Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Yu, S. X. (2012).  Angular Embedding: A Robust Quadratic Criterion. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE. 34(1), 158-173.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Yaman, S., Tur G., Vergyri D., Hakkani-Tür D., Harper M. P., & Wang W. (2009).  Anchored Speech Recognition for Question Answering. 265-268.
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of CHI '16.
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Ikram, M., Vallina-Rodriguez N., Seneviratne S., Kaafar M. Ali, & Paxson V. (2016).  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. Proceedings of ACM Internet Measurement Conference.
Cuendet, S., Shriberg E., Favre B., Fung J., & Hakkani-Tür D. (2007).  An Analysis of Sentence Segmentation Features for Broadcast News, Broadcast Conversations, and Meetings. 43-59.
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (2020).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Sudholt, D., & Zarges C. (2010).  Analysis of an Iterated Local Search Algorithm for Vertex Coloring.
Demers, A. J., Keshav S., & Shenker S. J. (1989).  Analysis and Simulation of a Fair Queuing Algorithm. Proceedings of the 1989 SIGCOMM Symposium on Communications Architectures & Protocols. 1-12.
Chiang, H-L., Kadur T., & Fettweis G. (2016).  Analyses of orthogonal and non-orthogonal steering vectors at millimeter wave systems. 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM). 1-6.
Song, X., Hälsig T., Rave W., Lankl B., & Fettweis G. (2016).  Analog equalization and low resolution quantization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Song, X., Rave W., & Fettweis G. (2016).  Analog and successive channel equalization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Yuan, A., Luther K., Krause M., Vennix S. Isabel, Dow S. P., & Hartmann B. (2016).  Almost an expert: The effects of rubrics and expertise on perceived value of crowdsourced design critiques. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1005-1017.
Petruck, M. R. L., & Boas H. C. (2003).  All in a Day's Week. Proceedings of the Workshop on Frame Semantics.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Ferrandez, O.., Ellsworth M., Muñoz R., & Baker C. F. (2010).  Aligning FrameNet and WordNet Based on Semantic Neighborhoods. 310-314.
Hodgkinson, L., & Karp R. M. (2011).  Algorithms to Detect Multiprotein Modularity Conserved During Evolution.
Karp, R. M., & Shamir R. (1998).  Algorithms for Optical Mapping. Proceedings of the Second Annual International Conference on Computational Molecular Biology. 117-124.
Chandrasekaran, K.., Karp R. M., Moreno-Centeno E.., & Vempala S.. (2011).  Algorithms for Implicit Hitting Set Problems. 614-629.
Radoslavov, P., & Tokuda T.. (1997).  An Algorithm for Cost-Delay Balanced Trees and Its Application to Wide Area Network Multicast. Proceedings of the First International Conference on Worldwide Computing and Its Applications.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Thaler, D., & Handley M. (2000).  On the Aggregatability of Multicast Forwarding State. Proceedings of Infocom 2000.
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.

Pages