Publications

Found 1106 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is K  [Clear All Filters]
Conference Paper
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Hoffman, J., Saenko K., Kulis B., & Darrell T. (2012).  Discovering Latent Domains for Multisource Domain Adaptation. 702-715.
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2002).  Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Ideker, T. E., Thorsson V., & Karp R. M. (2000).  Discovery of Regulatory Interactions Through Perturbation: Inference and Experimental Design. Proceedings of Pacific Symposium on Biocomputing (PSB 2000). 302-313.
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Shriberg, E., Kajarekar S., & Scheffer N. (2009).  Does Session Variability Compensation in Speaker Recognition Model Intrinsic Variation Under Mismatched Conditions?. 1551-1554.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Kirchhoff, K., & Bilmes J. A. (1999).  Dynamic Classifier Combinations in Hybrid Speech Recognition Systems Using Utterance-Level Confidence Values. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Gergen, S., Zeiler S., Abdelaziz A. Hussen, Nickel R., & Kolossa D. (2016).  Dynamic Stream Weighting for Turbo-Decoding-Based Audiovisual ASR. Proceedings of Interspeech 2016.
Klafft, M., Kraentzer T.., Meissen U.., & Voisard A. (2009).  Early Warning Systems in Practice: Performance of the SAFE System in the Field. 436-439.
Klafft, M., Kraentzer T.., Meissen U.., & Voisard A. (2009).  Early Warning Systems in Practice: Performance of the SAFE System in the Field. 436-439.
Friedland, G., Hürst W., & Knipping L. (2007).  Educational Multimedia Systems: The Past, the Present, and a Glimpse into the Future. 1-4.
Liu, H., Levchenko K., Felegyhazi M., Kreibich C., Maier G., Voelker G. M., et al. (2011).  On the Effects of Registrar-Level Intervention.
Shriberg, E., Graciarena M., Bratt H., Kathol A., Kajarekar S., Jameel H., et al. (2008).  Effects of Vocal Effort and Speaking Style on Text-Independent Speaker Verification. 609-612.
Shriberg, E., Graciarena M., Bratt H., Kathol A., Kajarekar S., Jameel H., et al. (2008).  Effects of Vocal Effort and Speaking Style on Text-Independent Speaker Verification. 609-612.
Scott, J., Ideker T. E., Karp R. M., & Sharan R. (2005).  Efficient Algorithms for Detecting Signaling Pathways in Protein Interaction Networks. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 133-144.
Karmarkar, N., & Karp R. M. (1982).  An efficient approximation scheme for the one-dimensional bin-packing problem. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. 312-320.

Pages