Publications

Found 495 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is W  [Clear All Filters]
2011
Larson, M.., Soleymani M.., Serdyukov P.., Rudinac S.., Wartena C.., Murdock V.., et al. (2011).  Automatic Tagging and Geo-Tagging in Video Collections and Communities.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Raab, M., Wernsdorfer M., Kitzelmann E., & Schmid U. (2011).  From Sensorimotor Graphs to Rules: An Agent Learns from a Stream of Experience. 6830, 333-339.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Ghodsi, A., Koponen T., Raghavan B., Shenker S., Singla A., & Wilcox J. (2011).  Information-Centric Networking: Seeing the Forest for the Trees. 1-6.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Ghodsi, A., Koponen T., Raghavan B., Shenker S., Singla A., & Wilcox J. (2011).  Intelligent Design Enables Architectural Evolution. 1-6.
Wang, P. Chuan, Miller S., Fritz M., Darrell T., & Abbeel P. (2011).  Perception for the Manipulation of Socks. 4877-4884.
Colmenares, J. A., Saxton I., Battenberg E., Avižienis R., Peters N., Asanović K., et al. (2011).  Real-Time Musical Applications on an Experimental Operating System for Multi-Core Processors.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Friedland, G., Maier G., Sommer R., & Weaver N. (2011).  Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Koetzing, T.., Neumann F., Sudholt D., & Wagner M.. (2011).  Simple Max-Min Ant Systems and the Optimization of Linear Pseudo-Boolean Functions. 209-218.

Pages