Publications

Found 541 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
N
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. J. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Shenker, S. J., & Wroclawski J. (1997).  Network Element Service Specification Template.
Hellerstein, J. M., Paxson V., Peterson L., Roscoe T., Shenker S. J., & Wetherall D. (2005).  The Network Oracle. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering. 28(1), 3-10.
Tangmunarunkit, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Network Topology Generators: Degree-Based vs. Structural. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 147-159.
Robinson, A.., Almeida L.., Boite J.., Bourlard H., Fallside F., Hochberg H.., et al. (1993).  A Neural Network Based, Speaker Independent, Large Vocabulary, Continuous Speech Recognition System: the Wernicke Project. Proceedings of the Third European Conference on Speech Communication and Technology (Eurospeech '93). 1941-1944.
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  A New Perspective on Efficient and Dependable Vehicle Routing. 388-391.
N. Erichson, B., Taylor D., Wu Q., & Mahoney M. (2021).  Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware. Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
Wundsam, A., & Yu M. (2012).  NOSIX: A Portable Switch Interface for the Network Operating System.
Fosler-Lussier, E., & Williams G. (1999).  Not Just What, But Also When: Guided Automatic Pronunciation Modeling for Broadcast News. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
Mirghafori, N., & Wooters C. (2006).  Nuts and Flakes: A Study of Data Characteristics in Speaker Diarization. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1017-1020.
O
Friedland, G., Jantz K., Lenz T., Wiesel F., & Rojas R. (2007).  Object Cut and Paste in Images and Videos. International Journal of Semantic Computing. 1(2), 221-247.
Chu, M., Weaver N., Sulimma K., DeHon A., & Wawrzynek J. (1998).  Object Oriented Circuit Generators in Java. Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
Chu, M., Weaver N., Sulimma K., DeHon A., & Wawrzynek J. (1998).  Object Oriented Circuit Generators in Java. Proceedings of the IEEE Symposium on Field Programmable Custom Computing Machines (FCCM).
Joseph, D.., Kannan J., Kubota A.., Lakshminarayanan K., Stoica I., & Wehrle K.. (2006).  OCALA: An Architecture for Supporting Legacy Applications Over Overlays. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 267-280.
Ostrovsky, R., & Wigderson A. (1993).  One-Way Functions Are Essential for Non-Trivial Zero-Knowledge.
Räcke, H., Sohler C., & Westermann M. (2002).  Online Scheduling for Sorting Buffers.
Callejo, P., Kelton C., Vallina-Rodriguez N., Cuevas R., Gasser O., Kreibich C., et al. (2017).  Opportunities and Challenges of Ad-based Measurements from the Edge of the Network. Proceedings of HotNets 2017.
Shenker, S. J., & Weinrib A. (1989).  The Optimal Control of Heterogeneous Queuing Systems: A Paradigm for Load-Sharing and Routing. IEEE Transactions of Computers. 38(12), 1724-1735.
der Heide, F. Meyer auf, Storch M., & Wanka R. (1996).  Optimal Trade-Offs Between Size and Slowdown for Universal Parallel Networks.
Moody, J., & Wu L. (1997).  Optimization of Trading Systems and Portfolios.
Doerr, B., Jansen T., Sudholt D., Winzen C., & Zarges C. (2010).  Optimizing Monotone Functions Can Be Difficult. 42-51.
Chen, Q.., Chang H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  The Origin of Power Laws in Internet Topologies Revisited. Proceedings of the Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 608-617.
Chen, Q.., Chang H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  The Origin of Power-Laws in Internet Topologies Revisited.
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).

Pages