| Enriching Speech Recognition with Automatic Detection of Sentence Boundaries and Disfluencies | Y. Liu, E. Shriberg, A. Stolcke, D. Hillard, M. Ostendorf, and M. Harper | IEEE Transactions on Audio, Speech and Language Processing, Vol. 14, Issue 5, pp. 1526-1540 | September 2006 | Speech | [PDF]
|
| Automatic Disfluency Identification in Conversational Speech Using Multiple Knowledge Sources | Y. Liu, E. Shriberg, and A. Stolcke | Proceedings of EUROSPEECH 2003, Geneva | September 2003 | Speech | [PDF]
|
| A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech | Y. Liu, N.V. Chawla, M.P. Harper, E. Shriberg, and A. Stolcke | Computer Speech and Language, Vol. 20, Issue 4, pp. 468-494 | October 2006 | Speech | [PDF]
|
| Improving the Usability of MedSLT: Back-Translation and the Help System (in Japanese) | Y. Nakao, M. Rayner, N. Chatzichrisafis, K. Kanzaki, P. Bouillon, B.A. Hockey, and H. Isahara | Proceedings of the 12th Annual Meeting of the Japanese Society for Natural Language Processing (NLP2006), Tokyo, Japan | March 2006 | Speech | |
| A Semantics-Based Decision Theory Region Analyser | Y. Yakimovsky and J.A. Feldman | Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI 1973), Stanford, California, pp. 580-588 | August 1973 | AI | |
| Detecting Backdoors | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| Detecting Stepping Stones | Y. Zhang and V. Paxson | Proceedings of the Ninth USENIX Security Symposium, August 2000. | August 2000 | Networking | |
| On the Characteristics and Origins of Internet Flow Rates | Y. Zhang, L. Breslau, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM, August 2002. | 2002 | Networking | |
| On the Constancy of Internet Path Properties | Y. Zhang, N. Duffield, V. Paxson, and S. Shenker | Proceedings of ACM SIGCOMM Internet Measurement Workshop, November 2001. | November 2001 | Networking | |
| The Stationarity of Internet Path Properties: Routing, Loss, and Throughput | Y. Zhang, V. Paxson, and S. Shenker | ACIRI Technical Report, May 2000. | May 2000 | Networking | |
| Geographic Routing Made Practical | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005), Boston, Massachusetts, pp. 217-230 | May 2005 | Networking | [PDF]
|
| On the Pitfalls of Geographic Face Routing | Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker | Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cologne, Germany, pp. 34-43 | September 2005 | Networking | [PDF]
|
| Efficient Application Placement in a Dynamic Hosting Platform | Z. Al-Qudah, H. Alzoubi, M. Allman, M. Rabinovich, and V. Liberatore | Proceedings of the 18th International World Wide Web Conference (WWW 2009), Madrid, Spain, pp. 281-290 | April 2009 | Networking | [PDF]
|
| Web Timeouts and Their Implications | Z. Al-Qudah, M. Rabinovich, and M. Allman | Proceedings of the 11th Passive and Active Measurement Conference (PAM 2010), Zurich, Switzerland | April 2010 | Networking | [PDF]
|
| Automating Analysis of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | Proceedings of the ACM Symposium on Information, Computer, and Communication Security (ASIACCS 2009), Sydney, Australia, pp. 11-22 | March 2009 | Networking | [PDF]
|
| Towards Situational Awareness of Large-Scale Botnet Probing Events | Z. Li, A. Goyal, Y. Chen, and V. Paxson | IEEE Transactions on Information Forensics and Security, Vol. 6, No. 1, pp. 175-188 | March 2011 | Networking | [PDF]
|
| Toward Large-Scale Face Recognition Using Social Network Context | Z. Stone, T. Zickler, and T. Darrell | Proceedings of the IEEE, Vol. 98, Issue 8, pp. 1408-1415 | August 2010 | Vision | [PDF]
|
| A Case for FAME: FPGA Architecture Model Execution | Z. Tan, A. Waterman, H. Cook, S. Bird, K. Asanović, and D. Patterson | Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), Saint-Malo, France, pp. 290-301 | June 2010 | Architecture | [PDF]
|
| RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors | Z. Tan, A. Waterman, R. Avizienis, Y. Lee, H. Cook, D. Patterson, and K. Asanović | Proceedings of the 47th Design Automation Conference (DAC 2010), Anaheim, California | June 2010 | Architecture | [PDF]
|
| An FPGA Host-Multithreaded Functional Model for SPARC v8 | Z. Tan, K. Asanović and D. A. Patterson | Proceedings of the Workshop on Architectural Prototyping at the International Symposium on Computer Architecture, Beijing, China | June 2008 | Architecture | [PDF]
|
| An FPGA-Based Simulator for Datacenter Networks | Z. Tan, K. Asanovic, and D. Patterson | Presented at the Exascale Evaluation and Research Techniques Workshop, Pittsburgh, Pennsylvania | March 2010 | Architecture | |
| Datacenter-Scale Network Research on FPGAs | Z. Tan, K. Asanovic, and D. Patterson | Proceedings of the Exascale Evaluation and Research Techniques Workshop (EXERT 2011) at the 16th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2011), Newport Beach, California | March 2011 | Architecture | [PDF]
|
| CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping | Z. Wang, F. Hormozdiari, W.-Y. Yang, E. Halperin, and E. Eskin | Proceedings of the 16th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2012), Barcelona, Spain, pp. 326-340 | April 2012 | Algorithms | |
| Route Flap Dampening Exacerbates Internet Routing Convergence | Z.M. Mao, R. Govindan, G. Varghese, and R. Katz | Proceedings of the ACM SIGCOMM 2002. | 2002 | Networking | |