Publications

Found 289 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is P  [Clear All Filters]
2015
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
2012
Ananthanarayanan, G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S., et al. (2012).  PACMan: Coordinated Memory Caching for Parallel Jobs. 1-14.
Peters, N., & McAdams S. (2012).  A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical Properties. Journal of the Acoustical Society of America. 131, 3256.
Peters, N., & McAdams S. (2012).  A Perceptual Analysis of Off-Center Sound Degradation in Surround-Sound Reproduction Based on Geometrical Properties.
McCoy, D., Pitsillidis A., Jordan G., Weaver N., Kreibich C., Krebs B., et al. (2012).  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs.
Zhang, N., Farrell R., & Darrell T. (2012).  Pose Pooling Kernels for Sub-Category Recognition. 3665-3672.
Zhang, W., Yu S. X., & Teng S-H. (2012).  Power SVM: Generalization with Exemplar Classification Uncertainty. 2144-2151.
Petruck, M. R. L., & de Melo G. (2012).  Precedes: A Semantic Relation in FrameNet. 45-49.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Nishimura, J., & Friedman E. (2012).  Probabilistic Convergence Guarantees for Type-II Pulse-Coupled Oscillators. Physical Review E. 86,
Zagordi, O., Töpfer A., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2012).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. 342-354.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Rossow, C., Dietrich C. J., Kreibich C., Grier C., Paxson V., Pohlmann N., et al. (2012).  Prudent Practices for Designing Malware Experiments: Status Quo and Outlook. 65-79.

Pages