Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1989).  Sequencing in an Assembly Line with Blocking to Minimize Cycle Time. Operations Research. 37(6), 925-935.
S. McCormick, T., Pinedo M. L., Shenker S. J., & Wolf B. (1991).  Transient Behavior in a Flexible Assembly System. International Journal of Flexible Manufacturing Systems. 27-44.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2015).  Taking an AXE to L2 Spanning Trees.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2016).  The Deforestation of L2.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Mavronicolas, M., & Sauerwald T. (2009).  A Randomized, O(log w)-Depth 2-Smoothing Network. 178-187.
Mauve, M. (1997).  Protocol Enhancement and Compression for X-Based Application Sharing.
Matusov, E., Hillard D., Magimai-Doss M., Hakkani-Tür D., Ostendorf M., & Ney H. (2007).  Improving Speech Translation with Automatic Boundary Prediction. 2449-2452.
Mathur, A., Malkin N., Harbach M., Peer E., & Egelman S. (2018).  Quantifying Users’ Beliefs about Software Updates. Proceedings of the NDSS Workshop on Usable Security (USEC ’18).
Mathis, M., Mahdavi J., Floyd S., & Romanow A. (1996).  RFC 2018: TCP Selective Acknowledgment Options.
Mathis, M., & Allman M. (2001).  A Framework for Defining Empirical Bulk Transfer Capacity Metrics.
Marzo, J. L., Vilà P., Fàbrega L., & Massaguer D.. (2001).  An ATM Distributed Simulator for Network Management Research. Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
Marzo, J. L., Maryni P.., & Vilà P. (2001).  Towards QoS in IP-Based Core Networks: A Survey on Performance Management, MPLS Case. Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'2001).
März, A., & Ulrich R. (1996).  JAM: A Java Toolkit for Traffic Analyzing and Monitoring.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Martin, M.., Maycock J.., Schmidt F.., & Kramer O. (2010).  Recognition of Manual Motions with Dimension Reduction and Dynamic Time Warping. Proceedings of the Fifth International Conference on Hybrid Artificial Intelligence Systems (HAIS 2010). 1, 221-228.
Martin, C.. H., & Mahoney M. (2019).  Statistical Mechanics Methods for Discovering Knowledge from Modern Production Quality Neural Networks. Proceedings of the 25th Annual SIGKDD. 3239-3240.
Martin, E., Vinyals O., Friedland G., & Bajcsy R.. (2010).  Precise Indoor Localization Using Smart Phones. 787-790.
Martin, C.. H., & Mahoney M. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Marquis-Boire, M., Marczak B., Guarnieri C., & Scott-Railton J. (2013).  You Only Click Twice: FinFisher's Global Proliferation. The Citizen Lab.
Marquis-Boire, M., Marczak B., Guarnieri C., & Scott-Railton J. (2013).  For Their Eyes Only: The Commercialization of Digital Spying. The Citizen Lab.

Pages