Publications

Found 118 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Title is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Q
Qazi, Z. Ayyub, Walls M., Panda A., Sekar V., Ratnasamy S., & Shenker S. J. (2017).  A High Performance Packet Core for Next Generation Cellular Networks.. Proceedings of the Conference of the ACM Special Interest Group on Data Communication SIGNCOMM '17.
S
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Salfner, F. (2008).  Hardware Reliability; Software Reliability; Performability.
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Shapiro, V., & Liu X. (2019).  Homogenization of material properties in additively manufactured structures. US Patent 10353378.
Shem-Tov, D., & Halperin E. (2014).  Historical Pedigree Reconstruction from Extant Populations Using PArtitioning of RElatives (PREPARE). PLoS Computational Biology. 10(6), 
Shriberg, E. (2007).  Higher Level Features in Speaker Recognition. 241-259.
Sivadas, S., & Hermansky H. (2002).  Hierarchical Tandem Feature Extraction. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2002).
Sommer, R., Vallentin M., De Carli L., & Paxson V. (2014).  HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis.
Sommer, R., De Carli L., Kothari N., Vallentin M., & Paxson V. (2012).  HILTI: An Abstract Execution Environment for Concurrent, Stateful Network Traffic Analysis.
Sommer, R., Weaver N., & Paxson V. (2010).  HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Stern, R. M., & Morgan N. (2012).  Hearing is Believing: Biologically-Inspired Feature Extraction for Robust Automatic Speech Recognition. Signal Processing Magazine. 29(6), 34-43.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.

Pages