Publications

Found 116 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Wang, H.., Gelbart D., Hirsch H-G., & Hemmert W. (2008).  The Value of Auditory Offset Adaptation and Appropriate Acoustic Modeling. 902-905.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Wang, P. Chuan, Miller S., Fritz M., Darrell T., & Abbeel P. (2011).  Perception for the Manipulation of Socks. 4877-4884.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Wang, R., Li Y., Mahoney M. W., & Darve E. (2015).  Structured Block Basis Factorization for Scalable Kernel Matrix Evaluation.
Wang, D., Rao S., & Mahoney M. W. (2015).  Unified Acceleration Method for Packing and Covering Problems via Diameter Reduction. Proceedings of the 43rd ICALP Conference.
[Anonymous] (1988).  Connectionist Models and Their Applications. (Waltz, D.., & Feldman J., Ed.).
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Walfish, M., Balakrishnan H., & Shenker S. (2004).  Untangling the Web from DNS. Proceedings of the First Symposium on Networked Systems Design and Implementation (NSDI 2004). 225-238.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Walfish, M., Stribling J., Krohn M., Balakrishnan H., Morris R., & Shenker S. (2004).  Middleboxes No Longer Considered Harmful. Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI '04). 215-230.
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. (2010).  DDoS Defense by Offense. ACM Transactions on Computer Systems. 28(1), 1-54.
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Wachsmann, A., & Wanka R. (1997).  Sorting on a Massively Parallel System Using a Library of Basic Primitives: Modeling and Experimental Results.

Pages