Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Revisiting SSL: A Large Scale Study of the Internet's Most Trusted Protocol.
Amann, J., Gasser O., Scheitle Q., Brent L., Carle G., & Holz R. (2017).  Mission Accomplished? HTTPS Security after DigiNotar. Proceedings of the IMC 2017.
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Amann, J., Vallentin M., Hall S., & Sommer R. (2012).  Extracting Certificates from Live Traffic: A Near Real Time SSL Notary Service.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Amengual, A. (2009).  A Specification of a Hybrid Petri Net Semantics for the HISim Simulator.
Amengual, A. (2009).  A computational model of attachment secure responses in the Strange Situation.
Amir, E., Krathgamer R., & Rao S. (2002).  Constant-Factor Approximation of Vertex-Cuts in Planar Graphs.
Amirshahi, S. Ali, Anoosheh A., Yu S. X., Suchan J., Schultz C., & Bhatt M. (2017).  Symmetry in the Eye of the Beholder . Proceedings of Vision Sciences Society Annual Meeting.
Amirshahi, S. Ali, Pedersen M., & Yu S. X. (2016).  Image Quality Assessment by Comparing CNN Features Between Images. Journal of Imaging Science and Technology.
Anand, A.., Gupta A., Akella A., Seshan S., & Shenker S. J. (2008).  Packet Caches on Routers: The Implications of Universal Redundant Traffic Elimination. 219-230.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2013).  Effective Straggler Mitigation: Attack of the Clones. 185-198.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2011).  Disk-Locality in Datacenter Computing Considered Irrelevant. 1-5.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  Enabling Innovation Below the Communication API.
Ananthanarayanan, G., Ghodsi A., Wang A., Borthakur D., Kandula S., Shenker S. J., et al. (2012).  PACMan: Coordinated Memory Caching for Parallel Jobs. 1-14.
Ananthanarayanan, G., Heimerl K., Zaharia M., Demmer M., Koponen T., Tavakoli A., et al. (2009).  A New Communications API.
Ananthanarayanan, G., Ghodsi A., Shenker S. J., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Andeani, G.., Di Fabbrizio D.., Gilbert M.., Gillick D., Hakkani-Tür D., & Lemon O.. (2006).  Let's DISCOH: Collecting an Annotated Open Corpus with Dialogue Acts and Reward Signals for Natural Language Helpdesks. Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 218-221.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2007).  Holding the Internet Accountable. 1-7.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2008).  Accountable Internet Protocol (AIP). 339-350.
Andersen, D. G., Du S. S., Mahoney M., Melgaard C., Wu K., & Gu M. (2015).  Spectral Gap Error Bounds for Improving CUR Matrix Decomposition and the Nystrom Method.
Anderson, T., Shenker S. J., Stoica I., & Wetherall D. (2002).  Design Guidelines for Robust Internet Protocols. Proceedings of the First Workshop on Hot Topics in Networks (HotNets-I).

Pages