Publications

Found 4139 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2011).  Disk-Locality in Datacenter Computing Considered Irrelevant. 1-5.
Ananthanarayanan, G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S., et al. (2012).  PACMan: Coordinated Memory Caching for Parallel Jobs. 1-14.
Anand, A.., Gupta A., Akella A., Seshan S., & Shenker S. (2008).  Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. 219-230.
Amirshahi, S. Ali, Anoosheh A., Yu S. X., Suchan J., Schultz C., & Bhatt M. (2017).  Symmetry in the Eye of the Beholder . Proceedings of Vision Sciences Society Annual Meeting.
Amirshahi, S. Ali, Pedersen M., & Yu S. X. (2016).  Image Quality Assessment by Comparing CNN Features Between Images. Journal of Imaging Science and Technology.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Amengual, A. (2009).  A Specification of a Hybrid Petri Net Semantics for the HISim Simulator.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Amann, J., Gasser O., Scheitle Q., Brent L., Carle G., & Holz R. (2017).  Mission Accomplished? HTTPS Security after DigiNotar. Proceedings of the IMC 2017.
Amann, J., Sommer R., Sharma A., & Hall S. (2012).  A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333.
Amann, J., & Sommer R. (2017).   Viable Protection of High-Performance Networks through Hardware/Software Co-Design. Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol.
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Amann, J., & Sommer R. (2016).  Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement. Proceedings of Passive and Active Measurement Conference (PAM).
Amann, J., Sommer R., Vallentin M., & Hall S. (2013).  No Attack Necessary: The Surprising Dynamics of SSL Trust Relationships.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Althoff, K-D., Richter M. M., & Wilke W. (1997).  Cased-Based Reasoning: A New Technology for Experience Based Construction of Knowledge Systems.
Althoff, T., Song H. Oh, & Darrell T. (2012).  Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition.
Althaus, E., & Fink C.. (2002).  A Polyhedral Approach to Surface Reconstruction from Planar Contours. Proceedings of the Ninth Conference on Integer Programming and Combinatorial Optimization.
Althaus, E., & Mehlhorn K. (2001).  TSP-Based Curve Reconstruction in Polynomial Time. 31(1), 
Althaus, E., Mehlhorn K., Naher S.., & Schirra S. (2000).  Experiments on Curve Reconstruction.

Pages