Publications

Found 541 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Wang, J., Majumdar A., & Ramchandran K. (2005).  On Enhancing MPEG Video Broadcast Over Wireless Networks with an Auxiliary Broadcast Channel. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005).
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications: the Extended Version.
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Karp, R. M., Kenyon C., & Waarts O. (1999).  Error-Resilient DNA Computation. 15,
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Kreibich, C., Weaver N., Maier G., Nechaev B., & Paxson V. (2011).  Experiences from Netalyzr with Engaging Users in End-System Measurement. 25-30.
Morgan, N., Wooters C., Hermansky H., & Bourlard H. (1991).  Experiments with Temporal Resolution for Continuous Speech Recognition with Multi-Layer Perceptrons. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 405-410.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Kumar, A., Paxson V., & Weaver N. (2005).  Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.
F
Su, H., & Wegmann S. (2016).  Factor analysis based speaker verification using ASR. Proceedings of Interspeech 2016.
Salfner, F., & Wolter K. (2008).  Fast Abstract: Replication vs. Failure Precention--How to Boost Service Availability?. Proceedings of the 19th International Symposium on Software Reliability Engineering (ISSRE 2008). 289-290.
Karp, R. M., & Wigderson A. (1985).  A fast parallel algorithm for the maximal independent set problem. Journal of the Association for Computing Machinery. 32(4), 762-773.
Ostrovsky, R., & Wilkerson D. (1994).  Faster Computation On Directed Networks of Automata.
Wang, D., Mahoney M., Mohan N., & Rao S. (2015).  Faster Parallel Solver for Positive Linear Programs via Dynamically-Bucketed Selective Coordinate Descent.
Huang, Y., Vinyals O., Friedland G., Müller C., Mirghafori N., & Wooters C. (2007).  A Fast-Match Approach for Robust, Faster than Real-Time Speaker Diarization. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding. 693-698.
Dhawan, M.., Samuel J.., Teixeira R., Kreibich C., Allman M., Weaver N., et al. (2012).  Fathom: A Browser-based Network Measurement Platform.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Neumann, F., Sudholt D., & Witt C. (2010).  A Few Ants Are Enough: ACO with Iteration-Best Update. 63-70.

Pages