Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Morgan, N. (2002).  What's New in Government-Sponsored Speech Recognition Research. Speech Technology Magazine. 7,
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Allman, M. (2008).  What Ought a Program Committee to Do?.
Feldman, J. (1989).  What Lies Ahead.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Leen, T. K., & Moody J. (1993).  Weight-Space Probability Densities and Equilibria in Stochastic Learning.
Yang, J., Chow Y-L., Re C., & Mahoney M. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
d'Amore, F., Marchetti-Spaccamela A., & Nanni U. (1992).  The Weighted List Update Problem and the Lazy Adversary.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Bansal, M., & Klein D. (2011).  Web-Scale Features for Full-Scale Parsing. 693-702.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.
Allman, M. (2000).  A Web Server's View of the Transport Layer.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Feldman, J. (1971).  A Way of Looking at Things.

Pages