Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Bansal, D., Balakrishnan H., Floyd S., & Shenker S. J. (2001).  Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01). 263-274.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Hornauer, S., Yellapragada B., Ranjbar A., & Yu S. X. (2019).  Driving Scene Retrieval by Example from Large-Scale Data. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Gloe, T., & Boehme R. (2010).  The "Dresden Image Database" for Benchmarking Digital Image Forensics. Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010). 1584-1590.
Gelbart, D., & Morgan N. (2002).  Double the Trouble: Handling Noise and Reverberation in Far-Field Automatic Speech Recognition. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Shriberg, E., Kajarekar S., & Scheffer N. (2009).  Does Session Variability Compensation in Speaker Recognition Model Intrinsic Variation Under Mismatched Conditions?. 1551-1554.
Venkataraman, A., Liu Y., Shriberg E., & Stolcke A. (2005).  Does Active Learning Help Automatic Dialog Act Tagging in Meeting Data?. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2777-2780.
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Schomp, K., Allman M., & Rabinovich M. (2014).  DNS Resolvers Considered Harmful.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Chun, B-G., Maniatis P., & Shenker S. J. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.
Zheng, C., Shen G., Li S., & Shenker S. J. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Beamer, S., Buluç A., Asanović K., & Patterson D. (2013).  Distributed Memory Breadth-First Search Revisited: Enabling Bottom-Up Search.

Pages