| Virtualizing the Network Forwarding Plane | M. Casado, T. Koponen, R. Ramanathan, and S. Shenker | Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow (PRESTO 2010), Philadelphia, Pennsylvania | December 2010 | Networking | [PDF]
|
| Hot Data Centers vs. Cool Peers | S. Nedevschi, S. Ratnasamy, and J. Padhye | Proceedings of the Workshop on Power Aware Computing and Systems (HotPower '09), Big Sky, Montana, p. 8 | October 2009 | Networking | [PDF]
|
| NS-3 Project Goals | T. Henderson, S. Roy, S. Floyd, and G. Riley | Proceedings of the Workshop on NS-2 (WNS2 2006), Pisa, Italy, article 13 | October 2006 | Networking | [PDF]
|
| Advancing Embodied Theories of Language | J. Feldman | Proceedings of the Workshop on Neurobiology of Embodied Language (NOEL), Bielefeld, Germany | October 2011 | AI | |
| Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce | J. Hendrik Boese, A. Andrzejak, and M. Hoegqvist | Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010), Raleigh, North Carolina, Article No. 3 | April 2010 | Networking | |
| Precedes: A Semantic Relation in FrameNet | M. R. L. Petruck and G. de Melo | Proceedings of the Workshop on Language Resources for Public Security Applications at the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey, pp.45-49 | May 2012 | AI | [PDF]
|
| Ontology-Based Reasoning about Lexical Resources | J. Scheffczyk, C. F. Baker, and S. Narayanan | Proceedings of the Workshop on Interfacing Ontologies and Lexical Resources for Semantic Web Technologies (OntoLex 2006), Genoa, Italy, pp. 1-8 | May 2006 | AI | |
| A Scalable Global Model for Summarization | D. Gillick and B. Favre | Proceedings of the Workshop on Integer Linear Programming for Natural Language Processing at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2009), Boulder, Colorado, pp. 10-18 | June 2009 | Speech | [PDF]
|
| Exploiting Process Knowledge for Event Processing in Distributed Business Applications | H. Ziekow | Proceedings of the Workshop on Information System in Distributed Environment (ISDE 2009) at the OnTheMove Federated Conferences and Workshops (OTM '09), Vilamoura, Portugal, pp. 277-281 | November 2009 | Other | |
| Logically Centralized? State Distribution Tradeoffs in Software Defined Networks | D. Levin, A. Wundsam, B. Heller, N. Handigol, and A. Feldmann | Proceedings of the Workshop on Hot Topics in Software Defined Networks (HotSDN '12) at ACM SIGCOMM 2012, Helsinki, Finland | August 2012 | Networking | [PDF]
|
| SpeechCorder, The Portable Meeting Recorder | A. Janin and N. Morgan | Proceedings of the Workshop on Hands-Free Speech Communication, Kyoto, Japan | April 2001 | Speech | [PDF]
|
| Competitive Cyber-Insurance and Internet Security | N. Shetty, G. Schwartz. M. Felegyhazi, and J. Walrand | Proceedings of the Workshop on Economics of Information Security (WEIS 2009), London, United Kingdom | June 2009 | Networking | [PDF]
|
| Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia | G. Schryen | Proceedings of the Workshop on e-Business (WEB 2008), Paris, France, pp. 37-50 | December 2008 | Networking | [PDF]
|
| Combining Bottom-Up and Top-Down Constraints for Robust ASR: The Multiscore Decoder | J. Barker, M. Cooke, and D. Ellis | Proceedings of the Workshop on Consistent and Reliable Acoustic Cues (CRAC-2001), Aalborg, Denmark | September 2001 | Speech | |
| Corpus-Driven Metaphor Harvesting | A. Reining and B. Lönneker-Rodman | Proceedings of the Workshop on Computational Approaches to Figurative Language, Rochester, New York, pp. 5-12 | April 2007 | AI | [PDF]
|
| The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers | J. A. Edwards | Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004), pp. 8-11 | May 2004 | Speech | [PDF]
|
| The MASC/MultiMASC Community Collaboration Project: Why You Should Be Involved and How | N. Ide, C. Baker, C. Fellbaum, and R. Passonneau | Proceedings of the Workshop on Collaborative Resource Development and Delivery at the 8th Conference on International Language Resources and Evaluation (LREC 2012), Istanbul, Turkey | May 2012 | AI | |
| An FPGA Host-Multithreaded Functional Model for SPARC v8 | Z. Tan, K. Asanović and D. A. Patterson | Proceedings of the Workshop on Architectural Prototyping at the International Symposium on Computer Architecture, Beijing, China | June 2008 | Architecture | [PDF]
|
| Towards Engineering a Location-Aware Wireless Multi-Agent System | I. Nieto-Cavajal, P. M. Ruiz, J.A. Botia, and A.F. Gomez-Skarmeta | Proceedings of the Workshop on Applications of Software Agents in Engineering at the 16th European Conference on Artificial Intelligence (ECAI 2004), Valencia, Spain | August 2004 | Networking | |
| Quasirandom Rumor Spreading: An Experimental Analysis | B. Doerr, T. Friedrich, M. Künneman, and T. Sauerwald | Proceedings of the Workshop on Algorithm Engineering and Experiments (ALENEX09), New York, New York, pp. 145-153 | January 2009 | Algorithms | [PDF]
|
| Development of a Test Collection for Studying Long-Term User Modelling | F. Hopfgartner and J. M. Jose | Proceedings of the Workshop Information Retrieval (LWA'11), Magdeburg, Germany | September 2011 | AI | |
| Towards Subband-Based Speech Recognition | H. Bourlard, S. Dupont, H. Hermansky, and N. Morgan | Proceedings of the VIII European Signal Processing Conference (EUSIPCO '96), Trieste, Italy, pp. 1579-1582 | 1996 | Speech | |
| Metodo de Eliminacion de Reenvios Basado en Contador y Adaptable a la Movilidad para Reducir la Sobrecarga de Datos al Encaminar | C.M. Yago, P. M. Ruiz, and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Aproximacion de Arboles Multicast Optimos en Redes Ad Hoc Inalambricas | P.M. Ruiz and A.F. Gomez Skarmeta | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Redes Ad hoc, Comunicaciones Multimedia y Control de Acceso en el Marco del Proyecto SAM | A.F. Gomez Skarmeta and P.M. Ruiz | Proceedings of the V Jornadas de Ingenieria Telematica, Vigo, Spain | September 2005 | Networking | |
| Hedera: Dynamic Flow Scheduling for Data Center Networks | M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat | Proceedings of the USENIX/ACM SIGCOMM Symposium on Networked Systems Design and Implementation (NSDI), San Jose, California | April 2010 | Networking | [PDF]
|
| On Controller Performance in Software-Defined Networks | A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood | Proceedings of the USENIX NSDI Workshop on Hot Topics in Management of Internet, Cloud, and Enterprise Networks and Services (Hot-ICE), San Jose, California | April 2012 | Networking | [PDF]
|
| Brooery: A Graphical Environment for Analysis of Security-Relevant Network Activity | C. Kreibich | Proceedings of the USENIX Annual Technical Conference, FREENIX Track (USENIX '05 FREENIX), Annaheim, California, pp. 109-118 | April 2005 | Networking | [PDF]
|
| Diverse Replication for Single-Machine Byzantine-Fault Tolerance | B.-C. Chun, P. Maniatis, and S. Shenker | Proceedings of the USENIX Annual Technical Conference, Boston, Massachusetts, pp. 287-292 | June 2008 | Networking | [PDF]
|
| Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems | L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica | Proceedings of the USENIX Annual Technical Conference (ATC), Boston, MA | June 2012 | Networking | [PDF]
|
| Integrality Ratio for Group Steiner Trees and Directed Steiner Trees | E. Halperin, G. Kortsarz, R. Krauthgamer, A. Srinivasan, and N. Wang | Proceedings of the Twelfth Symposium on Discrete Algorithms (SODA), 275-284 | 2003 | Algorithms | |
| Spectro-temporal Gabor Features as a Front End for Automatic Speech Recognition | M. Kleinschmidt | Proceedings of the Triennial Forum Acusticum 2002, Seville, Spain | September 2002 | Speech | [PDF]
|
| Refinement of Observations Under Budget Constraints in Active Learning | N. Cebron | Proceedings of the Towards Closing the Loop: Active Learning for Robotics Workshop at the 2010 Robotics: Science and Systems Conference (RSS 2010), Zaragoza, Spain | June 2010 | Vision | [PDF]
|
| On the Complexity of Unsatisfiability Proofs for Random k-CNF Formulas | P. Beame, R.M. Karp, T. Pitassi, and M. Saks | Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing. May 1998. New York, New York, USA: ACM, 1998. p. 561-71. | May 1998 | Algorithms | |
| Approximation Algorithms for Data Management in Networks | C. Krick, H. Racke, and M. Westermann | Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA) pp. 237-246, 2001. | 2001 | Algorithms | |
| Gatekeeper: Supporting Bandwidth Guarantees for Multi-Tenant Datacenter Networks | H. Rodrigues, J.R. Santos, Y. Turner, P. Soares, and D. Guedes | Proceedings of the Third Workshop on I/O Virtualization (WIOV '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Providing Packet Obituaries | K. Argyraki, P. Maniatis, D. Cheriton, and Scott Shenker | Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III), San Diego, California | November 2004 | Networking | [PDF]
|
| Towards an Economic Analysis of Trusted Systems (Position Paper) | D. Bergemann, J. Feigenbaum, S. Shenker, and J. M. Smith | Proceedings of the Third Workshop on Economics and Information Security, Minneapolis, Minnesota | May 2004 | Networking | [PDF]
|
| Idetifying Blocks and Sub-Populations in Noisy SNP Data | G. Kimmel, R. Sharan, and R. Shamir | Proceedings of the Third Workshop on Algorithms in Bioinformatics (WABI'03), pp. 303-319 | 2003 | Algorithms | |
| A generalization of binary search | R. M. Karp. Edited by: F. Dehne, J.R. Sack, N. Santoro, and S. Whitesides | Proceedings of the Third Workshop on Algorithms and Data Structures (WADS'93), Montreal, Quebec, Canada, pp. 27-34 | August 1993 | Algorithms | |
| Insights from the Inside: A View of Botnet Management from Infiltration | C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| On the Potential of Proactive Domain Blacklisting | M. Felegyhazi, C. Kreibich, and V. Paxson | Proceedings of the Third USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET ’10), San Jose, California | April 2010 | Networking | [PDF]
|
| Principles for Developing Comprehensive Network Visibility | M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver | Proceedings of the Third USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, California | July 2008 | Networking | [PDF]
|
| CUDA-Level Performance with Python-Level Productivity for Gaussian Mixture Model Applications | H. Cook, E. Gonina, S. Kamil, G. Friedland, D. Patterson, and A. Fox | Proceedings of the Third USENIX Workshop on Hot Topics in Parallelism (HotPar ’11), Berkeley, California | May 2011 | Speech | [PDF]
|
| The Datacenter Needs an Operating System | M. Zaharia, B. Hindman, A. Konwinski, A. Ghodsi, A. Joseph, R. Katz, S. Shenker, and I. Stoica | Proceedings of the Third USENIX Workshop on Hot Topics in Cloud Computing (Hot Cloud '11), Portland, Oregon | June 2011 | Networking | [PDF]
|
| Practical Data-Centric Storage | C. T. Ee, S. Ratnasamy, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 325-338 | May 2006 | Networking | [PDF]
|
| Distributed Quota Enforcement for Spam Control | M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 281-296 | May 2006 | Networking | [PDF]
|
| OCALA: An Architecture for Supporting Legacy Applications Over Overlays | D. Joseph, J. Kannan, A. Kubota, K. Lakshminarayanan, I. Stoica, and K. Wehrle | Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006), San Jose, California, pp. 267-280 | May 2006 | Networking | [PDF]
|
| WordNet and FrameNet as Complementary Resources for Annotation | C. F. Baker and C. Fellbaum | Proceedings of the Third Linguistic Annotation Workshop (LAW III), Suntec, Singapore, pp. 125-129 | August 2009 | AI | [PDF]
|
| Speaker Diarization for Multi-Microphone Meetings Using Only Between-Channel Differences | J.M. Pardo, X Anguera, and C. Wooters | Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006), Washington DC, pp. 257-264 | May 2006 | Speech | [PDF]
|