Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2007
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Lüning, A.., Friedland G., Knipping L., & Rojas R. (2007).  Visualizing Large-Screen Electronic Chalkboard Content on Handheld Devices. Proceedings of the Second IEEE International Workshop on Multimedia Technologies for E-Learning at 9th IEEE Symposium on Multimedia. 369-375.
Motlicek, P., Ullal V.., & Hermansky H. (2007).  Wide-Band Perceptual Audio Coding Based on Frequency-Domain Linear Prediction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 1, 265-268.
Lei, H., & Mirghafori N. (2007).  Word-Conditioned HMM Supervectors for Speaker Recognition. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 746-749.
Lei, H., & Mirghafori N. (2007).  Word-Conditioned Phone N-Grams for Speaker Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 253-256.
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S. J., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
2006
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Anguera, X., Wooters C., & Hernando J. (2006).  Automatic Cluster Complexity and Quantity Selection: Towards Robust Speaker Diarization. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 248-256.
Holmberg, M., Gelbart D., & Hemmert W. (2006).  Automatic Speech Recognition with an Adaptation Model Motivated by Auditory Processing. IEEE Transactions on Speech and Audio Processing. 14(1), 44-49.
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.
Mok, E., & Bryant J. (2006).  A Best-Fit Approach to Productive Omission of Arguments.
Pang, R., Paxson V., Sommer R., & Peterson L. (2006).  binpac: A yacc for Writing Application Protocol Parsers. Proceedings of the Internet Measurement Conference 2006 (IMC 2006). 289-300.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Marchini, J., Cutler D., Patterson N., Stephens M., Eskin E., Halperin E., et al. (2006).  A Comparison of Phasing Algorithms for Trios and Unrelated Individuals. American Journal of Human Genetics. 78(3), 437-450.
Mok, E., & Chang N. (2006).  Contextual Bootstrapping for Grammar Learning.
Stolcke, A., Grezl F., Hwang M-Y., Lei X., Morgan N., & Vergyri D. (2006).  Cross-Domain and Cross-Language Portability of Acoustic Features Estimated by Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 321-324.
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2006).  The Design and Implementation of a Declarative Sensor Network System.
Kohler, E., Handley M., & Floyd S. (2006).  Designing DCCP: Congestion Control Without Reliability. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 27-38.
Petrov, S., Faria A., Michaillat P., Berg A., Stolcke A., Klein D., et al. (2006).  Detecting Categories in News Video Using Acoustic, Speech, and Image Features.
Pang, R., Allman M., Paxson V., & Lee J. (2006).  The Devil and Packet Trace Anonymization. Computer Communication Review. 36(1), 29-38.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Zheng, C., Shen G., Li S., & Shenker S. J. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Pal, J. (2006).  Early-stage practicalities of implementing computer aided education: Experience from India.

Pages