Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2013).  Designing Chip-Level Nanophotonic Interconnection Networks.
Kohler, E., Handley M., & Floyd S. (2003).  Designing DCCP: Congestion Control Without Reliability.
Kohler, E., Handley M., & Floyd S. (2006).  Designing DCCP: Congestion Control Without Reliability. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Bird, S. (2018).  Designing Mobile Applications for Endangered Languages. The Oxford Handbook of Endangered Languages.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Blum, M. E. (1988).  Designing Programs to Check Their Work.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.
Voisard, A., & Ziekow H. (2009).  Designing Sensor-Based Event Processing Infrastructures: A Tradeoff Analysis.
Stojanovic, V., Joshi A., Batten C., Kwon Y-J., Beamer S., Chen S.., et al. (2010).  A Design-Space Exploration for CMOS Photonic Processor Networks.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Petrov, S., Faria A., Michaillat P., Berg A., Stolcke A., Klein D., et al. (2006).  Detecting Categories in News Video Using Acoustic, Speech, and Image Features.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Kannan, J., Jung J., Paxson V., & Koksal C. Emre (2005).  Detecting Hidden Causality in Network Connections.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Lee, K., Ellis D. P. W., & Loui A. (2010).  Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering.
Lee, K., & Ellis D. P. W. (2008).  Detecting Music in Ambient Audio by Long-Window Autocorrelation. 9-12.

Pages