Publications

Found 642 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Rubinfeld, R. (1990).  Designing Checkers for Programs that Run in Parallel.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Rüttgers, M. (1997).  Differential Evolution: A Method for Optimization of Real Scheduling Problems.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Elsevier Journal of Ad Hoc Networks. 1,
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  Digital Fountain Approach to Reliable Distribution of Bulk Data.
Byers, J. W., Luby M., Mitzenmacher M., & Rege A. (1998).  A Digital Fountain Approach to Reliable Distribution of Bulk Data.
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Xing, E. P., Ng A.. Y., Jordan M. I., & Russell S. (2002).  Distance Metric Learning, with Application to Clustering with Side-Information.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hornauer, S., Yellapragada B., Ranjbar A., & Yu S. X. (2019).  Driving Scene Retrieval by Example from Large-Scale Data. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Friedman, E., Racz M. Z., & Shenker S. J. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. J. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
Floyd, S., & Romanow A. (1995).  Dynamics of TCP Traffic over ATM Networks. IEEE Journal on Selected Areas in Communications. 13(4), 633-641.

Pages