Publications

Found 541 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
V
Asanović, K., Bodik R., Demmel J., Keaveny T., Keutzer K., Kubiatowicz J. D., et al. (2009).  A View of the Parallel Computing Landscape. Communications of the ACM. 52(10), 56-67.
Asanović, K., Bodik R., Demmel J., Keaveny T., Keutzer K., Kubiatowicz J. D., et al. (2009).  A View of the Parallel Computing Landscape. Communications of the ACM. 52(10), 56-67.
Asanović, K., Bodik R., Demmel J., Keaveny T., Keutzer K., Kubiatowicz J. D., et al. (2009).  A View of the Parallel Computing Landscape. Communications of the ACM. 52(10), 56-67.
Asanović, K., Bodik R., Demmel J., Keaveny T., Keutzer K., Kubiatowicz J. D., et al. (2009).  A View of the Parallel Computing Landscape. Communications of the ACM. 52(10), 56-67.
W
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Moody, J., & Wu L. (1997).  What is the True Price? -- State Space Models for High Frequency FX Rates.
Scott, C., Wundsam A., Zarifis K., & Shenker S. J. (2012).  What, Where, and When: Software Fault Localization for SDN.
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Willinger, W., & Paxson V. (1998).  Where Mathematics Meets the Internet. Notices of the American Mathematical Society. 45(8), 961-970.
Wegmann, S., & Gillick L. (2010).  Why Has (Reasonably Accurate) Automatic Speech Recognition Been So Hard to Achieve?.
Reyes, I., Wijesekera P., Reardon J., Elazari A., Razaghpanah A., Vallina-Rodriguez N., et al. (2018).  "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA. Proceedings on Privacy Enhancing Technologies.
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Weaver, N., & Paxson V. (2004).  A Worst-Case Worm. Proceedings of Third Annual Workshop on Economics and Information Security (WEIS04).

Pages