Publications
The ICSI Meeting Corpus.
Proceedings of ICASSP-2003.
(2003).
(2004).
(2010).
(2006). The ICSI Meeting Project: Resources and Research.
Proceedings of the ICASSP 2004 Meeting Recognition Workshop.
(2004). Meeting Recorder.
Proceedings of the Applied Voice Input/Output Society.
(2001). Comparison of Measurement-Based Admission Control Algorithms for Controlled-Load Service.
Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 3, 973-980.
(1997). A Measurement-Based Admission Control Algorithm for Integrated Services Packet Network.
IEEE/ACM Transactions on Networking. 5(1), 56-70.
(1997). An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract).
Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
(1992). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016).
(2010).
(1989). Connectionist Symbol Processing: Dead or Alive?.
(Jagota, A.., Plate T.., Shastri L., & Sun R.., Ed.).2, 1-40.
(1999).
(1998). Fast Semidifferential-based Submodular Function Optimization.
28(3), 855-863.
(2013). Monarch: Gaining Command on Geo-Distributed Graph Analytics..
Proceedings of HotCloud 2018.
(2018). Bridging the GAP: towards approximate graph analytics.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
(2018).
(2013).
(2009).
(2001).
(1996).
(1990).
(1992). Adversarially Robust Malware Detection Using Monotonic Classification.
Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
(2018). Tuning-Robust Initialization Methods for Speaker Diarization.
IEEE Transactions on Audio. 18(8), 2028-2037.
(2010).