Publications

Export 1202 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
B
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Cardone A, Amelot J, Li-Baboud Y-S, Brady M, Bajcsy P.  2012.  Biases from model assumptions in texture sub-cellular image segmentation. SPIE Newsroom. 13
Sultana M, Nusrin S, Hasan NA, Sadique A, Ahmed KU, Islam A, Hossain A, Longini I, Nizam A, Huq A et al..  2018.  Biofilms Comprise a Component of the Annual Cycle of Vibrio cholerae in the Bay of Bengal Estuary. mBio. (2):e00483-18.
Lee S, Wang TD, Hashmi N, Cummings MP.  2007.  Bio-STEER: A Semantic Web workflow tool for Grid computing in the life sciences. Future Generation Comp Syst. 23(3):497-509.
Legendre C, Raschid L, Snyder B.  2007.  BIPASS: BioInformatics Pipeline Alternative Splicing Services. Nucleic Acids Research. 35(Web Server issue):W292-W292.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Dachman-Soled D, Lindell Y, Mahmoody M, Malkin T.  2011.  On the Black-Box Complexity of Optimally-Fair Coin Tossing. Theory of Cryptography. :450-467.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Liu F, Vishkin U, Milner S.  2006.  Bootstrapping free-space optical networks. Selected Areas in Communications, IEEE Journal on. 24(12):13-22.
Milner S, Llorca J, Anibha A, Vishkin U.  2006.  A bootstrapping model for directional wireless networks. Communications Letters, IEEE. 10(12):840-842.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
Levin D, Bender A, Lumezanu C, Spring N, Bhattacharjee B.  2007.  Boycotting and extorting nodes in an internetwork. NetE-con+ IBC.
desJardins M, Littman M.  2010.  Broadening student enthusiasm for computer science with a great insights course. Proceedings of the 41st ACM technical symposium on Computer science education. :157-161.
Liao H, Osada M, Shneiderman B.  1993.  Browsing Unix directories with dynamic queries: An analytical and experimental evaluation. Proc. Ninth Japanese Symp. Human Interface. :95-98.
Liao H, Osada M, Shneiderman B.  1998.  Browsing Unix Directories With Dynamic Queries: An Evaluation of Three Information Display Techniques. Technical Reports of the Computer Science Department.
Jimmy Lin.  2009.  Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :155-162.
Dorr BJ, Levow G-A, Lin D.  2000.  Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
Dorr BJ, Levow G-A, Lin D.  2000.  Building a Chinese-English Mapping Between Verb Concepts for Multilingual Applications. Envisioning Machine Translation in the Information FutureEnvisioning Machine Translation in the Information Future. 1934:345-363.
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.
Dorr BJ, Lee K.  1992.  Building a lexicon for machine translation: use of corpora for aspectual classification of verbs.
Basili VR, Tesoriero R, Costa P, Lindvall M, Rus I, Shull F, Zelkowitz MV.  2001.  Building an Experience Base for Software Engineering: A report on the first CeBASE eWorkshop. Product Focused Software Process Improvement. :110-125.

Pages