Publications
Found 1144 results
Author [ Title] Type Year Filters: First Letter Of Last Name is K [Clear All Filters]
(2013).
You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016).
(2015). X-Trace: A Pervasive Network Tracing Framework.
Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
(2007).
(2002).
(1995).
(1995).
(1995).
(2005).
(2010).
Within-Class Covariance Normalization for SVM-Based Speaker Recognition.
Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1471-1474.
(2006). Whorf Hypothesis Is Supported in the Right Visual Field but Not The Left.
Proceedings of the National Academy of Sciences of the United States of America. 103(2), 489-494.
(2006).
(2012). When is the assignment bound tight for the asymmetric traveling-salesman problem?.
SIAM Journal on Computing. 24(3), 484-493.
(1995).
(1992).
(2011).
(2011).
(2011).
(1996).
Visualizing Large-Screen Electronic Chalkboard Content on Handheld Devices.
Proceedings of the Second IEEE International Workshop on Multimedia Technologies for E-Learning at 9th IEEE Symposium on Multimedia. 369-375.
(2007).
(2015).
(2010). A View of the Parallel Computing Landscape.
Communications of the ACM. 52(10), 56-67.
(2009). A View of the Parallel Computing Landscape.
Communications of the ACM. 52(10), 56-67.
(2009).