Publications

Found 541 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
T
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2004).  Towards Capturing Representative AS-Level Internet Topologies. Computer Networks. 44(6), 737-755.
Chang, H., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2002).  Towards Capturing Representative AS-Level Internet Topologies. Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Widom, M., & Shenker S. J. (1984).  Topological Phase Transitions. 46-51.
Staniford, S., Moore D., Paxson V., & Weaver N. (2004).  The Top Speed of Flash Worms. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Feldman, J., Weber S. Hollbach, & Stolcke A. (1990).  A Testbed for the Miniature Language L0. Proceedings of the Fifth Rocky Mountain Conference on Artificial Intelligence.
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.
Weaver, N., Paxson V., Staniford S., & Cunningham R. (2003).  A Taxonomy of Computer Worms. Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
de Melo, G., & Weikum G. (2013).  Taxonomic Data Integration from Multilingual Wikipedia Editions. 1-39.
Wegmann, S., Faria A., Janin A., Riedhammer K., & Morgan N. (2013).  The Tao of ATWV: Probing the Mysteries of Keyword Search Performance.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
S
Asanović, K., & Witchel E.. (2007).  System and technique for fine-grained computer memory protection.
Liu, X., Hieronymus J., Gales M.. J. F., & Woodland P. (2013).  Syllable Models for Mandarin Speech Recognition: Exploiting Character Language Models. Journal of the Acoustical Society of America. 133(1), 519-528.
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Jähnichen, S., Gabriel R., Weber M., & Anlauff M. (1989).  Supporting Formal Program Developments: the DEVA Environment.
Weber, S. (2004).  The Success of Open Source.
Wang, R., Li Y., Mahoney M., & Darve E. (2015).  Structured Block Basis Factorization for Scalable Kernel Matrix Evaluation.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
Sturmfels, B., & Wiegelmann M. (1996).  Structural Gröbner Basis Detection.
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Widom, M., Bensimon D., Kadanoff L. P., & Shenker S. J. (1983).  Strange Objects in the Complex Plane. Journal of Statistical Physics. 443-454.

Pages