Publications

Found 4120 results
Author Title Type [ Year(Asc)]
2015
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Feldman, J., Trott S., & Khayrallah H. (2015).  Natural Language For Human Robot Interaction.
Fisher, J., Darrell T., Galup L., How J., Krause A., & Soatto S. (2015).  Nonparametric Representations for Integrated Inference, Control, and Sensing.
Zhu, R., Ma P., Mahoney M. W., & Yu B. (2015).  Optimal Subsampling Approaches for Large Sample Linear Regression.
Friedman, E., Psomas C-A., & Vardi S. (2015).  Pareto Optimal Dynamic Fair Division with Minimal Disruptions.
Marczak, B., Scott-Railton J., Senft A., Poetranto I., & McKune S. (2015).  Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation. The Citizen Lab.
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Sargent, M., Czyz J., Allman M., & Bailey M. (2015).  On The Power and Limitations of Detecting Network Filtering via Passive Observation. Proceedings of the Passive and Active Management Conference (PAM 2015).
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Beijbom, O., Hoffman J., Yao E., Darrell T., Rodriguez-Ramirez A., Gonzalez-Rivero M., et al. (2015).  Quantification in-the-wild: data-sets and baselines. CoRR. abs/1510.04811,
Liu, X., & Shapiro V. (2015).  Random heterogeneous materials via texture synthesis. Computational Materials Science. 99, 177-189.
Nelaturi, S., & Shapiro V. (2015).  Representation and analysis of additively manufactured parts. Computer-Aided Design. 67,
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2015).  Robotic Learning of Haptic Adjectives Through Physical Interaction. Robot. Auton. Syst.. 63(P3), 279–292.
Petruck, M. R. L., & Kordoni V. (2015).  Robust Semantic Analysis of Multiword Expressions with FrameNet.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Venugopalan, S., Rohrbach M., Donahue J., Mooney R., Darrell T., & Saenko K. (2015).  Sequence to Sequence - Video to Text. The IEEE International Conference on Computer Vision (ICCV).
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.

Pages