Publications

Found 565 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Barker, J., Cooke M. P., & Ellis D. P. W. (2000).  Decoding Speech in the Presence of Other Sound Sources. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2006).  The Design and Implementation of a Declarative Sensor Network System.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Preuss, M., König I. R., Thompson J. R., Erdmann J., Absher D., Assimes T. L., et al. (2010).  Design of the Coronary Artery Disease Genome-Wide Replication and Meta-Analysis (CARDIoGRAM) Study--A Genome-Wide Association Meta-Analysis Involving More than 22,000 Cases and 60,000 Controls. Circulation: Cardiovascular Genetics. 3, 475-483.
Preuss, M., König I. R., Thompson J. R., Erdmann J., Absher D., Assimes T. L., et al. (2010).  Design of the Coronary Artery Disease Genome-Wide Replication and Meta-Analysis (CARDIoGRAM) Study--A Genome-Wide Association Meta-Analysis Involving More than 22,000 Cases and 60,000 Controls. Circulation: Cardiovascular Genetics. 3, 475-483.
Stojanovic, V., Joshi A., Batten C., Kwon Y-J., Beamer S., Chen S.., et al. (2010).  A Design-Space Exploration for CMOS Photonic Processor Networks.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2002).  Discovering Local Structure in Gene Expression Data: The Order Preserving Submatrix Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Ben-Dor, A., Chor B., Karp R. M., & Yakhini Z. (2003).  Discovering Local Structure in Gene Expression Data: The Order-Preserving Submatrix Problem. Journal of Computational Biology. 10(3-4), 385-398.
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
Caballero, J., Poosankam P., Kreibich C., & Song D. (2009).  Dispatcher: Enabling Active Botnet Infiltration Using Automatic Protocol Reverse-Engineering. 621-634.
Chun, B-G., Maniatis P., & Shenker S. J. (2008).  Diverse Replication for Single-Machine Byzantine-Fault Tolerance. 287-292.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Calle, E., Jové T., Vilà P., & Marzo J. L. (2001).  A Dynamic Multilevel MPLS Protection Domain. Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. J. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.
Caesar, M., Casado M., Koponen T., Rexford J., & Shenker S. J. (2010).  Dynamic Route Recomputation Considered Harmful. ACM Computer Communication Review. 40(2), 66-71.

Pages