Publications
Found 593 results
Author [ Title] Type Year Filters: First Letter Of Last Name is L [Clear All Filters]
(2009).
The Emergence of a Networking Primitive in Wireless Sensor Networks.
Communications of the ACM. 51(7), 99-106.
(2008). End-Host Controlled Multicast Routing.
Elsevier Computer Networks. 5(6), 807-825.
(2006). End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic.
Proceedings of the IEEE International Conference on Communications 2019.
(2019). End-to-end training of deep visuomotor policies.
Journal of Machine Learning Research. 17, 1–40.
(2016). Enhancing P2P File-Sharing with an Internet-Scale Query Processor.
Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
(2004). Enriching Speech Recognition with Automatic Detection of Sentence Boundaries and Disfluencies.
IEEE Transactions on Audio. 14(5), 1526-1540.
(2006).
(2013). Epidemic Algorithms for Replicated Database Maintenance.
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
(1987). EPIQEfficient Detection of SNPSNP Epistatic Interactions for Quantitative Traits.
Bioinformatics. 30(12), i19-i25.
(2014).
(1991). Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap.
Proceedings of the 35th ICML Conference. 3223-3232.
(2018). Evaluating Anti-Fingerprinting Privacy Enhancing Technologies.
Proceedings of the WWW'19 (World Wide Web Conference).
(2019). Evaluating Factors Impacting the Accuracy of Forced Alignments in a Multimodal Corpus.
Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 759-762.
(2004).
(2010).
(2009). Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks.
Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
(2007).
(2013).
(2012). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015). Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators.
129-140.
(2011).
(2011).
(2010).
(1994).
(2009).