Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Hillard, D., Ostendorf M., & Shriberg E. (2003).  Detection of Agreement vs. Disagreement In Meetings: Training With Unlabeled Data. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2003).
Althoff, T., Song H. Oh, & Darrell T. (2012).  Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Posch, S. (1991).  Detecting Skewed Symmetries.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Lee, K., & Ellis D. P. W. (2008).  Detecting Music in Ambient Audio by Long-Window Autocorrelation. 9-12.
Lee, K., Ellis D. P. W., & Loui A. (2010).  Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Petrov, S., Faria A., Michaillat P., Berg A., Stolcke A., Klein D., et al. (2006).  Detecting Categories in News Video Using Acoustic, Speech, and Image Features.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
Stojanovic, V., Joshi A., Batten C., Kwon Y-J., Beamer S., Chen S.., et al. (2010).  A Design-Space Exploration for CMOS Photonic Processor Networks.
Voisard, A., & Ziekow H. (2009).  Designing Sensor-Based Event Processing Infrastructures: A Tradeoff Analysis.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.

Pages