Publications

Found 541 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Ghodsi, A., Koponen T., Raghavan B., Shenker S. J., Singla A., & Wilcox J. (2011).  Information-Centric Networking: Seeing the Forest for the Trees. 1-6.
Lee, L., Lee JH., Egelman S., & Wagner D. (2016).  Information Disclosure Concerns in The Age of Wearable Computing. Proceedings of the NDSS Workshop on Usable Security (USEC ’16).
Wu, S-L., Kingsbury B., Morgan N., & Greenberg S. (1998).  Incorporating Information from Syllable-length Time Scales into Automatic Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1998). 721-724.
Moody, J., & Wu L. (1996).  Improved Estimates for the Rescaled Range and Hurst Exponents. Proceedings of the Third International Conference on Neural Networks in Financial Engineering. 537-553.
Weaver, N., Kreibich C., Nechaev B., & Paxson V. (2011).  Implications of Netalyzr's DNS Measurements.
Kirchner, M., Winkler P., & Farid H. (2013).  Impeding Forgers at Photo Inception.
Hillard, D., Huang Z.., Ji H., Grishman R., Hakkani-Tür D., Harper M. P., et al. (2006).  Impact of Automatic Comma Prediction on POS/Name Tagging of Speech. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 58-61.
Wooters, C., & Huijbregts M. (2007).  The ICSI RT07s Speaker Diarization System. 509-519.
Janin, A., Ang J., Bhagat S., Dhillon R., Edwards J., Macías-Guarasa J., et al. (2004).  The ICSI Meeting Project: Resources and Research. Proceedings of the ICASSP 2004 Meeting Recognition Workshop.
Janin, A., Ang J., Bhagat S., Dhillon R., Edwards J., Macías-Guarasa J., et al. (2004).  The ICSI Meeting Project: Resources and Research. Proceedings of the ICASSP 2004 Meeting Recognition Workshop.
Janin, A., Baron D., Edwards J., Ellis D. P. W., Gelbart D., Morgan N., et al. (2003).  The ICSI Meeting Corpus. Proceedings of ICASSP-2003.
Anguera, X., Aguilo M., Wooters C., Nadeu C., & Hernando J. (2006).  Hybrid Speech/Non-Speech Detector Applied to Speaker Diarization of Meetings. Proceedings of IEEE Odyssey: The Speaker and Language Recognition Workshop. 1-6.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Qazi, Z. Ayyub, Walls M., Panda A., Sekar V., Ratnasamy S., & Shenker S. J. (2017).  A High Performance Packet Core for Next Generation Cellular Networks.. Proceedings of the Conference of the ACM Special Interest Group on Data Communication SIGNCOMM '17.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Dodge, E., & Wright A. (2002).  Herds of Wildebeest, Flasks of Vodka, Heaps of Trouble: An Embodied Construction Grammar Approach to English Measure Phrases. Proceedings of the 28th Annual Meeting of the Berkeley Linguistics Society.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Weinrib, A., & Shenker S. J. (1988).  Greed is Not Enough: Adaptive Load Sharing in Large Heterogeneous Systems. Proceedings of the Seventh Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM '88). 986-994.

Pages