Publications

Found 472 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is S  [Clear All Filters]
Conference Paper
Sharma, P., Estrin D., Floyd S., & Jacobson V. (1997).  Scalable Timers for Soft State Protocols. Proceedings of the Conference on Computer Communications, 16th Annual Joint Conference of the IEEE Computer and Communications Societies. 222-229.
Rodner, E., Hoffman J., Donahue J., Darrell T., & Saenko K. (2013).  Scalable Transform-Based Domain Adaptation.
Yu, H., Breslau L., & Shenker S. J. (1999).  A Scalable Web Cache Consistency Architecture. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '99). 163-174.
Phillips, G., Shenker S. J., & Tangmunarunkit H. (1999).  Scaling of Multicast Trees: Comments on the Chuang-Sirbu Scaling Law. Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM). 41-51.
Willinger, W., Govindan R., Jamin S., Paxson V., & Shenker S. J. (2002).  Scaling Phenomena in the Internet: Critically Examining Criticality. Proceedings of National Academy of Science of the United States of America (PNAS). 99,
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Mok, E., Bryant J., & Feldman J. (2004).  Scaling Understanding Up to Mental Spaces. Proceedings of ScaNaLU-2004.
Morgan, N., Chen B. Y., Zhu Q., & Stolcke A. (2004).  Scaling Up: Learning Large-Scale Recognition Methods from Small-Scale Recognition Tasks. Special Workshop in Maui(SWIM).
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Weiser, M., Welch B., Demers A. J., & Shenker S. J. (1994).  Scheduling for Reduced CPU Energy. Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI). 13-23.
Yao, F., Demers A. J., & Shenker S. J. (1995).  A Scheduling Model for Reduced CPU Energy. Proceedings of the 36th IEEE Annual Symposium on Foundations of Computer Science (FOCS). 374-382.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. J. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Seamless Multimedia Communications in Heterogeneous Mobile Access Networks. Proceedings of the TERENA Networking Conference (TNC 2004).
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the 16th International Conference on Supercomputing (ICS-02). 84-95.
Lv, Q., Cao P., Cohen E., Li K., & Shenker S. J. (2002).  Search and Replication in Unstructured Peer-to-Peer Networks. Proceedings of the International Comference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 258-259.
Karp, R. M., Saks M., & Wigderson A. (1986).  On a Search Problem Related to Branch-and-Bound Procedures. Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 19-28.
de Melo, G., & Hose K. (2012).  Searching the Web of Data (Tutorial Abstract).
Binder, W.., & Roth V. (2002).  Secure Mobile Agent Systems Using Java - Where Are We Heading?. Proceedings, 17th ACM Symposium on Applied Computing, Special Track on Agents, Interactions, Mobility, and Systems (SAC/AIMS).
Mittal, P., Paxson V., Sommer R., & Winterrowd M. (2009).  Securing Mediated Trace Access Using Black-Box Permutation Analysis.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Schryen, G. (2009).  Security of Open Source and Closed Source Software: An Empirical Comparison of Published Vulnerabilities.
Dolev, D., Even S., & Karp R. M. (1982).  On the security of ping-pong protocols.
Fillmore, C. J., Baker C. F., & Sato H. (2002).  Seeing Arguments Through Transparent Structures. Proceedings of the Third International Conference on Language Resources and Evaluation (LREC 2002). 787-791.
Shastri, L., & Wendelken C. (2000).  Seeking coherent explanations - a fusion of structured connectionism, temporal synchrony, and evidential reasoning. Proceedings of the 22nd Annual Conference of the Cognitive Science Society (CogSci 2000).

Pages