Publications

Found 595 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
Conference Paper
Anguera, X., Wooters C., & Hernando J. (2005).  Speaker Diarization for Multi-Party Meetings Using Acoustic Fusion. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2005). 426-461.
Pardo, J. M., Anguera X., & Wooters C. (2006).  Speaker Diarization for Multi-Microphone Meetings Using Only Between-Channel Differences. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 257-264.
Song, H. Oh, Zickler S., Althoff T., Girshick R., Geyer C., Fritz M., et al. (2012).  Sparselet Models for Efficient Multiclass Object Detection. 802-815.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Nguyen, G. T. K., Agarwal R., Liu J., Caesar M., P. Godfrey B., & Shenker S. J. (2011).  Slick Packets. 245-256.
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (2019).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Joshi, A., Batten C., Kwon Y-J., Beamer S., Shamim I., Asanović K., et al. (2009).  Silicon-Photonic Clos Networks for Global On-Chip Communication. 124-133.
Akella, A., Karp R. M., Papadimitriou C. H., Seshan S., & Shenker S. J. (2002).  Selfish Behavior and Stability of the Internet: A Gamer-Theoretic Analysis of TCP. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2002). 117-130.
Adler, M., Gemmell P., Harchol-Balter M., Karp R. M., & Kenyon C. (1994).  Selection in the presence of noise: the design of playoff systems. Proceedings of Fifth Annual ACM-SIAM Symposium on Discrete Algorithms. 564-572.
Koskela, J.., Weaver N., Gurtov A., & Allman M. (2009).  Securing Web Content. 7-12.
Adler, M., Byers J. W., & Karp R. M. (1995).  Scheduling parallel communication: the h-relation problem. Proceedings of the 20th International Mathematical Foundations of Computer Science Symposium, (MFCS '95). 1-20.
Allman, M., Blanton E., & Eddy W. M. (2002).  A Scalable System for Sharing Internet Measurements. Proceedings of the Passive and Active Measurement Workshop.
Kruse, H., Allman M., Griner J., Ostermann S., & Helvey E.. (1999).  Satellite Network Performance Measurements Using Simulated Multi-User Internet Traffic. Proceedings of the Seventh International Conference on Telecommunication Systems.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Anguera, X., Wooters C., Peskin B., & Aguilo M. (2005).  Robust Speaker Segmentation for Meetings: The ICSI-SRI Spring 2005 Diarization System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 402-414.
Anguera, X., Wooters C., Peskin B., & Aguilo M. (2005).  Robust Speaker Segmentation for Meetings: The ICSI-SRI Spring 2005 Diarization System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 402-414.
Anguera, X., Wooters C., & Pardo J. M. (2006).  Robust Speaker Diarization for Meetings: ICSI RT06s evaluation system. Proceedings of the 9th International Conference on Spoken Language Processing (ICSLP-Interspeech 2006). 1674-1677.
Ajmera, J., & Wooters C. (2003).  A Robust Speaker Clustering Algorithm. Proceedings of IEEE Speech Recognition and Understanding Workshop.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Vallina-Rodriguez, N., Aucinas A., Almeida M., Grunenberger Y., Papagiannaki K., & Crowcroft J. (2013).  RILAnalyzer: A Comprehensive 3G Monitor On Your Phone.
Vallina-Rodriguez, N., Aucinas A., Almeida M., Grunenberger Y., Papagiannaki K., & Crowcroft J. (2013).  RILAnalyzer: A Comprehensive 3G Monitor On Your Phone.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
Paxson, V., Asanović K., Dharmapurikar S., Lockwood J.., Pang R., Sommer R., et al. (2006).  Rethinking Hardware Support for Network Analysis and Intrusion Prevention. Proceedings of the First USENIX Workshop on Hot Topics in Security (HotSec '06).

Pages