Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
Weaver, N., & Allman M. (2009).  On Constructing a Trusted Path to the User.
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Weaver, N., & Ellis D. (2004).  Reflections on Witty: Analyzing the Attacker. ;login: The USENIX Magazine. 29(3), 34-37.
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weber, S. (2004).  The Success of Open Source.
Weber, S. Hollbach, & Stolcke A. (1990).  L0: A Testbed for Miniature Language Acquisition;.
Weber, F.., Manganaro L.., Peskin B., & Shriberg E. (2002).  Using Prosodic and Lexical Information for Speaker Identification. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Webster, M. A., & Kay P. (2006).  Individual and Population Differences in Focal Colors. 29-54.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Weihrauch, K. (1992).  The Degrees of Discontinuity of Some Translators Between Representations ofthe Real Numbers.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Weissman, B., Gomes B., Quittek J. W., & Holtkamp M. (1997).  A Performance Evaluation of Fine Grain Thread Migration with Active Threads.
Wendelken, C. (2003).  Shruti-agent: A structured connectionist architecture for reasoning and decision-making.

Pages