Publications

Found 541 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Regier, T., Corrigan B.., Cabasaan R.., Woodward A.., Gasser M.., & Smith L.. (2001).  The Emergence of Words. Proceedings of the 23rd Annual Conference of the Cognitive Science Society (CogSci 2001). 815-820.
Chang, S., Greenberg S., & Wester M. (2001).  An Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Gillick, D., Wegmann S., & Gillick L. (2012).  Discriminative Training for Speech Recognition is Compensating for Statistical Dependence on the HMM Framework. 4745-4748.
Morgan, N., Wu S-L., & Bourlard H. (1995).  Digit Recognition with Stochastic Perceptual Models. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Morgan, N., Hermansky H., Bourlard H., Kohn P., & Wooters C. (1991).  Continuous Speech Recognition Using PLP Analysis with Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing. 49-52.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).

Pages