Publications

Found 593 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Conference Paper
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Moody, J., Levin A.., & Rehfuss S. (1993).  Predicting the U.S. Index of Industrial Production. Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
Saenko, K., Karayev S., Jia Y., Shyr A., Janoch A., Long J., et al. (2011).  Practical 3-D Object Detection Using Category and Instance-Level Appearance Models. 793-800.
Kramer, O., Satzger B., & Lässig J. (2010).  Power Prediction in Smart Grids with Evolutionary Local Kernel Regression. 262-269.
Lokshtanov, D., Mnich M., & Saurabh S. (2011).  Planar k-Path in Subexponential Time and Polynomial Space.
Yeh, T., Lee J. J., & Darrell T. (2008).  Photo-Based Question Answering. 389-398.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Lei, H., Choi J., Janin A., & Friedland G. (2011).  Persona Linking: Matching Uploaders of Videos Across Accounts.
Kirkpatrick, B., Li S. Cheng, Karp R. M., & Halperin E. (2011).  Pedigree Reconstruction Using Identity by Descent. 136-152.
Jones, C.. G., Liu R., Meyerovich L.., Asanović K., & Bodik R. (2009).  Parallelizing the Web Browser.
Stribling, J., Councill I. G., Li J., M. Kaashoek F., Karger D.. R., Morris R., et al. (2005).  OverCite: A Cooperative Digital Research Library. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 69-79.
Dagum, P., Karp R. M., Luby M., & Ross S. (1995).  An optimal algorithm for Monte Carlo estimation. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 142-149.
Joseph, D.., Kannan J., Kubota A.., Lakshminarayanan K., Stoica I., & Wehrle K.. (2006).  OCALA: An Architecture for Supporting Legacy Applications Over Overlays. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 267-280.
Kohler, E., Li J., Paxson V., & Shenker S. J. (2002).  Observed Structure of Addresses in IP Traffic. Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop (IMW). 253-266.
Lei, H., Choi J., & Friedland G. (2013).  Nowhere to Hide: Exploring User-Verification Across Flickr Accounts.
Lawrence, N. D., & Urtasun R. (2009).  Non-Linear Matrix Factorization with Gaussian Processes. 601-608.
Lim, S. Hoe, N. Erichson B., Hodgkinson L., & Mahoney M. (2021).  Noisy Recurrent Neural Networks. Advances in Neural Information Processing Systems Conference. 34,
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Lönneker-Rodman, B., Baker C. F., & Hong J. (2008).  The New FrameNet Desktop: A Usage Scenario for Slovenian. 147-154.
Lässig, J., & Trommler U.. (2010).  New Approaches to Enterprise Cooperation Generation and Management. Proceedings of the 12th International Conference on Enterprise Information Systems (ICEIS 2010).
Liao, Y., & Moody J. (1996).  A Neural Network Visualization and Sensitivity Analysis Toolkit. Proceedings of the International Conference on Neural Information Processing. 1069-1074.
Fabrikant, A., Luthra A., Maneva E., Papadimitriou C. H., & Shenker S. J. (2003).  On a Network Creation Game. Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing (PODC '03). 347-351.
Peters, N., Lei H., & Friedland G. (2012).  Name That Room: Room Identification Using Acoustic Features in a Recording. 841-844.
Pal, J., Lakshmanan M.., & Toyama K. (2007).  "My Child Will be Respected": Parental Perspectives on Computers in Rural India. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 168-176.

Pages