Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Sommer, R., & Paxson V. (2005).  Exploiting Independent State For Network Intrusion Detection. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
Hakkani-Tür, D., Tur G., & Levit M. (2007).  Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Fountoulakis, K., Chen X., Shun J., Roosta-Khorasani F., & Mahoney M. (2016).  Exploiting Optimization for Local Graph Clustering.
Ziekow, H. (2009).  Exploiting Process Knowledge for Event Processing in Distributed Business Applications. 277-281.
Harchol-Balter, M., & Downey A. B. (1995).  Exploiting Process Lifetime Distributions for Dynamic Load Balancing.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Shastri, L. (1997).  Exploiting Temporal Binding to Learn Relational Rules Within a Connectionist Network.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
Vergyri, D., Stolcke A., & Tur G. (2009).  Exploiting User Feedback for Language Model Adaptation in Meeting Recognition. 4737-4740.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
de Melo, G. (2012).  Exploiting Web Data Sources for Advanced NLP.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Afroz, S., Tschantz M. Carl, Sajid S., Qazi S. Asif, Javed M., & Paxson V. (2018).  Exploring Server-side Blocking of Regions.
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Amann, J., & Sommer R. (2016).  Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement. Proceedings of Passive and Active Measurement Conference (PAM).
Grigoriev, D. Yu., Karpinski M., & Yao A. C. (1995).  An Exponential Lower Bound on the Size of Algebraic Decision Trees for MAX.
Hasegawa, Y., Lee-Goldman R., Ohara K. Hirose, Fujii S., & Fillmore C. J. (2010).  On Expressing Measurement and Comparison in Japanese and English. 169-198.
Shastri, L. (2000).  An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge. Behavioral and Brain Sciences. 23(4), 492-493.
Shastri, L. (2000).  An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge.
Bailey, D. R., Chang N., Narayanan S., & Feldman J. (1998).  Extending Embodied Lexical Development. Proceedings of 20th Cognitive Science Society Conference. 84-90.

Pages