Publications
Exploiting Independent State For Network Intrusion Detection.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005). 59-71.
(2005). Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks.
Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
(2007).
(2013).
(2012).
(2016).
(2009).
(1995).
(2009).
(1997).
(1997).
(1999). Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 351-364.
(2005).
(2009).
(2016).
(2012).
(2013). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015).
(2018). Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators.
129-140.
(2011). Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement.
Proceedings of Passive and Active Measurement Conference (PAM).
(2016).
(1995).
(2010). An Extended Local Connectionist Manifesto: Embracing Relational and Procedural Knowledge.
Behavioral and Brain Sciences. 23(4), 492-493.
(2000).
(2000). Extending Embodied Lexical Development.
Proceedings of 20th Cognitive Science Society Conference. 84-90.
(1998).