Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Chawathe, Y., Ratnasamy S., Breslau L., & Shenker S. J. (2003).  Making Gnutella-Like P2P Systems Scalable. Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 407-418.
Harchol, Y., Mushtaq A., Fang V., McCauley J. Murphy, Panda A., & Shenker S. J. (2020).  Making edge-computing resilient. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
Moody, J. (1995).  Macroeconomic Forecasting: Challenges and Neural Network Solutions. Proceedings of the International Symposium on Artificial Neural Networks.
Kramer, O. (2011).  Machine Symbol Grounding and Optimization.
Bharghavan, V., Demers A. J., Shenker S. J., & Zhang L. (1994).  MACAW: A Media Access Protocol for Wireless LAN's. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). 212-225.
Hunold, S. (2010).  Low-Cost Tuning of Two-Step Algorithms for Scheduling Mixed-Parallel Applications onto Homogeneous Clusters. 253-261.
Jantz, K., Friedland G., Knipping L., & Rojas R. (2007).  A Low-Cost Mobile Pointing and Drawing Device. 121-122.
Chiang, H-L., Kadur T., Rave W., & Fettweis G. (2016).  Low-complexity spatial channel estimation and hybrid beamforming for millimeter wave links. 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). 1-7.
Elizalde, B. Martinez, & Friedland G. (2013).  Lost in Segmentation: Three Approaches for Speech/Non-Speech Detection in Consumer-Produced Videos.
Argyraki, K., Maniatis P., Irzak O.., Subramanian A.., & Shenker S. J. (2007).  Loss and Delay Accountability for the Internet. 194-205.
Khattak, S., Javed M., Khayam S. Ali, Uzmi Z. Afzal, & Paxson V. (2014).  A Look at the Consequences of Internet Censorship Through an ISP Lens.
Chen, B. Y., Zhu Q., & Morgan N. (2004).  Long-Term Temporal Features for Conversational Speech Recognition. Proceedings of the First International Workshop on Machine Learning for Multimodal Interaction (MLMI 2004).
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Wang, X., Lian L., Miao Z., Liu Z., & Yu S. X. (2021).  Long-tailed Recognition by Routing Diverse Distribution-Aware Experts. Proceedings of International Conference on Learning Representations.
Callahan, T., Allman M., & Paxson V. (2010).  A Longitudinal View of HTTP Traffic.
Tsai, T.. J., & Morgan N. (2012).  Longer Features: They Do a Speech Detector Good.
Amann, J., Sommer R., Sharma A., & Hall S. (2012).  A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333.
Tantau, T. (2004).  A Logspace Approximation Scheme for the Shortest Path Problem for Graphs with Bounded Independence Number.
Culler, D. E., Karp R. M., Patterson D., Sahay A., Schauser K. Erik, Santos E. E., et al. (1993).  LogP: towards a realistic model of parallel computation. Proceedings of the Fourth ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. 1-12.
Xing, E. P., Wu W.., Jordan M. I., & Karp R. M. (2003).  LOGOS: A Modular Bayesian Model for de Novo Motif Detection. Proceedings of IEEE Computer Society Bioinformatic Conference IPTPS.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Urtasun, R., & Darrell T. (2008).  Local Probabilistic Regression for Activity-Independent Human Pose Inference.
Liu, C-G., Estrin D., Shenker S. J., & Zhang L. (1998).  Local error recovery in SRM: comparison of two approaches. Proceedings of IEEE/ACM Transactions on Networking. 6, 686-699.
Salzmann, M., Urtasun R., & Fua P. (2008).  Local Deformation Models for Monocular 3D Shape Recovery.
Karp, R. M., Rao A., Lakshminarayanan K., Surana S., & Stoica I. (2003).  Load Balancing in Structured P2P Systems. Proceedings of the Second International Workshop on Peer-to-Peer Systems.

Pages