Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2008
P. Godfrey, B., Shenker S. J., & Stoica I. (2008).  Pathlet Routing. 97-102.
Motlicek, P., Ganapathy S., Hermansky H., Garudadri H., & Athineos M. (2008).  Perceptually Motivated Sub-Band Decomposition for FDLP Audio Coding. 435-442.
Garg, N. P., & Weber I.. (2008).  Personalized, Interactive Tag Recommendation for Flickr. 67-74.
Yeh, T., Lee J. J., & Darrell T. (2008).  Photo-Based Question Answering. 389-398.
Skibola, C. F., Bracci P. M., Halperin E., Nieters A., Hubbard A., Paynter R. A., et al. (2008).  Polymorphisms in the Estrogen Receptor 1 and Vitamin C and Matrix Metalloproteinase Gene Families Are Associated with Susceptibility to Lymphoma. PLoS ONE. 3(7), 
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Daskalakis, C., Dimakis A.. G., Karp R. M., & Wainwright M.. J. (2008).  Probabilistic Analysis of Linear Programming Decoding. IEEE Transactions on Information Theory. 54(8), 3565-3578.
Favre, B., Grishman R., Hillard D., Ji H., Hakkani-Tür D., & Ostendorf M. (2008).  Punctuating Speech For Information Extraction. 5013-5016.
Allman, M., & Paxson V. (2008).  A Reactive Measurement Framework. 92-101.
Nedevschi, S., Popa L., Iannaccone G., Raynasamy S.., & Wetherall D. (2008).  Reducing Network Energy Consumption via Sleeping and Rate-Adaptation. 323-336.
Ermolinskiy, A., & Shenker S. J. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding.
Ermolinskiy, A., & Shenker S. J. (2008).  Reducing Transient Disconnectivity Using Anomaly-Cognizant Forwarding. 91-96.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
Raya, M.., Manshaei M.. H., Felegyhazi M., & Hubaux J.-P.. (2008).  Revocation Games in Ephemeral Networks. 199-210.
Floyd, S. (2008).  RFC 5166: Metrics for the Evaluation of Congestion Control Mechanisms.
Floyd, S., & Allman M. (2008).  RFC 5290: Comments on the Usefulness of Simple Best-Effort Traffic.
Garg, N. P., Favre S.., Salamin H.., Hakkani-Tür D., & Vinciarelli A.. (2008).  Role Recognition for Meeting Participants: An Approach Based on Lexical Information and Social Network Analysis. 693-696.
DeNero, J., Bouchard-Côté A.., & Klein D. (2008).  Sampling Alignment Structure Under a Bayesian Translation Model. 314-323.
Salfner, F., & Wolter K. (2008).  Service Availability of Systems with Failure Prevention.
Feldman, J., & Narayanan S. (2008).  Simulation and Cognition in Language Understanding. Proceedings of Exciting Biologies 2008.
Pfennigschmidt, S., & Voisard A. (2008).  A Situation-Centric Approach to Meteorological Services in the SITUMET Platform.
Barrett, L., Feldman J., & Dermed L. Mac (2008).  A (Somewhat) New Solution to the Binding Problem. Neural Computation. 20(9), 2361-2378.

Pages