Publications

Found 257 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is Z  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2016).  The Deforestation of L2.
Zhang, N., Farrell R., Iandola F., & Darrell T. (2013).  Deformable Part Descriptors for Fine-Grained Recognition and Attribute Prediction.
Verma, D. C., Zhang H., & Ferrari D. (1991).  Delay Jitter Control for Real-Time Communication in a Packet Switching Network.
Zaharia, M., Borthakur D., Sarma J. Sen, Elmeleegy K., Shenker S. J., & Stoica I. (2010).  Delay Scheduling: A Simple Technique for Achieving Locality and Fairness in Cluster Scheduling. 265-278.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Voisard, A., & Ziekow H. (2010).  Designing Sensor-Based Event Processing Infrastructures.
Voisard, A., & Ziekow H. (2009).  Designing Sensor-Based Event Processing Infrastructures: A Tradeoff Analysis.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Zaharia, M., Das T., Li H., Hunter T., Shenker S. J., & Stoica I. (2012).  Discretized Streams: A Fault-Tolerant Model for Scalable Stream Processing.
Zaharia, M., Das T., Li H., Shenker S. J., & Stoica I. (2012).  Discretized Streams: An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters. 1-6.
Buchholz, S., Göbel S., Schill A., & Ziegert T. (2001).  Dissemination of Mutable Sets of Web Objects.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Zheng, C., Shen G., Li S., & Shenker S. J. (2006).  Distributed Segment Tree: Support Range Query and Cover Query over DHT. Proceedings of the Fifth International Workshop on Peer-to-Peer Systems (IPTPS).
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters.
Gergen, S., Zeiler S., Abdelaziz A. Hussen, Nickel R., & Kolossa D. (2016).  Dynamic Stream Weighting for Turbo-Decoding-Based Audiovisual ASR. Proceedings of Interspeech 2016.
E
Brockhoff, D.., Friedrich T., Hebbinghaus N., Klein C.., Neumann F., & Zitzler E.. (2009).  On the Effects of Adding Objectives to Plateau Functions. IEEE Transactions on Evolutionary Computation. 13(3), 591-603.
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Breslau, L., Knightly E. W., Shenker S. J., Stoica I., & Zhang H. (2000).  Endpoint Admission Control: Architectural Issues and Performance. Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.

Pages