Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Leicher, C. (1994).  Hierarchical Encoding of MPEG Sequences Using Priority Encoding Transmission (PET).
Leoncini, M. (1994).  On the Parallel Complexity of Gaussian Elimination with Pivoting.
Leoncini, M., Manzini G., & Margara L. (1997).  Parallel Complexity of Numerically Accurate Linear System Solvers.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Levin, A.. U., Leen T. K., & Moody J. (1994).  Fast Pruning Using Principal Components. 6,
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Li, F.., & Paxson V. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Liao, Y., & Moody J. (2000).  Constructing Heterogeneous Committees via Input Feature Grouping. 12,
Liao, Y., & Moody J. (1996).  A Neural Network Visualization and Sensitivity Analysis Toolkit. Proceedings of the International Conference on Neural Information Processing. 1069-1074.
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.

Pages