Publications

Found 4120 results
Author Title [ Type(Desc)] Year
Conference Paper
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Franklin, A., Drivonikou V. G., Bevis L.., Kay P., & Regier T. (2008).  Categorical Perception of Color is Lateralized to the Right Hemisphere in Infants, but to the Left Hemisphere in Adults. 105(9), 3221-3225.
Jia, Y., & Han M. (2013).  Category Independent Object-Level Saliency Detection.
Janoch, A., Karayev S., Jia Y., Barron J. T., Fritz M., Saenko K., et al. (2011).  A Category-Level 3-D Object Dataset: Putting the Kinect to Work. 1168-1174.
Bourlard, H., Morgan N., Wooters C., & Renals S. (1992).  CDNN: A Context Dependent Neural Network for Continuous Speech Recognition. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Hermansky, H., Morgan N., Bayya A., & Kohn P. (1991).  The Challenge of Inverse-E: The RASTA-PLP Method. Proceedings of the 25th Asilomar Conference on Signals, Systems, & Computers. 800-804.
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Zhang, Y., Breslau L., Paxson V., & Shenker S. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Pang, R., Yegneswaran V., Barford P., Paxson V., & Peterson L. (2004).  Characteristics of Internet Background Radiation. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Ghodsi, A., Zaharia M., Shenker S., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Frankle, J.., & Karp R. M. (1986).  Circuit placements and costs bounds by eigenvector decomposition. Proceedings of the IEEE International Conference on Computer-Aided Design (ICCAD-86), A Conference for the EE CAD Professional. 414-417.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Morris, R., Kohler E., Jannotti J., & M. Kaashoek F. (1999).  The Click Modular Router.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Garg, N. P., Favre B., Riedhammer K., & Hakkani-Tür D. (2009).  ClusterRank: A Graph Based Method for Meeting Summarization. 1499-1502.

Pages