Publications

Found 4083 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Whetten, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2001).  RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Whetton, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2000).  Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Whitlock, S., Scott C., & Shenker S. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Widmer, J. (2000).  A Mobile Network Architecture for Vehicles.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.
Widom, M., & Shenker S. (1984).  Topological Phase Transitions. 46-51.
Widom, M., Bensimon D., Kadanoff L. P., & Shenker S. (1983).  Strange Objects in the Complex Plane. Journal of Statistical Physics. 443-454.
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wikarski, D. (1996).  An Introduction to Modular Process Nets.
Williams, G., & Ellis D. P. W. (1999).  Speech/music Discrimination Based on Posterior Probability Features. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Willinger, W., & Paxson V. (1997).  Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick. 25(5), 1805-1869.
Willinger, W., Paxson V., Riedi R. H., & Taqqu M. S. (2002).  Long-Range Dependence and Data Network Traffic.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Willinger, W., Paxson V., & Taqqu M. S. (1998).  Self-similarity and Heavy Tails: Structural Modeling of Network Traffic.
Wittkop, T., Emig D., Lange S.. J., Rahmann S., Albrecht M., Morris J.. H., et al. (2010).  Partitioning Biological Data with Transitivity Clustering. Nature Methods. 7(6), 419-420.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Wolfinger, B. (1997).  Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations.
Woo, S., Sherry J., Han S., Moon S., Ratnasamy S., & Shenker S. (2018).  Elastic Scaling of Stateful Network Functions. Proceedings of NSDI '18.
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.

Pages