Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Shenker, S. J., Clark D. D., & Zhang L. (1994).  Services or Infrastructure: Why We Need a Network Service Model. Proceedings of the 1st International Workshop on Community Networking Integrated Multimedia Services to the Home. 145-149.
Handley, M. (1998).  Session Directories and Scalable Internet Multicast Address Allocation. Proceedings of the Annual Conference of the Association for Computing Machinery's Special Interest Group on Data Communication (ACM SIGCOMM 98).
Weaver, N., Hauser J., & Wawrzynek J. (2004).  The SFRA: A Corner-Turn FPGA Architecture. Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
Feldman, J., Lim C-C., & Rauber T. (1992).  The Shared-Memory Language pSather on a Distributed-Memory Multiprocessor. Proceedings of the ACM Special Interest Group on Programming Languages (SIGPLAN). 17-20.
Feigenbaum, J., Papadimitriou C. H., & Shenker S. J. (2000).  Sharing the Cost of Multicast Transmissions. Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (STOC 2000). 218-227.
Engle, C., Lupher A., Xin R., Zaharia M., Franklin M. J., Shenker S. J., et al. (2012).  Shark: Fast Data Analysis Using Coarse-grained Distributed Memory.
Xin, R., Rosen J., Zaharia M., Franklin M. J., Shenker S. J., & Stoica I. (2013).  Shark: SQL and Rich Analytics at Scale. 13-24.
Friedland, G., Maier G., Sommer R., & Weaver N. (2011).  Sherlock Holmes’s Evil Twin: On The Impact of Global Inference for Online Privacy.
Shastri, L. (1997).  A short (and early) paper describing this work. Proceedings of the 19th Annual Conference of the Cognitive Science Society. 680-685.
Fountoulakis, K.., Gleich D.. F., & Mahoney M. (2018).  A Short Introduction to Local Graph Clustering Methods and Software. Abstracts of the 7th International Conference on Complex Networks and Their Applications.
Kramer, O., & Gieseke F.. (2011).  Short-Term Wind Energy Forecasting Using Support Vector Regression.
Hermansky, H. (1997).  Should Recognizers Have Ears?. Proceedings of ESCA Tutorial and Research Workshop on Robust Speech Recognition for Unknown Communication Channels. 1-10.
Kanich, C., Weaver N., McCoy D., Halvorson T., Kreibich C., Levchenko K., et al. (2011).  Show Me the Money: Characterizing Spam-Advertised Revenue.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Joshi, A., Batten C., Kwon Y-J., Beamer S., Shamim I., Asanović K., et al. (2009).  Silicon-Photonic Clos Networks for Global On-Chip Communication. 124-133.
Bansal, M., & Klein D. (2010).  Simple, Accurate Parsing with an All-Fragments Grammar. 1098-1107.
Veldt, N., Gleich D., & Mahoney M. (2016).  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Koetzing, T.., Neumann F., Sudholt D., & Wagner M.. (2011).  Simple Max-Min Ant Systems and the Optimization of Linear Pseudo-Boolean Functions. 209-218.
Bergen, B. K., Chang N., & Narayanan S. (2004).  Simulated Action in an Embodied Construction Grammar. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Feldman, J., & Narayanan S. (2008).  Simulation and Cognition in Language Understanding. Proceedings of Exciting Biologies 2008.
Feldman, J., & Narayanan S. (2011).  Simulation Semantics, Embodied Construction Grammar, and the Language of Events. Proceedings of the International Workshop on Language - Action Tools for Cognitive Artificial Agents: Integrating Vision, Action and Language at the 25th Conference on Artificial Intelligence (AAAI-2011).
Hochmuth, C. A., Lässig J., & Thiem S. (2010).  Simulation-Based Evolutionary Optimization of Complex Multi-Location Inventory Models. 703-708.
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Pancholy, A., Petruck M. R. L., & Swayamdipta S. (202).  Sister Help: Data Augmentation for Frame-Semantic Role Labeling. Proceedings of the Joint 15th Linguistic Annotation Workshop (LAW) and 3rd Designing Meaning Representations (DMR) Workshop.

Pages