Publications
Strange Objects in the Complex Plane.
Journal of Statistical Physics. 443-454.
(1983).
(1993).
(2003).
(2008). Scheduling for Reduced CPU Energy.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
(1994).
(2004). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007). The SFRA: A Corner-Turn FPGA Architecture.
Proceedings of the 12th ACM International Symposium on Field Programmable Gate Arrays (FPGA 2004). 3-12.
(2004). The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention.
Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
(2007).
(2020). SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training.
IEEE Computer. 29(3), 79-86.
(1996). SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training.
Proceedings of the Advances in Neural Information Processing Systems 8 Conference (NIPS 8). 619-625.
(1995). Spatial Transformer for 3D Point Clouds.
IEEE Transactions on Pattern Analysis and Machine Intelligence.
(2021).
(2015).
(1997). Sequence to Sequence - Video to Text.
The IEEE International Conference on Computer Vision (ICCV).
(2015). A Simple and Strongly-Local Flow-Based Method for Cut Improvement.
Proceedings of the 33rd ICML Conference.
(2016).
(1993). Selecting Input Variables via Sensitivity Analysis: Application to Predicting the U.S. Business Cycle.
Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
(1995). Selecting Neural Network Architecture via the Prediction Risk: Application to Corporate Bond Rating Prediction.
Proceedings of the First International Conference on Artificial Intelligence Applications on Wall Street.
(1991).
(1998). Source-Path-Goal: Investigating the Cross-Linguistic Potential of Frame-Semantic Text Analysis.
it - Information Technology. 54(3), 147-152.
(2012). Simultaneous Deep Transfer Across Domains and Tasks.
The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
(2015). SoK: Towards Grounding Censorship Circumvention in Empiricism.
IEEE Symposium on Security and Privacy.
(2016).
(2013).