Publications
(1982).
Improving Plagiarism Detection in Coding Assignments by Dynamic Removal of Common Ground.
Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 1173-1179.
(2016).
(1995).
(2015).
(2013).
(2014). Adversarial Feature Learning.
CoRR. abs/1605.09782,
(2016). HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision.
Proceedings of ICCV 2019.
(2019). Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay.
Proceedings of RAID.
(2002).
(1992). Processing Natural Language About Ongoing Actions in ECG.
Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
(2017).
(2008). Operational Experiences with High-Volume Network Intrusion Detection.
Proceedings of the 11th ACM Conference on Computer Communications Security (CCS 2004). 11, 2.
(2004). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection.
Proceedings of the 15th USENIX Security Symposium (Security '06).
(2006). Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context.
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005). 206-221.
(2005). Adaptive Concept Drift Detection.
235-246.
(2009). RandNLA: Randomized Numerical Linear Algebra.
Communications of the ACM. 59, 80-90.
(2016). Further Evidence That Whorfian Effects Are Stronger in the Right Visual Field Than the Left.
104(3), 1097-1102.
(2007).
(2012). Network Loss Tomography Using Striped Unicast Probes.
IEEE/ACM Transactions on Networking. 697-710.
(2006). Inferring Link Loss Using Striped Unicast Probes.
Proceedings of IEEE INFOCOM.
(2001). Construction Detection in a Conventional NLP Pipeline.
Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding. 178-184.
(2017).
(2001).
(2014).
(2008).