Publications

Found 565 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
G
Bouillon, P., Rayner M., Chatzichrisafis N., Hockey B. Ann, Santaholma M., Starlander M., et al. (2005).  A Generic Multi-Lingual Open Source Platform for Limited-Domain Medical Speech Translation. Proceedings of the 10th Annual Conference of the European Association of Machine Translation (EAMT 2005). 5-58.
Skibola, C. F., Bracci P. M., Halperin E., Conde L., Craig D. W., Agana L., et al. (2009).  Genetic Variants at 6p21.33 Are Associated with Susceptibility to Follicular Lymphoma. Nature Genetics. 41(8), 873-875.
Skibola, C. F., Bracci P. M., Halperin E., Conde L., Craig D. W., Agana L., et al. (2009).  Genetic Variants at 6p21.33 Are Associated with Susceptibility to Follicular Lymphoma. Nature Genetics. 41(8), 873-875.
Skibola, C. F., Bracci P. M., Halperin E., Conde L., Craig D. W., Agana L., et al. (2009).  Genetic Variants at 6p21.33 Are Associated with Susceptibility to Follicular Lymphoma. Nature Genetics. 41(8), 873-875.
Conde, L., Halperin E., Akers N.. K., Brown K. M., Smedby K.. E., & Rothman N.. (2010).  Genome-Wide Association Study of Follicular Lymphoma Identifies a Risk Locus at 6p21.32. Nature Genetics. 42(8), 661-664.
Cao, L., Friedland G., & Xie L. (2014).  GeoMM 2014: The Third ACM Multimedia Workshop on Geotagging and its Applications in Multimedia. 1251-1252.
Choi, J., Larson M., Li X., Li K., Friedland G., & Hanjalic A. (2017).  The Geo-Privacy Bonus of Popular Photo Enhancements. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. 84-92.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Kreibich, C., Weaver N., Kanich C., Cui W., & Paxson V. (2011).  GQ: Practical Containment for Measuring Modern Malware Systems.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Graph-Based Semi-Supervised Learning for Question Semantic Labeling. 27-35.
Chang, N., & Maia T.. (2001).  Grounded learning of grammatical constructions. Proceedings of the Association for the Advancement of Artificial Intelligence 2001 Spring Symposium on Learning Grounded Representations.
Regier, T., & Carlson L.. (2001).  Grounding Spatial Language in Perception: An Empirical and Computational Investigation. Journal of Experimental Psychology: General. 130(2), 273-298.
H
Cook, H., Moretó M., Bird S., Dao K., Patterson D., & Asanović K. (2013).  A Hardware Evaluation of Cache Partitioning to Improve Utilization and Energy-Efficiency while Preserving Responsiveness.
Coja-Oghlan, A.., Krumke S.. O., & Nierhoff T. (2003).  A Heuristic for the Stacker Crane Problem on Trees Which is Almost Surely Exact. Algorithms and Computation, 14th International Symposium, ISAAC 2003, LNCS 2906. 605-614.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2005).  Hidden-Action in Multi-Hop Routing. Proceedings of the 6th ACM Conference on Electronic Commerce (EC'05). 117-126.
Feldman, M., Chuang J., Stoica I., & Shenker S. J. (2007).  Hidden-Action in Network Routing. IEEE Journal on Selected Areas in Communications. 25(6), 1161-1172.
Bhattacharya, A. A., Culler D. E., Friedman E., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Hierarchical Scheduling for Diverse Datacenter Workloads.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next Generation Inter-domain Routing Protocol.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.

Pages