Publications

Export 853 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2011
Falk J, Zebelein C, Keinert J, Haubelt C, Teich J, Bhattacharyya SS.  2011.  Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
Arya S, da Fonseca GD, Mount D.  2011.  Approximate polytope membership queries. Proceedings of 43rd Annual ACM Symposium on Theory of Computing. :579-586.
Koponen T, Shenker S, Balakrishnan H, Feamster N, Ganichev I, Ghodsi A, Godfrey BP, McKeown N, Parulkar G, Raghavan B et al..  2011.  Architecting for innovation. SIGCOMM Comput. Commun. Rev.. 41(3):24-36.
Oh S, Hoogs A, Perera A, Cuntoor N, Chen C-C, Lee J T, Mukherjee S, Aggarwal JK, Lee H, Davis LS et al..  2011.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video. Advanced Video and Signal-Based Surveillance (AVSS), 2011 8th IEEE International Conference on. :527-528.
Rasko DA, Worsham PL, Abshire TG, Stanley ST, Bannan JD, Wilson MR, Langham RJ, Decker SR, Jiang L, Read TD et al..  2011.  Bacillus Anthracis Comparative Genome Analysis in Support of the Amerithrax Investigation. Proceedings of the National Academy of SciencesPNAS. 108(12):5027-5032.
Farrell R, Oza O, Zhang N, Morariu VI, Darrell T, Davis LS.  2011.  Birdlets: Subordinate categorization using volumetric primitives and pose-normalized appearance. Computer Vision (ICCV), 2011 IEEE International Conference on. :161-168.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Sundaresan S, de Donato W, Feamster N, Teixeira R, Crawford S, Pescapè A.  2011.  Broadband internet performance: A view from the gateway. SIGCOMM-Computer Communication Review. 41(4):134-134.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Khan A, Bartram L, Blevis E, DiSalvo C, Froehlich J, Kurtenbach G.  2011.  CHI 2011 sustainability community invited panel: challenges ahead. 2011 annual conference extended abstracts on Human factors in computing systems. :73-76.
Alam M, Islam A, Bhuiyan NA, Rahim N, Hossain A, Khan GY, Ahmed D, Watanabe H, Izumiya H, Faruque ASG et al..  2011.  Clonal transmission, dual peak, and off-season cholera in Bangladesh. Infection Ecology & Epidemiology. 1(1)
Kim H, Sundaresan S, Chetty M, Feamster N, Edwards KW.  2011.  Communicating with caps: managing usage caps in home networks. ACM SIGCOMM Computer Communication Review. 41(4):470-471.
Kim H, Sundaresan S, Chetty M, Feamster N, W. Edwards K.  2011.  Communicating with Caps: Managing Usage Caps in Home Networks. SIGCOMM Comput. Commun. Rev.. 41(4):470-471.
Templeton T C, Fleischmann KR, Boyd-Graber J.  2011.  Comparing values and sentiment using Mechanical Turk. Proceedings of the 2011 iConference. :783-784.
Teo CL, Yang Y, Daumé H, Fermüller C, Aloimonos Y.  2011.  A Corpus-Guided Framework for Robotic Visual Perception. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Lee W, Dagon D, Giffin J, Feamster N, Ollman G, Westby J, Wesson R, Vixie P.  2011.  Countering Botnets: Anomaly-Based Detection, Comprehensive Analysis, and Efficient Mitigation.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Froehlich J, Larson E, Gupta S, Cohn G, Reynolds M, Patel S.  2011.  Disaggregated End-Use Energy Sensing for the Smart Grid. IEEE Pervasive Computing. 10(1):28-39.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
An J-hoon(D), Chaudhuri A, Foster JS, Hicks MW.  2011.  Dynamic inference of static types for ruby. Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :459-472.
Fang H-ren, O'Leary DP.  2011.  Euclidean distance matrix completion problems. Optimization Methods and Software. :1-23.
Hayden C, Smith E, Hardisty E, Hicks MW, Foster JS.  2011.  Evaluating Dynamic Software Update Safety Using Systematic Testing. IEEE Transactions on Software Engineering. PP(99):1-1.
Froehlich J.  2011.  Every bit has a cost. XRDS. 17(4):5-5.
Froehlich J.  2011.  Every bit has a cost. XRDS. 17(4):5-5.
Kim H, Benson T, Akella A, Feamster N.  2011.  The Evolution of Network Configuration: A Tale of Two Campuses. Networks. 7:18-18.

Pages