Publications

Found 701 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is G  [Clear All Filters]
2011
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: Flexible Resource Sharing for the Cloud. USENIX ;login:. 36(4), 37-45.
Ghodsi, A., Koponen T., Rajahalme J., Sarolahti P., & Shenker S. (2011).  Naming in Content-Oriented Architectures. 1-6.
Kramer, O., & Gieseke F.. (2011).  Short-Term Wind Energy Forecasting Using Support Vector Regression.
Nguyen, G. T. K., Agarwal R., Liu J., Caesar M., P. Godfrey B., & Shenker S. (2011).  Slick Packets. 245-256.
Ribeiro, M. Túlio, Guerra P. H. Calais, Vilela L., Veloso A., Guedes D., Meira, Jr. W., et al. (2011).  Spam Detection Using Web Page Content: A New Battleground.
Ribeiro, M. Túlio, Guerra P. H. Calais, Vilela L., Veloso A., Guedes D., Meira, Jr. W., et al. (2011).  Spam Detection Using Web Page Content: A New Battleground.
Gold, B., Morgan N., & Ellis D. P. W. (2011).  Speech and Audio Signal Processing: Processing and Perception of Speech and Music, 2nd Edition.
Scheffer, N., Ferrer L., Graciarena M., Kajarekar S., Shriberg E., & Stolcke A. (2011).  The SRI NIST 2010 Speaker Recognition Evaluation System. 5292-5295.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Song, H. Oh, Fritz M., Gu C., & Darrell T. (2011).  Visual Grasp Affordances From Appearance-Based Cues. 998-1005.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
2010
Graciarena, M., Delplanche M., Shriberg E., Stolcke A., & Ferrer L. (2010).  Acoustic Front-End Optimization for Bird Species Recognition. 293-296.
Ziekow, H., Ivantysynova L., & Günther O. (2010).  Architectural Patterns for RFID Applications in Manufacturing.
Tur, G., Stolcke A., Voss L., Peters S., Hakkani-Tür D., Dowding J., et al. (2010).  The CALO Meeting Assistant System. IEEE Transactions on Audio. 18(6), 1601-1611.
Gillick, D. (2010).  Can Conversational Word Usage Be Used to Predict Speaker Demographics?.
Guz, U., Tur G., Hakkani-Tür D., & Cuendet S. (2010).  Cascaded Model Adaptation for Dialog Act Segmentation and Tagging. Journal of Computer Speech and Language. 24(2), 289-306.
Gairing, M., Lücking T., Mavronicolas M., & Monien B. (2010).  Computing Nash Equilibria for Scheduling on Restricted Parallel Links. Theory of Computing Systems. 47(2), 405-432.
Gloe, T., & Boehme R. (2010).  The "Dresden Image Database" for Benchmarking Digital Image Forensics. Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010). 1584-1590.
Kapoor, A., Grauman K., Urtasun R., & Darrell T. (2010).  Gaussian Processes for Object Categorization. International Journal of Computer Vision. 88(2), 169-188.
Pasaniuc, B., Avinery R.., Gur T., Skibola C. F., Bracci P. M., & Halperin E. (2010).  A Generic Coalescent-Based Framework for the Selection of a Reference Panel for Imputation. Genetic Epidemiology. 34(8), 773-782.
Srivas, R., Hannum G., Guénolé A., van Attikum H., Krogan N. J., Karp R. M., et al. (2010).  Genome-Wide Association Data Reveal a Global Map of Genetic Interactions among Protein Complexes.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
P. Godfrey, B., Schapira M., Zohar A.., & Shenker S. (2010).  Incentive Compatibility and Dynamics of Congestion Control. ACM SIGMETRICS Performance Evaluation Review. 36(1), 95-106.
Cho, C.. Y., Caballero J., Grier C., Paxson V., & Song D. (2010).  Insights from the Inside: A View of Botnet Management from Infiltration.

Pages