Publications

Found 572 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
Conference Paper
Chun, B-G., Maniatis P., Shenker S. J., & Kubiatowicz J. D. (2007).  Attested Append-Only Memory: Making Adversaries Stick to their Word. 189-204.
Chen, B., & Fung P. (2004).  Automatic Construction of an English-Chinese Bilingual Framenet. Proceedings of the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
Pelaez-Moreno, C.., Zhu Q., Chen B. Y., & Morgan N. (2005).  Automatic Data Selection for MLP-Based Feature Extraction for ASR. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 229-232.
Cuendet, S., Hakkani-Tür D., & Shriberg E. (2007).  Automatic Labeling Inconsistencies Detection And Correction For Sentence Unit Segmentation In Conversational Speech. 144-155.
Chang, S., Shastri L., & Greenberg S. (2000).  Automatic Phonetic Transcription of Spontaneous Speech American English. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Bhagat, S., Carvey H., & Shriberg E. (2003).  Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty Meetings. Proceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003).
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Bernd, J., Abu-Salma R., Choy J., & Frik A. (2022).  Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships. Symposium on Usable Privacy and Security.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Tolley, W. J., Kujath B., Khan M. Taha, Vallina-Rodriguez N., & Crandall J. R. (2021).  Blind In/On-Path Attacks and Applications to VPNs. 30th USENIX Security Symposium '21. 3129-3146.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S. J., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Argyraki, K., Baset S., Chun B-G., Fall K., Iannaccone G., Knies A., et al. (2008).  Can Software Routers Scale?.
Tan, Z., Waterman A., Cook H., Bird S., Asanović K., & Patterson D. (2010).  A Case for FAME: FPGA Architecture Model Execution. 290-301.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Caballé, S., & Feldman J. (2008).  CoLPE: Communities of Learning Practice Environment. 35-46.
Barker, J., Cooke M. P., & Ellis D. P. W. (2001).  Combining Bottom-Up and Top-Down Constraints for Robust ASR: The Multiscore Decoder. Proceedings of the Workshop on Consistent and Reliable Acoustic Cues (CRAC-2001).
Kotzias, P., Razaghpanah A., Amann J., Paterson K. G., Vallina-Rodriguez N., & Caballero J. (2018).  Coming of Age: A Longitudinal Study of TLS Deployment. Proceedings of IMC 18.
Ben-David, Y., Hasan S., Pal J., Vallentin M., Panjwani S.., Gutheim P.., et al. (2011).  Computing Security in the Developing World: A Case for Multidisciplinary Research. 39-44.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Abrash, V., Cohen M., Franco H., Morgan N., & Konig Y. (1992).  Connectionist Gender Adaptation in a Hybrid Neural Network / Hidden Markov Model Speech Recognition System. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 911-914.
Renals, S., Morgan N., Cohen M., Bourlard H., & Franco H. (1992).  Connectionist Probability Estimation in the Decipher Speech Recognition System. Proceedings of the IEEE International Conference on Acoustics, Speech & Signal Processing (ICASSP 1992). I601-I604.

Pages