Publications

Found 504 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
R
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Anguera, X., Wooters C., Peskin B., & Aguilo M. (2005).  Robust Speaker Segmentation for Meetings: The ICSI-SRI Spring 2005 Diarization System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 402-414.
Anguera, X., Wooters C., & Pardo J. M. (2006).  Robust Speaker Diarization for Meetings: ICSI TR06 Meetings Evaluation System. 346-358.
Anguera, X., Wooters C., & Pardo J. M. (2006).  Robust Speaker Diarization for Meetings: ICSI RT06s evaluation system. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1674-1677.
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Reyes I., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies.
Handley, M., Floyd S., Padhye J., & Widmer J. (2003).  RFC 3448: TCP Friendly Rate Control (TFRC): Protocol Specification.
Whetten, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2001).  RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Salama, R., Wegner L., & Thamm J. (1997).  Reorganization in Persistent Object Stores.
Whetton, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2000).  Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Handley, M., Floyd S., Whetten B., Kermode R., Vicisano L., & Luby M. (2000).  The Reliable Multicast Design Space for Bulk Data Transfer.
Wrede, B., & Shriberg E. (2003).  The Relationship Between Dialogue Acts and Hot Spots in Meetings. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Becker, B., Drechsler R., & Werchner R. (1994).  On the Relation Between BDDs and FDDs.
Moody, J., Saffell M., Liao Y., & Wu L. (1998).  Reinforcement Learning for Trading Systems and Portfolios. Decision Technologies for Computational Finance, Proceedings of the London Conference.
Weaver, N., & Ellis D. (2004).  Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine. 29(3), 34-37.

Pages