Publications

Found 4166 results
Author Title [ Type(Desc)] Year
Conference Paper
Francis, P., Jamin S., Paxson V., Zhang L., Gryniewicz D. F., & Jin Y. (1999).  An Architecture for a Global Internet Host Distance Estimation Service. Proceedings of IEEE INFOCOM.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Huebsch, R., Chun B., Hellerstein J. M., Loo B. Thau, Maniatis P., Roscoe T., et al. (2005).  The Architecture of PIER: An Internet-Scale Query Processor. Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Black, A. W., H. Bunnell T., Dou Y., Kumar P., Metze F., Perry D., et al. (2012).  Articulatory Features for Expressive Speech Synthesis.
Feldman, J., Brown C. M., Ellis C. S., LeBlanc T. J., & Peterson G. L. (1985).  Artificial Intelligence Research on the Butterfly Multicomputer. Proceedings of the Workshop on Artificial Intelligence and Distributed Problem Solving. 109-118.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Batliner, A., Steidl S., & Nöth E.. (2011).  Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction. 22-27.
Shenker, S., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Raman, S., McCanne S., & Shenker S. (1998).  Asymptotic Behavior of Global Recovery in SRM. Proceedings of the 1998 ACM SIGMETRICS Joint International Conference on Measurement and Modeling of Computer Systems. 90-99.
Mitzel, D. J., & Shenker S. (1994).  Asymptotic Resource Consumption in Multicast Reservation Styles. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 226-233.
DeNero, J., Pauls A., & Klein D. (2009).  Asynchronous Binarization for Synchronous Grammars.
Dutta, P., Culler D. E., & Shenker S. (2008).  Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. 531-532.
Greenberg, A.., Shenker S., & Stolyar A.. (1996).  Asynchronous Updates in Large Parallel Systems. Proceedings of the ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. 91-103.
Marzo, J. L., Vilà P., Fàbrega L., & Massaguer D.. (2001).  An ATM Distributed Simulator for Network Management Research. Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
Regier, T., & Zheng M. (2003).  An Attentional Constraint on Spatial Meaning. Proceedings of the 25th Annual Conference of the Cognitive Science Society. 50.
Chun, B-G., Maniatis P., Shenker S., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. 189-204.

Pages