Publications

Found 259 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Derezinski, M.., & Mahoney M. W. (2019).  Distributed estimation of the inverse Hessian by determinantal averaging. Proceedings of the 2019 NeurIPS Conference.
Feldman, J. (1979).  A Distributed Information Processing Model of Visual Memory.
Feldman, J. (1979).  A Distributed Information Processing Model of Visual Memory. Proceedings of the Conference on Associative Memory and Parallel Computation.
Beamer, S., Buluç A., Asanović K., & Patterson D. (2013).  Distributed Memory Breadth-First Search Revisited: Enabling Bottom-Up Search.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Albanese, A., & Oppliger R. (1999).  Distributed registration and key distribution system and method.
Rieger, B. B. (1991).  On Distributed Representation in Word Semantics.
Zheng, C., Shen G., Li S., & Shenker S. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Moulin, H., & Shenker S. (1999).  Distributive and Additive Cost Sharing of an Homogeneous Good. Games and Economic Behavior. 27(2), 299-330.
Chun, B-G., Maniatis P., & Shenker S. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Venkataraman, A., Liu Y., Shriberg E., & Stolcke A. (2005).  Does Active Learning Help Automatic Dialog Act Tagging in Meeting Data?. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2777-2780.
Tangmunarunkit, H., Doyle J., Govindan R., Jamin S., Shenker S., & Willinger W. (2001).  Does AS Size Determine Degree in AS Topology?. ACM Computer Communication Review. 31(5), 7-10.
Metere, A. (2018).  Does free will exist in the universe? (That would be a no.).
Shriberg, E., Kajarekar S., & Scheffer N. (2009).  Does Session Variability Compensation in Speaker Recognition Model Intrinsic Variation Under Mismatched Conditions?. 1551-1554.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).

Pages