Publications

Found 315 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is A  [Clear All Filters]
Conference Paper
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
Feldman, J., Brown C. M., Ellis C. S., LeBlanc T. J., & Peterson G. L. (1985).  Artificial Intelligence Research on the Butterfly Multicomputer. Proceedings of the Workshop on Artificial Intelligence and Distributed Problem Solving. 109-118.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Batliner, A., Steidl S., & Nöth E.. (2011).  Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction. 22-27.
Shenker, S. J., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Raman, S., McCanne S., & Shenker S. J. (1998).  Asymptotic Behavior of Global Recovery in SRM. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 90-99.
Mitzel, D. J., & Shenker S. J. (1994).  Asymptotic Resource Consumption in Multicast Reservation Styles. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 226-233.
DeNero, J., Pauls A., & Klein D. (2009).  Asynchronous Binarization for Synchronous Grammars.
Dutta, P., Culler D. E., & Shenker S. J. (2008).  Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. 531-532.
Greenberg, A.., Shenker S. J., & Stolyar A.. (1996).  Asynchronous Updates in Large Parallel Systems. Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 91-103.
Marzo, J. L., Vilà P., Fàbrega L., & Massaguer D.. (2001).  An ATM Distributed Simulator for Network Management Research. Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
Regier, T., & Zheng M. (2003).  An Attentional Constraint on Spatial Meaning. Proceedings of the 25th Annual Conference of the Cognitive Science Society. 50.
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. 189-204.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concept Ranking for Video Event Detection on User-Generated Content.
Renals, S., & Ellis D. P. W. (2003).  Audio Information Access from Meeting Rooms. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003).
Ashraf, K., Elizalde B. Martinez, Iandola F., Moskewicz M., Bernd J., Friedland G., et al. (2015).  Audio-Based Multimedia Event Detection with DNNs and Sparse Sampling. 611-614.

Pages