Publications

Export 853 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2011
Ramachandran A, Dasgupta A, Feamster N, Weinberger K.  2011.  Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference. :210-219.
Chellappa R, Cavallaro A, Wu Y, Shan C, Fu Y, Pulli K.  2011.  Special Issue on Video Analysis on Resource-Limited Systems. IEEE Transactions on Circuits and Systems for Video Technology. 21(10):1349-1352.
Hayden CM, Smith EK, Hicks MW, Foster JS.  2011.  State transfer for clear and efficient runtime updates. 2011 IEEE 27th International Conference on Data Engineering Workshops (ICDEW). :179-184.
Fushman D, Wilkinson KD.  2011.  Structure and recognition of polyubiquitin chains of different lengths and linkage. F1000 Biology ReportsF1000 Biol Rep. 3
Lopez JV, Ledger A, Santiago-Vázquez LZ, Pop M, Sommer DD, Ranzer LK, Feldman RA, Russell GK.  2011.  Suppression subtractive hybridization PCR isolation of cDNAs from a Caribbean soft coral. Electronic Journal of Biotechnology. 14(1):8-9.
Yu M, Rexford J, Sun X, Rao S, Feamster N.  2011.  A survey of virtual LAN usage in campus networks. Communications Magazine, IEEE. 49(7):98-103.
Nguyen H V, Banerjee A, Burlina P, Broadwater J, Chellappa R.  2011.  Tracking and Identification via Object Reflectance Using a Hyperspectral Video Camera. Machine Vision Beyond Visible SpectrumMachine Vision Beyond Visible Spectrum. 1:201-219.
Yu X, Fermüller C, Aloimonos Y.  2011.  Visual Scene Interpretation as a Dialogue between Vision and Language. Workshops at the Twenty-Fifth AAAI Conference on Artificial Intelligence.
Konte M, Feamster N.  2011.  Wide-area routing dynamics of malicious networks. Proceedings of the ACM SIGCOMM 2011 conference. :432-433.
2010
Aggarwal G, Panigrahy R, Feder T, Thomas D, Kenthapadi K, Khuller S, Zhu A.  2010.  Achieving anonymity via clustering. ACM Trans. Algorithms. 6(3):49:1–49:19-49:1–49:19.
Hicks MW, Foster JS.  2010.  Adapting Scrum to Managing a Research Group. Technical Reports of the Computer Science Department.
Ordóñez P, desJardins M, Lombardi M, Lehmann CU, Fackler J.  2010.  An animated multivariate visualization for physiological and clinical data in the ICU. Proceedings of the 1st ACM International Health Informatics Symposium. :771-779.
da Fonseca GD, Mount D.  2010.  Approximate range searching: The absolute model. Computational Geometry. 43(4):434-444.
Friedler SA, Mount D.  2010.  Approximation algorithm for the kinetic robust K-center problem. Computational Geometry. 43(6–7):572-586.
Sundaresan S, Lumezanu C, Feamster N, François P.  2010.  Autonomous Traffic Engineering using Self-Configuring Link Weights. GT-CS-10-16
Sundaresan S, Lumezanu C, Feamster N, François P.  2010.  Autonomous Traffic Engineering using Self-Configuring Link Weights. GT-CS-10-16
Sundaresan S, Lumezanu C, Feamster N, Francois P.  2010.  Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
Sundaresan S, Lumezanu C, Feamster N, Francois P.  2010.  Autonomous traffic engineering with self-configuring topologies. SIGCOMM Comput. Commun. Rev.. 41(4):–-–.
Perdisci R, Lee W, Feamster N.  2010.  Behavioral clustering of HTTP-based malware and signature generation using malicious network traces. Proceedings of the 7th USENIX conference on Networked systems design and implementation. :26-26.
Ji H, Fermüller C.  2010.  Better Flow Estimation from Color Images-Volume 2007, Article ID 53912, 9 pages. EURASIP Journal on Advances in Signal Processing. 2007(23)
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N.  2010.  Building a dynamic reputation system for DNS. 19th Usenix Security Symposium.
Anwer M B, Feamster N.  2010.  Building a fast, virtualized data plane with programmable hardware. SIGCOMM Comput. Commun. Rev.. 40(1):75-82.
Tsui C, Wang P, Fleischmann KR, Sayeed AB, Weinberg A.  2010.  Building an IT Taxonomy with Co-occurrence Analysis, Hierarchical Clustering, and Multidimensional Scaling.
Druin A, Foss E, Hutchinson H, Golub E, Hatley L.  2010.  Children's roles using keyword search interfaces at home. Proceedings of the 28th international conference on Human factors in computing systems. :413-422.
Burnett S, Feamster N, Vempala S.  2010.  Chipping away at censorship firewalls with user-generated content. Proc. 19th USENIX Security Symposium, Washington, DC.

Pages