Publications

Found 495 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Westermann, M. (2002).  Distributed Caching Independent of the Network Size.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Tangmunarunkit, H., Doyle J., Govindan R., Jamin S., Shenker S., & Willinger W. (2001).  Does AS Size Determine Degree in AS Topology?. ACM Computer Communication Review. 31(5), 7-10.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
E
Jannesari, A., Wolf F., & Tichy W. F. (2016).  Editorial of Special Issue on Software Engineering for Parallel Systems. Elsevier Journal of Systems and Software.
Wolfinger, B. (1997).  Efficiency of PET and MPEG Encoding for Video Streams: Analytical QoS Evaluations.
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Brockmann, K., & Wanka R. (1996).  Efficient Oblivious Parallel Sorting on the MasPar MP-1.
Chang, S., Greenberg S., & Wester M. (2001).  An Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Regier, T., Corrigan B.., Cabasaan R.., Woodward A.., Gasser M.., & Smith L.. (2001).  The Emergence of Words. Proceedings of the 23rd Annual Conference of the Cognitive Science Society (CogSci 2001). 815-820.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
Karp, R. M., Kenyon C., & Waarts O. (1999).  Error-Resilient DNA Computation. 15,
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Morgan, N., Wooters C., Hermansky H., & Bourlard H. (1991).  Experiments with Temporal Resolution for Continuous Speech Recognition with Multi-Layer Perceptrons. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 405-410.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.

Pages