Publications

Export 7148 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
F
Faruque SM, Sack DA, Sack BR, Colwell RR, Takeda Y, Nair BG.  2003.  Emergence and Evolution of Vibrio Cholerae O139. Proceedings of the National Academy of SciencesPNAS. 100(3):1304-1309.
Farwell D, Helmreich S, Dorr BJ, Habash N, Reeder F, Miller K, Levin L, Mitamura T, Hovy E, Rambow O et al..  2004.  Interlingual annotation of multilingual text corpora. Proceedings of the North American Chapter of the Association for Computational Linguistics Workshop on Frontiers in Corpus Annotation. :55-62.
Faulk S, Gustafson J, Johnson P, Porter A, Tichy W, Votta L.  2004.  Measuring HPC productivity. International Journal of High Performance Computing Applications. 18(4):459-473.
Fayzullin M, V.S. Subrahmanian, Albanese M, Cesarano C, Picariello A.  2007.  Story creation from heterogeneous data sources. Multimedia Tools and Applications. 33(3):351-377.
Fayzullin M, V.S. Subrahmanian.  2004.  An algebra for powerpoint sources. Multimedia Tools and Applications. 24(3):273-301.
Fayzullin M, V.S. Subrahmanian, Picariello A, Sapino ML.  2003.  The CPR model for summarizing video. Proceedings of the 1st ACM international workshop on Multimedia databases. :2-9.
Fayzullin M, V.S. Subrahmanian, Picariello A, Sapino ML.  2005.  The CPR model for summarizing video. Multimedia Tools and Applications. 26(2):153-173.
Fayzullin M, V.S. Subrahmanian, Albanese M, Picariello A.  2004.  The priority curve algorithm for video summarization. Proceedings of the 2nd ACM international workshop on Multimedia databases. :28-35.
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
Feamster N, Wee S.  1999.  An MPEG-2 to H. 263 transcoder. SPIE Voice, Video, and Data Communications Conference.
Feamster N.  2010.  Outsourcing home network security. Proceedings of the 2010 ACM SIGCOMM workshop on Home networks. :37-42.
Feamster N, Jung J, Balakrishnan H.  2005.  An empirical study of "bogon" route advertisements. SIGCOMM Comput. Commun. Rev.. 35(1):63-70.
Feamster N, Johari R, Balakrishnan H.  2005.  Stable Policy Routing with Provider Independence. MIT-CSAIL-TR-2005-009
Feamster N, Gray A.  2008.  Can great research be taught?: independent research with cross-disciplinary thinking and broader impact Proceedings of the 39th SIGCSE technical symposium on Computer science education. :471-475.
Feamster N, Bansal D, Balakrishnan H.  2001.  On the interactions between layered quality adaptation and congestion control for streaming video. 11th International Packet Video Workshop.
Feamster N, Borkenhagen J, Rexford J.  2003.  Guidelines for interdomain traffic engineering. SIGCOMM Comput. Commun. Rev.. 33(5):19-30.
Feamster N.  2004.  Practical verification techniques for wide-area routing. SIGCOMM Comput. Commun. Rev.. 34(1):87-92.
Feamster N, Johari R, Balakrishnan H.  2007.  Implications of Autonomy for the Expressiveness of Policy Routing. Networking, IEEE/ACM Transactions on. 15(6):1266-1279.
Feamster N, Rexford J.  2007.  Network-Wide Prediction of BGP Routes. Networking, IEEE/ACM Transactions on. 15(2):253-266.
Feamster N.  2006.  Can Information from End Systems Improve Routing. Proceedings of the Workshop on Internet Routing Evolution and Design.
Feamster N, Balakrishnan H.  2005.  Correctness properties for Internet routing. Allerton Conference on Communication, Control, and Computing.
Feamster N, Voellmy A, Agarwal A, Hudak P, Burnett S, Launchbury J.  2010.  Don't Configure the Network, Program It! Domain-Specific Programming Languages for Network Systems. YALEU/DCS/RR-1432
Feamster N, Dingledine R.  2004.  Location diversity in anonymity networks. Proceedings of the 2004 ACM workshop on Privacy in the electronic society. :66-76.
Feamster N, Motiwala M, Vempala S.  2007.  Path splicing with network slicing. Proc. ACM SIGCOMM Hot-Nets.
Feamster N, Balazinska M, Wang W, Balakrishnan H, Karger D.  2003.  Thwarting Web Censorship with Untrusted Messenger Discovery. Privacy Enhancing TechnologiesPrivacy Enhancing Technologies. 2760:125-140.

Pages