Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Lukyanenko, A., Nikolaevskiy I., Kuptsov D., Gurtov A., Ghodsi A., & Shenker S. J. (2014).  STEM+: Allocating Bandwidth Fairly To Tasks.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Luby, M., & Velickovic B. (1993).  On Deterministic Approximation of DNF.
Luby, M. (2018).  ICSI 30th Anniversary Celebration. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Analysis of Low Density Codes and Improved Designs Using Irregular Graphs.
Luby, M., & Vigoda E. (1999).  Fast Convergence of the Glauber Dynamics for Sampling Independent Sets: Part I.
Luby, M., & Wigderson A. (1995).  Pairwise Independence and Derandomization.
Luby, M., Mitzenmacher M., M. Shokrollahi A., & Spielman D. A. (1997).  Improved Low-Density Parity-Check Codes Using Irregular Graphs and Belief Propagation.
Luby, M. (1989).  Removing Randomness in Parallel Computation Without a Processor Penalty.
Luby, M., & Ertel W. (1993).  Optimal Parallelization of Las Vegas Algorithms.
Luby, M., Naor J., & Naor M. (1993).  On Removing Randomness from a Parallel Algorithm for Minimum Cuts.
Luby, M. (2019).  Systems and methods for storing, maintaining, and accessing objects in storage system clusters. US Patent 10,191,808.
Luby, M., Sinclair A., & Zuckerman D. (1993).  Optimal Speedup of Las Vegas Algorithms.
Luby, M., Mitzenmacher M., & M. Shokrollahi A. (1997).  Analysis of Random Processes via And-Or Tree Evaluation.
Luby, M. (1995).  Derandomizing Approximation Algorithms for Hard Counting Problems.
Luby, M. (1996).  A Geometric Proof of a Formula for the Number of Young Tableaux of a Given Shape.
Luby, M., Padovani R., Richardson T. J., Minder L., & Aggarwal P. (2019).  Liquid Cloud Storage. ACM Transactions on Storage. 15(1), 
Luby, M., & Rackoff C. (1989).  A Study of Password Security.
Lowery, C. M. (1991).  Protocols for Providing Performance Guarantees in a Packet Switching Internet.
Lowe, J.. B., Baker C. F., & Fillmore C. J. (1997).  A frame-semantic approach to semantic annotation. Proceedings of the SIGLEX Workshop on Tagging Text with Lexical Semantics: Why, What, and How?.
Lorenzo, A., Metere A., & Dzugutov M. (2018).  Hexatic smectic phase with algebraically decaying bond-orientational order.
López, J. Ferreiros, & Ellis D. P. W. (2000).  Using Acoustic Condition Clustering to Improve Acoustic Change Detection on Broadcast News. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000). 4, 568-571.
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Lönneker-Rodman, B., Baker C. F., & Hong J. (2008).  The New FrameNet Desktop: A Usage Scenario for Slovenian. 147-154.

Pages