Publications

Found 101 results
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is B  [Clear All Filters]
1998
Paxson, V. (1998).  Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium.
1999
Shastri, L. (1999).  A Biological Grounding of Recruitment Learning and Vicinal Algorithms.
Paxson, V. (1999).  Bro: A System for Detecting Network Intruders in Real-Time. 2435-2463.
Bilmes, J. A. (1999).  Buried Markov Models for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
2002
Feigenbaum, J., Papadimitriou C. H., Sami R., & Shenker S. (2002).  A BGP-Based Mechanism for Lowest-Cost Routing. Proceedings of the 21st ACM Symposium on Principles of Distributed Computing (PODC 2002). 173-182.
Boas, H. C. (2002).  Bilingual FrameNet Dictionaries for Machine Translation. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). IV, 1364-1371.
2004
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes. 99-112.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of ICML 2004.
Ramabhadran, S., Ratnasamy S., Hellerstein J. M., & Shenker S. (2004).  Brief Announcement: Prefix Hash Tree. Proceedings of the 23rd ACM Symposium on Principles of Distributed Computing (PODC 2004). 367.
2005
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 215-219.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Feigenbaum, J., Papadimitriou C. H., Sami R., & Shenker S. (2005).  A BGP-Based Mechanism for Lowest-Cost Routing. Distributed Computing. 18(1), 61-72.
Kreibich, C. (2005).  Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity. Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX). 109-118.
Kornexl, S.., Paxson V., Dreger H., Feldmann A., & Sommer R. (2005).  Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic. Proceedings of the Fifth ACM Conference on Internet Measurement (IMC 2005). 267-272.
2006
Ji, G., & Bilmes J. A. (2006).  Backoff Model Training Using Partially Observed Data: Application to Dialog Act Tagging. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2006). 280-287.

Pages