Publications

Found 597 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  A Digital Fountain Approach to Reliable Distribution of Bulk Data.
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Xing, E. P., Ng A.. Y., Jordan M. I., & Russell S. (2002).  Distance Metric Learning, with Application to Clustering with Side-Information.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (In Press).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (In Press).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Friedman, E., Racz M. Z., & Shenker S. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
Floyd, S., & Romanow A. (1995).  Dynamics of TCP Traffic over ATM Networks. IEEE Journal on Selected Areas in Communications. 13(4), 633-641.
E
Ravuri, S., & Morgan N. (2012).  Easy Does It: Robust Spectro-Temporal Many-Stream ASR Without Fine Tuning Streams. 4309-4312.
Koponen, T., Shenker S., Balakrishnan H., Feamster N., Ganichev I., Ghodsi A., et al. (2011).  Editorial: Architecting for Innovation. ACM SIGCOMM Computer Communication Review. 41(3), 24-36.
Koponen, T., Shenker S., Balakrishnan H., Feamster N., Ganichev I., Ghodsi A., et al. (2011).  Editorial: Architecting for Innovation. ACM SIGCOMM Computer Communication Review. 41(3), 24-36.
Makhoul, J.., Baron A.., Bulyko I., Nguyen L.., Ramshaw L.., Stallard D.., et al. (2005).  The Effects of Speech Recognition and Punctuation on Information Extraction Performance. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 57-60.
Shriberg, E., Graciarena M., Bratt H., Kathol A., Kajarekar S., Jameel H., et al. (2008).  Effects of Vocal Effort and Speaking Style on Text-Independent Speaker Verification. 609-612.
Sridhar, S., Rao S., & Halperin E. (2007).  An Efficient and Accurate Graph-based Approach to Detect Population Substructure. 503-517.
Al-Qudah, Z., Alzoubi H. A., Allman M., Rabinovich M., & Liberatore V. (2009).  Efficient Application Placement in a Dynamic Hosting Platform. 281-290.
Hoffman, J., Rodner E., Donahue J., Darrell T., & Saenko K. (2013).  Efficient Learning of Domain-Invariant Image Representations.
Karp, R. M., & Rabin M.. O. (1987).  Efficient randomized pattern-matching algorithms. IBM Journal of Research and Development. 31(2), 249-260.
Hermalin, N., & Regier T. (In Press).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Regier, T., Corrigan B.., Cabasaan R.., Woodward A.., Gasser M.., & Smith L.. (2001).  The Emergence of Words. Proceedings of the 23rd Annual Conference of the Cognitive Science Society (CogSci 2001). 815-820.
Regier, T. (2005).  The Emergence of Words: Attentional Learning in Form and Meaning. Cognitive Science. 29(6), 819-865.
Regier, T. (2003).  Emergent Constraints on Word-Learning: A Computational Review. Trends in Cognitive Sciences. 7(6), 263-268.
Roth, V. (2002).  Empowering mobile software agents. Proceedings 6th IEEE Mobile Agents Conference.
Lakshminarayanan, K., Rao A., Stoica I., & Shenker S. (2006).  End-Host Controlled Multicast Routing. Elsevier Computer Networks. 5(6), 807-825.

Pages