Publications

Found 4113 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: An Approach to Universal Topology Generation. Proceedings of MASCOTS 2001.
Medina, A., Lakhina A., Matta I., & Byers J. W. (2001).  BRITE: Universal Topology Generation From a User's Perspective.
Paxson, V. (1999).  Bro: A System for Detecting Network Intruders in Real-Time. 2435-2463.
Paxson, V. (1998).  Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
Schindelhauer, C. (2000).  Broadcasting Time Cannot be Approximated Within a Factor of 57/56-epsilon.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Bell, O., Allman M., & Kuperman B. (2012).  On Browser-Level Event Logging.
Ferrari, D., & Verma D. C. (1990).  Buffer Space Allocation for Real-Time Channels in a Packet-Switching Network.
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Hwang, M-Y., Peng G.., Wang W., Faria A., & Heidel A.. (2007).  Building a Highly Accurate Mandarin Speech Recognizer. 490-495.
Fillmore, C. J., Wooters C., & Baker C. F. (2001).  Building a Large Lexical Databank Which Provides Deep Semantics. Proceedings of the Pacific Asian Conference on Language, Information and Computation (PACLIC).
Kornexl, S.., Paxson V., Dreger H., Feldmann A., & Sommer R. (2005).  Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
Pellegrini, M. (1993).  Building Convex Space Partitions Induced by Pairwise Interior-Disjoint Simplices.
Heidemann, J., Silva F., Intanagonwiwat C., Govindan R., Estrin D., & Ganesan D. (2001).  Building Efficient Wireless Sensor Networks With Low-Level Naming. Proceedings of the Symposium on Operating Systems Principles.
Popa, L., Egi N.., Ratnasamy S., & Stoica I. (2010).  Building Extensible Networks with Rule-Based Forwarding. 379-391.
Shue, C., Kalafut A., Allman M., & Taylor C. (2012).  On Building Inexpensive Network Capabilities. ACM SIGCOMM Computer Communication Review. 42(2), 72-79.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2009).  Building Many-Core Processor-to-DRAM Networks with Monolithic CMOS Silicon Photonics. IEEE Micro. 29(4), 8-21.
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.
Tajchman, G., Fosler-Lussier E., & Jurafsky D. (1995).  Building Multiple Pronunication Models for Novel Words using Exploratory Computational Phonology. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Allman, M. (2010).  On Building Special-Purpose Social Networks for Emergency Communication. ACM Computer Communication Review. 40,
David, O., Stickles E., Hong J., Dodge E., & Sweetser E. (2014).  Building the MetaNet Metaphor Repository: The Natural Symbiosis of Metaphor Analysis and Construction Grammar.
Omohundro, S. (1991).  Bumptrees for Efficient Function, Constraint, and Classification Learning.
Bilmes, J. A. (1999).  Buried Markov Models for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
C
Vasuna, J., Scott C., Buettner M., Piatek M., Krishnamurthy A., & Shenker S. (2016).  Caching Doesn't Improve Mobile Web Performance (Much). Proceedings of the 2016 USENIX Annual Technical Conference (USENIC ATC ’16).

Pages