Publications

Found 1074 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Sarolahti, P., Allman M., & Floyd S. (2007).  Determining an Appropriate Sending Rate Over an Underutilized Network Path. 51(7), 1815-1832.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Friedland, G., Yeo C., & Hung H. (2010).  Dialocalizaton: Acoustic Speaker Diarization and Visual Localization as Joint Optimization Problem. ACM Transactions on Multimedia Computing. 6(4), 
Floyd, S., & Paxson V. (2001).  Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking. 9(4), 392-403.
Friedland, G. (2007).  The Digital Hand, Vol 2 - How Computers Changed the Work of the American Financial, Telecommunications, Media, and Entertainment Industries (book review). IEEE Annals of the History of Computing. 29(3), 72-75.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Friedman, E., Young K., Tremper G., Liang J., Landsberg A. S., & Schuff N. (2015).  Directed Network Motifs in Alzheimer’s Disease and Mild Cognitive Impairment. PLoS ONE.
Friedman, E., Young K., Asif D., Jutla I., Liang M., Wilson S., et al. (2014).  Directed Progression Brain Networks in Alzheimer's Disease: Properties and Classification. Brain Connectivity. 4(5), 384-393.
Galley, M., McKeown K. R., Fosler-Lussier E., & Jing H.. (2003).  Discourse Segmentation of Multi-party Conversation. Proceedings of the 41st Annual Meeting of the Association for Computational Linguistics (ACL-03).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
Schnitzspan, P., Fritz M., Roth S., & Schiele B. (2009).  Discriminative Structure Learning of Hierarchical Representations for Object Detection. 2238-2245.
Vinyals, O., Friedland G., & Morgan N. (2010).  Discriminative Training for Hierarchical Clustering in Speaker Diarization. 2326-2329.
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
Ferrari, D., Gupta A., & Ventre G. (1995).  Distributed advance reservation of real-time connections.
Feigenbaum, J., Schapira M., & Shenker S. J. (2007).  Distributed Algorithmic Mechanism Design. 363-384.
Feigenbaum, J., & Shenker S. J. (2002).  Distributed Algorithmic Mechanism Design: Recent Results and Future Directions. Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02). 1-13.
Ferrari, D. (1991).  Distributed Delay Jitter Control in Packet-Switching Internetworks.
Feldman, J. (1979).  A Distributed Information Processing Model of Visual Memory. Proceedings of the Conference on Associative Memory and Parallel Computation.
Feldman, J. (1979).  A Distributed Information Processing Model of Visual Memory.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.

Pages