Publications

Found 1886 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
Conference Paper
Shriberg, E., Stolcke A., & Baron D. (2001).  Can Prosody Aid the Automatic Processing of Multi-Party Meetings? Evidence from Predicting Punctuation, Disfluencies, and Overlapping Speech. Proceedings of the ISCA Tutorial and Research Workshop on Prosody in Speech Recognition and Understanding.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Shriberg, E., & Stolcke A. (2008).  The Case for Automatic Higher-Level Features in Forensic Speaker Recognition. 1509-1512.
Shriberg, E., & Stolcke A. (2008).  The Case for Automatic Higher-Level Features in Forensic Speaker Recognition. 1509-1512.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Janoch, A., Karayev S., Jia Y., Barron J. T., Fritz M., Saenko K., et al. (2011).  A Category-Level 3-D Object Dataset: Putting the Kinect to Work. 1168-1174.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Ghodsi, A., Zaharia M., Shenker S. J., & Stoica I. (2013).  Choosy: Max-Min Fair Sharing for Datacenter Jobs with Constraints. 365-378.
Yaman, S., Hakkani-Tür D., Tur G., Grishman R., Harper M. P., McKeown K. R., et al. (2009).  Classification-Based Strategies for Combining Multiple 5-W Question Answering Systems. 2703-2706.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Martignoni, L., Poosankam P., Zaharia M., Han J., McCamant S., Song D., et al. (2012).  Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems. 165-176.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Nelaturi, S., de Kleer J., & Shapiro V. (2016).  Combinatorial models for heterogeneous system composition and analysis. Proceedings of 2016 11th System of Systems Engineering Conference (SoSE).
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Salzmann, M., & Urtasun R. (2010).  Combining Discriminative and Generative Methods for 3D Deformable Surface and Articulated Pose Reconstruction. 647-654.

Pages