Publications

Export 1202 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is L  [Clear All Filters]
Conference Papers
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Lee S, Levin D, Gopalakrishnan V, Bhattacharjee B.  2007.  Backbone construction in selfish wireless networks. Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. :121-132.
Labrinidis A, Roussopoulos N.  2003.  Balancing performance and data freshness in web database servers. Proceedings of the 29th international conference on Very large data bases-Volume 29. :393-404.
Chellappa R, Zhou S, Li B.  2002.  Bayesian methods for face recognition from video. Acoustics, Speech, and Signal Processing (ICASSP), 2002 IEEE International Conference on. 4:IV-4068-IV-4071-IV-4068-IV-4071.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Friedman B, Levenson N, Shneiderman B, Suchman L, Winograd T.  1994.  Beyond accuracy, reliability, and efficiency: criteria for a good computer system. Conference companion on Human factors in computing systems. :195-198.
Lumezanu C, Feamster N, Klein H.  2012.  #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Levin D, LaCurts K, Spring N, Bhattacharjee B.  2008.  Bittorrent is an auction: analyzing and improving bittorrent's incentives. Proceedings of the ACM SIGCOMM 2008 conference on Data communication. :243-254.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
Zhang J, Luo X, Perdisci R, Gu G, Lee W, Feamster N.  2011.  Boosting the scalability of botnet detection using adaptive traffic sampling. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. :124-134.
desJardins M, Littman M.  2010.  Broadening student enthusiasm for computer science with a great insights course. Proceedings of the 41st ACM technical symposium on Computer science education. :157-161.
Liao H, Osada M, Shneiderman B.  1993.  Browsing Unix directories with dynamic queries: An analytical and experimental evaluation. Proc. Ninth Japanese Symp. Human Interface. :95-98.
Jimmy Lin.  2009.  Brute force and indexed approaches to pairwise document similarity comparisons with MapReduce. Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval. :155-162.
Kashyap A, Bhattacharjee B, La R, Shayman M, Tabatabaee V.  2006.  CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
Liu X, Doermann D, Li H.  2008.  Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
Liu X, Doermann D, Li H.  2008.  Camera Phone Based Tools for People with Visual Impairments. The First International Workshop on Mobile Multimedia Processing.
Liang J, DeMenthon D, Doermann D.  2006.  Camera-Based Document Image Mosaicing. ICPR'06. :476-479.
Luo Y, Duraiswami R.  2008.  Canny edge detection on NVIDIA CUDA. Computer Vision and Pattern Recognition Workshops, 2008. CVPRW '08. IEEE Computer Society Conference on. :1-8.
Chafekar D, Levin D, Kumar VSA, Marathe MV, Parthasarathy S, Srinivasan A.  2008.  Capacity of Asynchronous Random-Access Scheduling in Wireless Networks. IEEE INFOCOM 2008. The 27th Conference on Computer Communications. :1148-1156.
Licamele L, Bilgic M, Getoor L, Roussopoulos N.  2005.  Capital and benefit in social networks. Proceedings of the 3rd international workshop on Link discovery. :44-51.
Lee S, Banerjee S, Bhattacharjee B.  2004.  The case for a multi-hop wireless local area network. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 2:894-905vol.2-894-905vol.2.
Layman L, Basili VR, Zelkowitz MV, Fisher KL.  2011.  A case study of measuring process risk for early insights into software safety. Software Engineering (ICSE), 2011 33rd International Conference on. :623-632.
Dyer C, Weese J, Setiawan H, Lopez A, Ture F, Eidelman V, Ganitkevitch J, Blunsom P, Resnik P.  2010.  cdec: A decoder, alignment, and learning framework for finite-state and context-free translation models. Proceedings of the ACL 2010 System Demonstrations. :7-12.
Cleary KR, Levine BA, Norton GS, Mundur PV.  1997.  Challenges in sending large radiology images over military communications channels. Proceedings of SPIE. 3035:230-230.

Pages