Publications

Found 4071 results
Author Title Type [ Year(Desc)]
2019
Luby, M., Padovani R., Richardson T. J., Minder L., & Aggarwal P. (2019).  Liquid Cloud Storage. ACM Transactions on Storage (TOS). 15(1), 
Luby, M., Padovani R., Richardson T. J., Minder L., & Aggarwal P. (2019).  Liquid Cloud Storage. ACM Transactions on Storage. 15(1), 
Simsek, M., Hößler T., Jorswieck E., Klessig H., & Fettweis G. (2019).  Multiconnectivity in Multicellular, Multiuser Systems: A Matching- Based Approach. Proceedings of the IEEE. 107(2), 394-413.
Larson, M., Choi J., Slokom M., Erkin Z., Friedland G., & de Vries A. P. (2019).  Privacy and audiovisual content: Protecting users as big multimedia data grows bigger. Big Data Analytics for Large-Scale Multimedia Search.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
In Press
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (In Press).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (In Press).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hermalin, N., & Regier T. (In Press).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Zaslavsky, N., Garvin K., Kemp C., Tishby N., & Regier T. (In Press).  Evolution and efficiency in color naming: The case of Nafaanra. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Nurgalieva, L., Frik A., Ceschel F., Egelman S., & Marchese M. (In Press).  Information Design in An Aged Care Context. Proceedings of Pervasive Health ’19.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (In Press).   Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (In Press).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (In Press).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Zaslavsky, N., Regier T., Tishby N., & Kemp C. (In Press).  Semantic categories of artifacts and animals reflect efficient coding. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
QasemiZadeh, B., Petruck M. R. L., Stodden R., Kallmeyer L., & Candito M. (In Press).  SemEval-2019 Task 2: Unsupervised Lexical Frame Induction. Proceedings of the 13th International Workshop on Semantic Evaluation (SemEval-2019). 16-30.
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (In Press).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (In Press).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
Hayes, D. (In Press).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).

Pages