Publications

Found 701 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is G  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Zaharia, M., Hindman B., Konwinski A., Ghodsi A., Joseph A. D., Katz R. H., et al. (2011).  The Datacenter Needs an Operating System. 1-5.
Shenker, S., Ratnasamy S., Karp B., Govindan R., & Estrin D. (2002).  Data-Centric Storage in Sensornets. Workshop Record of the First Workshop on Hot Topics in Networks (HotNets-I).
Shenker, S., Ratnasamy S., Karp B., Govindan R., & Estrin D. (2003).  Data-Centric Storage in Sensornets. ACM SIGCOMM Computer Communication Review. 33(1), 137-142.
Ratnasamy, S., Karp B., Shenker S., Estrin D., Govindan R., Yin L., et al. (2003).  Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. 8(4), 427-442.
Shastri, L., & Grannes D. Jeffrey (1995).  Dealing with Negated Knowledge and Inconsistency in a Neurally Motivated Model of Memory and Reflexive Reasoning.
Shastri, L., & Grannes D. Jeffrey (1995).  Dealing with negated knowledge and inconsistency in a neurally motivated model of memory and reflexive reasoning.
Gao, Y., Hendricks L. Anne, Kuchenbecker K. J., & Darrell T. (2016).  Deep learning for tactile understanding from visual and haptic data. IEEE International Conference on Robotics and Automation (ICRA). 536-543.
Girshick, R., Iandola F., Darrell T., & Malik J. (2015).  Deformable Part Models are Convolutional Neural Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 437-446.
Iandola, F., Moskewicz M., Karayev S., Girshick R., Darrell T., & Keutzer K. (2014).  DenseNet: Implementing Efficient ConvNet Descriptor Pyramids.
Thomas, K., Grier C., Ma J., Paxson V., & Song D. (2011).  Design and Evaluation of a Real-Time URL Spam Filtering Service. 447-464.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Handley, M., Kohler E., Ghosh A., Hodson O., & Radoslavov P. (2005).  Designing Extensible IP Router Software. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 189-202.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Pupko, T., Sharan R., Hasegawa M.., Shamir R., & Graur D.. (2003).  Detecting Excess Radical Replacements in Phylogenetic Trees. Gene. 127-135.
Reis, C.., Gribble S., Kohno T.., & Weaver N. (2008).  Detecting In-Flight Page Changes with Web Tripwires. 31-44.
Lindfors, E., Gopalacharyulu P. V., Halperin E., & Orešič M. (2009).  Detection of Molecular Paths Associated with Insulitis and Type 1 Diabetes in Non-Obese Diabetic Mouse. PLoS ONE. 4(10), 
Griesemer, R. (1994).  Detection of Side-Effects in Function Procedures.
Giammarresi, D., & Montalbano R. (1996).  Deterministic Generalized Automata.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Vergyri, D., Mandal A., Wang W., Stolcke A., Zheng J., Graciarena M., et al. (2008).  Development of the SRI/Nightingale Arabic ASR system. 1437-1440.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Elsevier Journal of Ad Hoc Networks. 1,

Pages