Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Plaskota, L. (1995).  How to Benefit From Noise.
Kotro, T.., Lindh-Knuutila T., & Hiltunen E.. (2009).  How to Analyze Various Consumer Data in the Future?. 135-143.
Paxson, V. (2009).  How the Pursuit of Truth Led Me to Selling Viagra.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2005).  Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks. 11(6), 741-756.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.

Pages