Publications

Found 4169 results
Author Title [ Type(Desc)] Year
Conference Paper
Allman, M., Paxson V., & Terrell J.. (2007).  A Brief History of Scanning. 77-82.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: An Approach to Universal Topology Generation. Proceedings of MASCOTS 2001.
Paxson, V. (1998).  Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Hwang, M-Y., Peng G.., Wang W., Faria A., & Heidel A.. (2007).  Building a Highly Accurate Mandarin Speech Recognizer. 490-495.
Fillmore, C. J., Wooters C., & Baker C. F. (2001).  Building a Large Lexical Databank Which Provides Deep Semantics. Proceedings of the Pacific Asian Conference on Language, Information and Computation (PACLIC).
Kornexl, S.., Paxson V., Dreger H., Feldmann A., & Sommer R. (2005).  Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
Heidemann, J., Silva F., Intanagonwiwat C., Govindan R., Estrin D., & Ganesan D. (2001).  Building Efficient Wireless Sensor Networks With Low-Level Naming. Proceedings of the Symposium on Operating Systems Principles.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Bilmes, J. A. (1999).  Buried Markov Models for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Vasuna, J., Scott C., Buettner M., Piatek M., Krishnamurthy A., & Shenker S. (2016).  Caching Doesn't Improve Mobile Web Performance (Much). Proceedings of the 2016 USENIX Annual Technical Conference (USENIC ATC ’16).
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Nechaev, B., Paxson V., Allman M., & Gurtov A. (2009).  On Calibrating Enterprise Switch Measurements. 143-155.
Paxson, V. (1998).  On Calibrating Measurements of Packet Transit Times. Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98). 11-21.
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Gillick, D. (2010).  Can Conversational Word Usage Be Used to Predict Speaker Demographics?.
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Hermansky, H., & Morgan N. (1993).  A Can of RASTA Worms. Proceedings of the Speech Research Symposium XIII, Johns Hopkins University. 343-350.
Shriberg, E., Stolcke A., & Baron D. (2001).  Can Prosody Aid the Automatic Processing of Multi-Party Meetings? Evidence from Predicting Punctuation, Disfluencies, and Overlapping Speech. Proceedings of the ISCA Tutorial and Research Workshop on Prosody in Speech Recognition and Understanding.
Argyraki, K., Baset S., Chun B-G., Fall K., Iannaccone G., Knies A., et al. (2008).  Can Software Routers Scale?.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. (2013).  CAP for Networks. 91-96.

Pages