Publications
Found 541 results
Author [ Title] Type Year Filters: First Letter Of Last Name is W [Clear All Filters]
Towards Capturing Representative AS-Level Internet Topologies.
Computer Networks. 44(6), 737-755.
(2004). Towards Capturing Representative AS-Level Internet Topologies.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems (SIGMETRICS 2002). 280-281.
(2002). Topological semantics for lumped parameter systems modeling.
Advanced Engineering Informatics. 42,
(2019). Topological Phase Transitions.
46-51.
(1984). The Top Speed of Flash Worms.
Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
(2004). Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018). TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016). Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters.
Proceedings of AAAI Conference on Artificial Intelligence.
(2021). A Testbed for the Miniature Language L0.
Proceedings of the Fifth Rocky Mountain Conference on Artificial Intelligence.
(1990).
(2015). A Taxonomy of Computer Worms.
Proceedings of the ACM CCS First Workshop on Rapid Malcode (WORM 2003). 11-18.
(2003).
(2013).
(2013).
(2014).
(2007).
Syllable Models for Mandarin Speech Recognition: Exploiting Character Language Models.
Journal of the Acoustical Society of America. 133(1), 519-528.
(2013). SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning.
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
(2019).
(1989).
(2004).
(2015). Structural Metadata Research in the EARS Program.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
(2005).
(1996). Stress Testing Cluster Bro.
Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
(2007). The Strengths of Weaker Identities: Opportunistic Personas.
Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
(2007). Strange Objects in the Complex Plane.
Journal of Statistical Physics. 443-454.
(1983).