Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Vinyals, O., Jia Y., & Darrell T. (2013).  Why Size Matters: Feature Coding as Nystrom Sampling.
Paxson, V., & Floyd S. (1997).  Why We Don't Know How To Simulate The Internet. Proceedings of the 1997 Winter Simulation Conference.
Motlicek, P., Ullal V.., & Hermansky H. (2007).  Wide-Band Perceptual Audio Coding Based on Frequency-Domain Linear Prediction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 1, 265-268.
Hatch, A., Kajarekar S., & Stolcke A. (2006).  Within-Class Covariance Normalization for SVM-Based Speaker Recognition. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1471-1474.
Reyes, I., Wijesekera P., Reardon J., Elazari A., Razaghpanah A., Vallina-Rodriguez N., et al. (2018).  "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA. Proceedings on Privacy Enhancing Technologies.
Liu, Y. (2003).  Word Fragments Identification Using Acoustic-Prosodic Features in Conversational Speech. Proceedings of HLT/NAACL, Student Session.
Lei, H., & Mirghafori N. (2007).  Word-Conditioned HMM Supervectors for Speaker Recognition. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 746-749.
Lei, H., & Mirghafori N. (2007).  Word-Conditioned Phone N-Grams for Speaker Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 253-256.
Baker, C. F., & Fellbaum C. (2009).  WordNet and FrameNet as Complementary Resources for Annotation. 125-129.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S. J., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Guadarrama, S., Krishnamoorthy N., Malkarnenkar G., Mooney R., Darrell T., & Saenko K. (2013).  YouTube2Text: Recognizing and Describing Arbitrary Activities Using Semantic Hierarchies and Zero-Shoot Recognition.

Pages