Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2014
Maire, M., Yu S. X., & Perona P. (2014).  Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling.
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Dodge, E., & Petruck M. R. L. (2014).  Representing Caused Motion in Embodied Construction Grammar. 39-44.
Girshick, R., Donahue J., Darrell T., & Malik J. (2014).  Rich Feature Hierarchies for Accurate Object Detection and Semantic Segmentation.
Chang, S-Y., & Morgan N. (2014).  Robust CNN-Based Speech Recognition With Gabor Filter Kernels.
Gonina, E., Friedland G., Battenberg E., Koanantakool P., Driscoll M., Georganas E., et al. (2014).  Scalable Multimedia Content Analysis on Parallel Platforms Using Python. ACM Transactions on Multimedia Computing. 10(2), 
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Giannakis, G. B., Bach F., Cendrillon R., Mahoney M., & Neville J. (2014).  Signal Processing for Big Data (Editorial for Special Issue). IEEE Signal Processing Magazine. 31, 15-16.
Raskutti, G., & Mahoney M. (2014).  A Statistical Perspective on Randomized Sketching for Ordinary Least-Squares.
Lukyanenko, A., Nikolaevskiy I., Kuptsov D., Gurtov A., Ghodsi A., & Shenker S. J. (2014).  STEM+: Allocating Bandwidth Fairly To Tasks.
Friedman, E., Landsberg A. S., Owen J. P., Li Y-O., & Mukherjee P. (2014).  Stochastic Geometric Network Models for Groups of Functional and Structural Connectomes. NeuroImage. 101,
Friedman, E., Ghodsi A., & Psomas C-A. (2014).  Strategyproof Allocation of Discrete Jobs on Multiple Machines. 529-546.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Craven, R., Beverly R., & Allman M. (2014).  Techniques for the Detection of Faulty Packet Header Modifications.
Rasti, R., Murthy M., & Paxson V. (2014).  Temporal Lensing and its Application in Pulsing Denial of Service Attacks.
Jeub, L. G. S., Balachandran P., Porter M. A., Mucha P. J., & Mahoney M. (2014).  Think Locally, Act Locally: The Detection of Small, Medium-Sized, and Large Communities in Large Networks.
Fanti, G., Finiasz M., Friedland G., & Ramchandran K. (2014).  Toward Efficient, Privacy-Aware Media Classification on Public Databases. 49-56.
Adcock, A. B., Sullivan B. D., & Mahoney M. (2014).  Tree Decompositions and Social Graphs.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Kay, P. (2014).  Unary Phrase Structure Rules and the Cognitive Linguistics Lexical Linking Theory. Theoretical Linguistics. 40(1-2), 
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.

Pages