Found 230 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is E  [Clear All Filters]
Hermalin, N., & Regier T. (2019).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Allman, M. (2019).  On Eliminating Root Nameservers from the DNS. Proceedings of ACM SIGCOMM Workshop on Hot Topics in Networks (HotNets).
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Zaslavsky, N., Garvin K., Kemp C., Tishby N., & Regier T. (2019).  Evolution and efficiency in color naming: The case of Nafaanra. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Kumar, G., & Shapiro V. (2015).  Efficient 3D analysis of laminate structures using ABD-equivalent material models. Finite Elements in Analysis and Design. 106, 41-55.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.