Publications

Found 62 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Feldman, J. (1971).  A Way of Looking at Things.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Allman, M. (2000).  A Web Server's View of the Transport Layer.
Al-Qudah, Z., Rabinovich M., & Allman M. (2010).  Web Timeouts and Their Implications.
Bansal, M., & Klein D. (2011).  Web-Scale Features for Full-Scale Parsing. 693-702.
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
d'Amore, F., Marchetti-Spaccamela A., & Nanni U. (1992).  The Weighted List Update Problem and the Lazy Adversary.
Yang, J., Chow Y-L., Re C., & Mahoney M. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Leen, T. K., & Moody J. (1993).  Weight-Space Probability Densities and Equilibria in Stochastic Learning.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Fillmore, L. Wong, & Fillmore C. J. (2013).  What Does Text Complexity Mean for English Learners and Language Minority Students?. 1-11.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
Feldman, J. (1989).  What Lies Ahead.
Allman, M. (2008).  What Ought a Program Committee to Do?.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Miller, B.., Pearce P., Grier C., Kreibich C., & Paxson V. (2011).  What's Clicking What? Techniques and Innovations of Today's Clickbots. 164-183.
Morgan, N. (2002).  What's New in Government-Sponsored Speech Recognition Research. Speech Technology Magazine. 7,
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.

Pages