Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1996).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. IEEE Computer. 29(3), 79-86.
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1995).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. Proceedings of the Advances in Neural Information Processing Systems 8 Conference (NIPS 8). 619-625.
Weaver, N., Hauser J., & Wawrzynek J. (2004).  The SFRA: A Corner-Turn FPGA Architecture. Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
Weaver, N. (2020).  The SolarWinds Breach: Why Your Work Computers Are Down Today.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Weaver, N., & Wawrzynek J. (2000).  A Comparison of the AES Candidates Amenability to FPGA Implementation.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Weaver, N., Staniford S., & Paxson V. (2004).  Very Fast Containment of Scanning Worms. Proceedings of the 13th USENIX Security Symposium. 29-44.
Weaver, N. (2021).  Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'. Lawfare.
Weaver, N. (2021).  The Microsoft Exchange Hack and the Great Email Robbery.
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.

Pages