Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2013 | Making Every Bit Count in Wide-Area Analytics | Rabkin, Ariel; Arye, Matvey; Sen, Siddhartha; Pai, Vivek; Freedman, Michael J |
2011 | Fast and Balanced: Efficient Label Tree Learning for Large Scale Object Recognition | Deng, Jia; Satheesh, Sanjeev; Berg, Alexander C; Li, Fei-Fei |
2018 | Exploring the phenotypic consequences of tissue specific gene expression variation inferred from GWAS summary statistics | Barbeira, Alvaro N; Dickinson, Scott P; Bonazzola, Rodrigo; Zheng, Jiamao; Wheeler, Heather E, et al |
26-Jun-2017 | Augur: Internet-Wide Detection of Connectivity Disruptions | Pearce, P; Ensafi, R; Li, F; Feamster, Nick; Paxson, V |
2012 | Computing a nonnegative matrix factorization -- provably | Arora, Sanjeev; Ge, Rong; Kannan, Ravindran; Moitra, Ankur |
26-Jun-2017 | Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks | Sun, Y; Edmundson, A; Feamster, Nick; Chiang, M; Mittal, Prateek |
2018 | PairedCycleGAN: Asymmetric Style Transfer for Applying and Removing Makeup | Chang, Huiwen; Lu, Jingwan; Yu, Fisher; Finkelstein, Adam |
2017 | A Time-Space Lower Bound for a Large Class of Learning Problems | Raz, Ran |
2020 | Indifferentiability for Public Key Cryptosystems | Zhandry, Mark; Zhang, Cong |
Jan-2016 | Example-directed synthesis: a type-theoretic interpretation | Frankle, Jonathan; Osera, Peter-Michael; Walker, David; Zdancewic, Steve |