Publications

Found 1845 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is S  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
X
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
Fonseca, R., Porter G. Manning, Katz R. H., Shenker S., & Stoica I. (2007).  X-Trace: A Pervasive Network Tracing Framework. Proceedings of the Fourth USENIX Symposium on Networked Systems Design and Implementation (NSDI 2007). 271-284.
W
Weaver, N., Ellis D., Staniford S., & Paxson V. (2004).  Worms vs. Perimeters: The Case for Hard-LANs. Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (Hot Interconnects 12). 70-76.
Hatch, A., Kajarekar S., & Stolcke A. (2006).  Within-Class Covariance Normalization for SVM-Based Speaker Recognition. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1471-1474.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.
Srivastava, M., Hansen M., Burke J., Parker A., Reddy S., Saurabh G., et al. (2006).  Wireless Urban Sensing Systems.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Ananthanarayanan, G., Ghodsi A., Shenker S., & Stoica I. (2012).  Why Let Resources Idle? Aggressive Cloning of Jobs with Dolly. 1-6.
Hinds, D.. A., Stuve L.. L., Nilsen G.. B., Halperin E., Eskin E., Ballinger D.. G., et al. (2005).  Whole-Genome Patterns of Common DNA Variation in Three Human Populations. Science. 307(5712), 1072-1079.
Parton, K., McKeown K. R., Coyne B., Diab M. T., Grishman R., Hakkani-Tür D., et al. (2009).  Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task. 423-431.
Parton, K., McKeown K. R., Coyne B., Diab M. T., Grishman R., Hakkani-Tür D., et al. (2009).  Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task. 423-431.
Bryant, J., Chang N., Porzel R., & Sanders K. (2001).  Where is natural language understanding? Toward context-dependent utterance interpretation. Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
Marczak, B., Scott-Railton J., Marquis-Boire M., & Paxson V. (2014).  When Governments Hack Opponents: A Look at Actors and Technology.
Kulis, B., Saenko K., & Darrell T. (2011).  What You Saw is Not What You Get: Domain Adaptation Using Asymmetric Kernel Transforms. 1785-1792.
Scott, C., Wundsam A., Zarifis K., & Shenker S. (2012).  What, Where, and When: Software Fault Localization for SDN.
Scott, C., Wundsam A., Zarifis K., & Shenker S. (2012).  What, Where, and When: Software Fault Localization for SDN.
Berenbrink, P., & Sauerwald T. (2009).  The Weighted Coupon Collector's Problem and Applications. 449-458.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Song, H. Oh, Lee Y. Jae, Jegelka S., & Darrell T. (2014).  Weakly-Supervised Discovery of Visual Pattern Configurations.

Pages