Publications

Found 504 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Stolcke, A., Anguera X., Boakye K., etin Ö. Ç., Grezl F., Janin A., et al. (2005).  Further Progress in Meeting Recognition: The ICSI-SRI Spring 2005 Speech-to-Text Evaluation System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 463-475.
G
Shenker, S., & Wroclawski J. (1997).  General Characterization Parameters for Integrated Service Network Elements.
Werther, T. (1993).  Generalized Vandermonde Determinants Over the Chebyshev Basis.
Warren, W. (2001).  Global Posterior Probability Estimates as Confidence Measures in an Automatic Speech Recognition System. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Warren, W. (2000).  Global Posterior Probability Estimates as Decision Confidence Measures in an Automatic Speech Recognition System.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Gusfield, D., Karp R. M., Wang L., & Stelling P. (1998).  Graph Traversals, Genes and Matroids: An Efficient Case of the Travelling Salesman Problem. 88,
Alon, N., Karp R. M., Peleg D., & West D. (1995).  A graph-theoretic game and its application to the k-server problem. SIAM Journal on Computing. 24(1), 78-100.
Alon, N., Karp R. M., Peleg D., & West D. (1991).  A Graph-Theoretic Game and its Application to the k-Server Problem.
Weinrib, A., & Shenker S. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Asanović, K., & Wittig R.. (2010).  Guest Editors' Introduction: Proceedings of the 21st Symposium on High Performance Chips (Hot Chips 21), Stanford, California. IEEE Micro. 30(2), 5-6.
H
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Moody, J., & Wu L. (1998).  High Frequency Foreign Exchange Rates: Price Behavior Analysis and `True Price' Models.
Qazi, Z. Ayyub, Walls M., Panda A., Sekar V., Ratnasamy S., & Shenker S. (2017).  A High Performance Packet Core for Next Generation Cellular Networks.. Proceedings of the Conference of the ACM Special Interest Group on Data Communication SIGNCOMM '17.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Asanović, K., Kingsbury B., Morgan N., & Wawrzynek J. (1991).  HiPNeT-1: A Highly Pipelined Architecture for Neural Network Training.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).

Pages