Publications
Found 593 results
Author Title [ Type![(Desc)](https://icsi.berkeley.edu/icsi/sites/all/modules/biblio/misc/arrow-desc.png)
Filters: First Letter Of Last Name is L [Clear All Filters]
Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy.
Proceedings of the Network and Distributed System Security Symposium (NDSS).
(2016).
(2011).
(2011).
(2009). Efficient PRAM simulation on a distributed memory machine.
Proceedings of the 24th Annual ACM Symposium on the Theory of Computing. 318-326.
(1992). End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic.
Proceedings of the IEEE International Conference on Communications 2019.
(2019). Enhancing P2P File-Sharing with an Internet-Scale Query Processor.
Proceedings of the 30th International Conference on Very Large Data Bases (VLDB 2004). 432-443.
(2004).
(2013). Epidemic Algorithms for Replicated Database Maintenance.
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
(1987). Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap.
Proceedings of the 35th ICML Conference. 3223-3232.
(2018). Evaluating Anti-Fingerprinting Privacy Enhancing Technologies.
Proceedings of the WWW'19 (World Wide Web Conference).
(2019). Evaluating Factors Impacting the Accuracy of Forced Alignments in a Multimodal Corpus.
Proceedings of the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 759-762.
(2004).
(2010).
(2009). Exploiting Information Extraction Annotations for Document Retrieval in Distillation Tasks.
Proceedings of the 8th Annual Conference of the International Speech Communication Association (Interspeech 2007). 330-333.
(2007).
(2013). Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners.
Proceedings of ACM Cloud Computing Security Workshop.
(2015). Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators.
129-140.
(2011). Exploring the Tradeoffs Between Programmability and Efficiency in Data-Parallel Accelerators.
129-140.
(2011).
(2009).
(2013).
(2013). Finite-Length Analysis of LT-codes.
Proceedings of International Symposium on Information Theory (ISIT).
(2004). A First Look at Modern Enterprise Traffic.
Proceedings of the 2005 Internet Measurement Conference (IMC 2005). 15-28.
(2005).
(2015).