Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2005
Yago, C.. M., Ruiz P. M., & Gómez-Skarmeta A. (2005).  Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar. Proceedings of the V Jornadas de Ingenieria Telematica.
P. Godfrey, B., Shenker S. J., & Stoica I. (2005).  Minimizing Churn in Distributed Systems.
Halperin, E., & Karp R. M. (2005).  The Minimum-Entropy Set Cover Problem. Theoretical Computer Science. 348(2), 240-250.
Stolcke, A., Ferrer L., Kajarekar S., Shriberg E., & Venkataraman A. (2005).  MLLR Transforms as Features in Speaker Recognition. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2425-2428.
Narayanan, S., & Sinha S. (2005).  Model-Based Answer Selection. Proceedings of the Workshop on Textual Inference for Question Answering at the 20th National Conference on Artificial Intelligence.
Shriberg, E., Ferrer L., Kajarekar S., Venkataraman A., & Stolcke A. (2005).  Modeling Prosodic Feature Sequences for Speaker Recognition. Speech Communication. 46(3-4), 455-472.
M. Font, F. (2005).  Multi-Microphone Signal Processing for Automatic Speech Recognition in Meeting Rooms.
etin, Ö. Ç., & Ostendorf M. (2005).  Multi-Rate and Variable-Rate Modeling of Speech at Phone and Syllable Time Scales. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 665-668.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S. J., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Allman, M., & Blanton E. (2005).  Notes on Burst Mitigation for Transport Protocols. ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
Ballani, H., Chawathe Y., Ratnasamy S., Roscoe T., & Shenker S. J. (2005).  Off by Default. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Rhea, S., P. Godfrey B., Karp B., Kubiatowicz J. D., Ratnasamy S., Shenker S. J., et al. (2005).  OpenDHT: A Public DHT Service and Its Uses. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 73-84.
Rhea, S., P. Godfrey B., Karp B., Kubiatowicz J. D., Ratnasamy S., Shenker S. J., et al. (2005).  OpenDHT: A Public DHT Service and Its Uses. ACM SIGCOMM Computer Communication Review. 35(4), 73-84.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Karp, R. M., Nierhoff T., & Tantau T. (2005).  Optimal Flow Distribution Among Multiple Channels with Unknown Capacities. Proceedings of the Second Brazilian Symposium of Graphs, Algorithms, and Combinatorics (GRACO 2005). 225-231.
Karp, R. M. (2005).  Optimization Problems Related to Internet Congestion Control.
Stribling, J., Councill I. G., Li J., M. Kaashoek F., Karger D.. R., Morris R., et al. (2005).  OverCite: A Cooperative Digital Research Library. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 69-79.
Balakrishnan, H., Shenker S. J., & Walfish M. (2005).  Peering Peer-to-Peer Providers. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 104-114.
Cohen, E., Halperin E., & Kaplan H.. (2005).  Performance Aspects of Distributed Caches Using TTL-Based Consistency. Theoretical Computer Science. 331(1), 73-96.
Kim, Y-J., Govindan R., Karp B., & Shenker S. J. (2005).  On the Pitfalls of Geographic Face Routing. Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Adler, I., Ahn H-S., Karp R. M., & Ross S. M. (2005).  A Probabilistic Model for the Survivability of Cells. Journal of Applied Probability. 42(4), 919-931.
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
Boulis, C., & Ostendorf M. (2005).  A Quantitative Analysis of Lexical Differences Between Genders in Telephone Conversations. Proceedings of the 43rd Annual Meeting on Association for Computational Linguistics (ACL 2005). 435-442.
Gómez-Skarmeta, A., & Ruiz P. M. (2005).  Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM. Proceedings of the V Jornadas de Ingenieria Telematica.

Pages