Found 4070 results
Author Title Type [ Year(Asc)]
Fifield, D., Lan C., Hynes R., Wegmann P., & Paxson V. (2015).  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Fornasa, M., Stecca M., Maresca M., & Baglietto P. (2015).  Bounded Latency Spanning Tree Reconfiguration. Computer Networks. 76, 259-274.
Akkus, I. Ekin, & Weaver N. (2015).  The Case for a General and Interaction-Based Third-Party Cookie Policy.
Afroz, S., Fifield D., Tschantz M. Carl, Paxson V., & Tygar J.D.. (2015).  Censorship Arms Race: Research vs. Practice. Proceedings of the Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs).
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Marczak, B., Weaver N., Dalek J., Fifield D., McKune S., Rey A., et al. (2015).  China’s Great Cannon. The Citizen Report.
Pathak, D., Krahenbuhl P., & Darrell T. (2015).  Constrained Convolutional Neural Networks for Weakly Supervised Segmentation. The IEEE International Conference on Computer Vision (ICCV). 1796-1804.
Pathak, D., Kraehenbuehl P., Yu S. X., & Darrell T. (2015).  Constrained Structured Regression with Convolutional Neural Networks. CoRR. abs/1511.07497,
Friedland, G., Janin A., Lei H., Choi J., & Sommer R. (2015).  Content-Based Privacy for Consumer-Produced Multimedia. 157-173.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Krahenbuhl, P., Doersch C., Donahue J., & Darrell T. (2015).  Data-dependent Initializations of Convolutional Neural Networks. CoRR. abs/1511.06856,
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Girshick, R., Iandola F., Darrell T., & Malik J. (2015).  Deformable Part Models are Convolutional Neural Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 437-446.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Narihira, T., Maire M., & Yu S. X. (2015).  Direct Intrinsics: Learning Albedo-Shading Decomposition by Convolutional Regression. Proceedings of International Conference on Computer Vision.
Friedman, E., Young K., Tremper G., Liang J., Landsberg A. S., & Schuff N. (2015).  Directed Network Motifs in Alzheimer’s Disease and Mild Cognitive Impairment. PLoS ONE.
Friedman, E., Racz M. Z., & Shenker S. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Kumar, G., & Shapiro V. (2015).  Efficient 3D analysis of laminate structures using ABD-equivalent material models. Finite Elements in Analysis and Design. 106, 41-55.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Wang, D., Mahoney M. W., Mohan N., & Rao S. (2015).  Faster Parallel Solver for Positive Linear Programs via Dynamically-Bucketed Selective Coordinate Descent.
Zipser, K., Yu S. X., & Olshausen B. A. (2015).  Figure-Ground Organization Emerges in a Deep Net with a Feedback Loop.
Zhang, N., Shelhamer E., Gao Y., & Darrell T. (2015).  Fine-grained pose prediction, normalization, and recognition. CoRR. abs/1511.07063,