Publications

Found 1106 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2012
Hoffman, J., Saenko K., Kulis B., & Darrell T. (2012).  Discovering Latent Domains for Multisource Domain Adaptation. 702-715.
Casado, M., Koponen T., Shenker S., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Virtanen, S., Jia Y., Klami A., & Darrell T. (2012).  Factorized Multi-Modal Topic Model.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Maas, M., Reames P., Morlan J., Asanović K., Joseph A. D., & Kubiatowicz J. D. (2012).  GPUs: An Opportunity for Offloading Garbage Collection.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Zaharia, M., Katti S., Grier C., Paxson V., Shenker S., Stoica I., et al. (2012).  Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community.
Friedland, G., Janin A., Imseng D., Anguera X., Gottlieb L., Huijbregts M., et al. (2012).  The ICSI RT-09 Speaker Diarization System. IEEE Transactions on Audio. 20(2), 371-381.
Kirchner, M., & Ghosal D. (2012).  Information Hiding.
Sag, I. A., Boas H. C., & Kay P. (2012).  Introducing Sign-Based Construction Grammar. 1-28.
Raghavan, B., Koponen T., Ghodsi A., Brajkovic V., & Shenker S. (2012).  Making the Internet More Evolvable.
Ananthanarayanan, G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S., et al. (2012).  PACMan: Coordinated Memory Caching for Parallel Jobs. 1-14.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.
Gottlieb, L., Choi J., Kelm P., Sikora T., & Friedland G. (2012).  Pushing the Limits of Mechanical Turk: Qualifying the Crowd for Video Geo-Location. 23-28.
Sharan, R., & Karp R. M. (2012).  Reconstructing Boolean Models of Signaling. 261-271.
Raghavan, B., Casado M., Koponen T., Ratnasamy S., Ghodsi A., & Shenker S. (2012).  Software-Defined Internet Architecture: Decoupling Architecture from Infrastructure. 43-48.
Pfennig, S., & Kirchner M. (2012).  Spectral Methods to Determine the Exact Scaling Factor of Resample Digital Images.
Karp, R. M. (2012).  Theory of Computation as an Enabling Tool for the Sciences.
Karp, R. M. (2012).  Theory of Computation as an Enabling Tool for the Sciences.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.

Pages