Publications

Found 823 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is B  [Clear All Filters]
Conference Paper
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Colmenares, J. A., Bird S., Cook H., Pearce P., Zhu D.., Shalf J., et al. (2010).  Resource Management in the Tessellation Manycore OS.
Ben-Dor, A., Karp R. M., Schwikowski B., & Shamir R. (2002).  The Restriction Scaffold Problem. Proceedings of the Sixth Annual International Conference on Research in Computational Molecular Biology (RECOMB'02).
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Benitez, C.., Burget L., Chen B. Y., Dupont S., Garudadri H., Hermansky H., et al. (2001).  Robust ASR Front-End Using Spectral-Based and Discriminant Features: Experiments on the Aurora Tasks. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001). 429-432.
Benitez, C.., Burget L., Chen B. Y., Dupont S., Garudadri H., Hermansky H., et al. (2001).  Robust ASR Front-End Using Spectral-Based and Discriminant Features: Experiments on the Aurora Tasks. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001). 429-432.
Boulis, C., Kahn J. G., & Ostendorf M. (2005).  The Role of Disfluencies on Topic Classification of Human-Human Conversations. Proceedings of the Spoken Language Understanding Workshop Program at the 20th National Conference on Artificial Intelligence (AAAI-05).
Pötzsch, S., & Boehme R. (2010).  The Role of Soft Information in Trust Building: Evidence from Online Social Lending. 381-395.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
DeNero, J., Bouchard-Côté A.., & Klein D. (2008).  Sampling Alignment Structure Under a Bayesian Translation Model. 314-323.
Casado, M., Garfinkel T., Akella A., Freedman M. J., Boneh D.., McKeown N., et al. (2006).  SANE: A Protection Architecture for Enterprise Networks. Proceedings of the 15th USENIX Security Symposium (Security '05).
Bryant, J. (2004).  Scalable Construction Based Parsing and Semantic Analysis. Proceedings of Second Workshop on Scalable Natural Language Understanding.
Bryant, J. (2004).  Scalable Construction-Based Parsing and Semantic Analysis. Proceedings of the Second International Workshop on Scalable Natural Language Understanding (ScaNaLU 2004). 33-40.
Allman, M., Blanton E., & Eddy W. M. (2002).  A Scalable System for Sharing Internet Measurements. Proceedings of the Passive and Active Measurement Workshop.
Yu, H., Breslau L., & Shenker S. J. (1999).  A Scalable Web Cache Consistency Architecture. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '99). 163-174.
Mok, E., Bryant J., & Feldman J. (2004).  Scaling Understanding Up to Mental Spaces. Proceedings of ScaNaLU-2004.
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.

Pages