Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Fosler-Lussier, E. (1996).  On Reversing the Generation Process in Optimality Theory. Proceedings of the 34th Annual Meeting of the Association for Computational Linguistics (ACL-96).
Tanay, A., Sharan R., Kupiec M., & Shamir R. (2004).  Revealing Modularity and Organization in the Yeast Molecular Network by Integrated Analysis of Highly Heterogeneous Genome-Wide Data. Proceedings of the National Academy of Sciences of the United States of America. 101(9), 2981-2986.
Moon, D., Casado M., Koponen T., & Shenker S. J. (2008).  Rethinking Packet Forwarding Hardware. 1-6.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).
Ben-Dor, A., Karp R. M., Schwikowski B., & Shamir R. (2002).  The Restriction Scaffold Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Colmenares, J. A., Bird S., Cook H., Pearce P., Zhu D.., Shalf J., et al. (2010).  Resource Management in the Tessellation Manycore OS.
Kay, P., & Regier T. (2003).  Resolving the Question of Color Naming Universals. Proceedings of the National Academy of Sciences of the United States of America. 100(15), 9085-9089.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Zaharia, M., Chowdhury M., Das T., Dave A., Ma J., McCauley M., et al. (2012).  Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing. 1-14.
Feigenbaum, J., P. Godfrey B., Panda A., Schapira M., Shenker S. J., & Singla A. (2012).  On the Resilience of Routing Tables. 1-7.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Roark, B.., Liu Y., Harper M. P., Stewart R.., Lease M.., Snover M.., et al. (2006).  Reranking for Sentence Boundary Detection in Conversational Speech. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006). 1, 545-548.
Friedland, G. (2019).  Reproducibility and Experimental Design for Machine Learning on Audio and Multimedia Data. Proceedings of the 27th ACM International Conference on Multimedia. 2709-2710.
Petruck, M. R. L., & Ellsworth M. (2016).  Representing Support Verbs in FrameNet. Proceedings of the 12th Workshop on Multiword Expressions. 72–77.
Petruck, M. R. L., & Ellsworth M. (2018).  Representing Spatial Relations in FrameNet. Proceedings of SpLU 2018, First International Workshop on Spatial Language Understanding.
Dodge, E., & Petruck M. R. L. (2014).  Representing Caused Motion in Embodied Construction Grammar. 39-44.
Cohen, E., & Shenker S. J. (2002).  Replication Strategies in Unstructured Peer-to-Peer Networks. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 177-190.
Geels, D.., Altekar G.., Shenker S. J., & Stoica I. (2006).  Replay Debugging for Distributed Applications. Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Konig, Y., Bourlard H., & Morgan N. (1995).  REMAP: Recursive Estimation and Maximization of A Posteriori Probabilities - Application to Transition-Based Connectionist Speech Recognition. Proceedings of the 9th Annual Conference on Neural Information Processing Systems (NIPS 1995).

Pages