Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2008
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Daskalakis, C., Dimakis A.. G., Karp R. M., & Wainwright M.. J. (2008).  Probabilistic Analysis of Linear Programming Decoding. IEEE Transactions on Information Theory. 54(8), 3565-3578.
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
Allman, M., & Paxson V. (2008).  A Reactive Measurement Framework. 92-101.
Nedevschi, S., Popa L., Iannaccone G., Raynasamy S.., & Wetherall D. (2008).  Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. 323-336.
Ermolinskiy, A., & Shenker S. J. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding.
Ermolinskiy, A., & Shenker S. J. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Raya, M.., Manshaei M.. H., Felegyhazi M., & Hubaux J.-P.. (2008).  Revocation Games in Ephemeral Networks. 199-210.
Floyd, S. (2008).  RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms.
Floyd, S., & Allman M. (2008).  RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic.
Garg, N. P., Favre S.., Salamin H.., Hakkani-Tür D., & Vinciarelli A.. (2008).  Role Recognition for Meeting Participants: An Approach Based on Lexical Information and Social Network Analysis. 693-696.
DeNero, J., Bouchard-Côté A.., & Klein D. (2008).  Sampling Alignment Structure Under a Bayesian Translation Model. 314-323.
Salfner, F., & Wolter K. (2008).  Service Availability of Systems with Failure Prevention.
Feldman, J., & Narayanan S. (2008).  Simulation and Cognition in Language Understanding. Proceedings of Exciting Biologies 2008.
Pfennigschmidt, S., & Voisard A. (2008).  A Situation-Centric Approach to Meteorological Services in the SITUMET Platform.
Barrett, L., Feldman J., & Dermed L. Mac (2008).  A (Somewhat) New Solution to the Binding Problem. Neural Computation. 20(9), 2361-2378.
Weiss, R. J., Mandel M. I., & Ellis D. P. W. (2008).  Source Separation Based on Binaural Cues and Source Model Constraints. 419-422.
Kreibich, C., Kanich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  On the Spam Campaign Trail.
Kanich, C., Kreibich C., Levchenko K., Enright B., Voelker G. M., Paxson V., et al. (2008).  Spamalytics: An Empirical Analysis of Spam Marketing Conversion. 3-14.
Garg, N. P., & Hakkani-Tür D. (2008).  Speaker Role Detection in Meetings Using Lexiocal Information and Social Network Analysis.
Ganapathy, S., Motlicek P., Hermansky H., & Garudadri H. (2008).  Spectral Noise Shaping: Improvements in Speech/Audio Codec Based on Linear Prediction in Spectral Domain.
Ostendorf, M., Favre B., Grishman R., Hakkani-Tür D., Harper M. P., Hillard D., et al. (2008).  Speech Segmentation and Spoken Document Processing. IEEE Signal Processing Magazine. 25(3), 59-69.
Müller, C., Biel J-I., Kim E., & Rosario D. (2008).  Speech-Overlapped Acoustic Event Detection for Automotive Applications. 2590-2593.

Pages