Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Paxson, V. (1997).  End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking. 5(5), 601-615.
Paxson, V., Allman M., Chu J., & Sargent M. (2011).  Computing TCP's Retransmission Timer.
Paxson, V. (1998).  On Calibrating Measurements of Packet Transit Times. Proceedings of the International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '98). 11-21.
Paxson, V. (2018).  ICSI & The "Bro" Project. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Paxson, V. (1990).  A Survey of Support for Implementing Debuggers.
Paxson, V. (1997).  Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic. Computer Communication Review. 27(5), 5-18.
Paxson, V. (2001).  An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks. 31(3), 
Paxson, V., Adams A. K., & Mathis M. (2000).  Experiences with NIMI. Proceedings of the Passive & Active Measurement (PAM 2000).
Paxson, V., Allman M., Dawson S.., Fenner W.., Griner J., Heavens I.., et al. (1999).  Known TCP Implementation Problems.
Paxson, V., & Allman M. (2000).  Computing TCP's Retransmission Timer.
Paxson, V. (1998).  Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium.
Paxson, V., & Saltmarsh C.. (1993).  Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. Proceedings of the 1993 Winter USENIX Technical Conference.
Paxson, V. (1994).  Growth Trends in Wide-Area TCP Connections. IEEE Network. 8-17.
Pe'er, I., Pupko T., Shamir R., & Sharan R. (2004).  Incomplete Directed Perfect Phylogeny. SIAM Journal on Computing. 33(3), 590-607.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
Pelaez-Moreno, C.., Zhu Q., Chen B. Y., & Morgan N. (2005).  Automatic Data Selection for MLP-Based Feature Extraction for ASR. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 229-232.
Pellegrini, M. (1993).  Repetitive Hidden-Surface-Removal for Polyhedra.
Pellegrini, M. (1993).  Building Convex Space Partitions Induced by Pairwise Interior-Disjoint Simplices.
Pellegrini, M. (1992).  A New Algorithm for Counting Circular Arc Intersections.
Pellegrini, M. (1993).  On Lines Missing Polyhedral Sets in 3-Space.
Peng, X., Hoffman J., Yu S. X., & Saenko K. (2016).  Fine-to-Coarse Knowledge Transfer for Low-Res Image Classification. Proceedings of International Conference on Image Processing.
Perfors, A., Tenenbaum J., & Regier T. (2006).  Poverty of the Stimulus? A Rational Approach. Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
Perona, P. (1990).  Finite Representations of Deformable Functions.
Peskin, B., Navratil J., Abramson J., Jones D., Klusacek D., Reynolds D., et al. (2003).  Using Prosodic and Conversational Features for High-Performance Speaker Recognition: Report From JHU WS'02.. Proceedings of ICASSP-2003.

Pages