Publications

Found 541 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Bachrach, J., Vo H., Richards B., Lee Y., Waterman A., Avižienis R., et al. (2012).  Chisel: Constructing Hardware in a Scala Embedded Language.
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Wang, Z., Hormozdiari F., Yang W-Y., Halperin E., & Eskin E. (2012).  CNVeM: Copy Number Variation Detection Using Uncertainty of Read Mapping. 326-340.
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Demers, A. J., Weiser M., Hayes B., Boehm H-J.., Bobrow D., & Shenker S. J. (1990).  Combining Generational and Conservative Garbage Collection: Framework and Implementations. Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL). 261-269.
Valente, F., Magimai-Doss M., Plahl C., Ravuri S., & Wang W. (2010).  A Comparative Large Scale Study of MLP Features for Mandarin ASR. 2630-2633.
Wester, M., & Fosler-Lussier E. (2000).  A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Shetty, N., Schwartz G., Felegyhazi M., & Walrand J. (2009).  Competitive Cyber-Insurance and Internet Security.
Karp, R. M., Upfal E., & Wigderson A. (1988).  The Complexity of Parallel Search. Proceedings of the 17th Annual ACM Symposium on the Theory of Computing. 225-253.
Liu, D., Allman M., Jin S., & Wang L. (2007).  Congestion Control Without a Startup Phase.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Garagnani, M., Shastri L., & Wendelken C. (2001).  A Connectionist Model of Planning via Back-Chaining Search. Proceedings of the 20th Workshop of the UK Planning and Scheduling Special Interest Group (PLANSIG 2001).
Garagnani, M., Shastri L., & Wendelken C. (2002).  A Connectionist Model of Planning via Back-Chaining Search. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Wooters, C., & Morgan N. (1992).  Connectionist-Based Acoustic Word Models. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 157-163.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Morgan, N., Hermansky H., Bourlard H., Kohn P., & Wooters C. (1991).  Continuous Speech Recognition Using PLP Analysis with Multilayer Perceptrons. Proceedings of IEEE International Conference on Acoustics, Speech & Signal Processing. 49-52.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Walfish, M., Vutukuru M., Balakrishnan H., Karger D. R., & Shenker S. J. (2006).  DDoS Defense by Offense. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2006). 303-314.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).

Pages