Publications

Found 593 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Volkamer, M.., Schryen G., Langer L.., Schmitt A.., & Buchmann J.. (2009).  Elektronische Wahlen: Verifizierung vs. Zertifizierung.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Lakshminarayanan, K., Rao A., Stoica I., & Shenker S. J. (2006).  End-Host Controlled Multicast Routing. Elsevier Computer Networks. 5(6), 807-825.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Liu, Y., Shriberg E., Stolcke A., Hillard D., Ostendorf M., & Harper M. P. (2006).  Enriching Speech Recognition with Automatic Detection of Sentence Boundaries and Disfluencies. IEEE Transactions on Audio. 14(5), 1526-1540.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Arkin, Y'ara., Rahmani E., Kleber M. E., Laaksonen R., März W., & Halperin E. (2014).  EPIQ—Efficient Detection of SNP–SNP Epistatic Interactions for Quantitative Traits. Bioinformatics. 30(12), i19-i25.
Karpinski, M., & Lhotzky B. (1991).  An (epsilon, delta)--Approximation Algorithm of the Number of Zeros for a Multilinear Polynomial over GF[q].
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Chen, L., Liu Y., Harper M. P., Maia E.., & McRoy S.. (2004).  Evaluating Factors Impacting the Accuracy of Forced Alignments in a Multimodal Corpus. Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 759-762.
Lässig, J., & Sudholt D. (2010).  Experimental Supplements to the Theoretical Analysis of Migration in the Island Model. 224-233.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Hakkani-Tür, D., Tur G., & Levit M. (2007).  Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2012).  On Exploiting Innocuous User Activity for Correlating Accounts Across Social Network Sites.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Hasegawa, Y., Lee-Goldman R., Ohara K. Hirose, Fujii S., & Fillmore C. J. (2010).  On Expressing Measurement and Comparison in Japanese and English. 169-198.

Pages