Publications

Found 1845 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Weaver, N., & Sommer R. (2007).  Stress Testing Cluster Bro. Proceedings of USENiX DETER Community Workshop on Cyber Security Experimentation and Test (DETER 2007).
Song, X., Landau L., Israel J., & Fettweis G. (2015).  Strong LOS MIMO for Short Range mmWave Communication - Towards 1 Tbps Wireless Data Bus. 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB). 1-5.
Koehler, J., Stoffel K., & Hendler J. A. (1996).  Structural Classification - A Preliminary Report.
Sturmfels, B., & Wiegelmann M. (1996).  Structural Gröbner Basis Detection.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
Liu, Y., Shriberg E., Stolcke A., Peskin B., Ang J., Hillard D., et al. (2005).  Structural Metadata Research in the EARS Program. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 957-960.
Shastri, L. (2003).  Structured Connectionist Models.
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Liu, Y., Chawla N.. V., Harper M. P., Shriberg E., & Stolcke A. (2006).  A Study in Machine Learning from Imbalanced Data for Sentence Boundary Detection in Speech. Computer Speech and Language. 20(4), 468-494.
Sah, A., Oklobdjiza V. G., & Verma D. C. (1991).  A Study of I/O Architecture for High Performance Next Generation Computers.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
Cocchi, R., Estrin D., Shenker S., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1990).  Subtree isomorphism is in random NC. Discrete Applied Mathematics. 29(1), 35-62.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1989).  Subtree Isomorphism is in Random NC.
Gibbons, P. B., Karp R. M., Miller G. L., & Soroker D. (1988).  Subtree isomorphism is in random NC. Proceedings of the Third Aegean Workshop on Computing, VLSI Algorithms and Architectures (AWOC 88). 43-52.
Shyr, A., Darrell T., Jordan M. I., & Urtasun R. (2011).  Supervised Hierarchical Pitman-Yor Process for Natural Scene Segmentation.
Clark, D. D., Shenker S., & Zhang L. (1992).  Supporting Real-Time Applications in an Integrated Services Packet Network: Architecture and Mechanism. Proceedings of the ACM SIGCOMM '92 Conference on Communications Architecture & Protocols. 14-26.
Subirats-Rüggeberg, C., & Petruck M. R. L. (2003).  Surprise: Spanish FrameNet!. Proceedings of the Workshop on Frame Semantics.
Bailer, W.., Schoeffmann K.., & Hopfgartner F. (2011).  Survey on Tools for Content Management in TV Post-Production.
Thomas, K., Grier C., Paxson V., & Song D. (2011).  Suspended Accounts in Retrospect: An Analysis of Twitter Spam.
Partridge, C., Rockwell D.., Allman M., Krishnan R., & Sterbenz J. P. G. (2002).  A Swifter Start for TCP.

Pages