Publications

Found 701 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
Conference Paper
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Nechaev, B., Paxson V., Allman M., & Gurtov A. (2009).  On Calibrating Enterprise Switch Measurements. 143-155.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Gillick, D. (2010).  Can Conversational Word Usage Be Used to Predict Speaker Demographics?.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. (2013).  CAP for Networks. 91-96.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Ghodsi, A., Zaharia M., Shenker S., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Garg, N. P., Favre B., Riedhammer K., & Hakkani-Tür D. (2009).  ClusterRank: A Graph Based Method for Meeting Summarization. 1499-1502.
Genoud, D., Ellis D. P. W., & Morgan N. (1999).  Combined Speech and Speaker Recognition With Speaker-adapted Connectionist Models. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU-99).
Gao, Y., Beijbom O., Zhang N., & Darrell T. (2016).  Compact Bilinear Pooling. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 317-326.
Radoslavov, P., Papadopoulos C., Govindan R., & Estrin D. (2001).  A Comparison of Application-Level and Router-Assisted Hierarchical Schemes for Reliable Multicast. Proceedings of the IEEE Infocom 2001.
Gramm, J., Nierhoff T., Sharan R., & Tantau T. (2004).  On the Complexity of Haplotyping via Perfect Phylogeny. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 35-46.
Ben-David, Y., Hasan S., Pal J., Vallentin M., Panjwani S.., Gutheim P.., et al. (2011).  Computing Security in the Developing World: A Case for Multidisciplinary Research. 39-44.
Shastri, L., Grannes D. Jeffrey, Narayanan S., & Feldman J. (1999).  A Connectionist Encoding of Parameterized Schemas and Reactive Plans. Proceedings of the First SMART-Symposium. 1-28.
Garagnani, M., Shastri L., & Wendelken C. (2002).  A Connectionist Model of Planning via Back-Chaining Search. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Garagnani, M., Shastri L., & Wendelken C. (2001).  A Connectionist Model of Planning via Back-Chaining Search. Proceedings of the 20th Workshop of the UK Planning and Scheduling Special Interest Group (PLANSIG 2001).
Shastri, L., & Grannes D. Jeffrey (1996).  A Connectionist Treatment of Negation and Inconsistency. Proceedings of the 18th Conference of the Cognitive Science Society.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Chang, N., & Gurevich O.. (2004).  Context-Driven Construction Learning. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).

Pages