Publications

Found 1144 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is K  [Clear All Filters]
2013
Panda, A., Scott C., Ghodsi A., Koponen T., & Shenker S. J. (2013).  CAP for Networks. 91-96.
Lee, Y., Krashinsky R., Grover V., Keckler S. W., & Asanović K. (2013).  Convergence and Scalarization for Data-Parallel Architectures.
Lee, Y., Krashinsky R., Grover V., Keckler S. W., & Asanović K. (2013).  Convergence and Scalarization for Data-Parallel Architectures.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
Krishnamoorthy, N., Malkarnenkar G., Mooney R., Saenko K., & Guadarrama S. (2013).  Generating Natural-Language Video Descriptions Using Text-Mined Knowledge.
Guadarrama, S., Riano L., Golland D., Göhring D., Jia Y., Klein D., et al. (2013).  Grounding Spatial Relations for Human-Robot Interaction.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Kirchner, M., Winkler P., & Farid H. (2013).  Impeding Forgers at Photo Inception.
Jegelka, S., Kapoor A., & Horvitz E. (2013).  An Interactive Approach to Solving Correspondence Problems. International Journal of Computer Vision.
Fayazbakhsh, S. Kaveh, Lin Y., Tootoonchian A., Ghodsi A., Koponen T., Maggs B. M., et al. (2013).  Less Pain, Most of the Gain: Incrementally Deployable ICN. 147-158.
Heller, B., Scott C., McKeown N., Shenker S. J., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Kelm, P., Schmiedeke S., Choi J., Friedland G., Ekambaram V., Ramchandran K., et al. (2013).  A Novel Fusion Method for Integrating Multiple Modalities and Knowledge for Multimodal Location Estimation. 7-12.
Alizadeh, M., Yang S., Sharif M., Katti S., McKeown N., Prabhakar B., et al. (2013).  pFabric: Minimal Near-Optimal Datacenter Transport. 435-446.
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
Ryu, S-J., Kirchner M., Lee M-J., & Lee H-K. (2013).  Rotation Invariant Localization of Duplicated Image Regions Based on Zernike Moments. IEEE Transactions on Information Forensics and Security. 8(8), 1355-1370.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Khattak, S., Javed M., Anderson P. D., & Paxson V. (2013).  Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion.
Thomas, K., McCoy D., Grier C., Kolcz A., & Paxson V. (2013).  Traf?cking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2013).  Using Robotic Exploratory Procedures to Learn the Meaning of Haptic Adjectives.
Guadarrama, S., Krishnamoorthy N., Malkarnenkar G., Mooney R., Darrell T., & Saenko K. (2013).  YouTube2Text: Recognizing and Describing Arbitrary Activities Using Semantic Hierarchies and Zero-Shoot Recognition.

Pages