Publications
Found 247 results
[ Author![(Asc)](https://www.icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is A [Clear All Filters]
(2007).
Let's DISCOH: Collecting an Annotated Open Corpus with Dialogue Acts and Reward Signals for Natural Language Helpdesks.
Proceedings of the IEEE 2006 Workshop on Spoken Language Technology (SLT 2006). 218-221.
(2006).
(2012).
(2012).
(2009).
(2011).
(2013).
(2009).
(2008). Symmetry in the Eye of the Beholder .
Proceedings of Vision Sciences Society Annual Meeting.
(2017). Image Quality Assessment by Comparing CNN Features Between Images.
Journal of Imaging Science and Technology.
(2016).
(2002).
(2009).
(2009). Putting logic-based distributed systems on stable grounds.
Theory and Practice of Logic Programming. 16(4), 378-417.
(2016). Can far memory improve job throughput?.
EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.
(2020). Remote Memory Calls.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
(2020). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015).
(2012). Viable Protection of High-Performance Networks through Hardware/Software Co-Design.
Proceedings of ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization.
(2017). Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(2012). Mission Accomplished? HTTPS Security after DigiNotar.
Proceedings of the IMC 2017.
(2017).
(2014).
(2012).