Publications
(1989).
Tuning-Robust Initialization Methods for Speaker Diarization.
IEEE Transactions on Audio. 18(8), 2028-2037.
(2010).
(2009).
(2010). Adversarially Robust Malware Detection Using Monotonic Classification.
Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
(2018).
(1990).
(1992).
(1996).
(2001).
(2009). Fast Semidifferential-based Submodular Function Optimization.
28(3), 855-863.
(2013). Monarch: Gaining Command on Geo-Distributed Graph Analytics..
Proceedings of HotCloud 2018.
(2018). Bridging the GAP: towards approximate graph analytics.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
(2018).
(2013).
(1998).
Connectionist Symbol Processing: Dead or Alive?.
(Jagota, A.., Plate T.., Shastri L., & Sun R.., Ed.).2, 1-40.
(1999).
(1989). Towards Mining Latent Client Identifiers from Network Traffic.
Proceedings of Privacy Enhancing Technologies Symposium.
(2016).
(2010). Comparison of Measurement-Based Admission Control Algorithms for Controlled-Load Service.
Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). 3, 973-980.
(1997). A Measurement-Based Admission Control Algorithm for Integrated Services Packet Network.
IEEE/ACM Transactions on Networking. 5(1), 56-70.
(1997). An Admission Control Algorithm for Predictive Real-Time Service (Extended Abstract).
Proceedings of the Third International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV). 349-356.
(1992). Multi-stream Speech Recognition: Ready for Prime Time?.
Proceedings of the 6th European Conference on Speech Communication and Technology (Eurospeech '99).
(1999). SpeechCorder, The Portable Meeting Recorder.
Proceedings of the Workshop on Hands-Free Speech Communication.
(2001).
(2012).