Publications

Export 853 results:
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Caesar M, Caldwell D, Feamster N, Rexford J, Shaikh A, van der Merwe J.  2005.  Design and implementation of a routing control platform. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :15-28.
Fleet DJ, Black MJ, Yacoob Y, Jepson AD.  2000.  Design and use of linear models for image motion analysis. International Journal of Computer Vision. 36(3):171-193.
Froehlich J, Findlater L, Landay J.  2010.  The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
Froehlich J, Findlater L, Landay J.  2010.  The design of eco-feedback technology. Proceedings of the 28th international conference on Human factors in computing systems. :1999-2008.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Fei Wu P, Qu Y, Fleischmann K, Golbeck J, Jaeger P, Preece J, Shneiderman B.  2008.  Designing community-based emergency communication system: A preliminary study. Proceedings of the American Society for Information Science and Technology. 45(1):1-3.
Lychev R, Feamster N.  2009.  Designing Enforceable Network Contracts. GT-CS-09-02
Druin A, Montemayor J, Hendler J, McAlister B, Boltman A, Fiterman E, Plaisant A, Kruskal A, Olsen H, Revett I et al..  1999.  Designing PETS: a personal electronic teller of stories. Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit. :326-329.
Feamster N, Balakrishnan H.  2005.  Detecting BGP configuration faults with static analysis. Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2. :43-56.
Ramachandran A, Feamster N, Dagon D.  2008.  Detecting botnet membership with dnsbl counterintelligence. Botnet Detection. :131-142.
Shankar U, Talwar K, Foster JS, Wagner D.  2001.  Detecting format string vulnerabilities with type qualifiers. Proceedings of the 10th conference on USENIX Security Symposium-Volume 10. :16-16.
Corrochano E B, Ogale AS, Fermüller C, Aloimonos Y.  2005.  Detecting Independent 3D Movement. Handbook of Geometric ComputingHandbook of Geometric Computing. :383-401.
Bin Tariq M, Motiwala M, Feamster N, Ammar M.  2009.  Detecting network neutrality violations with causal inference. Proceedings of the 5th international conference on Emerging networking experiments and technologies. :289-300.
Hao S, Syed N A, Feamster N, Gray AG, Krasser S.  2009.  Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine. Proceedings of the 18th conference on USENIX security symposium. :101-118.
Fischer-Le Saux M, Hervio-Heath D, Loaec S, Colwell RR, Pommepuy M.  2002.  Detection of Cytotoxin-Hemolysin mRNA in Nonculturable Populations of Environmental and Clinical Vibrio Vulnificus Strains in Artificial Seawater. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 68(11):5641-5646.
Fushman D.  2012.  Determining Protein Dynamics from 15N Relaxation Data by Using DYNAMICS. Protein NMR Techniques. 831:485-511.
Medem A, Teixeira R, Feamster N, Meulle M.  2009.  Determining the causes of intradomain routing changes.
Kobla V, Doermann D, Faloutsos C.  1998.  Developing High-Level Representations of Video Clips using VideoTrails. Proceedings of the SPIEConference on Storage and Retrieval for Image and Video Databases VI. 3312:81-92.
Huang Y, Feamster N, Lakhina A, Xu J(J).  2007.  Diagnosing network disruptions with network-wide analysis. SIGMETRICS Perform. Eval. Rev.. 35(1):61-72.
Afework A, Beynon MD, Bustamante F, Cho S, Demarzo A, Ferreira R, Miller R, Silberman M, Saltz J, Sussman A et al..  1998.  Digital dynamic telepathology–the Virtual Microscope.. Proceedings of the AMIA Symposium. :912-912.
Fermüller C, Aloimonos Y.  1997.  DIRECT MOTION PERCEPTION. Visual navigation: from biological systems to unmanned ground vehicles. :135-135.
Fermüller C, Aloimonos Y.  1995.  Direct Perception of Three-Dimensional Motion from Patterns of Visual Motion. ScienceScience. 270(5244):1973-1976.
Ma K-K, Yit Phang K, Foster JS, Hicks MW.  2011.  Directed Symbolic Execution. Static AnalysisStatic Analysis. 6887:95-111.
Khoo Y P, Hicks MW, Foster JS, Sazawal V.  2009.  Directing JavaScript with arrows. Proceedings of the 5th symposium on Dynamic languages. :49-58.
Khoo YP, Hicks MW, Foster JS, Sazawal V.  2008.  Directing javascript with arrows (functional pearl). Technical Reports of the Computer Science Department.

Pages