Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao M., Shenker S. J., et al. (2005).  HLP: A Next-Generation Interdomain Routing Protocol. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2005). 13-24.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2007).  Holding the Internet Accountable. 1-7.
Duan, H., Weaver N., Zhao Z., Hu M., Liang J., Jiang J., et al. (2012).  Hold-On: Protecting Against On-Path DNS Poisoning.
Meyer, B. T., Spille C., Kollmeier B., & Morgan N. (2012).  Hooking Up Spectro-Temporal Filters with Auditory-Inspired Representations for Robust Automatic Speech Recognition.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Zhuang, S., Lai K., Stoica I., Katz R. H., & Shenker S. J. (2003).  Host Mobility Using an Internet Indirection Infrastructure. Proceedings of the First International Conference on Mobile Systems, Applications, and Services (MobiSys 2003). 129-144.
Chen, J., Weaver N., Jiang J., Wan T., Duan H., & Paxson V. (2016).   Host of Troubles: Multiple Host Ambiguities in HTTP Implementations. Proceedings of ACM CCS.
Nedevschi, S., Ratnasamy S., & Padhye J. (2009).  Hot Data Centers vs. Cool Peers. 8.
Hong, J., & Baker C. F. (2011).  How Good Is the Crowd at "Real" WSD?.
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
Kay, P., & Sag I. A. (2009).  How Hard A Problem Would This Be To Solve?.
Ravuri, S., & Wegmann S. (2016).  How neural network depth compensates for HMM conditional independence assumptions in DNN-HMM acoustic models. Proceedings of Interspeech 2016.
Staniford, S., Paxson V., & Weaver N. (2002).  How to Own the Internet in Your Spare Time. Proceedings of the Eleventh USENIX Security Symposium (Security '02).
Huang, P-S., Mertens R., Divakaran A., Friedland G., & Hasegawa-Johnson M. (2012).  How to Put It Into Words - Using Random Forests to Extract Symbol Level Descriptions from Audio Content for Concept Detection. 505-508.
Popa, L., Ghodsi A., & Stoica I. (2010).  HTTP as the Narrow Waist of the Future Internet.
Kruse, H., Allman M., Griner J., & Tran D. (1998).  HTTP Page Transfer Rates Over Geo-Stationary Satellite Links. Proceedings of the 6th International Conference on Telecommunication Systems.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.
Orr, R., & van Leeuwen D. A. (2009).  A Human Benchmark for Language Recognition. 2175-2178.
Saha, D., Schumann C., McElfresh D. C., Dickerson J. P., Mazurek M. L., & Tschantz M. Carl (2020).  Human Comprehension of Fairness in Machine Learning. AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
Choi, J., Lei H., Ekambaram V., Kelm P., Gottlieb L., Sikora T., et al. (2013).  Human Vs Machine: Establishing a Human Baseline for Multimodal Location Estimation.
Lee, M. Kyung, Grgić-Hlača N., Tschantz M. Carl, Binns R., Weller A., Carney M., et al. (2020).  Human-Centered Approaches to Fair and Responsible AI. CHI EA '20: Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1-8.
Stoll, L., & Doddington G. (2010).  Hunting for Wolves in Speaker Recognition. 159-164.
Vaquero, C.., Vinyals O., & Friedland G. (2010).  A Hybrid Approach to Online Speaker Diarization. 2642-2645.
Celikyilmaz, A., & Hakkani-Tür D. (2010).  A Hybrid Hierarchical Model for Multi-Document Summarization. 1149-1154.
Ravuri, S. (2014).  Hybrid MLP/Structured-SVM Tandem Systems for Large Vocabulary and Robust ASR.

Pages