Publications

Found 259 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is D  [Clear All Filters]
2007
Koponen, T., Chawla M., Chun B-G., Ermolinskiy A., Kim K. Hyun, Shenker S., et al. (2007).  A Data-Oriented (and Beyond) Network Architecture. 181-192.
Koponen, T., Chawla M., Chun B-G., Ermolinskiy A., Kim K. Hyun, Shenker S., et al. (2007).  A Data-oriented (and Beyond) Network Architecture. Computer Communication Review. 37(4), 181-192.
Tavakoli, A., Chu D., Hellerstein J. M., Levis P., & Shenker S. (2007).  A Declarative Sensornet Architecture. 55-60.
Tavakoli, A., Chu D., Hellerstein J. M., Levis P., & Shenker S. (2007).  A Declarative Sensornet Architecture. 4(3), 55-60.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Sarolahti, P., Allman M., & Floyd S. (2007).  Determining an Appropriate Sending Rate Over an Underutilized Network Path. 51(7), 1815-1832.
Friedland, G. (2007).  The Digital Hand, Vol 2 - How Computers Changed the Work of the American Financial, Telecommunications, Media, and Entertainment Industries (book review). IEEE Annals of the History of Computing. 29(3), 72-75.
Feigenbaum, J., Schapira M., & Shenker S. (2007).  Distributed Algorithmic Mechanism Design. 363-384.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
2006
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S., et al. (2006).  The Design and Implementation of a Declarative Sensor Network System.

Pages