Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Weber, S. (2004).  The Success of Open Source.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weber, F.., Manganaro L.., Peskin B., & Shriberg E. (2002).  Using Prosodic and Lexical Information for Speaker Identification. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Weissman, B., Gomes B., Quittek J. W., & Holtkamp M. (1997).  A Performance Evaluation of Fine Grain Thread Migration with Active Threads.
Wendelken, C., & Shastri L. (2004).  Connectionist Mechanisms for Cognitive Control.

Pages