Publications

Found 4113 results
Author Title Type [ Year(Asc)]
2015
Friedland, G., Janin A., Lei H., Choi J., & Sommer R. (2015).  Content-Based Privacy for Consumer-Produced Multimedia. 157-173.
Zheng, X., Jiang J., Liang J., Duan H., Chen S.., Wan T., et al. (2015).  Cookies Lack Integrity: Real-World Implications. 707-721.
Krahenbuhl, P., Doersch C., Donahue J., & Darrell T. (2015).  Data-dependent Initializations of Convolutional Neural Networks. CoRR. abs/1511.06856,
Rohrbach, A., Rohrbach M., Tandon N., & Schiele B. (2015).  A Dataset for Movie Description.
Girshick, R., Iandola F., Darrell T., & Malik J. (2015).  Deformable Part Models are Convolutional Neural Networks. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 437-446.
McGillivary, P.., Stecca M., Maresca M., & Baglietto P. (2015).  Designing New Arctic Ships to Incorporate Cloud Computing for Improved Information Systems and Vessel Management.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Narihira, T., Maire M., & Yu S. X. (2015).  Direct Intrinsics: Learning Albedo-Shading Decomposition by Convolutional Regression. Proceedings of International Conference on Computer Vision.
Friedman, E., Young K., Tremper G., Liang J., Landsberg A. S., & Schuff N. (2015).  Directed Network Motifs in Alzheimer’s Disease and Mild Cognitive Impairment. PLoS ONE.
Friedman, E., Racz M. Z., & Shenker S. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Kumar, G., & Shapiro V. (2015).  Efficient 3D analysis of laminate structures using ABD-equivalent material models. Finite Elements in Analysis and Design. 106, 41-55.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Wang, D., Mahoney M. W., Mohan N., & Rao S. (2015).  Faster Parallel Solver for Positive Linear Programs via Dynamically-Bucketed Selective Coordinate Descent.
Zipser, K., Yu S. X., & Olshausen B. A. (2015).  Figure-Ground Organization Emerges in a Deep Net with a Feedback Loop.
Zhang, N., Shelhamer E., Gao Y., & Darrell T. (2015).  Fine-grained pose prediction, normalization, and recognition. CoRR. abs/1511.07063,
Fifield, D., & Egelman S. (2015).  Fingerprinting Web Users through Font Metrics. Proceedings of the 19th international conference on Financial Cryptography and Data Security.
Zhou, T., Lee Y. Jae, Yu S. X., & Efros A. A. (2015).  FlowWeb: Joint Image Set Alignment by Weaving Consistent, Pixel-Wise Correspondences.
Long, J., Shelhamer E., & Darrell T. (2015).  Fully Convolutional Networks for Semantic Segmentation. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 3431-3440.
Song, H. Oh, Girshick R., Zickler S., Geyer C., Felzenszwalb P., & Darrell T. (2015).  Generalized Sparselet Models for Real-Time Multiclass Object Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. 37, 1001-1012.
Baker, C. F., Schneider N.., Petruck M. R. L., & Ellsworth M. (2015).  Getting the Roles Right: FrameNet in NLP.
Gordo, B. (2015).  Guidelines for Socially Responsible, Inclusive Privacy Education. IEEE MultiMedia. 22(1), 13.
Marczak, B., Scott-Railton J., & McKune S. (2015).  Hacking Team Reloaded? US - Based Ethiopian Journalists Again Targeted with Spyware. The Citizen Lab.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.

Pages