Publications

Found 289 results
Author Title Type [ Year(Desc)]
Filters: First Letter Of Title is P  [Clear All Filters]
2004
Mirghafori, N., & Hébert M. (2004).  Parameterization of the Score Threshold for a Text-Dependent Adaptive Speaker Verification System. Proceedings of IEEE ICASSP.
Gramm, J., Guo J., & Niedermeier R. (2004).  Parameterized Intractability of Distinguishing Substring Selection. Theory of Computing Systems.
Kelley, B. P., Yuan B., Lewitter F., Sharan R., Stockwell B. R., & Ideker T. E. (2004).  PathBLAST: A Tool for Alignment of Protein Interaction Networks. 32, W83-W88.
Gramm, J., Guo J., & Niedermeier R. (2004).  Pattern Matching for Arc-Annotated Sequences. Journal of Algorithms.
Gramm, J., Nierhoff T., & Tantau T. (2004).  Perfect Path Phylogeny Haplotyping with Missing Data is Fixed-Parameter Tractable. Proceedings of the First International Workshop on Parameterized and Exact Computation (IWPEC 2004).
Halperin, E., & Karp R. M. (2004).  Perfect Phylogeny and Haplotype Assignment. Proceedings of RECOMB.
Gramm, J. (2004).  A Polynomial-Time Algorithm for the Matching of Crossing Contact-Map Patterns. Proceedings of the Fourth International Workshop on Algorithms in Bioinformatics (WABI 2004).
Kim, Y.., Govindan R., Karp B., & Shenker S. (2004).  Practical and Robust Geographic Routing in Wireless Networks.
Kay, P. (2004).  Pragmatic Aspects of Grammatical Constructions.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Stolcke, A., Wooters C., Mirghafori N., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  Progress in Meeting Recognition: The ICSI-SRI-UW Spring 2004 Evaluation System. NIST ICASSP 2004 Meeting Recognition Workshop.
Shriberg, E., & Stolcke A. (2004).  Prosody Modeling for Automatic Speech Recognition and Understanding. 105-114.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Ruiz, P. M., Botia J., & Gómez-Skarmeta A. (2004).  Providing QoS through Machine Learning-Driven Adaptive Multimedia Applications. IEEE Transactions on Systems. 34(3), 1398-1422.
2005
Balakrishnan, H., Shenker S., & Walfish M. (2005).  Peering Peer-to-Peer Providers. Proceedings of the Fourth International Workshop on Peer-to-Peer Systems (IPTPS05). 104-114.
Cohen, E., Halperin E., & Kaplan H.. (2005).  Performance Aspects of Distributed Caches Using TTL-Based Consistency. Theoretical Computer Science. 331(1), 73-96.
Kim, Y-J., Govindan R., Karp B., & Shenker S. (2005).  On the Pitfalls of Geographic Face Routing. Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing. 34-43.
Kreibich, C., & Sommer R. (2005).  Policy-Controlled Event Management for Distributed Intrusion Detection. Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). 4, 385-391.
Adler, I., Ahn H-S., Karp R. M., & Ross S. M. (2005).  A Probabilistic Model for the Survivability of Cells. Journal of Applied Probability. 42(4), 919-931.
Morgan, N., Zhu Q., Stolcke A., Sönmez K., Sivadas S., Shinozaki T., et al. (2005).  Pushing the Envelope - Aside. IEEE Signal Processing Magazine. 22(5), 81-88.
2006
Stoll, L. (2006).  Phonetic- and Speaker-Discriminant Features for Speaker Recognition.
Mehta, A., Shenker S., & Vazirani V. V. (2006).  Posted Price Profit Maximization for Multicast by Approximating Fixed Points. Journal of Algorithms. 58(2), 150-164.
Perfors, A., Tenenbaum J., & Regier T. (2006).  Poverty of the Stimulus? A Rational Approach. Proceedings of the 28th Annual Conference of the Cognitive Science Society (CogSci 2006).
Ee, C. Tien, Ratnasamy S., & Shenker S. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Cui, W., Paxson V., Weaver N., & Katz R. H. (2006).  Protocol-Independent Adaptive Replay of Application Dialog. Proceedings of the 13th Annual Symposium on Network and Distributed System Security (NDSS'06).

Pages