Publications

Found 595 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Alpernas, K., Manevich R., Panda A., Sagiv M., Shenker S. J., Shoham S., et al. (2018).  Abstract Interpretation of Stateful Networks. Proceedings of SAS 2018.
Andersen, D. G., Balakrishnan H., Feamster N., Koponen T., Moon D., & Shenker S. J. (2008).  Accountable Internet Protocol (AIP). 339-350.
Lakshminarayanan, K., Caesar M., Rangan M., Anderson T., Shenker S. J., & Stoica I. (2007).  Achieving Convergence-Free Routing Using Failure-Carrying Packets. 241-252.
Lakshminarayanan, K., Caesar M., Rangan M., Anderson T., Shenker S. J., & Stoica I. (2007).  Achieving Convergence-Free Routing Using Failure-Carrying Packets. SIGCOMM Computer Communication Review. 37(4), 241-252.
Lakshminarayanan, K., Caesar M., Rangan M., Anderson T., Shenker S. J., & Stoica I. (2007).  Achieving Convergence-Free Routing using Failure-Carrying Packets.
Anguera, X., Wooters C., & Hernando J. (2007).  Acoustic Beamforming for Speaker Diarization of Meetings. IEEE Transactions on Audio. 15(7), 2011-2022.
Heo, S., Krashinsky R., & Asanović K. (2007).  Activity-Sensitive Flip-Flop and Latch Selection for Reduced Energy. IEEE Transactions on VLSI Systems. 15(9), 1060-1064.
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Avvenuti, M., Rizzo L., & Vicisano L. (1996).  Adaptive Load Sharing Based on a Broker Module.
Partridge, C., & Allman M. (2015).  Addressing Ethical Considerations in Network Measurement Papers. Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
Partridge, C., & Allman M. (2016).  Addressing Ethical Considerations in Network Measurement Papers. Communications of the ACM. 59(10), 
Eddy, W. M., & Allman M. (2000).  Advantages of Parallel Processing and the Effects of Communications Time.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Emig, D., Salomonis N., Baumbach J., Lengauer T., Conklin B. R., & Albrecht M. (2010).  AltAnalyze and DomainGraph: Analyzing and Visualizing Exon Expression Data. Nucleic Acids Research. 38, W755-W762.
Zaharia, M., Xin R. S., Wendell P., Das T., Armbrust M., Dave A., et al. (2016).  Apache Spark: a unified engine for big data processing. Communications of the ACM. 59(11), 56-65.
Feigenbaum, J., Archer A.., Krishnamurthy A., Sami R., & Shenker S. J. (2004).  Approximation and Collusion in Multicast Cost Sharing. Games and Economic Behavior. 47(1), 36-71.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Allman, M., Blanton E., & Paxson V. (2005).  An Architecture for Developing Behavioral History. Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
Paxson, V., Mahdavi J., Adams A. K., & Mathis M. (1998).  An Architecture for Large-Scale Internet Measurement. IEEE Communications. 36(8), 48-54.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Ashraf, K., Elizalde B. Martinez, Iandola F., Moskewicz M., Bernd J., Friedland G., et al. (2015).  Audio-Based Multimedia Event Detection with DNNs and Sparse Sampling. 611-614.
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.

Pages