Publications

Found 1886 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Bhagat, S., Carvey H., & Shriberg E. (2003).  Automatically Generated Prosodic Cues to Lexically Ambiguous Dialog Acts in Multiparty Meetings. Proceedings of the 15th International Congress of Phonetic Sciences (ICPhS 2003).
Satzger, B., Pietzowski A., & Ungerer T. (2011).  Autonomous and Scalable Failure Detection in Distributed Systems. International Journal of Autonomous and Adaptive Communications Systems. 4(1), 61-77.
Moulin, H., & Shenker S. J. (1994).  Average Cost Pricing Versus Serial Cost Sharing: An Axiomatic Comparison. Journal of Economic Theory. 64(1), 178-201.
Zarchy, D., Mittal R., Schapira M., & Shenker S. J. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Zarchy, D., Mittal R., Schapira M., & Shenker S. J. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
B
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Seidel, R.. (1992).  Backwards Analysis of Randomized Geometric Algorithms.
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Kadanoff, L. P., & Shenker S. J. (1981).  Band to Band Hopping in One-Dimensional Maps. Journal of Physics A: Mathematical and General. 14(2), L23-26.
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 215-219.
Zimmermann, M., Liu Y., Shriberg E., & Stolcke A. (2005).  A* Based Joint Segmentation and Classification of Dialog Acts in Multi-Party Meetings. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 215-219.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNP and Haplotypes. 99-112.
Xing, E. P., Sharan R., & Jordan M. I. (2004).  Bayesian Haplotype Inference via the Dirichlet Process. Proceedings of ICML 2004.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Peters, N., & Schmeder A. W. (2011).  Beamforming using a spherical microphone array based on legacy microphone characteristics.
Lässig, J., & Sudholt D. (2010).  The Benefit of Migration in Parallel Evolutionary Algorithms. 1105-1112.
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Jurafsky, D., Wooters C., Tajchman G., Segal J., Stolcke A., Fosler-Lussier E., et al. (1994).  The Berkeley Restaurant Project. Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
Narayan, A., Panda A., Alizadeh M., Balakrishnan H., Krishnamurthy A., & Shenker S. J. (2020).  Bertha: Tunneling through the Network API. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
Breslau, L., & Shenker S. J. (1998).  Best-Effort versus Reservations: A Simple Comparative Analysis. ACM Computer Communication Review. 28, 3-16.
Stolcke, A., & Omohundro S. (1994).  Best-First Model Merging for Hidden Markov Model Induction.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Kantchelian, A., Tschantz M. Carl, Afroz S., Miller B., Shankar V., Bachwani R., et al. (2015).  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.

Pages