Publications

Found 273 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Conference Paper
Jin, Y., Scott C., Dhamdhere A., Giotsas V., Krishnamurthy A., & Shenker S. J. (2019).  Stable and Practical AS Relationship Inference with ProbLink. Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Reynolds, D., Andrews W., Campbell J., Navratil J., Peskin B., Adami A., et al. (2003).  The SuperSID Project: Exploiting High-Level Information for High-Accuracy Speaker Recognition. Proceedings of ICASSP-2003.
Shyr, A., Darrell T., Jordan M. I., & Urtasun R. (2011).  Supervised Hierarchical Pitman-Yor Process for Natural Scene Segmentation.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2015).  Taking an AXE to L2 Spanning Trees.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Radhakrishnan, S., Cheng Y., Chu J., Jain A., & Raghavan B. (2011).  TCP Fast Open.
Juan, L.., Kreibich C., Lin C.-H.., & Paxson V. (2008).  A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. 267-278.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Holz, R., Hiller J., Amann J., Razaghpanah A., Hohleld O., Vallina-Rodriguez N., et al. (2020).  Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
Lei, H., Choi J., Janin A., & Friedland G. (2011).  User Verification: Matching the Uploaders of Videos Across Accounts. 2404-2407.
Jurafsky, D., Wooters C., Segal J., Stolcke A., Fosler-Lussier E., Tajchman G., et al. (1995).  Using A Stochastic Context-Free Grammar as a Language Model for Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 95).
Friedland, G., Gottlieb L., & Janin A. (2009).  Using Artistic Markers and Speaker Identification for Narrative-Theme Navigation of Seinfeld Episodes. 511-516.
Hung, H., Jayagopi D., Yeo C., Friedland G., Ba S., Odobez J-M., et al. (2007).  Using Audio and Video Features to Classify the Most Dominant Person in Meetings. Proceedings of ACM Multimedia 2007. 835-838.
Maron-Katz, A., Ben Simon E., Jacob Y., Rosenberg K., Karp R. M., Hendler T., et al. (2011).  Using Contiguous Bi-Clustering for Data Driven Temporal Analysis of fMRI Based Functional Connectivity. Proceedings of the 4th Annual INCF Neuroinformatics Congress.
Peskin, B., Navratil J., Abramson J., Jones D., Klusacek D., Reynolds D., et al. (2003).  Using Prosodic and Conversational Features for High-Performance Speaker Recognition: Report From JHU WS'02.. Proceedings of ICASSP-2003.
Friedland, G., Choi J., & Janin A. (2011).  Video2GPS: A Demo of Multimodal Location Estimation on Flickr Videos.
Jia, Y., Abbott J., Austerweil J., Griffiths T., & Darrell T. (2013).  Visual Concept Learning: Combining Machine Vision and Bayesian Generalization on Concept Hierarchies.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Parton, K., McKeown K. R., Coyne B., Diab M. T., Grishman R., Hakkani-Tür D., et al. (2009).  Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task. 423-431.

Pages