Publications
Found 541 results
Author Title [ Type] Year Filters: First Letter Of Last Name is W [Clear All Filters]
(2014).
(2012).
(2012).
(2011).
(2012).
Combining Belief and Utility in a Structured Connectionist Agent Architecture.
Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
(2002). Combining Generational and Conservative Garbage Collection: Framework and Implementations.
Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 261-269.
(1990).
(2010). A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation.
Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
(2000).
(2009). The Complexity of Parallel Search.
Proceedings of the 17th Annual ACM Symposium on the Theory of Computing. 225-253.
(1988).
(2007). Connecting Online Work and Online Education at Scale.
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
(2016). A Connectionist Model of Planning via Back-Chaining Search.
Proceedings of the 20th Workshop of the UK Planning and Scheduling Special Interest Group (PLANSIG 2001).
(2001). A Connectionist Model of Planning via Back-Chaining Search.
Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
(2002). Connectionist-Based Acoustic Word Models.
Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.
(1992). Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
(2018). Contextualizing Privacy Decisions for Better Prediction (and Protection).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
(2018). Continuous Speech Recognition Using PLP Analysis with Multilayer Perceptrons.
Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing. 49-52.
(1991).
(2015).
(2015). DDoS Defense by Offense.
Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
(2006). Design Guidelines for Robust Internet Protocols.
Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
(2002). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019). Detecting DNS Root Manipulation.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).