Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2004).  Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
Casado, M., Garfinkel T., Cui W., Paxson V., & Savage S. (2005).  Opportunistic Measurement: Extracting Insight from Spurious Traffic. Proceedings of the Fourth Workshop on Hot Topics in Networks (Hotnets-IV).
Callejo, P., Kelton C., Vallina-Rodriguez N., Cuevas R., Gasser O., Kreibich C., et al. (2017).  Opportunities and Challenges of Ad-based Measurements from the Edge of the Network. Proceedings of HotNets 2017.
Chong, J., Friedland G., Janin A., & Morgan N. (2010).  Opportunities and Challenges of Parallelizing Speech Recognition.
Dagum, P., Karp R. M., Luby M., & Ross S. (1995).  An optimal algorithm for Monte Carlo estimation. Proceedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS'95). 142-149.
Karp, R. M., Vazirani U. V., & Vazirani V. V. (1990).  An optimal algorithm for on-line bipartite matching. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing.
Karp, R. M., Nierhoff T., & Tantau T. (2005).  Optimal Flow Distribution Among Multiple Channels with Unknown Capacities. Proceedings of the Second Brazilian Symposium of Graphs, Algorithms, and Combinatorics (GRACO 2005). 225-231.
Boehme, R., & Felegyhazi M. (2010).  Optimal Information Security Investment with Penetration Testing.
Radojković, P., Cakarevic V., Moretó M., Verdú J., Pajuelo A., Cazorla F. J., et al. (2012).  Optimal Task Assignment in Multithreaded Processors: A Statistical Approach. 235-248.
Eskin, E., Halperin E., & Sharan R. (2004).  Optimally Phasing Long Genomic Regions using Local Haplotype Predictions. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 13-16.
Pan, X., Gonzalez J., Jegelka S., Broderick T., & Jordan M. I. (2013).  Optimistic Concurrency Control for Distributed Unsupervised Learning.
Karp, R. M., Koutsoupias E.., Papadimitriou C. H., & Shenker S. J. (2000).  Optimization Problems in Congestion Control. Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS 2000). 66-74.
Doerr, B., Jansen T., Sudholt D., Winzen C., & Zarges C. (2010).  Optimizing Monotone Functions Can Be Difficult. 42-51.
Ma, D., Friedland G., & Krell M. Michael (2018).  OrigamiSet1.0: Two New Datasets for Origami Classification and Difficulty Estimation. Proceedings of the 7th International Meeting on Origami in Science, Mathematics and Education (7OSME).
Chen, Q.., Chang H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  The Origin of Power Laws in Internet Topologies Revisited. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 608-617.
Greenberg, S. (1997).  On the Origins of Speech Intelligibility in the Real World. Proceedings of the ESCA Workshop of Robust Speech Recognition. 23-32.
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
Sommer, R., & Paxson V. (2010).  Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. 305-316.
Stribling, J., Councill I. G., Li J., M. Kaashoek F., Karger D.. R., Morris R., et al. (2005).  OverCite: A Cooperative Digital Research Library. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 69-79.
Peterson, L., Shenker S. J., & Turner J. (2004).  Overcoming the Internet Impasse through Virtualization. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III). 34-41.
etin, Ö. Ç., & Shriberg E. (2006).  Overlap in Meetings: ASR Effects and Analysis by Dialog Factors, Speakers, and Collection Site. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 212-224.
Boakye, K., Trueba-Hornero B.., Vinyals O., & Friedland G. (2008).  Overlapped Speech Detection for Improved Speaker Diarization in Multiparty Meetings. 4353-4356.
Ohara, K. Hirose, Ishizaki S., Ohori T., Saito H., Suzuki R., & Fujii S. (2004).  An Overview of Japanese FrameNet. Proceedings of the Fifth Annual Meeting of the Japanese Cognitive Linguistics Association (JCLA 5). 613-616.
Cook, G.., Christie J.., Ellis D. P. W., Fosler-Lussier E., Gotoh Y.., Kingsbury B., et al. (1999).  An Overview of the SPRACH System for the Transcription of Broadcast News. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
Anand, A.., Gupta A., Akella A., Seshan S., & Shenker S. J. (2008).  Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. 219-230.

Pages