Found 4120 results
Author Title Type [ Year(Desc)]
Luckie, M., Beverly R., Wu T., Allman M., & claffy kc. (2015).  Resilience of Deployed TCP to Blind Off-Path Attacks. Proceedings of ACM Internet Measurement Conference.
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2015).  Robotic Learning of Haptic Adjectives Through Physical Interaction. Robot. Auton. Syst.. 63(P3), 279–292.
Petruck, M. R. L., & Kordoni V. (2015).  Robust Semantic Analysis of Multiword Expressions with FrameNet.
Sherry, J., Gao P. X., Basu S., Panda A., Krishnamurthy A., Maciocco C., et al. (2015).  Rollback-Recovery for Middleboxes.
Castro, I., Panda A., Raghavan B., Shenker S., & Gorinsky S. (2015).  Route Bazaar: Automatic Interdomain Contract Negotiation.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Shelhamer, E., Barron J. T., & Darrell T. (2015).  Scene Intrinsics and Depth From a Single Image. The IEEE International Conference on Computer Vision (ICCV) Workshops.
Tomlinson, B., Norton J., Baumer E. P. S., Pufal M., & Raghavan B. (2015).  Self-Obviating Systems and their Application to Sustainability.
Venugopalan, S., Rohrbach M., Donahue J., Mooney R., Darrell T., & Saenko K. (2015).  Sequence to Sequence - Video to Text. The IEEE International Conference on Computer Vision (ICCV).
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.
Portnoff, R. S., Lee L. N., Egelman S., Mishra P., Leung D., & Wagner D. (2015).  Somebody's Watching Me? Assessing the Effectiveness of Webcam Indicator Lights. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Song, X., & Fettweis G. (2015).  On Spatial Multiplexing of Strong Line-of-Sight MIMO With 3D Antenna Arrangements. IEEE Wireless Communications Letters. 4, 393-396.
Mrowca, D., Rohrbach M., Hoffman J., Hu R., Saenko K., & Darrell T. (2015).  Spatial Semantic Regularisation for Large Scale Object Detection. The IEEE International Conference on Computer Vision (ICCV).
Andersen, D. G., Du S. S., Mahoney M. W., Melgaard C., Wu K., & Gu M. (2015).  Spectral Gap Error Bounds for Improving CUR Matrix Decomposition and the Nystrom Method.
Sommer, R., Amann J., & Hall S. (2015).  Spicy: A Unified Deep Packet Inspection Framework Dissecting All Your Data. ICSI Technical Report.
P. Godfrey, B., Caesar M., Haken I., Singer Y., Shenker S., & Stoica I. (2015).  Stabilizing Route Selection in BGP. IEEE/ACM Transactions on Networking. 23(1), 282-299.
Karami, M.., Park Y.., & McCoy D. (2015).  Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Song, X., Landau L., Israel J., & Fettweis G. (2015).  Strong LOS MIMO for Short Range mmWave Communication - Towards 1 Tbps Wireless Data Bus. 2015 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB). 1-5.
Wang, R., Li Y., Mahoney M. W., & Darve E. (2015).  Structured Block Basis Factorization for Scalable Kernel Matrix Evaluation.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  A Study of Multimodal Addressee Detection in Human-Human-Computer Interaction. IEEE Transactions on Multimedia. 17(9), 1550-1561.
McCauley, M., Sheng A., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2015).  Taking an AXE to L2 Spanning Trees.
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Friedland, G., Egelman S., & Garcia D. D. (2015).  Teaching Privacy: What Every Student Needs to Know. 713.
Rasti, R., Murthy M., Weaver N., & Paxson V. (2015).  Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks.