Publications

Found 187 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Lischke, G. (1992).  The Quality of Separation Between NP and Exponential Time; Reducing the Cases.
[Anonymous] (1991).  Advances in Neural Information Processing Systems 3. (Lippmann, R.., Moody J., & Touretzky D.., Ed.).
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Lin, H.., Amanatidis C.., Sideri M.., Karp R. M., & Papadimitriou C. H. (2008).  Linked Decomposition of Networks and the Power of Choice in Polya Urns. Proceedings of ACM-SIAM Symposium on Discrete Algorithms (SODA 2008). 993-1002.
Lim, C-C. (1993).  A Parallel Object-Oriented System for Realizing Reusable and Efficient Data Abstractions.
Lim, S. Hoe, N. Erichson B., Hodgkinson L., & Mahoney M. (2021).  Noisy Recurrent Neural Networks. Advances in Neural Information Processing Systems Conference. 34,
Lim, C-C., & Stolcke A. (1991).  Sather Language Design and Performance Evaluation.
Liebeherr, J., & Wrege D. E. (1994).  Design and Analysis of a High-Performance Packet Multiplexer for Multiservice Networks with Delay Guarantees.
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.
Liao, Y., & Moody J. (1996).  A Neural Network Visualization and Sensitivity Analysis Toolkit. Proceedings of the International Conference on Neural Information Processing. 1069-1074.
Liao, Y., & Moody J. (2000).  Constructing Heterogeneous Committees via Input Feature Grouping. 12,
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Li, F.., & Paxson V. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.

Pages