Publications

Found 1886 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Ermolinskiy, A., & Shenker S. J. (2011).  Design and Implementation of a Hypervisor-Based Platform for Dynamic Information Flow Tracking in a Distributed Environment.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2003).  Design Guidelines for Robust Internet Protocols. 33(1), 125-130.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2003).  Design Guidelines for Robust Internet Protocols. 33(1), 125-130.
Schröder-Preikschat, W. (1993).  Design Principles of Parallel Operating Systems: ?A PEACE Case Study?.
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2012).  Designing Chip-Level Nanophotonic Interconnection Networks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2(2), 137-153.
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2012).  Designing Chip-Level Nanophotonic Interconnection Networks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 2(2), 137-153.
Batten, C., Joshi A., Stojanovic V., & Asanović K. (2013).  Designing Chip-Level Nanophotonic Interconnection Networks.
Beamer, S., Asanović K., Batten C., Joshi A., & Stojanovic V. (2009).  Designing Multi-Socket Systems Using Silicon Photonics. 521-522.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Stojanovic, V., Joshi A., Batten C., Kwon Y-J., Beamer S., Chen S.., et al. (2010).  A Design-Space Exploration for CMOS Photonic Processor Networks.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Petrov, S., Faria A., Michaillat P., Berg A., Stolcke A., Klein D., et al. (2006).  Detecting Categories in News Video Using Acoustic, Speech, and Image Features.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.

Pages