Publications

Found 4113 results
Author Title Type [ Year(Asc)]
2015
Sargent, M., Czyz J., Allman M., & Bailey M. (2015).  On The Power and Limitations of Detecting Network Filtering via Passive Observation. Proceedings of the Passive and Active Management Conference (PAM 2015).
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Beijbom, O., Hoffman J., Yao E., Darrell T., Rodriguez-Ramirez A., Gonzalez-Rivero M., et al. (2015).  Quantification in-the-wild: data-sets and baselines. CoRR. abs/1510.04811,
Liu, X., & Shapiro V. (2015).  Random heterogeneous materials via texture synthesis. Computational Materials Science. 99, 177-189.
Nelaturi, S., & Shapiro V. (2015).  Representation and analysis of additively manufactured parts. Computer-Aided Design. 67,
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2015).  Robotic Learning of Haptic Adjectives Through Physical Interaction. Robot. Auton. Syst.. 63(P3), 279–292.
Petruck, M. R. L., & Kordoni V. (2015).  Robust Semantic Analysis of Multiword Expressions with FrameNet.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Venugopalan, S., Rohrbach M., Donahue J., Mooney R., Darrell T., & Saenko K. (2015).  Sequence to Sequence - Video to Text. The IEEE International Conference on Computer Vision (ICCV).
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Song, X., & Fettweis G. (2015).  On Spatial Multiplexing of Strong Line-of-Sight MIMO With 3D Antenna Arrangements. IEEE Wireless Communications Letters. 4, 393-396.
Mrowca, D., Rohrbach M., Hoffman J., Hu R., Saenko K., & Darrell T. (2015).  Spatial Semantic Regularisation for Large Scale Object Detection. The IEEE International Conference on Computer Vision (ICCV).
Andersen, D. G., Du S. S., Mahoney M. W., Melgaard C., Wu K., & Gu M. (2015).  Spectral Gap Error Bounds for Improving CUR Matrix Decomposition and the Nystrom Method.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
P. Godfrey, B., Caesar M., Haken I., Singer Y., Shenker S., & Stoica I. (2015).  Stabilizing Route Selection in BGP. IEEE/ACM Transactions on Networking. 23(1), 282-299.
Karami, M.., Park Y.., & McCoy D. (2015).  Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.

Pages