Publications

Search
Export 853 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
Conference Papers
Beynon M, Ferreira R, Kurc T, Sussman A, Saltz J.  2000.  DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
Farrell R, Davis LS.  2008.  Decentralized discovery of camera network topology. Distributed Smart Cameras, 2008. ICDSC 2008. Second ACM/IEEE International Conference on. :1-10.
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Froehlich J, Findlater L, Ostergren M, Ramanathan S, Peterson J, Wragg I, Larson E, Fu F, Bai M, Patel S.  2012.  The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
Froehlich J, Findlater L, Ostergren M, Ramanathan S, Peterson J, Wragg I, Larson E, Fu F, Bai M, Patel S.  2012.  The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
Froehlich J, Findlater L, Ostergren M, Ramanathan S, Peterson J, Wragg I, Larson E, Fu F, Bai M, Patel S.  2012.  The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
Caesar M, Caldwell D, Feamster N, Rexford J, Shaikh A, van der Merwe J.  2005.  Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
Froehlich J, Findlater L, Landay J.  2010.  The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
Froehlich J, Findlater L, Landay J.  2010.  The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
Druin A, Montemayor J, Hendler J, McAlister B, Boltman A, Fiterman E, Plaisant A, Kruskal A, Olsen H, Revett I et al..  1999.  Designing PETS: a personal electronic teller of stories. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :326-329.
Feamster N, Balakrishnan H.  2005.  Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.
Shankar U, Talwar K, Foster JS, Wagner D.  2001.  Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
Bin Tariq M, Motiwala M, Feamster N, Ammar M.  2009.  Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
Kobla V, Doermann D, Faloutsos C.  1998.  Developing High-Level Representations of Video Clips using VideoTrails. Proceedings of the SPIEConference on Storage and Retrieval for Image and Video Databases VI. 3312:81-92.
Afework A, Beynon MD, Bustamante F, Cho S, Demarzo A, Ferreira R, Miller R, Silberman M, Saltz J, Sussman A et al..  1998.  Digital dynamic telepathology–the Virtual Microscope.. Proceedings of the AMIA Symposium. :912-912.
Khoo Y P, Hicks MW, Foster JS, Sazawal V.  2009.  Directing JavaScript with arrows. Proceedings of the 5th symposium on Dynamic languages. :49-58.
Guerra-Filho G, Fermüller C, Aloimonos Y.  2005.  Discovering a language for human activity. Proceedings of the AAAI 2005 Fall Symposium on Anticipatory Cognitive Embodied Systems, Washington, DC.
Fernandez JA, Gryz J, Minker J.  1996.  Disjunctive deductive databases: Semantics, updates and architecture. Proceedings of the 4th Bar-Ilan Symposium on Foundations of AI. :256-274.
Cunha Í, Teixeira R, Feamster N, Diot C.  2008.  Distinguishing persistent failures from transient losses. Proceedings of the 2008 ACM CoNEXT Conference. :50:1–50:2-50:1–50:2.
Su G-M, Han Z, Kwasinski A, M. Wu, Liu KJR, Farvardin N.  2004.  Distortion management of real-time MPEG-4 video over downlink multicode CDMA networks. Communications, 2004 IEEE International Conference on. 5:3071-3075Vol.5-3071-3075Vol.5.
Maniatis P, Akhawe D, Fall K, Elaine Shi, McCamant S, Song D.  2011.  Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
Fu K, Sit E, Smith K, Feamster N.  2001.  Dos and don'ts of client authentication on the web. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10. :19-19.
Fu K, Sit E, Smith K, Feamster N.  2001.  Dos and don'ts of client authentication on the web. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10. :19-19.
Samet H, Fruin BC, Nutanong S.  2012.  Duking it out at the smartphone mobile app mapping API corral: Apple, Google, and the competition. 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS 2012).

Pages