Publications
Export 3364 results:
Author Title Type [ Year] Filters: First Letter Of Last Name is S [Clear All Filters]
2008. On the fidelity of 802.11 packet traces. Proceedings of the 9th international conference on Passive and active network measurement. :132-141.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
2008. Fixing ally's growing pains with velocity modeling. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :337-342.
2008. Fixing ally's growing pains with velocity modeling. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. :337-342.
2008. A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
2008. Functional Diversification of Paralogous Transcription Factors via Divergence in DNA Binding Site Motif and in Expression. PLoS ONEPLoS ONE. 3(6):e2345-e2345.
2008. Genome-Wide Analysis of Natural Selection on Human Cis-Elements. PLoS ONEPLoS ONE. 3(9):e3137-e3137.
2008. Group proximity measure for recommending groups in online social networks. networks. 1(6):5-5.
2008. Hardware and Software Systems for Image and Video Processing-Algorithmic and Architectural Optimizations for Computationally Efficient Particle Filtering. IEEE Transactions on Image Processing. 17(5):737-748.
2008. Hardware and Software Systems for Image and Video Processing-Algorithmic and Architectural Optimizations for Computationally Efficient Particle Filtering. IEEE Transactions on Image Processing. 17(5):737-748.
2008. Hierarchical infrastructure for internet mapping services. Geospatial Services and Applications for the Internet. :1-30.
2008. High-Dimensional Similarity Retrieval Using Dimensional Choice. Similarity Search and Applications, 2008. SISAP 2008. First International Workshop on. :35-42.
2008. How Do Users Find Things with PubMed? Towards Automatic Utility Evaluation with User Simulations
2008. ilearn on the iphone: Real-time human activity classification on commodity mobile phones. University of Washington CSE Tech Report UW-CSE-08-04-02.
2008. Image acquisition forensics: Forensic analysis to identify imaging source. Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference on. :1657-1660.
2008. Immunity-Based Epidemic Routing in Intermittent Networks. 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2008. SECON '08. :609-611.
2008. Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em. Information Systems SecurityInformation Systems Security. 5352:56-70.
2008. Improved algorithmic versions of the Lovász Local Lemma. Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms. :611-620.
2008. Inconsistency management policies. Proc. 2008 Intl. Conference on Knowledge Representation and Reasoning (KR 2008).