Publications

Found 4113 results
Author Title Type [ Year(Desc)]
2014
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
David, O., Stickles E., Hong J., Dodge E., & Sweetser E. (2014).  Building the MetaNet Metaphor Repository: The Natural Symbiosis of Metaphor Analysis and Construction Grammar.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
McGillivary, A.., Fornasa M., Baglietto P., Stecca M., Caprino G., & Maresca M. (2014).  Cloud Computing Goes To Sea: Ship Design Around Software Defined Networking (SDN) Systems. Ocean News and Technology.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Stickles, E., Dodge E., & Hong J. (2014).  A Construction-Driven, MetaNet-Based Approach to Metaphor Extraction and Corpus Analysis.
Dodge, E., Sweetser E., David O., Hong J., & Stickles E. (2014).  Constructions and Metaphor: Integrating MetaNet and Embodied Construction Grammar.
Hoffman, J., Darrell T., & Saenko K. (2014).  Continuous Manifold Based Adaptation for Evolving Visual Domains.
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Gottlieb, L., Friedland G., Choi J., Kelm P., & Sikora T. (2014).  Creating Experts From the Crowd: Techniques for Finding Workers for Difficult Tasks. IEEE Transactions on Multimedia. 16(7), 2075-2079.
Donahue, J., Jia Y., Vinyals O., Hoffman J., Zhang N., Tzeng E., et al. (2014).  DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition.
Iandola, F., Moskewicz M., Karayev S., Girshick R., Darrell T., & Keutzer K. (2014).  DenseNet: Implementing Efficient ConvNet Descriptor Pyramids.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Friedman, E., Young K., Asif D., Jutla I., Liang M., Wilson S., et al. (2014).  Directed Progression Brain Networks in Alzheimer's Disease: Properties and Classification. Brain Connectivity. 4(5), 384-393.

Pages