Publications

Found 100 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is D  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Dutta, P., Culler D. E., & Shenker S. (2008).  Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. 531-532.
Dutta, P., Culler D. E., & Shenker S. (2007).  Procrastination Might Lead to a Longer and More Useful Life. 1-7.
Durumeric, Z., Li F., Kasten J., Amann J., Beekman J., Payer M., et al. (2014).  The Matter of Heartbleed.
[Anonymous] (2001).  Developments in Forecast Combination and Portfolio Choice. (Dunis, C.., Timmermann A.., & Moody J., Ed.).
Dunietz, J., Levin L., & Petruck M. R. L. (2017).  Construction Detection in a Conventional NLP Pipeline. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding. 178-184.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2006).  Network Loss Tomography Using Striped Unicast Probes. IEEE/ACM Transactions on Networking. 697-710.
Duffield, N., Presti F. Lo, Paxson V., & Towsley D. (2001).  Inferring Link Loss Using Striped Unicast Probes. Proceedings of IEEE INFOCOM.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Drivonikou, V. G., Kay P., Regier T., Ivry R. B., Gilbert A. L., Franklin A., et al. (2007).  Further Evidence That Whorfian Effects Are Stronger in the Right Visual Field Than the Left. 104(3), 1097-1102.
Drineas, P., & Mahoney M. W. (2016).  RandNLA: Randomized Numerical Linear Algebra. Communications of the ACM. 59, 80-90.
Dries, A., & Rückert U. (2009).  Adaptive Concept Drift Detection. 235-246.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Doubleday, S., Trott S., & Feldman J. (2017).  Processing Natural Language About Ongoing Actions in ECG. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Dorigo, M. (1992).  Genetic and Non Genetic Operators in Alecsys - Revised Version.
Donoho, D.., Flesia A.. G., Shankar U., Paxson V., Coit J.., & Staniford S. (2002).  Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay. Proceedings of RAID.
Donahue, J., Jia Y., Vinyals O., Hoffman J., Zhang N., Tzeng E., et al. (2014).  DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.
Donahue, J., Krahenbuhl P., & Darrell T. (2016).  Adversarial Feature Learning. CoRR. abs/1605.09782,
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Donahue, J., Hoffman J., Rodner E., Saenko K., & Darrell T. (2013).  Semi-Supervised Domain Adaptation with Instance Constraints.
Domingo-Pascual, J., Albanese A., & Holfelder W. (1995).  Emulation of Traffic Congestion on ATM Gigabit Networks.
Domin, C., Pohl H., & Krause M. (2016).  Improving Plagiarism Detection in Coding Assignments by Dynamic Removal of Common Ground. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 1173-1179.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols. 55(1-3), 57-68.

Pages