Publications

Found 565 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Paper
Regier, T., Kay P., & Cook R. S. (2005).  Focal Colors Are Universal After All. Proceedings of the National Academy of Sciences of the United States of America. 102(23), 8386-8391.
Chen, J., Jiang J., Zheng X., Duan H., Liang J., Li K., et al. (2016).  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Cruse, H., & Schilling M. (2011).  From Egocentric Systems to Systems Allowing for Theory of Mind and Mutualism. 184-191.
Casado, M., McKeown N., & Shenker S. J. (2019).  From ethane to SDN and beyond. ACM SIGCOMM Computer Communication Review. 49(5), 92-95.
Chang, N., Narayanan S., & Petruck M. R. L. (2002).  From Frames to Inference. Proceedings of the First International Workshop on Scalable Natural Language Understanding.
Choi, J., Larson M., Friedland G., & Hanjalic A. (2019).  From Intra-Modal to Inter-Modal Space: Multi-Task Learning of Shared Representations for Cross-Modal Retrieval. Proceedings of 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM). 1-10.
Chiang, H-L., Rave W., Kadur T., & Fettweis G. (2016).  Full rank spatial channel estimation at millimeter wave systems. 2016 International Symposium on Wireless Communication Systems (ISWCS). 42-48.
Cheng, O.., Dines J.., & Magimai-Doss M. (2007).  A Generalized Dynamic Composition Algorithm of Weighted Finite State Transducers for Large Vocabulary Speech Recognition. 4, 345-348.
Bouillon, P., Rayner M., Chatzichrisafis N., Hockey B. Ann, Santaholma M., Starlander M., et al. (2005).  A Generic Multi-Lingual Open Source Platform for Limited-Domain Medical Speech Translation. Proceedings of the 10th Annual Conference of the European Association of Machine Translation (EAMT 2005). 5-58.
Cao, L., Friedland G., & Xie L. (2014).  GeoMM 2014: The Third ACM Multimedia Workshop on Geotagging and its Applications in Multimedia. 1251-1252.
Choi, J., Larson M., Li X., Li K., Friedland G., & Hanjalic A. (2017).  The Geo-Privacy Bonus of Popular Photo Enhancements. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. 84-92.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Coja-Oghlan, A.., Krumke S.. O., & Nierhoff T. (2003).  A Heuristic for the Stacker Crane Problem on Trees Which is Almost Surely Exact. Algorithms and Computation, 14th International Symposium, ISAAC 2003, LNCS 2906. 605-614.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2005).  Hidden-Action in Multi-Hop Routing. Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05). 117-126.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.

Pages