Publications

Found 266 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is J  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Jung, J., Milito R. A., & Paxson V. (2008).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. Journal on Computer Virology. 4(1), 197-210.
Jung, J., Milito R. A., & Paxson V. (2007).  On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. 175-192.
Zhang, L., Michel S.., Nguyen K.., Rosenstein A.., Floyd S., & Jacobson V. (1998).  Adaptive Web Caching: Towards a New Global Caching Architecture. Proceedings of the Third International WWW Caching Workshop.
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
Jamin, S., Shenker S., Zhang L., & Clark D. D. (1992).  An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract). Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
Fàbrega, L., Jové T., Bueno A., & Marzo J. L. (2001).  An Admission Control Approach for Elastic Flows in the Internet. Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Jansen, T., & Sudholt D. (2010).  Analysis of an Asymmetric Mutation Operator. Evolutionary Computation. 18(1), 1-26.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Friedland, G., Hensley E., Schumacher J., & Jain R. (2008).  Appscio: A Software Environment for Semantic Multimedia Analysis. 456-459.
Francis, P., Jamin S., Paxson V., Zhang L., Gryniewicz D. F., & Jin Y. (1999).  An Architecture for a Global Internet Host Distance Estimation Service. Proceedings of IEEE INFOCOM.
Francis, P., Jamin S., Paxson V., Zhang L., Gryniewicz D. F., & Jin Y. (1999).  An Architecture for a Global Internet Host Distance Estimation Service. Proceedings of IEEE INFOCOM.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 4(3), 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Jiang, X., Taneja J., Ortiz J., Tavakoli A., Dutta P., Jeong J., et al. (2007).  An Architecture for Energy Management in Wireless Sensor Networks. 31-36.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Kimmel, G., Karp R. M., Jordan M.. A., & Halperin E. (2008).  Association Mapping and Significance Estimation via the Coalescent. Journal of Human Genetics. 83(6), 675-683.
Gildea, D., & Jurafsky D. (1994).  Automatic Induction of Finite State Transducers for Simple Phonological Rules.
Gildea, D., & Jurafsky D. (2002).  Automatic Labeling of Semantic Roles. Computational Linguistics. 28(3), 245-288.
Gildea, D., & Jurafsky D. (2001).  Automatic Labeling of Semantic Roles.
Gildea, D., & Jurafsky D. (2000).  Automatic Labeling of Semantic Roles. The 38th Annual Meeting of the Association for Computational Linguistics (ACL-2000). 512-520.

Pages