Publications

Found 4258 results
Author [ Title(Asc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
C
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Gusella, R. (1990).  Characterizing the Variability of Arrival Processes with Indices of Dispersion.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Krishnapriyan, A. S., Gholami A., Zhe S., Kirby R. M., & Mahoney M. W. (2021).  Characterizing Possible Failure Modes in Physics-Informed Neural Networks. NeurIPS.
Radoslavov, P., Tangmunarunkit H., Yu H., Govindan R., Shenker S. J., & Estrin D. (2000).  On Characterizing Network Topologies and Analyzing Their Impact on Protocol Design.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Garg, R. (1995).  Characterization of Video Traffic.
Karp, R. M. (1978).  A Characterization of the Minimum Cycle Mean in a Digraph. Discrete Mathematics (Netherlands). 23(3), 309-311.
Ausiello, G., Protasi M., & Angelaccio M. (1991).  A Characterization of Space Complexity Cases and Subexponential Time Classesas Limiting Polynomially Decidable Sets.
Cutello, V., & Montero J. (1992).  A Characterization of Rational Amalgamation Operations.
Szyperski, C., & Ventre G. (1993).  A Characterization of Multi-Party Interactive Multimedia Applications.
Pang, R., Yegneswaran V., Barford P., Paxson V., & Peterson L. (2004).  Characteristics of Internet Background Radiation. Proceedings of the 2004 Internet Measurement Conference (IMC 2004).
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. Proceedings of the ACM SIGCOMM Conference. 309-322.
Zhang, Y., Breslau L., Paxson V., & Shenker S. J. (2002).  On the Characteristics and Origins of Internet Flow Rates. ACM SIGCOMM Computer Communication Review. 32(4), 309-322.
Edwards, J. (2001).  Chapter 17: The Transcription of Discourse. 321-348.
Gupta, A., & Moran M. (1993).  Channel Groups: A Unifying Abstraction for Specifying Inter-stream Relationships.
Allman, M. (2013).  On Changing the Culture of Empirical Internet Assessment. ACM SIGCOMM Computer Communication Review. 43(3), 78-83.
Yu, S. X., & Lisin D. (2013).  Change Blindness Reveals Distinctive Featural Processing in Size, Color, and Orientation.
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Brewer, E., Demmer M., Ho M., Honicky R.. J., Pal J., Plauché M., et al. (2006).  The challenges of IT research in developing regions. IEEE Pervasive Computing. 5(2), 15-23.
Condon, A., Edelsbrunner H., E. Emerson A., & Fortnow L. (1999).  Challenges for Theory of Computing. SIGACT News. 30,
Cole, R., Hirschman L., Atlas L., Beckman M., Biermann A., Bush M., et al. (1995).  The Challenge of Spoken Language Systems: Research Directions for the Nineties. IEEE Transactions on Speech and Audio Processing. 3(1), 1-21.
Hermansky, H., Morgan N., Bayya A., & Kohn P. (1991).  The Challenge of Inverse-E: The RASTA-PLP Method. Proceedings of the 25th Asilomar Conference on Signals, Systems, & Computers. 800-804.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).

Pages