Publications

Found 4113 results
Author Title [ Type(Desc)] Year
Conference Paper
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Boakye, K., Favre B., & Hakkani-Tür D. (2009).  Any Questions? Automatic Question Detection in Meetings. 485-489.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Mertens, R., Huang P-S., Gottlieb L., Friedland G., & Divakaran A. (2011).  On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval. 446-451.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Botia, J., Valdes M.., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions. Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
Tavakoli, A., Casado M., Koponen T., & Shenker S. (2009).  Applying NOX to the Datacenter.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Pan, R., Breslau L., Prabhakar B., & Shenker S. (2003).  Approximate Fairness Through Differential Dropping. ACM SIGCOMM Computer Communication Review. 33(2), 23-39.
Bringmann, K., & Friedrich T. (2009).  Approximating the Least Hypervolume Contributor : NP-Hard in General, but Fast in Practice. 6-20.
Mahoney, M. W., Rao S., Wang D., & Zhang P. (2016).  Approximating the Solution to Mixed Packing and Covering LPs in parallel time.
Bringmann, K., & Friedrich T. (2008).  Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects. 436-447.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. (2001).  Approximation and Collusion in Multicast Cost Sharing. Proceedings of the Third ACM Conference on Electronic Commerce (ACM-EE 2001). 253-255.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Friedland, G., Hensley E., Schumacher J., & Jain R. (2008).  Appscio: A Software Environment for Semantic Multimedia Analysis. 456-459.
Ruiz, P. M., & Gómez-Skarmeta A. (2005).  Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas. Proceedings of the V Jornadas de Ingenieria Telematica.
Mitzel, D. J., Estrin D., Shenker S., & Zhang L. (1994).  An Architectural Comparison of ST-II and RSVP. Proceedings of the 13th IEEE Conference on Networking for Global Communications (INFOCOM '94). 2, 716-725.
Ziekow, H., Ivantysynova L., & Günther O. (2010).  Architectural Patterns for RFID Applications in Manufacturing.
Francis, P., Jamin S., Paxson V., Zhang L., Gryniewicz D. F., & Jin Y. (1999).  An Architecture for a Global Internet Host Distance Estimation Service. Proceedings of IEEE INFOCOM.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.

Pages