Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Chen, L., Liu Y., Harper M. P., Maia E.., & McRoy S.. (2004).  Evaluating Factors Impacting the Accuracy of Forced Alignments in a Multimodal Corpus. Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 759-762.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Harborth, D., & Frik A. (2021).  Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. Seventeenth Symposium on Usable Privacy and Security (SOUPS) 2021. 513-534.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Hennebert, L.., Ris C.., Bourlard H., Renals S., & Morgan N. (1997).  Estimation of Global Posteriors and Forward-Backward Training of Hybrid HMM/ANN Systems. Proceedings of the Fifth European Conference on Speech Communication and Technology (Eurospeech '97). 1951-1954.
Hung, H., Huang Y., Friedland G., & Gatica-Perez D. (2008).  Estimating the Dominant Person in Multi-Party Conversations Using Speaker Diarization Strategies. 2197-2200.
Govindan, R., & Paxson V. (2002).  Estimating Router ICMP Generation Delays. Proceedings of Passive & Active Measurement: PAM-2002.
Halperin, E., & Hazan E. (2005).  Estimating Haplotype Frequencies Efficiently. Proceedings of the 9th Annual International Conference on Research in Computational Molecular Biology (RECOMB'05). 553-568.
Allman, M., & Paxson V. (2001).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM Workshop on Data Communication in Latin American and the Caribbean.
Allman, M., & Paxson V. (1999).  On Estimating End-to-End Network Path Properties. ACM SIGCOMM.
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Fillmore, C. J. (1990).  Epistemic Stance and Grammatical Form in English Conditional Sentences. Papers from the 26th Regional Meeting of the Chicago Linguistic Society (CLS 26). 137-162.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Goebel, C., Tribowski C., & Günther O. (2009).  EPCIS-Based Supply Chain Event Management—A Quantitative Comparison of Candidate System Architectures. 494-499.
Magimai-Doss, M., Hakkani-Tür D., etin Ö. Ç., Shriberg E., Fung J., & Mirghafori N. (2007).  Entropy Based Classifier Combination for Sentence Segmentation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 189-192.
Goebel, C., Krasnova H., Hildebrand T., Günther O., & Bidault F. (2008).  Enterprise Software Adoption and Perceived Business Performance—An Empirical Investigation in Germany and the U.S..
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Dreger, H., Kreibich C., Paxson V., & Sommer R. (2005).  Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Gonzalez, J. Maria, & Paxson V. (2006).  Enhancing Network Intrusion Detection With Integrated Sampling and Filtering. Proceedings of the 9th International Syposium on Recent Advances in Intrusion Detection (RAID 2006). 272-289.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Sommer, R., & Paxson V. (2003).  Enhancing Byte-Level Network Intrusion Detection Signatures with Context. Proceedings of ACM CCS.

Pages