Publications

Found 223 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multi-Protein Modularity Conserved During Evolution.
Hodgkinson, L., & Mahoney M. (2020).  Multiplicative Noise and Heavy Tails in Stochastic Optimization.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution. IEEE/ACM Transactions on Computational Biology and Bioinformatics.
Hockey, B. Ann, & Rayner M. (2005).  Comparison of Grammar Based and Statistical Language Models Trained on the Same Data.
Hochmuth, C. A., Lässig J., & Thiem S. (2010).  Simulation-Based Evolutionary Optimization of Complex Multi-Location Inventory Models. 703-708.
Hobbs, J.., & Narayanan S. (2003).  Spatial Representation and Reasoning.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of Wireless Communications and Networking Conference (WCNC) 2017.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC).
Hitchcock, L., & Greenberg S. (2001).  Vowel Height is Intimately Associated with Stress Accent in Spontaneous American English Discourse. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Hirsch, H-G. (1993).  Estimation of Noise Spectrum and its Application to SNR-Estimation and Speech Enhancement.
Hirsch, M. D. (1990).  Applications of Topology to Lower Bound Estimates in Computer Science.
Hinze, A., & Voisard A. (2009).  EVA: An EVent Algebra Supporting Adaptivity and Collaboration in Event‐Based Systems.
Hinrichs, T. L., Gude N. S., Casado M., Mitchell J. C., & Shenker S. J. (2009).  Practical Declarative Network Management. 1-10.
Hinds, D.. A., Stuve L.. L., Nilsen G.. B., Halperin E., Eskin E., Ballinger D.. G., et al. (2005).  Whole-Genome Patterns of Common DNA Variation in Three Human Populations. Science. 307(5712), 1072-1079.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center. 1-14.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2010).  Mesos: A Platform for Fine-Grained Resource Sharing in the Data Center.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  Mesos: Flexible Resource Sharing for the Cloud. USENIX ;login:. 36(4), 37-45.
Hindman, B., Konwinski A., Zaharia M., Ghodsi A., Joseph A. D., Shenker S. J., et al. (2009).  Nexus: A Common Substrate for Cluster Computing.
Himanen, P. (2002).  The Hacker Ethic and the Spirit of the Information Age.

Pages