Publications

Found 4120 results
Author Title Type [ Year(Asc)]
2014
[Anonymous] (2014).  2014 Audited Financial Statement.
Miller, B., Kantchelian A., Afroz S., Bachwani R., Dauber E., Huang L., et al. (2014).  Adversarial Active Learning. Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
Feldman, J., & Narayanan S. (2014).  Affordances, Actionability, and Simulation.
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Karayev, S., Fritz M., & Darrell T. (2014).  Anytime Recognition of Objects and Scenes.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Dodge, E. (2014).  Argument Structure Constructions in Embodied Construction Grammar.
Schomp, K., Callahan T., Rabinovich M., & Allman M. (2014).  Assessing DNS Vulnerability to Record Injection.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
De Carli, L., Sommer R., & Jha S. (2014).  Beyond Pattern Matching: A Concurrency Model for Stateful Deep Packet Inspection.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
Lei, H., & Mirghafori N. (2014).  Broad Phonetic Classes for Speaker Verification with Noisy, Large-Scale Data.
David, O., Stickles E., Hong J., Dodge E., & Sweetser E. (2014).  Building the MetaNet Metaphor Repository: The Natural Symbiosis of Metaphor Analysis and Construction Grammar.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
McGillivary, A.., Fornasa M., Baglietto P., Stecca M., Caprino G., & Maresca M. (2014).  Cloud Computing Goes To Sea: Ship Design Around Software Defined Networking (SDN) Systems. Ocean News and Technology.
Rohrbach, A., Rohrbach M., Qiu W., Friedrich A., Pinkal M., & Schiele B. (2014).  Coherent Multi-Sentence Video Description with Variable Level of Detail. 8753, 184-195.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Stickles, E., Dodge E., & Hong J. (2014).  A Construction-Driven, MetaNet-Based Approach to Metaphor Extraction and Corpus Analysis.
Dodge, E., Sweetser E., David O., Hong J., & Stickles E. (2014).  Constructions and Metaphor: Integrating MetaNet and Embodied Construction Grammar.
Hoffman, J., Darrell T., & Saenko K. (2014).  Continuous Manifold Based Adaptation for Evolving Visual Domains.
Amann, J., Hall S., & Sommer R. (2014).  Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.

Pages