Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
N. Erichson, B., Azencot O., Queiruga A., Hodgkinson L., & Mahoney M. (2021).  Lipschitz recurrent neural networks. International Conference on Learning Representations.
Subramanian, L., Roth V., Stoica I., Shenker S. J., & Katz R. H. (2004).  Listen and Whisper: Security Mechanisms for BGP. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 127-140.
Pan, H., Hindman B., & Asanović K. (2009).  Lithe: Enabling Efficient Composition of Parallel Libraries.
Friedland, G., & Vinyals O. (2008).  Live Speaker Identification in Conversations. 1017-1018.
P. Godfrey, B., Karp R. M., Lakshminarayanan K., Surana S., & Stoica I. (2004).  Load Balancing in Dynamic Structured P2P Systems. Proceedings of INFOCOMM.
P. Godfrey, B., Karp R. M., Lakshminarayanan K., Surana S., & Stoica I. (2004).  Load Balancing in Dynamic Structured P2P Systems. Proceedings of INFOCOMM.
Karp, R. M., Rao A., Lakshminarayanan K., Surana S., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems.
Rao, A., Lakshminarayanan K., Surana S., Karp R. M., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Second International Workshop on Peer-to-Peer Systems.
Rao, A., Lakshminarayanan K., Surana S., Karp R. M., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems (IPTPS '03).
Salzmann, M., Urtasun R., & Fua P. (2008).  Local Deformation Models for Monocular 3D Shape Recovery.
Liu, C-G., Estrin D., Shenker S. J., & Zhang L. (1998).  Local error recovery in SRM: comparison of two approaches. Proceedings of IEEE/ACM Transactions on Networking. 6, 686-699.
Urtasun, R., & Darrell T. (2008).  Local Probabilistic Regression for Activity-Independent Human Pose Inference.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Xing, E. P., Wu W.., Jordan M. I., & Karp R. M. (2003).  LOGOS: A Modular Bayesian Model for de Novo Motif Detection. Proceedings of IEEE Computer Society Bioinformatic Conference IPTPS.
Culler, D. E., Karp R. M., Patterson D., Sahay A., Schauser K. Erik, Santos E. E., et al. (1993).  LogP: towards a realistic model of parallel computation. Proceedings of the Fourth ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. 1-12.
Tantau, T. (2004).  A Logspace Approximation Scheme for the Shortest Path Problem for Graphs with Bounded Independence Number.
Amann, J., Sommer R., Sharma A., & Hall S. (2012).  A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333.
Tsai, T.. J., & Morgan N. (2012).  Longer Features: They Do a Speech Detector Good.
Callahan, T., Allman M., & Paxson V. (2010).  A Longitudinal View of HTTP Traffic.
Wang, X., Lian L., Miao Z., Liu Z., & Yu S. X. (2021).  Long-tailed Recognition by Routing Diverse Distribution-Aware Experts. Proceedings of International Conference on Learning Representations.
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Chen, B. Y., Zhu Q., & Morgan N. (2004).  Long-Term Temporal Features for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
Khattak, S., Javed M., Khayam S. Ali, Uzmi Z. Afzal, & Paxson V. (2014).  A Look at the Consequences of Internet Censorship Through an ISP Lens.
Argyraki, K., Maniatis P., Irzak O.., Subramanian A.., & Shenker S. J. (2007).  Loss and Delay Accountability for the Internet. 194-205.
Elizalde, B. Martinez, & Friedland G. (2013).  Lost in Segmentation: Three Approaches for Speech/Non-Speech Detection in Consumer-Produced Videos.

Pages