Publications

Found 642 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is R  [Clear All Filters]
Conference Paper
Batten, C., Joshi A., Orcutt J., Khilo A., Moss B., Holzwarth C., et al. (2008).  Building Manycore Processor-to-DRAM Networks with Monolithic Silicon Photonics. 21-30.
Tur, G., Stolcke A., Voss L., Dowding J., Favre B., Fernández R., et al. (2008).  The CALO Meeting Speech Recognition and Understanding System. 69-72.
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Ouyang, T., Ray S., Rabinovich M., & Allman M. (2011).  Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?.
Argyraki, K., Baset S., Chun B-G., Fall K., Iannaccone G., Knies A., et al. (2008).  Can Software Routers Scale?.
Rückert, U. (2009).  Capacity Control for Partially Ordered Feature Sets. 318-333.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Ousterhout, K., Panda A., Rosen J., Venkataraman S., Xin R., Ratnasamy S., et al. (2013).  The Case for Tiny Tasks in Compute Clusters. 1-6.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Chawathe, Y., Ramabhadran S., Ratnasamy S., LaMarca A., Shenker S. J., & Hellerstein J. M. (2005).  A Case Study in Building Layered DHT Applications. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 97-108.
Franklin, A., Drivonikou V. G., Bevis L.., Kay P., & Regier T. (2008).  Categorical Perception of Color is Lateralized to the Right Hemisphere in Infants, but to the Left Hemisphere in Adults. 105(9), 3221-3225.
Bourlard, H., Morgan N., Wooters C., & Renals S. (1992).  CDNN: A Context Dependent Neural Network for Continuous Speech Recognition. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing.
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Popa, L., Yu M., Ko S.. Y., Ratnasamy S., & Stoica I. (2010).  CloudPolice: Taking Access Control out of the Network.
Garg, N. P., Favre B., Riedhammer K., & Hakkani-Tür D. (2009).  ClusterRank: A Graph Based Method for Meeting Summarization. 1499-1502.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Ruppenhofer, J., Baker C. F., & Fillmore C. J. (2002).  Collocational Information in the FrameNet Database. Proceedings of the Tenth Euralex International Congress. 359-369.
Regier, T., Kay P., & Khetarpal N. (2007).  Color Naming Is Near Optimal. 15.
Regier, T., Kay P., & Khetarpal N. (2007).  Color Naming Reflects Optimal Partitions of Color Space. 104(4), 1436-1441.
Ferber, M., Rauber T., & Hunold S. (2010).  Combining Object-Oriented Design and SOA with Remote Objects over Web Services. 83-90.
Kotzias, P., Razaghpanah A., Amann J., Paterson K. G., Vallina-Rodriguez N., & Caballero J. (2018).  Coming of Age: A Longitudinal Study of TLS Deployment. Proceedings of IMC 18.
Allman, M., Martin L., Rabinovich M., & Atchinson K. (2008).  On Community-Oriented Internet Measurement. 112-121.

Pages