Publications
Found 595 results
Author Title [ Type![(Asc)](https://icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-asc.png)
Filters: First Letter Of Last Name is A [Clear All Filters]
ResQ: Enabling SLOs in Network Function Virtualization.
Proceedings of NSDI 2018.
(2018).
(2010). Resilience of Deployed TCP to Blind Off-Path Attacks.
Proceedings of ACM Internet Measurement Conference.
(2015). Replay Debugging for Distributed Applications.
Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
(2006). Remote Memory Calls.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
(2020). The Relation Between Speech Intelligibility and the Complex Modulation Spectrum.
Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
(2001).
(2014).
(2010).
(2011).
(2011). A Reactive Measurement Framework.
92-101.
(2008). Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems.
Proceedings of the 20th Annual IEEE Symposium of Foundations of Computer Science. 218-223.
(1979). Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems.
Proceedings of the Computer Science and Statistics 12th Annual Symposium on the Interface. 174-176.
(1979).
(2014).
(2010).
(2010). Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?.
Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
(2019).
(2014). Qualcomm-ICSI-OGI Features for ASR.
Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
(2002). Purity Algorithms for Speaker Diarization of Meetings Data.
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
(2006).
(2012). Providing Packet Obituaries.
Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
(2004). Providing Dynamic Control to Passive Network Security Monitoring.
Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
(2015). Prosody-Based Automatic Detection of Annoyance and Frustration in Human-Computer Dialog.
Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
(2002). Profiling Underground Merchants Based on Network Behavior.
Proceedings of APWG eCrime 2016.
(2016).