Publications

Found 257 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is Z  [Clear All Filters]
2016
Chen, J., Jiang J., Zheng X., Duan H., Liang J., Li K., et al. (2016).  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Zou, Y., Zetterberg P., Gustavsson U., Svensson T., Zaidi A., Kadur T., et al. (2016).  Impact of Major RF Impairments on mm-Wave Communications Using OFDM Waveforms. 2016 IEEE Globecom Workshops (GC Wkshps). 1-7.
Zou, Y., Zetterberg P., Gustavsson U., Svensson T., Zaidi A., Kadur T., et al. (2016).  Impact of Major RF Impairments on mm-Wave Communications Using OFDM Waveforms. 2016 IEEE Globecom Workshops (GC Wkshps). 1-7.
Zou, Y., Zetterberg P., Gustavsson U., Svensson T., Zaidi A., Kadur T., et al. (2016).  Impact of Major RF Impairments on mm-Wave Communications Using OFDM Waveforms. 2016 IEEE Globecom Workshops (GC Wkshps). 1-7.
Zeiler, S., Meutzner H., Abdelaziz A. Hussen, & Kolossa D. (2016).  Introducing the Turbo-Twin-HMM for Audio-Visual Speech Enhancement. Proceedings of Interspeech 2016.
Zhu, L., Amann J., & Heidemann J. (2016).  Measuring the Latency and Pervasiveness of TLS Certificate Revocation. Proceedings of Passive and Active Measurement Conference (PAM).
Gergen, S., Zeiler S., Abdelaziz A. Hussen, & Kolossa D. (2016).  New Insights into Turbo-Decoding-Based AVSR with Dynamic Stream Weights. Proceedings of ITG Conference on Speech Communication.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
2014
Donahue, J., Jia Y., Vinyals O., Hoffman J., Zhang N., Tzeng E., et al. (2014).  DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Czyz, J., Allman M., Zhang J., Iekel-Johnson S., Osterweil E., & Bailey M. (2014).  Measuring IPv6 Adoption.
Xiong, Y., Scharstein D., Chakrabarti A., Darrell T., Sun B., Saenko K., et al. (2014).  Modeling Radiometric Uncertainty for Vision with Tone-Mapped Color Images. IEEE Transactions on Pattern Analysis and Machine Intelligence. 36(11), 2185-2198.
Guadarrama, S., Rodner E., Saenko K., Zhang N., Farrell R., Donahue J., et al. (2014).  Open-Vocabulary Object Retrieval.
Zhang, N., Paluri M., Ranzato M. Aurelio, Darrell T., & Bourdev L. (2014).  PANDA: Pose Aligned Networks for Deep Attribute Modeling.
Zhang, N., Donahue J., Girshick R., & Darrell T. (2014).  Part-Based R-CNNs for Fine-Grained Category Detection.
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Schumacher, A., Pireddu L., Niemenmaa M., Kallio A., Korpelainen E., Zanetti G., et al. (2014).  SeqPig: Simple and Scalable Scripting for Large Sequencing Data Sets in Hadoop. Bioinformatics. 30(1), 119-120.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
2013
Ziem, A. (2013).  Beyond the Sentence: Towards a Cognitive-Linguistic Approach to Textual Reference. In Yearbook of the Cognitive Linguistic Association. 39-58.

Pages