Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Casado, M., Koponen T., Shenker S. J., & Tootoonchian A. (2012).  Fabric: A Retrospective on Evolving SDN. 85-90.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Castelluccia, C., Duermuth M., & Imamoglu F. (2014).  Learning from Neuroscience to Improve Internet Security. ERCIM News. 99, 46.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Castro, I., Panda A., Raghavan B., Shenker S. J., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Catanzaro, B., Kamil S., Lee Y., Asanović K., Demmel J., Keutzer K., et al. (2009).  SEJITS: Getting Poductivity AND Performance with Selective Embedded JIT Specialization.
Cebron, N.. (2010).  Refinement of Observations Under Budget Constraints in Active Learning.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Celikyilmaz, A., Hakkani-Tür D., & Tur G. (2010).  LDA Based Similarity Modeling for Question Answering. 1-9.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Chandrayana, K.., Karp R. M., Roughan M.., Sen S.., & Zhang Y. (2004).  Search Strategies in Inter-Domain Traffic Engineering.
Chang, S. (2002).  A Syllable, Articulatory-Feature, and Stress-Accent Model of Speech Recognition.
Chang, N., & Gurevich O.. (2004).  Context-Driven Construction Learning. Proceedings of the 26th Annual Meeting of the Cognitive Science Society.
Chang, S-Y., & Morgan N. (2013).  Informative Spectro-Temporal Bottleneck Features for Noise-Robust Speech Recognition.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Chang, N., Feldman J., Porzel R., & Sanders K. (2002).  Scaling Cognitive Linguistics: Formalisms for Language Understanding.
Chang, N. (2004).  A computational model of comprehension-based construction acquisition.
Chang, N. (2009).  From Motion Frames to Grammar: A Usage-Based Model of a Construction Learning.
Chang, S., Greenberg S., & Wester M. (2001).  An Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Chang, K., Lei H., & Canny J.. (2011).  Improved Classification of Speaking Styles for Mental Health Monitoring using Phoneme Dynamics. 85-88.

Pages