Publications

Found 595 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Last Name is A  [Clear All Filters]
Conference Paper
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Colmenares, J. A., Bird S., Cook H., Pearce P., Zhu D.., Shalf J., et al. (2010).  Resource Management in the Tessellation Manycore OS.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Geels, D.., Altekar G.., Shenker S. J., & Stoica I. (2006).  Replay Debugging for Distributed Applications. Proceedings of the 2006 USENIX Annual Technical Conference. 289-300.
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
Greenberg, S., & Arai T. (2001).  The Relation Between Speech Intelligibility and the Complex Modulation Spectrum. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Karayev, S., Hertzmann A., Winnemoeller H., Agarwala A., & Darrell T. (2014).  Recognizing Image Style.
Beamer, S., Sun C.., Kwon Y-J., Joshi A., Batten C., Stojanovic V., et al. (2010).  Re-Architecting DRAM Memory Systems with Monolithically Integrated Silicon Photonics. 129-140.
Colmenares, J. A., Saxton I., Battenberg E., Avižienis R., Peters N., Asanović K., et al. (2011).  Real-Time Musical Applications on an Experimental Operating System for Multi-Core Processors.
Colmenares, J. A., Saxton I., Battenberg E., Avižienis R., Peters N., Asanović K., et al. (2011).  Real-Time Musical Applications on an Experimental Operating System for Multi-Core Processors.
Allman, M., & Paxson V. (2008).  A Reactive Measurement Framework. 92-101.
Aleliunas, R., Karp R. M., Lipton R. J., Lovász L., & Rackoff C. (1979).  Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems. Proceedings of the 20th Annual IEEE Symposium of Foundations of Computer Science. 218-223.
Aleliunas, R., Karp R. M., Lipton R. J., & Lovász L. (1979).  Random Walks, Universal Traversal Sequences, and the Complexity of Maze Problems. Proceedings of the Computer Science and Statistics 12th Annual Symposium on the Interface. 174-176.
Yang, J., Sindhwani V., Fan Q., Avron H., & Mahoney M. (2014).  Random Laplace Feature Maps for Semigroup Kernels on Histograms.
Tan, Z., Waterman A., Avižienis R., Lee Y., Cook H., Patterson D., et al. (2010).  RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors.
Tan, Z., Waterman A., Avižienis R., Lee Y., Cook H., Patterson D., et al. (2010).  RAMP Gold: An FPGA-Based Architecture Simulator for Multiprocessors.
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (2019).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Yang, J., Sindhwani V., Avron H., & Mahoney M. (2014).  Quasi-Monte Carlo Feature Maps for Shift-Invariant Kernels.
Adami, A., Burget L., Dupont S., Garudadri H., Grezl F., Hermansky H., et al. (2002).  Qualcomm-ICSI-OGI Features for ASR. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Anguera, X., Wooters C., & Hernando J. (2006).  Purity Algorithms for Speaker Diarization of Meetings Data. Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2006).
Callahan, T., Allman M., & Rabinovich M. (2012).  Psst, Over Here: Communicating Without Fixed Infrastructure.
Argyraki, K., Maniatis P., Cheriton D., & Shenker S. J. (2004).  Providing Packet Obituaries. Proceedings of the Third Workshop on Hot Topics in Networks (HotNets-III).
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Ang, J., Dhillon R., Krupski A., Shriberg E., & Stolcke A. (2002).  Prosody-Based Automatic Detection of Annoyance and Frustration in Human-Computer Dialog. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.

Pages