Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1996).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. IEEE Computer. 29(3), 79-86.
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1995).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. Proceedings of the Advances in Neural Information Processing Systems 8 Conference (NIPS 8). 619-625.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N., Markovskiy Y., Patel Y., & Wawrzynek J. (2003).  Post Placement C-Slow Retiming for the Xilinx Virtex FPGA.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Weaver, N., Hauser J., & Wawrzynek J. (2004).  The SFRA: A Corner-Turn FPGA Architecture. Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.

Pages