Publications

Found 4139 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
W
Weaver, N., Kreibich C., & Paxson V. (2010).  Measuring Access Connectivity Characteristics with Netalyzr.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Weaver, N. (2010).  Unencumbered by Success: The Usenix Security Grand Challenge Competition.
Weaver, N. (2009).  Peer to Peer Edge Caches Should Be Free.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  Large Scale Malicious Code: A Research Agenda.
Weaver, N., Staniford S., & Paxson V. (2007).  Very Fast Containment of Scanning Worms, Revisited. 113-145.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1995).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. Proceedings of the Advances in Neural Information Processing Systems 8 Conference (NIPS 8). 619-625.
Wawrzynek, J., Asanović K., Kingsbury B., Beck J., Johnson D., & Morgan N. (1996).  SPERT-II: A Vector Microprocessor System and Its Application to Large Problems in Backpropagation Training. IEEE Computer. 29(3), 79-86.
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Waterman, A. (2011).  Improving Energy Efficiency and Reducing Code Size with RISC-V Compressed.
Waterman, A., Lee Y., Patterson D., & Asanović K. (2011).  The RISC-V Instruction Set Manual, Volume I: Base User-Level ISA.
Warren, W. (2001).  Global Posterior Probability Estimates as Confidence Measures in an Automatic Speech Recognition System. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Warren, W. (2000).  Global Posterior Probability Estimates as Decision Confidence Measures in an Automatic Speech Recognition System.
Wang, J., Geesman G. J., Hostikka S. Liisa, Atallah M., Blackwell B., Lee E., et al. (2011).  Inhibition of Activated Pericentromeric SINE/Alu Repeat Transcription in Senescent Human Adult Stem Cells Reinstates Self-Renewal. Cell Cycle. 10(17), 3016-3030.
Wang, D., Rao S., & Mahoney M. W. (2015).  Unified Acceleration Method for Packing and Covering Problems via Diameter Reduction. Proceedings of the 43rd ICALP Conference.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Wang, P. Chuan, Miller S., Fritz M., Darrell T., & Abbeel P. (2011).  Perception for the Manipulation of Socks. 4877-4884.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Wang, H.., Gelbart D., Hirsch H-G., & Hemmert W. (2008).  The Value of Auditory Offset Adaptation and Appropriate Acoustic Modeling. 902-905.
Wang, R., Li Y., Mahoney M. W., & Darve E. (2015).  Structured Block Basis Factorization for Scalable Kernel Matrix Evaluation.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,

Pages