URL: www.physics.princeton.edu

    - Date: 2016-09-02 08:40:35
      28

      PDF Document

      Add to Reading List

      Source URL: physics.princeton.edu

      - Date: 2013-01-18 11:33:47
        29

        PDF Document

        Add to Reading List

        Source URL: optimallearning.princeton.edu

        - Date: 2009-06-15 13:44:34
          30

          PDF Document

          Add to Reading List

          Source URL: optimallearning.princeton.edu

          - Date: 2011-04-03 14:42:18
            UPDATE