Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Kirkpatrick, B. (2010).  Haplotypes versus Genotypes on Pedigrees. 136-147.
Feigenbaum, J., Krishnamurthy A., Sami R., & Shenker S. J. (2002).  Hardness Results for Multicast Cost Sharing. Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2002). 133-144.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Vinyals, O., & Friedland G. (2008).  A Hardware-Independent Fast Logarithm Approximation with Adjustable Accuracy. 61-65.
Dong, Z.., Yao Z.., Gholami A.., Mahoney M., & Keutzer K.. (2019).  HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision. Proceedings of ICCV 2019.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.
Jia, Y., & Darrell T. (2011).  Heavy-Tailed Distances for Gradient Based Image Descriptors.
Martin, C.. H., & Mahoney M. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Al-Fares, M.., Radhakrishnan S., Raghavan B., Huang N.., & Vahdat A. (2010).  Hedera: Dynamic Flow Scheduling for Data Center Networks.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Akhawe, D., Amann J., Vallentin M., & Sommer R. (2013).  Here's My Cert, So Trust Me, Maybe? Understanding TLS Errors on the Web.
Yao, Z.., Gholami A.., Lei Q.., Keutzer K.., & Mahoney M. (2018).  Hessian-based Analysis of Large Batch Training and Robustness to Adversaries. Proceedings of the 2018 NeurIPS Conference. 4954-4964.
Coja-Oghlan, A.., Krumke S.. O., & Nierhoff T. (2003).  A Heuristic for the Stacker Crane Problem on Trees Which is Almost Surely Exact. Algorithms and Computation, 14th International Symposium, ISAAC 2003, LNCS 2906. 605-614.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2005).  Hidden-Action in Multi-Hop Routing. Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05). 117-126.
Valente, F., Magimai-Doss M., Plahl C., & Ravuri S. (2009).  Hierarchical Processing of the Modulation Spectrum for GALE Mandarin LVCSR System. 2963-2966.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.
Sivadas, S., & Hermansky H. (2002).  Hierarchical Tandem Feature Extraction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Qazi, Z. Ayyub, Walls M., Panda A., Sekar V., Ratnasamy S., & Shenker S. J. (2017).  A High Performance Packet Core for Next Generation Cellular Networks.. Proceedings of the Conference of the ACM Special Interest Group on Data Communication SIGNCOMM '17.
Pang, R., & Paxson V. (2003).  A High-level Programming Environment for Packet Trace Anonymization and Transformation. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2003).
Ziekow, H., Fabian B., & Müller C. (2009).  High-Speed Access to RFID Data: Meeting Real-Time Requirements in Distributed Value Chains. 142-151.
Gelbart, D., Morgan N., & Tsymbal A.. (2009).  Hill-Climbing Feature Selection for Multi-Stream ASR. 2967-2970.
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.

Pages