2013
59Private decayed predicate sums on streams. Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft. ICDT 2013, 284-295. Web SearchBibTeXDownload
2012
58Mixture Models of Endhost Network Traffic. John Mark Agosta, Jaideep Chandrashekar, Mark Crovella, Nina Taft, Daniel Ting. CoRR (abs/1212.2744) (2012). Web SearchBibTeXDownload
57CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks. Udi Weinsberg, Athula Balachandran, Nina Taft, Gianluca Iannaccone, Vyas Sekar, Srinivasan Seshan. CoRR (abs/1206.1815) (2012). Web SearchBibTeXDownload
56CARE: content aware redundancy elimination for challenged networks. Udi Weinsberg, Qingxi Li, Nina Taft, Athula Balachandran, Vyas Sekar, Gianluca Iannaccone, Srinivasan Seshan. HotNets 2012, 127-132. Web SearchBibTeXDownload
55Characterizing end-host application performance across multiple networking environments. Diana Joumblatt, Oana Goga, Renata Teixeira, Jaideep Chandrashekar, Nina Taft. INFOCOM 2012, 2536-2540. Web SearchBibTeXDownload
54Finding a needle in a haystack of reviews: cold start context-based hotel recommender system. Asher Levi, Osnat Mokryn, Christophe Diot, Nina Taft. RecSys 2012, 115-122. Web SearchBibTeXDownload
53Finding a needle in a haystack of reviews: cold start context-based hotel recommender system demo. Asher Levi, Osnat Mokryn, Christophe Diot, Nina Taft. RecSys 2012, 305-306. Web SearchBibTeXDownload
52BlurMe: inferring and obfuscating user gender based on ratings. Udi Weinsberg, Smriti Bhagat, Stratis Ioannidis, Nina Taft. RecSys 2012, 195-202. Web SearchBibTeXDownload
2011
51Private Decayed Sum Estimation under Continual Observation. Jean Bolot, Nadia Fawaz, S. Muthukrishnan, Aleksandar Nikolov, Nina Taft. CoRR (abs/1108.6123) (2011). Web SearchBibTeXDownload
2010
50Perspectives on tracing end-hosts: a survey summary. Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft. Computer Communication Review (40): 51-55 (2010). Web SearchBibTeXDownload
49ASTUTE: detecting a different class of traffic anomalies. Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan. SIGCOMM 2010, 267-278. Web SearchBibTeXDownload
48Detecting traffic anomalies using an equilibrium property. Fernando Silveira, Christophe Diot, Nina Taft, Ramesh Govindan. SIGMETRICS 2010, 377-378. Web SearchBibTeXDownload
47HostView: annotating end-host performance measurements with user feedback. Diana Joumblatt, Renata Teixeira, Jaideep Chandrashekar, Nina Taft. SIGMETRICS Performance Evaluation Review (38): 43-48 (2010). Web SearchBibTeXDownload
2009
46Macroscope: end-point approach to networked application dependency discovery. Lucian Popa, Byung-Gon Chun, Ion Stoica, Jaideep Chandrashekar, Nina Taft. CoNEXT 2009, 229-240. Web SearchBibTeXDownload
45Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning. Benjamin I. P. Rubinstein, Peter L. Bartlett, Ling Huang, Nina Taft. CoRR (abs/0911.5708) (2009). Web SearchBibTeXDownload
44ANTIDOTE: understanding and defending against poisoning of anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. Internet Measurement Conference 2009, 1-14. Web SearchBibTeXDownload
43Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems. Sergiu Nedevschi, Jaideep Chandrashekar, Junda Liu, Bruce Nordman, Sylvia Ratnasamy, Nina Taft. NSDI 2009, 381-394. Web SearchBibTeXDownload
42Exploiting Temporal Persistence to Detect Covert Botnet Channels. Frédéric Giroire, Jaideep Chandrashekar, Nina Taft, Eve M. Schooler, Dina Papagiannaki. RAID 2009, 326-345. Web SearchBibTeXDownload
41Stealthy poisoning attacks on PCA-based anomaly detectors. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Satish Rao, Nina Taft, J. D. Tygar. SIGMETRICS Performance Evaluation Review (37): 73-74 (2009). Web SearchBibTeXDownload
40Impact of IT monoculture on behavioral end host intrusion detection. Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire. WREN 2009, 27-36. Web SearchBibTeXDownload
2008
39Race conditions in coexisting overlay networks. Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone. IEEE/ACM Trans. Netw. (16): 1-14 (2008). Web SearchBibTeXDownload
38How healthy are today's enterprise networks?. Saikat Guha, Jaideep Chandrashekar, Nina Taft, Konstantina Papagiannaki. Internet Measurement Comference 2008, 145-150. Web SearchBibTeXDownload
37Spectral Clustering with Perturbed Data. Ling Huang, Donghui Yan, Michael I. Jordan, Nina Taft. NIPS 2008, 705-712. Web SearchBibTeXDownload
36The Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users. Frédéric Giroire, Jaideep Chandrashekar, Gianluca Iannaccone, Konstantina Papagiannaki, Eve M. Schooler, Nina Taft. PAM 2008, 202-211. Web SearchBibTeXDownload
35Evading Anomaly Detection through Variance Injection Attacks on PCA. Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar. RAID 2008, 394-395. Web SearchBibTeXDownload
2007
34Public Health for the Internet (PHI). Joseph M. Hellerstein, Tyson Condie, Minos N. Garofalakis, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Nina Taft. CIDR 2007, 332-340. Web SearchBibTeXDownload
33Communication-Efficient Tracking of Distributed Cumulative Triggers. Ling Huang, Minos N. Garofalakis, Anthony D. Joseph, Nina Taft. ICDCS 2007, 54. Cited by 13Web SearchBibTeXDownload
32Estimating dynamic traffic matrices by using viable routing changes. Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft. IEEE/ACM Trans. Netw. (15): 485-498 (2007). Web SearchBibTeXDownload
31IGP link weight assignment for operational Tier-1 backbones. Antonio Nucci, Supratik Bhattacharyya, Nina Taft, Christophe Diot. IEEE/ACM Trans. Netw. (15): 789-802 (2007). Web SearchBibTeXDownload
30Communication-Efficient Online Detection of Network-Wide Anomalies. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Nina Taft. INFOCOM 2007, 134-142. Cited by 26Web SearchBibTeXDownload
29Profiling the End Host. Thomas Karagiannis, Konstantina Papagiannaki, Nina Taft, Michalis Faloutsos. PAM 2007, 186-196. Web SearchBibTeXDownload
2006
28A fast lightweight approach to origin-destination IP traffic estimation using partial measurements. Gang Liang, Nina Taft, Bin Yu. IEEE Transactions on Information Theory (52): 2634-2648 (2006). Web SearchBibTeXDownload
27Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions. Farinaz Koushanfar, Nina Taft, Miodrag Potkonjak. INFOCOM 2006. Web SearchBibTeXDownload
26An independent-connection model for traffic matrices. Vijay Erramilli, Mark Crovella, Nina Taft. Internet Measurement Conference 2006, 251-256. Web SearchBibTeXDownload
25Toward sophisticated detection with distributed triggers. Ling Huang, Minos N. Garofalakis, Joseph M. Hellerstein, Anthony D. Joseph, Nina Taft. MineNet 2006, 311-316. Cited by 17Web SearchBibTeXDownload
24In-Network PCA and Anomaly Detection. Ling Huang, XuanLong Nguyen, Minos N. Garofalakis, Michael I. Jordan, Anthony D. Joseph, Nina Taft. NIPS 2006, 617-624. Cited by 19Web SearchBibTeXDownload
2005
23The problem of synthetically generating IP traffic matrices: initial recommendations. Antonio Nucci, Ashwin Sridharan, Nina Taft. Computer Communication Review (35): 19-32 (2005). Web SearchBibTeXDownload
22Can coexisting overlays inadvertently step on each other?. Ram Keralapura, Chen-Nee Chuah, Nina Taft, Gianluca Iannaccone. ICNP 2005, 201-214. Web SearchBibTeXDownload
21Long-term forecasting of Internet backbone traffic. Konstantina Papagiannaki, Nina Taft, Zhi-Li Zhang, Christophe Diot. IEEE Transactions on Neural Networks (16): 1110-1124 (2005). Web SearchBibTeXDownload
20Combining Filtering and Statistical Methods for Anomaly Detection. Augustin Soule, Kavé Salamatian, Nina Taft. Internet Measurment Conference 2005, 331-344. Web SearchBibTeXDownload
19Traffic matrices: balancing measurements, inference and modeling. Augustin Soule, Anukool Lakhina, Nina Taft, Konstantina Papagiannaki, Kavé Salamatian, Antonio Nucci, Mark Crovella, Christophe Diot. SIGMETRICS 2005, 362-373. Web SearchBibTeXDownload
18Traffic matrix tracking using Kalman filters. Augustin Soule, Kavé Salamatian, Antonio Nucci, Nina Taft. SIGMETRICS Performance Evaluation Review (33): 24-31 (2005). Web SearchBibTeXDownload
2004
17Fast Flow Classification over Internet. A. Oveissian, Kavé Salamatian, Augustin Soule, Nina Taft. CNSR 2004, 235-242. Web SearchBibTeXDownload
16Can ISPs and Overlay Networks Form a Synergistic Co-existence?. Ram Keralapura, Nina Taft, Gianluca Iannaccone, Chen-Nee Chuah. DSOM 2004, 263-265. Web SearchBibTeXDownload
15Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks. Antonio Nucci, Nina Taft, Chadi Barakat, Patrick Thiran. IEEE Journal on Selected Areas in Communications (22): 1692-1707 (2004). Web SearchBibTeXDownload
14Impact of Flow Dynamics on Traffic Engineering Design Principles. Konstantina Papagiannaki, Nina Taft, Christophe Diot. INFOCOM 2004. Web SearchBibTeXDownload
13Design of IGP Link Weights for Estimation of Traffic Matrices. Antonio Nucci, Rene L. Cruz, Nina Taft, Christophe Diot. INFOCOM 2004. Web SearchBibTeXDownload
12A distributed approach to measure IP traffic matrices. Konstantina Papagiannaki, Nina Taft, Anukool Lakhina. Internet Measurement Conference 2004, 161-174. Web SearchBibTeXDownload
11Structural analysis of network traffic flows. Anukool Lakhina, Konstantina Papagiannaki, Mark Crovella, Christophe Diot, Eric D. Kolaczyk, Nina Taft. SIGMETRICS 2004, 61-72. Web SearchBibTeXDownload
10How to identify and estimate the largest traffic matrix elements in a dynamic environment. Augustin Soule, Antonio Nucci, Rene L. Cruz, Emilio Leonardi, Nina Taft. SIGMETRICS 2004, 73-84. Web SearchBibTeXDownload
9Flow classification by histograms: or how to go on safari in the internet. Augustin Soule, Kavé Salamatian, Nina Taft, Richard Emilion, Konstantina Papagiannaki. SIGMETRICS 2004, 49-60. Web SearchBibTeXDownload
2003
8An approach to alleviate link overload as observed on an IP backbone. Sundar Iyer, Supratik Bhattacharyya, Nina Taft, Christophe Diot. INFOCOM 2003. Web SearchBibTeXDownload
7Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection. Frédéric Giroire, Antonio Nucci, Nina Taft, Christophe Diot. INFOCOM 2003. Web SearchBibTeXDownload
6Long-Term Forecasting of Internet Backbone Traffic: Observations and Initial Models. Konstantina Papagiannaki, Nina Taft, Zhi-Li Zhang, Christophe Diot. INFOCOM 2003. Web SearchBibTeXDownload
5Network Availability Based Service Differentiation. Mathilde Durvy, Christophe Diot, Nina Taft, Patrick Thiran. IWQoS 2003, 305-324. Web SearchBibTeXDownload
2002
4Geographical and temporal characteristics of inter-POP flows: View from a single pop. Supratik Bhattacharyya, Christophe Diot, Nina Taft, Jorjeta G. Jetcheva. European Transactions on Telecommunications (13): 5-22 (2002). Web SearchBibTeXDownload
3A pragmatic definition of elephants in internet backbone traffic. Konstantina Papagiannaki, Nina Taft, Supratik Bhattacharyya, Patrick Thiran, Kavé Salamatian, Christophe Diot. Internet Measurement Workshop 2002, 175-176. Web SearchBibTeXDownload
2Traffic matrix estimation: existing techniques and new directions. A. Medina, Nina Taft, Kavé Salamatian, Supratik Bhattacharyya, Christophe Diot. SIGCOMM 2002, 161-174. Web SearchBibTeXDownload
2001
1A Protection-Based Approach to QoS in Packet over Fiber Networks. Patrick Thiran, Nina Taft, Christophe Diot, Hui Zang, Robert Mac Donald. IWDC 2001, 266-278. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research