Publications

Found 452 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is S  [Clear All Filters]
In Press
Zaslavsky, N., Regier T., Tishby N., & Kemp C. (In Press).  Semantic categories of artifacts and animals reflect efficient coding. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (In Press).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Bernd, J., Frik A., Johnson M., & Malkin N. (In Press).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Ye, Z., Choi J., & Friedland G. (In Press).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
2019
QasemiZadeh, B., Petruck M. R. L., Stodden R., Kallmeyer L., & Candito M. (2019).  SemEval-2019 Task 2: Unsupervised Lexical Frame Induction. Proceedings of the 13th International Workshop on Semantic Evaluation (SemEval-2019). 16-30.
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
2017
Raghuram, V., Trott S., Shen K., Goldberg E., & Oderberg S. (2017).  Semantically-Driven Coreference Resolution with Embodied Construction Grammar. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Amirshahi, S. Ali, Anoosheh A., Yu S. X., Suchan J., Schultz C., & Bhatt M. (2017).  Symmetry in the Eye of the Beholder . Proceedings of Vision Sciences Society Annual Meeting.
2016
Jannesari, A., Sato Y., & Winter S. (2016).  SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems. SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
Veldt, N., Gleich D., & Mahoney M. W. (2016).  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Maresca, M. (2016).  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9), 78-85.
Mahoney, M. W., & Drineas P. (2016).  Structural properties underlying high-quality Randomized Numerical Linear Algebra algorithms. Handbook of Big Data. 137-154.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Xu, P., Yang J., Roosta-Khorasani F., Re C., & Mahoney M. W. (2016).  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
2015
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Venugopalan, S., Rohrbach M., Donahue J., Mooney R., Darrell T., & Saenko K. (2015).  Sequence to Sequence - Video to Text. The IEEE International Conference on Computer Vision (ICCV).
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.

Pages