Publications

Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Morgan, N., Wu S-L., & Bourlard H. (1995).  Digit Recognition with Stochastic Perceptual Models. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Gillick, D., Wegmann S., & Gillick L. (2012).  Discriminative Training for Speech Recognition is Compensating for Statistical Dependence on the HMM Framework. 4745-4748.
Walfish, M., Zamfirescu J.. D., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  Distributed Quota Enforcement for Spam Control. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 281-296.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.
Chang, S., Greenberg S., & Wester M. (2001).  An Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Regier, T., Corrigan B.., Cabasaan R.., Woodward A.., Gasser M.., & Smith L.. (2001).  The Emergence of Words. Proceedings of the 23rd Annual Conference of the Cognitive Science Society (CogSci 2001). 815-820.
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Lopes, M.. E., Wang S.., & Mahoney M.. W. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Morgan, N., Wooters C., Hermansky H., & Bourlard H. (1991).  Experiments with Temporal Resolution for Continuous Speech Recognition with Multi-Layer Perceptrons. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 405-410.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.

Pages