Publications

Found 512 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Gittens, A.., Rothauge K.., Wang S.., Mahoney M.. W., Gerhardt L.., Prabhat, et al. (2018).  Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist. Proceedings of the 24th Annual SIGKDD. 293-301.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2016).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Anguera, X., Wooters C., & Hernando J. (2007).  Acoustic Beamforming for Speaker Diarization of Meetings. IEEE Transactions on Audio. 15(7), 2011-2022.
Wooters, C., & Morgan N. (1992).  Acoustic Sub-word Models in the Berkeley Restaurant Project. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 1551-1554.
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Weissman, B. (1997).  Active Threads: An Extensible and Portable Light-Weight Thread System.
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Moody, J., Shapere A. D., & Wilczek F. (1989).  Adiabatic Effective Lagrangian.
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Renals, S., Morgan N., Bourlard H., Cohen M., Franco H., Wooters C., et al. (1991).  Advances in Connectionist Speech Recognition.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Rosenfeld, A.., Feldman J., Kanal L.. N., & Winston P.. H. (1977).  AI and Pattern Recognition.
Gittens, A.., Rothauge K.., Mahoney M.. W., Wang S.., Gerhardt L.., Prabhat, et al. (2018).  Alchemist: An Apache Spark <=> MPI Interface. Concurrency and Computation: Practice and Experience (Special Issue of the Cray User Group, CUG 2018), e5026.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Friedrich, T., Oliveto P.. S., Sudholt D., & Witt C. (2009).  Analysis of Diversity-Preserving Mechanisms for Global Exploration. Evolutionary Computation. 17(4), 455-476.
Yaman, S., Tur G., Vergyri D., Hakkani-Tür D., Harper M. P., & Wang W. (2009).  Anchored Speech Recognition for Question Answering. 265-268.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Friedrich, T., He J., Hebbinghaus N., Neumann F., & Witt C. (2010).  Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models. Evolutionary Computation. 18(4), 617-633.
Mahoney, M. W., Rao S., Wang D., & Zhang P. (2016).  Approximating the Solution to Mixed Packing and Covering LPs in parallel time.

Pages