Publications

Found 4161 results
Author Title [ Type(Desc)] Year
Conference Paper
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Shriberg, E., & Stolcke A. (2008).  The Case for Automatic Higher-Level Features in Forensic Speaker Recognition. 1509-1512.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Franklin, A., Drivonikou V. G., Bevis L.., Kay P., & Regier T. (2008).  Categorical Perception of Color is Lateralized to the Right Hemisphere in Infants, but to the Left Hemisphere in Adults. 105(9), 3221-3225.
Jia, Y., & Han M. (2013).  Category Independent Object-Level Saliency Detection.
Janoch, A., Karayev S., Jia Y., Barron J. T., Fritz M., Saenko K., et al. (2011).  A Category-Level 3-D Object Dataset: Putting the Kinect to Work. 1168-1174.
Bourlard, H., Morgan N., Wooters C., & Renals S. (1992).  CDNN: A Context Dependent Neural Network for Continuous Speech Recognition. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Hermansky, H., Morgan N., Bayya A., & Kohn P. (1991).  The Challenge of Inverse-E: The RASTA-PLP Method. Proceedings of the 25th Asilomar Conference on Signals, Systems, & Computers. 800-804.
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Zhang, Y., Breslau L., Paxson V., & Shenker S. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Pang, R., Yegneswaran V., Barford P., Paxson V., & Peterson L. (2004).  Characteristics of Internet Background Radiation. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Ghodsi, A., Zaharia M., Shenker S., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Frankle, J.., & Karp R. M. (1986).  Circuit placements and costs bounds by eigenvector decomposition. Proceedings of the IEEE International Conference on Computer-Aided Design (ICCAD-86), A Conference for the EE CAD Professional. 414-417.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Morris, R., Kohler E., Jannotti J., & M. Kaashoek F. (1999).  The Click Modular Router.

Pages