Found 529 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Ben-David, S., Borodin A., Karp R. M., Tardos G., & Wigderson A. (1990).  On the power of randomization in online algorithms. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
Stolcke, A., Wooters C., Mirghafori N., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  Progress in Meeting Recognition: The ICSI-SRI-UW Spring 2004 Evaluation System. NIST ICASSP 2004 Meeting Recognition Workshop.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
Tan, Z., Waterman A., Avižienis R., Lee Y., Cook H., Patterson D., et al. (2010).  RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors.
Colmenares, J. A., Saxton I., Battenberg E., Avižienis R., Peters N., Asanović K., et al. (2011).  Real-Time Musical Applications on an Experimental Operating System for Multi-Core Processors.
Karayev, S., Hertzmann A., Winnemoeller H., Agarwala A., & Darrell T. (2014).  Recognizing Image Style.
Weaver, N., Kreibich C., & Paxson V. (2011).  Redirecting DNS for Ads and Profit.
Nedevschi, S., Popa L., Iannaccone G., Raynasamy S.., & Wetherall D. (2008).  Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. 323-336.
Moody, J., Saffell M., Liao Y., & Wu L. (1998).  Reinforcement Learning for Trading Systems and Portfolios. Decision Technologies for Computational Finance, Proceedings of the London Conference.
Wrede, B., & Shriberg E. (2003).  The Relationship Between Dialogue Acts and Hot Spots in Meetings. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Heller, B., Erickson D., McKeown N., Griffith R., Ganichev I., Whyte S., et al. (2010).  Ripcord: A Modular Platform for Data Center Networking. 457-458.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.