Publications
(2010).
A New Speaker Change Detection Method for Two-Speaker Segmentation.
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
(2002).
(1990). Notes on Burst Mitigation for Transport Protocols.
ACM SIGCOMM Computer Communication Review. 35(2), 53-60.
(2005).
(2013).
(2009). Neural Module Networks.
The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 39-48.
(2016).
(1999).
(1999).
Neural Networks for Statistical Inference: Generalizations with Applications to Speech Recognition.
Proceedings of the International Joint Conference on Neural Networks (IJCNN '91).
(1991). Neural Networks for Statistical Inference: Generalizations with Applications to Speech Recognition.
Proceedings of the the International Joint Conference on Neural Networks (IJCNN '91).
(1991). Neural nets and hidden Markov models: Review and Generalizations.
11(2-3), 237-246.
(1992). The Network Block Device.
Linux Journal.
(2000).
(1990).
NetComplex: A Complexity Metric for Network System Designs.
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2008). 393-406.
(2008).
(1990).
(2011).
(1991).
Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). New Techniques for Making Transport Protocols Robust to Corruption-Based Loss.
ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
(2004). No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of 32nd USENIX Security Symposium.
(In Press).
(1997).
(2022). Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware.
Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
(2021). A Note on Optimally Phasing Long Genomic Regions Using Local Haplotype Predictions.
Journal of Bioinformatics and Computational Biology. 4(3), 639-647.
(2006).