Publications
Export 853 results:
Author Title [ Type] Year Filters: First Letter Of Last Name is F [Clear All Filters]
2000. DataCutter: Middleware for filtering very large scientific datasets on archival storage systems. NASA conference publication. :119-134.
2008. Decentralized discovery of camera network topology. Distributed Smart Cameras, 2008. ICDSC 2008. Second ACM/IEEE International Conference on. :1-10.
2010. Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
2012. The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
2012. The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
2012. The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
2005. Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
2010. The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
2010. The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
1999. Designing PETS: a personal electronic teller of stories. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :326-329.
2005. Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.
2001. Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
2009. Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
2009. Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
1998. Developing High-Level Representations of Video Clips using VideoTrails. Proceedings of the SPIEConference on Storage and Retrieval for Image and Video Databases VI. 3312:81-92.
1998. Digital dynamic telepathology–the Virtual Microscope.. Proceedings of the AMIA Symposium. :912-912.
2009. Directing JavaScript with arrows. Proceedings of the 5th symposium on Dynamic languages. :49-58.
2005. Discovering a language for human activity. Proceedings of the AAAI 2005 Fall Symposium on Anticipatory Cognitive Embodied Systems, Washington, DC.
1996. Disjunctive deductive databases: Semantics, updates and architecture. Proceedings of the 4th Bar-Ilan Symposium on Foundations of AI. :256-274.
2008. Distinguishing persistent failures from transient losses. Proceedings of the 2008 ACM CoNEXT Conference. :50:1–50:2-50:1–50:2.
2004. Distortion management of real-time MPEG-4 video over downlink multicode CDMA networks. Communications, 2004 IEEE International Conference on. 5:3071-3075Vol.5-3071-3075Vol.5.
2001. Dos and don'ts of client authentication on the web. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10. :19-19.
2001. Dos and don'ts of client authentication on the web. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10. :19-19.
2012. Duking it out at the smartphone mobile app mapping API corral: Apple, Google, and the competition. 1st ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS 2012).