Publications

Found 572 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Paper
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S. J., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Caesar, M., Condie T.., Kannan J., Lakshminarayanan K., Shenker S. J., & Stoica I. (2006).  ROFL: Routing on Flat Labels. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 363-374.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks. Special Workshop in Maui(SWIM).
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
QasemiZadeh, B., Petruck M. R. L., Stodden R., Kallmeyer L., & Candito M. (2019).  SemEval-2019, Task 2: Unsupervised lexical frame induction. Proceedings of the 13th International Workshop on Semantic Evaluation. 16-30.
QasemiZadeh, B., Petruck M. R. L., Stodden R., Kallmeyer L., & Candito M. (2019).  SemEval-2019 Task 2: Unsupervised Lexical Frame Induction. Proceedings of the 13th International Workshop on Semantic Evaluation (SemEval-2019). 16-30.
Shenker, S. J., Clark D. D., & Zhang L. (1994).  Services or Infrastructure: Why We Need a Network Service Model. Proceedings of the 1st International Workshop on Community Networking Integrated Multimedia Services to the Home. 145-149.
Bergen, B. K., Chang N., & Narayanan S. (2004).  Simulated Action in an Embodied Construction Grammar. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Nedevschi, S., Chandrashenkar J., Nordman B., Ratnasamy S., & Taft N. (2009).  Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. 381-394.
Nguyen, G. T. K., Agarwal R., Liu J., Caesar M., P. Godfrey B., & Shenker S. J. (2011).  Slick Packets. 245-256.
Raghavan, B., Casado M., Koponen T., Ratnasamy S., Ghodsi A., & Shenker S. J. (2012).  Software-Defined Internet Architecture: Decoupling Architecture from Infrastructure. 43-48.
Ribeiro, M. Túlio, Guerra P. H. Calais, Vilela L., Veloso A., Guedes D., Meira, Jr. W., et al. (2011).  Spam Detection Using Web Page Content: A New Battleground.
Zaharia, M., Chowdhury M., Franklin M. J., Shenker S. J., & Stoica I. (2010).  Spark: Cluster Computing with Working Sets. 1-7.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Chang, S-Y., Meyer B. T., & Morgan N. (2013).  Spectro-Temporal Features for Robust Speech Recognition Using Power-Law Nonlinearity and Power-Bias Subtraction.
Berenbrink, P., Cooper C.., Elsässer R., Radzik T.., & Sauerwald T. (2010).  Speeding Up Random Walks with Neighborhood Exploration. 1422-1435.
Cheng, H., Liu J., Ali S., Javed O., Yu Q., Tamrakar A., et al. (2012).  SRI-Sarnoff AURORA System at TRECVID 2012 Multimedia Event Detection and Recounting.
Cheng, H., Liu J., Ali S., Javed O., Yu Q., Tamrakar A., et al. (2012).  SRI-Sarnoff AURORA System at TRECVID 2012 Multimedia Event Detection and Recounting.

Pages