Publications
Export 853 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is F [Clear All Filters]
2011. Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
2011. Special Issue on Video Analysis on Resource-Limited Systems. IEEE Transactions on Circuits and Systems for Video Technology. 21(10):1349-1352.
2011. State transfer for clear and efficient runtime updates. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :179-184.
2011. Structure and recognition of polyubiquitin chains of different lengths and linkage. F1000 Biology ReportsF1000 Biol Rep. 3
2011. Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
2011. A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
2011. Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
2011. Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
2011. Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
2010. Adapting Scrum to Managing a Research Group. Technical Reports of the Computer Science Department.
2010. An animated multivariate visualization for physiological and clinical data in the ICU. Proceedings of the 1st ACM International Health Informatics Symposium. :771-779.
2010. Approximation algorithm for the kinetic robust K-center problem. Computational Geometry. 43(6–7):572-586.
2010. Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
2010. Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
2010. Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
2010. Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
2010. Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
2010. Children's roles using keyword search interfaces at home. Proceedings of the 28th international conference on Human factors in computing systems. :413-422.
2010. Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.