Publications

Found 4120 results
Author Title [ Type(Asc)] Year
Conference Paper
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Cuendet, S., Shriberg E., Favre B., Fung J., & Hakkani-Tür D. (2007).  An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings. 43-59.
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (In Press).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Demers, A. J., Keshav S., & Shenker S. (1989).  Analysis and Simulation of a Fair Queuing Algorithm. Proceedings of the 1989 SIGCOMM Symposium on Communications Architectures & Protocols. 1-12.
Chiang, H-L., Kadur T., & Fettweis G. (2016).  Analyses of orthogonal and non-orthogonal steering vectors at millimeter wave systems. 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). 1-6.
Song, X., Hälsig T., Rave W., Lankl B., & Fettweis G. (2016).  Analog equalization and low resolution quantization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Song, X., Rave W., & Fettweis G. (2016).  Analog and successive channel equalization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Yuan, A., Luther K., Krause M., Vennix S. Isabel, Dow S. P., & Hartmann B. (2016).  Almost an expert: The effects of rubrics and expertise on perceived value of crowdsourced design critiques. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1005-1017.
Petruck, M. R. L., & Boas H. C. (2003).  All in a Day's Week. Proceedings of the Workshop on Frame Semantics.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Ferrandez, O.., Ellsworth M., Muñoz R., & Baker C. F. (2010).  Aligning FrameNet and WordNet Based on Semantic Neighborhoods. 310-314.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution.
Karp, R. M., & Shamir R. (1998).  Algorithms for Optical Mapping. Proceedings of the Second Annual International Conference on Computational Molecular Biology. 117-124.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Radoslavov, P., & Tokuda T.. (1997).  An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast. Proceedings of the First International Conference on Worldwide Computing and Its Applications.
Thaler, D., & Handley M. (2000).  On the Aggregatability of Multicast Forwarding State. Proceedings of Infocom 2000.
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Feldman, J. (2011).  Advancing Embodied Theories of Language.
Goebel, C., Tribowski C., & Günther O. (2009).  Adoption of Cross-Company RFID: An Empirical Analysis of Perceived Influence Factors.
Fàbrega, L., Jové T., Bueno A., & Marzo J. L. (2001).  An Admission Control Approach for Elastic Flows in the Internet. Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).

Pages