Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Hopfgartner, F., & Jose J. M. (2011).  Development of a Test Collection for Studying Long-Term User Modelling. Proceedings of the Workshop Information Retrieval (LWA'11).
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Alomar, N., & Egelman S. (2022).  Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Hillard, D., Ostendorf M., & Shriberg E. (2003).  Detection of Agreement vs. Disagreement In Meetings: Training With Unlabeled Data. Proceedings of the Human Language Technology Conference of the North American Chapter of the Association for Computational Linguistics (HLT-NAACL 2003).
Althoff, T., Song H. Oh, & Darrell T. (2012).  Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition.
Pirinen, T., Yli-Hietanen J., Pertilä P., & Visa A. (2004).  Detection and Compensation of Sensor Malfunction in Time Delay Based Direction of Arrival Estimation. Proceedings of IEEE ISCAS.
Zhang, Y., & Paxson V. (2000).  Detecting Stepping Stones. Proceedings of the Ninth USENIX Security Symposium.
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Halperin, E., Buhler J., Karp R. M., Krauthgamer R., & Westover B. P. (2003).  Detecting Protein Sequences via Metric Embeddings. Proceedings of the 11th International Conference on Intelligent Systems for Molecular Biology (ISMB). 122-129.
Lee, K., & Ellis D. P. W. (2008).  Detecting Music in Ambient Audio by Long-Window Autocorrelation. 9-12.
Lee, K., Ellis D. P. W., & Loui A. (2010).  Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Weaver, N., Sommer R., & Paxson V. (2009).  Detecting Forged TCP Reset Packets.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Ulitzky, I.., Karp R. M., & Shamir R. (2008).  Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles. Proceedings of 12th Annual International Conference on Research in Computational Molecular Biology (RECOMB 2008). 347-359.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Zhang, Y., & Paxson V. (2000).  Detecting Backdoors. Proceedings of the Ninth USENIX Security Symposium.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Zhang, C. Micahel, & Paxson V. (2011).  Detecting and Analyzing Automated Activity on Twitter.
Hébert, M., & Mirghafori N. (2004).  Desperately Seeking Impostors: Data-Mining for Competitive Impostor Testing in a Text-Dependent Speaker Verification System. Proceedings of IEEE ICASSP.

Pages