Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
H
Shem-Tov, D., & Halperin E. (2014).  Historical Pedigree Reconstruction from Extant Populations Using PArtitioning of RElatives (PREPARE). PLoS Computational Biology. 10(6), 
Allman, M., Kruse H., & Ostermann S. (2000).  A History of the Improvement of Internet Protocols Over Satellites Using ACTS.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next Generation Inter-domain Routing Protocol.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2007).  Holding the Internet Accountable. 1-7.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Shapiro, V., & Liu X. (2019).  Homogenization of material properties in additively manufactured structures. US Patent 10353378.
Liu, X., & Shapiro V. (2016).  Homogenization of material properties in additively manufactured structures. Computer-Aided Design. 78, 71-82.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2002).  Host Mobility Using an Internet Indirection Infrastructure.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2005).  Host Mobility Using an Internet Indirection Infrastructure. Wireless Networks. 11(6), 741-756.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Kutten, S., Ostrovsky R., & Patt-Shamir B. (1993).  How and When to Be Unique.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Weaver, N. (2020).  How Easy Is it to Build a Robot Assassin?. Lawfare.
Maass, W., & Turan G. (1990).  How Fast Can A Threshold Gate Learn?.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Pal, J., Lyman P., Varian H. R., Charles P., Good N., Jordan L. Lamar, et al. (2003).  How Much Information.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Omohundro, S., & Mel B. W. (1991).  How Receptive Field Parameters Affect Neural Learning.

Pages