Publications

Found 4120 results
Author Title [ Type(Desc)] Year
Conference Paper
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Fernández-Iglesias, M. J., Pavón-Marino P., Rodríguez J.., Rifon L. Anido, & Llamas-Nistal M. (2000).  DelfosnetX: A Workbench for XML-Based Information Retrieval Systems. Proceedings of the 7th International Symposium on String Processing and Information Retrieval. 87-95.
Rosario, B., Hearst M. A., & Fillmore C. J. (2002).  The Descent of Hierarchy, and Selection in Relational Semantics. Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics (ACL 2002). 247-254.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Feldman, J. (1993).  Designing a Connectionist Network Supercomputer. Proceedings of the Third International Conference on Microelectronics for Neural Networks. 253-262.
Kohler, E., Handley M., & Floyd S. (2006).  Designing DCCP: Congestion Control Without Reliability. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Lee, K., Ellis D. P. W., & Loui A. (2010).  Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering.
Lee, K., & Ellis D. P. W. (2008).  Detecting Music in Ambient Audio by Long-Window Autocorrelation. 9-12.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.

Pages