Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Ben-Dor, A., Karp R. M., Schwikowski B., & Shamir R. (2002).  The Restriction Scaffold Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Tanay, A., Sharan R., Kupiec M., & Shamir R. (2004).  Revealing Modularity and Organization in the Yeast Molecular Network by Integrated Analysis of Highly Heterogeneous Genome-Wide Data. Proceedings of the National Academy of Sciences of the United States of America. 101(9), 2981-2986.
Fosler-Lussier, E. (1996).  On Reversing the Generation Process in Optimality Theory. Proceedings of the 34th Annual Meeting of the Association for Computational Linguistics (ACL-96).
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Ratnasamy, S., Ermolinskiy A., & Shenker S. J. (2006).  Revisiting IP Multicast. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 15-26.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
Raya, M.., Manshaei M.. H., Felegyhazi M., & Hubaux J.-P.. (2008).  Revocation Games in Ephemeral Networks. 199-210.
Tribowski, C., Goebel C., & Günther O. (2009).  RFID Context Data Management: The Missing Link to EPCIS-Based Supply Chain Monitoring.
Ivantysynova, L., Klafft M., Ziekow H., Günther O., & Kara S. (2009).  RFID in Manufacturing: The Investment Decision.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Chaudhuri, K.., Halperin E., Rao S., & Zhou S.. (2007).  A Rigorous Analysis of Population Stratification with Limited Data. 1046-1055.
Vallina-Rodriguez, N., Aucinas A., Almeida M., Grunenberger Y., Papagiannaki K., & Crowcroft J. (2013).  RILAnalyzer: A Comprehensive 3G Monitor On Your Phone.
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Benitez, C.., Burget L., Chen B. Y., Dupont S., Garudadri H., Hermansky H., et al. (2001).  Robust ASR Front-End Using Spectral-Based and Discriminant Features: Experiments on the Aurora Tasks. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001). 429-432.
Yiin-Chang, S., & Morgan N. (2016).  Robust CNN - based Speech Recognition With Gabor Filter Kernels. Proceedings of Interspeech 2016.
Chang, S-Y., & Morgan N. (2014).  Robust CNN-Based Speech Recognition With Gabor Filter Kernels.
Morgan, N. (1997).  Robust Features and Environmental Compensation: A Few Comments. Proceedings of the ESCA Workshop of Robust Speech Recognition. 43-44.
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Anguera, X., Wooters C., & Pardo J. M. (2006).  Robust Speaker Diarization for Meetings: ICSI RT06s evaluation system. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1674-1677.

Pages