Publications

Search
Export 47 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Internet  [Clear All Filters]
2013
Haft DH, Selengut JD, Richter RA, Harkins D, Basu MK, Beck E.  2013.  TIGRFAMs and Genome Properties in 2013.. Nucleic Acids Res. 41(Database issue):D387-95.
2012
Narayanan I, Sarangan V, Vasan A, Srinivasan A, Sivasubramaniam A.  2012.  Networking lessons: From computers to water. 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). :1-6.
Chetty M, Banks R, Brush A.J., Donner J, Grinter R.  2012.  You'Re Capped: Understanding the Effects of Bandwidth Caps on Broadband Use in the Home. SIGCHI '12. :3021-3030.
2011
Lai V, Rajashekar C, Rand W.  2011.  Comparing Social Tags to Microblogs. Privacy, security, risk and trust (passat), 2011 IEEE third international conference on and 2011 IEEE third international conference on social computing (socialcom). :1380-1383.
Song S, Keleher P, Bhattacharjee B, Sussman A.  2011.  Decentralized, accurate, and low-cost network bandwidth prediction. 2011 Proceedings IEEE INFOCOM. :6-10.
Bryce RC, Sampath S, Memon AM.  2011.  Developing a Single Model and Test Prioritization Strategies for Event-Driven Software. Software Engineering, IEEE Transactions on. 37(1):48-64.
DuBois T, Golbeck J, Srinivasan A.  2011.  Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
2010
Medem A, Teixeira R, Feamster N, Meulle M.  2010.  Joint analysis of network incidents and intradomain routing changes. Network and Service Management (CNSM), 2010 International Conference on. :198-205.
Shroff N, Turaga P, Chellappa R.  2010.  Video Précis: Highlighting Diverse Aspects of Videos. IEEE Transactions on Multimedia. 12(8):853-868.
2009
Wu Y, Raschid L.  2009.  ApproxRank: Estimating Rank for a Subgraph. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :54-65.
Bonsignore EM, Dunne C, Rotman D, Smith M, Capone T, Hansen DL, Shneiderman B.  2009.  First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXL. International Conference on Computational Science and Engineering, 2009. CSE '09. 4:332-339.
Roitman H, Gal A, Raschid L.  2009.  Web Monitoring 2.0: Crossing Streams to Satisfy Complex Data Needs. IEEE 25th International Conference on Data Engineering, 2009. ICDE '09. :1215-1218.
2008
Bitsakos K, Yi H, Yi L, Fermüller C.  2008.  Bilateral symmetry of object silhouettes under perspective projection. 19th International Conference on Pattern Recognition, 2008. ICPR 2008. :1-4.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Chrun D, Cukier M, Sneeringer G.  2008.  On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. :49-58.
2007
Tanin E, Shneiderman B, Xie H.  2007.  Browsing large online data tables using generalized query previews. Information Systems. 32(3):402-423.
Dachman-Soled D, Sreedhar V.C..  2007.  Configuration Reasoning and Ontology For Web. IEEE International Conference on Services Computing, 2007. SCC 2007. :387-394.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Wang F, Feamster N, Gao L.  2007.  Measuring the Contributions of Routing Dynamics to Prolonged End-to-End Internet Path Failures. Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE. :1855-1859.
2006
Dumitras T, Lee M., Quinones P., Smailagic A., Siewiorek D, Narasimhan P..  2006.  Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired. 2006 10th IEEE International Symposium on Wearable Computers. :145-146.
Le Moigne J, Cole-Rhodes A, Eastman R, Jain P, Joshua A, Memarsadeghi N, Mount D, Netanyahu N, Morisette J, Uko-Ozoro E.  2006.  Image Registration and Fusion Studies for the Integration of Multiple Remote Sensing Data. Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on. 5:V-V.
Bavier A, Feamster N, Huang M, Peterson L, Rexford J.  2006.  In VINI veritas: realistic and controlled network experimentation. SIGCOMM Comput. Commun. Rev.. 36(4):3-14.
Banerjee S, Lee S, Bhattacharjee B, Srinivasan A.  2006.  Resilient multicast using overlays. IEEE/ACM Transactions on Networking. 14(2):237-248.
2005
Feamster N, Johari R, Balakrishnan H.  2005.  Implications of autonomy for the expressiveness of policy routing. Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. :25-36.
2004
Vasan A, Memon AM.  2004.  ASPIRE: automated systematic protocol implementation robustness evaluation. Software Engineering Conference, 2004. Proceedings. 2004 Australian. :241-250.

Pages