Publications

Found 773 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is P  [Clear All Filters]
2007
Popa, L., Rostami A.., Karp R. M., Papadimitriou C. H., & Stoica I. (2007).  Balancing the Traffic Load in Wireless Networks with Curveball Routing. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2007).
Allman, M., Paxson V., & Terrell J.. (2007).  A Brief History of Scanning. 77-82.
Hwang, M-Y., Peng G.., Wang W., Faria A., & Heidel A.. (2007).  Building a Highly Accurate Mandarin Speech Recognizer. 490-495.
Chu, D., Popa L., Tavakoli A., Hellerstein J. M., Levis P., Shenker S. J., et al. (2007).  The Design and Implementation of a Declarative Sensor Network System. 175-188.
Allman, M., Christensen K.., Nordman B., & Paxson V. (2007).  Enabling an Energy-Efficient Future Internet Through Selectively Connected End Systems.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. ACM SIGCOMM Computer Communication Review. 37(4), 1-12.
Pal, J. (2007).  Examining e-literacy Using Telecenters as Public Spending: The Case of Akshaya. 59-67.
Plauché, M., etin Ö. Ç., & Nallasam U. (2007).  How to Build a Spoken Dialog System with Limited (or No) Resources.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Franklin, J.., Paxson V., Perrig A., & Savage S. (2007).  An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. 375-388.
Allman, M., & Paxson V. (2007).  Issues and Etiquette Concerning Use of Shared Measurement Data. 135-140.
Creutz, M.., Hirsimäki T.., Kurimo M.., Puurula A.., Pylkkönen J.., Siivola V.., et al. (2007).  Morph-Based Speech Recognition and Modeling of Out-of-Vocabulary Words Across Languages. ACM Transactions on Speech and Language Processing. 5(1), 1-29.
Creutz, M.., Hirsimäki T.., Kurimo M.., Puurula A.., Pylkkönen J.., Siivola V.., et al. (2007).  Morph-Based Speech Recognition and Modeling of Out-of-Vocabulary Words Across Languages. ACM Transactions on Speech and Language Processing. 5(1), 1-29.
Pawar, U. Singh, Pal J., Gupta R., & Toyama K. (2007).  Multiple Mice for Retention Tasks in Disadvantaged Schools. Proceedings of the 25th Annual ACM Conference on Human Factors in Computing Systems (CHI '07). 1581-1590.
Pawar, U. Singh, Pal J., Gupta R., & Toyama K. (2007).  Multiple Mice for Retention Tasks in Disadvantaged Schools. Proceedings of the 25th Annual ACM Conference on Human Factors in Computing Systems (CHI '07). 1581-1590.
Pal, J., Lakshmanan M.., & Toyama K. (2007).  "My Child Will be Respected": Parental Perspectives on Computers in Rural India. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 168-176.
Vallentin, M., Sommer R., Lee J., Leres C.., Paxson V., & Tierney B. (2007).  The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. Proceedings of the International Symposium on Recent Advances in Intrusion Detection (RAID 2007).
Wawrzynek, J., Patterson D., Oskin M., Lu S-L., Kozyrakis C., Hoe J. C., et al. (2007).  RAMP: Research Accelerator for Multiple Processors. IEEE Micro. 27(2), 46-57.
Weaver, N., Paxson V., & Gonzalez J. Maria (2007).  The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention. Proceedings of International Symposium on Field Programmable Gate Arrays (FPGA 2007). 199-206.
Gonzalez, J. Maria, Paxson V., & Weaver N. (2007).  Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. Proceedings of 14th Annual ACM Computer and Communication Security Conference (ACM CCS 2008). 139-149.
Pardo, J. M., Anguera X., & Wooters C. (2007).  Speaker Diarization For Multiple-distant-microphone Meetings Using Several Sources of Information. IEEE Transactions on Computers. 56(9), 1212-1224.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2007).  The Strengths of Weaker Identities: Opportunistic Personas. Proceedings of USENIX Workshop on Hot Topics in Security (HotSec 07).
Patra, R., Pal J., Nedevschi S., Plauché M., & Pawar U.. S. (2007).  Usage Models of Classroom Computing in Developing Regions. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 158-167.
Patra, R., Pal J., Nedevschi S., Plauché M., & Pawar U.. S. (2007).  Usage Models of Classroom Computing in Developing Regions. Proceedings of International Conference on Information Technologies and Development (ICTD2007). 158-167.

Pages