Publications

Found 270 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
Conference Paper
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Javed, M., & Paxson V. (2013).  Detecting Stealthy, Distributed SSH Brute-Forcing.
Hopfgartner, F., & Jose J. M. (2011).  Development of a Test Collection for Studying Long-Term User Modelling. Proceedings of the Workshop Information Retrieval (LWA'11).
Ji, G., & Bilmes J. A. (2005).  Dialog Act Tagging Using Graphical Models. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 1, 33-36.
Galley, M., McKeown K. R., Fosler-Lussier E., & Jing H.. (2003).  Discourse Segmentation of Multi-party Conversation. Proceedings of the 41st Annual Meeting of the Association for Computational Linguistics (ACL-03).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Calle, E., Jové T., Vilà P., & Marzo J. L. (2001).  A Dynamic Multilevel MPLS Protection Domain. Proceedings of the Third International Workshop on Design of Reliable Communication Networks (DRCN 2001).
Shriberg, E., Graciarena M., Bratt H., Kathol A., Kajarekar S., Jameel H., et al. (2008).  Effects of Vocal Effort and Speaking Style on Text-Independent Speaker Verification. 609-612.
Etzioni, O., Hanks S., Jiang T., & Karp R. M. (1996).  Efficient Information Gathering on the Internet. Proceedings. Thirty-Seventh Annual Symposium Foundations of Computer Science. 234-243.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Jia, Y., Salzmann M., & Darrell T. (2010).  Factorized Latent Spaces with Structured Sparsity. 982-990.
Virtanen, S., Jia Y., Klami A., & Darrell T. (2012).  Factorized Multi-Modal Topic Model.
Jung, J., Paxson V., Berger A.., & Balakrishnan H. (2004).  Fast Portscan Detection Using Sequention Hypothesis Testing. Proceedings of IEEE Symposium on Security and Privacy. 211-225.
Iyer, R., Jegelka S., & Bilmes J. A. (2013).  Fast Semidifferential-based Submodular Function Optimization. 28(3), 855-863.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Sharma, S., Ellis D. P. W., Kajarekar S., Jain P., & Hermansky H. (2000).  Feature Extraction Using Non-Linear Transformation for Robust Speech Recognition on the Aurora Database. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000).
Xing, E. P., Jordan M. I., & Karp R. M. (2001).  Feature Selection for High-Dimensional Genomic Microarray Data. Proceedings of the 18th International Conference on Machine Learning (ICML 2001). 601-608.
Bell, A., Jurafsky D., Fosler-Lussier E., Girand C., & Gildea D. (1999).  Forms of English Function Words - Effects of Disfluencies, Turn Position, Age and Sex, and Predictability. Proceedings of the International Congress of Phonetic Sciences. 1, 395-398.
Chen, J., Jiang J., Zheng X., Duan H., Liang J., Li K., et al. (2016).  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Johnson, C. R., & Fillmore C. J. (2000).  The FrameNet Tagset for Frame-Semantic and Syntactic Coding of Predicate-Argument Structure. Proceedings of the First Meeting of the North American Chapter of the Association for Computational Linguistics (ANLP-NAACL 2000). 56-62.
Stolcke, A., Anguera X., Boakye K., etin Ö. Ç., Grezl F., Janin A., et al. (2005).  Further Progress in Meeting Recognition: The ICSI-SRI Spring 2005 Speech-to-Text Evaluation System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 463-475.
Maas, M., Reames P., Morlan J., Asanović K., Joseph A. D., & Kubiatowicz J. D. (2012).  GPUs: An Opportunity for Offloading Garbage Collection.
Guadarrama, S., Riano L., Golland D., Göhring D., Jia Y., Klein D., et al. (2013).  Grounding Spatial Relations for Human-Robot Interaction.

Pages