Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2016
Ke, T-W., Maire M., & Yu S. X. (2016).  Neural Multigrid.
Regli, W., Rossignac J., Shapiro V., & Srinivasan V. (2016).  The new frontiers in computational modeling of material structures. Computer-Aided Design. 77, 73-85.
Gergen, S., Zeiler S., Abdelaziz A. Hussen, & Kolossa D. (2016).  New Insights into Turbo-Decoding-Based AVSR with Dynamic Stream Weights. Proceedings of ITG Conference on Speech Communication.
Panda, A., McCauley M., Tootoonchian A., Sherry J., Koponen T., Ratnasamy S., et al. (2016).  Open Network Interfaces for Carrier Networks. ACM SIGCOMM Computer Communication Review. 46(1), 5-11.
Fountoulakis, K., Gleich D., & Mahoney M. (2016).  An optimization approach to locally-biased graph algorithms.
Shun, J., Roosta-Khorasani F., Fountoulakis K., & Mahoney M. (2016).  Parallel Local Graph Clustering. Proceedings of the VLDB Endowment. 9(12), 
Suchan, J., Bhatt M., & Yu S. X. (2016).  The Perception of Symmetry in the Moving Image -- Multi-Level Computational Analysis of Cinematographic Scene Structure and Its Visual Reception. Proceedings of ACM Symposium on Applied Perception.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Thomee, B., Borth D., & Bernd J. (2016).  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Gallopoulos, E., Drineas P., Ipsen I., & Mahoney M. (2016).  RandNLA, Pythons, and the CUR for Your Data Problems: Reporting from G2S3 2015 in Delphi. SIAM News.
Drineas, P., & Mahoney M. (2016).  RandNLA: Randomized Numerical Linear Algebra. Communications of the ACM. 59, 80-90.
Dharmar, M., Simon A., Sadorra C., Friedland G., Sherwood J., Morrow H., et al. (2016).  Reducing Loss to Follow-Up with Tele-audiology Diagnostic Evaluations. 22,
Girshick, R., Donahue J., Darrell T., & Malik J. (2016).  Region-Based Convolutional Networks for Accurate Object Detection and Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 38(1), 142-158.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Petruck, M. R. L., & Ellsworth M. (2016).  Representing Support Verbs in FrameNet. Proceedings of the 12th Workshop on Multiword Expressions. 72–77.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Yiin-Chang, S., & Morgan N. (2016).  Robust CNN - based Speech Recognition With Gabor Filter Kernels. Proceedings of Interspeech 2016.
Kellman, M., & Morgan N. (2016).  Robust Multi-Pitch Tracking: a trained classifier based approach.
Liu, X., & Shapiro V. (2016).  Sample-Based Design of Functionally Graded Material Structures. Proceedings of the ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Jannesari, A., Sato Y., & Winter S. (2016).  SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems. SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
Veldt, N., Gleich D., & Mahoney M. (2016).  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.

Pages