Year: 2015

Conference

Challenge

2015 89-94
Chatzipapas A, Pediaditakis D, Rotsos C, Mancuso V, Crowcroft J, Moore A

Conference

Preface

2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security Plas 2015
Clarkson M, Jia L

Journal Article

BlindBox: Deep Packet Inspection over Encrypted Traffic.

2015 • IACR Cryptol. ePrint Arch. • 2015:264-264
Sherry J, Lan C, Popa RA, Ratnasamy S

Conference

Never-Ending Learning

2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 2302-2310
Mitchell T, and others

Conference

Adaptation from sparse observations through detection and correction of model anomalies (doctoral consortium)

2015 • Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS • 3:1999-2000
Mendoza JP, Veloso M, Simmons R

Conference

Sample complexity of episodic fixed-horizon reinforcement learning

2015 • Advances in Neural Information Processing Systems • 2015-January:2818-2826
Dann C, Brunskill E

Conference

The Case for Offload Shaping

2015 • 16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15) • 51-56
Hu W, Amos B, Chen Z, Ha K, Richter W, Pillai P, Gilbert B, Harkes J, Satyanarayanan M

Conference

An active learning approach to coreference resolution

2015 • IJCAI International Joint Conference on Artificial Intelligence • 2015-January:1312-1318
Sachan M, Hovy E, Xing EP

Journal Article

Efficient representations for lifelong learning and autoencoding

2015 • Journal of machine learning research • 40(2015):
Balcan MF, Blum A, Vempala S

Journal Article

BlindBox: Deep Packet Inspection over Encrypted Traffic.

2015 • Comput. Commun. Rev. • 45:213-226
Sherry J, Lan C, Popa RA, Ratnasamy S