Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
K
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2006).  Semi-Automated Discovery of Application Session Structure. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 119-132.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Kannan, S. (1989).  Program Checkers for Algebraic Problems.
Kannan, S. (1989).  Program Checkers for Algebraic Problems (Thesis).
Kannan, J. Kumar, Caesar M., Stoica I., & Shenker S. J. (2007).  On the Consistency of DHT-Based Routing.
Kannan, J., Yang B., Shenker S. J., Sharma P., Banerjee S., Basu S., et al. (2005).  Smartseer: Continuous Queries over Citeseer.
Kantchelian, A., Tschantz M. Carl, Huang L., Bartlett P. L., Joseph A. D., & Tygar J.D.. (2014).  Large-margin Convex Polytope Machine. Proceedings of the 27th International Conference on Neural Information Processing Systems. 3248–3256.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
Kapoor, A., Grauman K., Urtasun R., & Darrell T. (2010).  Gaussian Processes for Object Categorization. International Journal of Computer Vision. 88(2), 169-188.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Karagiannis, D., Kurfess F., & Schmidt H. W. (1991).  Knowledge Selection with ANNs.
Karami, M.., Park Y.., & McCoy D. (2015).  Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Karayev, S., Hertzmann A., Winnemoeller H., Agarwala A., & Darrell T. (2014).  Recognizing Image Style.
Karayev, S., Fritz M., Fidler S., & Darrell T. (2011).  A Probabilistic Model for Recursive Factorized Image Features. 401-408.
Karayev, S., Baumgartner T., Fritz M., & Darrell T. (2012).  Timely Object Recognition.
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Karmarkar, N., Karp R. M., Lipton R. J., Lovász L., & Luby M. (1993).  A Monte-Carlo algorithm for estimating the permanent. SIAM Journal on Computing. 22(2), 284-293.
Karmarkar, N., Karp R. M., Lipton R. J., Lovász L., & Luby M. (1990).  A Monte-Carlo Algorithm for Estimating the Permanent.
Karmarkar, N., & Karp R. M. (1982).  An efficient approximation scheme for the one-dimensional bin-packing problem. Proceedings of the 23rd Annual Symposium on Foundations of Computer Science. 312-320.
Karp, R. M. (2007).  Streaming Algorithms for Selection and Approximate Sorting. Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. 9-20.
Karp, R. M., & Zhang Y. (1995).  Bounded branching process and AND/OR tree evaluation. Random Structures and Algorithms. 7(2), 97-116.

Pages