Publications

Found 118 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.
Paxson, V. (2009).  How the Pursuit of Truth Led Me to Selling Viagra.
Kotro, T.., Lindh-Knuutila T., & Hiltunen E.. (2009).  How to Analyze Various Consumer Data in the Future?. 135-143.
Plaskota, L. (1995).  How to Benefit From Noise.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Ladkin, P., & Reinefeld A. (1991).  How to Solve Interval Constraint Networks: The Definitive Answer - Probably.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.

Pages