Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Gildea, D., & Hofmann T. (1999).  Topic-Based Language Models Using EM. Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
Ratnasamy, S., Handley M., Karp R. M., & Shenker S. J. (2002).  Topologically-Aware Overlay Construction and Server Selection. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002). 3, 1190-1199.
Urtasun, R., Fleet D. J., Geiger A., Popović J., Darrell T., & Lawrence N. D. (2008).  Topologically-Constrained Latent Variable Models. 1080-1087.
Radoslavov, P., Govindan R., & Estrin D. (2001).  Topology-Informed Internet Replica Placement. Proceedings of the Sixth International Workshop on Web Caching and Content Distribution.
Bruckner, S., Hüffner F., Karp R. M., Shamir R., & Sharan R. (2009).  Torque: Topology-Free Querying of Protein Interaction Networks. 74-89.
Gairing, M., & Schoppmann F.. (2007).  Total Latency in Singleton Congestion Games. Proceedings of the Third International Workshop on Internet and Network Economics (WINE 2007). 381-387.
Fanti, G., Finiasz M., Friedland G., & Ramchandran K. (2014).  Toward Efficient, Privacy-Aware Media Classification on Public Databases. 49-56.
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  Toward Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 187-193.
Stone, Z., Zickler T., & Darrell T. (2010).  Toward Large-Scale Face Recognition Using Social Network Context. 98(8), 1408-1415.
Andrew, L., Marcondes C.., Floyd S., Dunn L., Guillier R., Gang W., et al. (2008).  Towards a Common TCP Evaluation Suite.
VanderSloot, B., Amann J., Bernhard M., Durumeric Z., Bailey M., & J. Halderman A. (2016).  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Demmer, M., Fall K., Koponen T., & Shenker S. J. (2007).  Towards a Modern Communications API. Proceedings of the 6th ACM Workshop on Hot Topics in Networks (HotNets-VI). 1-7.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S. J., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Bergemann, D., Feigenbaum J., Shenker S. J., & Smith J. M. (2004).  Towards an Economic Analysis of Trusted Systems (Position Paper). Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota.
Ratnasamy, S., Shenker S. J., & McCanne S. (2005).  Towards an Evolvable Internet Architecture. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 313-324.
Hung, H., & Friedland G. (2008).  Towards Audio-Visual On-Line Diarization of Participants in Group Meetings.
Hakkani-Tür, D. (2009).  Towards Automatic Argument Diagramming of Multiparty Meetings. 4753-4756.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Nieto-Cavajal, I.., Ruiz P. M., Botia J., & Gómez-Skarmeta A. (2004).  Towards Engineering a Location-Aware Wireless Multi-Agent System. Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004).
Hermansky, H., & Morgan N. (1992).  Towards Handling the Acoustic Environment in Spoken Language Processing. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 85-88.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Satzger, B., Bagci F., Kluge F., & Ungerer T. (2010).  Towards Lightweight Self-Configuration in Wireless Sensor Networks. 791-792.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.

Pages