Publications

Found 504 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. (2010).  DDoS Defense by Offense. ACM Transactions on Computer Systems. 28(1), 1-54.
M. Shokrollahi, A., & Wasserman H. (1998).  Decoding Algebraic-Geometric Codes Beyond the Error-Correction Bound.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Liebeherr, J., & Wrege D. E. (1994).  Design and Analysis of a High-Performance Packet Multiplexer for Multiservice Networks with Delay Guarantees.
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2003).  Design Guidelines for Robust Internet Protocols. 33(1), 125-130.
Anderson, T., Shenker S., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Moran, M., & Wolfinger B. (1992).  Design of a Continuous Media Data Transport Service and Protocol.
Asanović, K., Beck J., Feldman J., Morgan N., & Wawrzynek J. (1993).  Designing a Connectionist Network Supercomputer. International Journal of Neural Systems.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Morgan, N., Asanović K., Kingsbury B., & Wawrzynek J. (1990).  Developments in Digital VLSI Design for Artificial Neural Networks.
Wöhlke, G. (1994).  Dextrous Object Manipulation with Robot Hands Including Rolling and Slipping: Improved Motion & Force Computation Method.
Morgan, N., Wu S-L., & Bourlard H. (1995).  Digit Recognition with Stochastic Perceptual Models. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Friedman, E., Young K., Asif D., Jutla I., Liang M., Wilson S., et al. (2014).  Directed Progression Brain Networks in Alzheimer's Disease: Properties and Classification. Brain Connectivity. 4(5), 384-393.
Gillick, D., Wegmann S., & Gillick L. (2012).  Discriminative Training for Speech Recognition is Compensating for Statistical Dependence on the HMM Framework. 4745-4748.
Willinger, W., & Paxson V. (1997).  Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick. 25(5), 1805-1869.

Pages