Publications

Found 593 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Conference Paper
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Liu, H., Levchenko K., Felegyhazi M., Kreibich C., Maier G., Voelker G. M., et al. (2011).  On the Effects of Registrar-Level Intervention.
Liu, H., Levchenko K., Felegyhazi M., Kreibich C., Maier G., Voelker G. M., et al. (2011).  On the Effects of Registrar-Level Intervention.
Al-Qudah, Z., Alzoubi H. A., Allman M., Rabinovich M., & Liberatore V. (2009).  Efficient Application Placement in a Dynamic Hosting Platform. 281-290.
Karp, R. M., Luby M., & der Heide F. Meyer auf (1992).  Efficient PRAM simulation on a distributed memory machine. Proceedings of the 24th Annual ACM Symposium on the Theory of Computing. 318-326.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
B. Loo, T., Hellerstein J. M., Huebsch R., Shenker S. J., & Stoica I. (2004).  Enhancing P2P File-Sharing with an Internet-Scale Query Processor. Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
Liu, J., Panda A., Singla A., P. Godfrey B., Schapira M., & Shenker S. J. (2013).  Ensuring Connectivity via Data Plane Mechanisms. 113-126.
Demers, A. J., Greene D., Hauser C., Irish W., Larson J., Shenker S. J., et al. (1987).  Epidemic Algorithms for Replicated Database Maintenance. Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
Lopes, M.. E., Wang S.., & Mahoney M. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Chen, L., Liu Y., Harper M. P., Maia E.., & McRoy S.. (2004).  Evaluating Factors Impacting the Accuracy of Forced Alignments in a Multimodal Corpus. Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 759-762.
Lässig, J., & Sudholt D. (2010).  Experimental Supplements to the Theoretical Analysis of Migration in the Island Model. 224-233.
Hieronymus, J., Liu X., Gales M.. J. F., & Woodland P. (2009).  Exploiting Chinese Character Models to Improve Speech Recognition Performance.
Hakkani-Tür, D., Tur G., & Levit M. (2007).  Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks. Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Lee, Y., Avižienis R., Bishara A.., Xia R.., Lockhart D.., Batten C., et al. (2011).  Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators. 129-140.
Yeh, T., Lee J. J., & Darrell T. (2009).  Fast Concurrent Object Localization and Recognition. 280-287.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Karp, R. M., Luby M., & M. Shokrollahi A. (2004).  Finite-Length Analysis of LT-codes. Proceedings of International Symposium on Information Theory (ISIT).
Pang, R., Allman M., Bennett M., Lee J., Paxson V., & Tierney B. (2005).  A First Look at Modern Enterprise Traffic. Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
Zhou, T., Lee Y. Jae, Yu S. X., & Efros A. A. (2015).  FlowWeb: Joint Image Set Alignment by Weaving Consistent, Pixel-Wise Correspondences.

Pages