Publications

Found 4228 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
L
Liebeherr, J., & Wrege D. E. (1994).  Design and Analysis of a High-Performance Packet Multiplexer for Multiservice Networks with Delay Guarantees.
Liebeherr, J., Wrege D. E., & Ferrari D. (1994).  Admission Control in Networks with Bounded Delay Services.
Lickteig, T. Michael (1990).  On Semi-Algebraic Decision Complexity.
Liao, Y., & Moody J. (2000).  Constructing Heterogeneous Committees via Input Feature Grouping. 12,
Liao, Y., & Moody J. (1996).  A Neural Network Visualization and Sensitivity Analysis Toolkit. Proceedings of the International Conference on Neural Information Processing. 1069-1074.
Liao, Y., Moody J., & Wu L. (2002).  Neural Networks for Time Series Analysis.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, Z., Goyal A., Chen Y., & Paxson V. (2009).  Automating Analysis of Large-Scale Botnet Probing Events. 11-22.
Li, H., Ghodsi A., Zaharia M., Shenker S. J., & Stoica I. (2014).  Reliable, Memory Speed Storage for Cluster Computing Frameworks.
Li, F.., & Paxson V. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Li, M. (2003).  SchemaDB - An Extensible Schema Database System Using ECG Representation.
Li, Z., Goyal A., Chen Y., & Paxson V. (2011).  Towards Situational Awareness of Large-Scale Botnet Probing Events. IEEE Transactions on Information Forensics and Security. 6(1), 175-188.
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
Levit, M., & Roy D.. (2007).  Interpretation of Spatial Language in a Map Navigation Task. IEEE Transactions on Systems. 37(3), 667-679.
Levit, M., Boschee E.., & Freedman M. (2007).  Selecting On-topic Sentences from Natural Language Corpora. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 2793-2796.
Levit, M., Hakkani-Tür D., Tur G., & Gillick D. (2009).  IXIR: A Statistical Information Distillation System. Journal of Computer Speech and Language. 23(4), 527-542.
Levis, P., Brewer E., Culler D. E., Gay D., Madden S., Patel N., et al. (2008).  The Emergence of a Networking Primitive in Wireless Sensor Networks. Communications of the ACM. 51(7), 99-106.
Levis, P., Patel N., Culler D. E., & Shenker S. J. (2004).  Trickle: A Self-Regulation Algorithm for Code Propogation and Maintenance in Wireless Sensor Networks. Proceedings of the First USENIX Symposium on Networked Systems Design and Implementation (NSDI '04). 15-28.
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.
Levin, D., Wundsam A., Heller B., Handigol N., & Feldmann A. (2012).  Logically Centralized? State Distribution Tradeoffs in Software Defined Networks.
Levin, A.. U., Leen T. K., & Moody J. (1994).  Fast Pruning Using Principal Components. 6,
Levchenko, K., Pitsillidis A., Chachra N., Enright B., Felegyhazi M., Grier C., et al. (2011).  Click Trajectories: End-to-End Analysis of the Spam Value Chain. 431-446.
Lesser, N.., & Ellis D. P. W. (2005).  Clap Detection and Discrimination for Rhythm Therapy. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005). 37-40.

Pages