Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2015
Friedman, E., Young K., Tremper G., Liang J., Landsberg A. S., & Schuff N. (2015).  Directed Network Motifs in Alzheimer’s Disease and Mild Cognitive Impairment. PLoS ONE.
Friedman, E., Racz M. Z., & Shenker S. J. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Kumar, G., & Shapiro V. (2015).  Efficient 3D analysis of laminate structures using ABD-equivalent material models. Finite Elements in Analysis and Design. 106, 41-55.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Li, F., Shin R., & Paxson V. (2015).  Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners. Proceedings of ACM Cloud Computing Security Workshop.
Wang, D., Mahoney M., Mohan N., & Rao S. (2015).  Faster Parallel Solver for Positive Linear Programs via Dynamically-Bucketed Selective Coordinate Descent.
Zipser, K., Yu S. X., & Olshausen B. A. (2015).  Figure-Ground Organization Emerges in a Deep Net with a Feedback Loop.
Zhang, N., Shelhamer E., Gao Y., & Darrell T. (2015).  Fine-grained pose prediction, normalization, and recognition. CoRR. abs/1511.07063,
Fifield, D., & Egelman S. (2015).  Fingerprinting Web Users through Font Metrics. Proceedings of the 19th international conference on Financial Cryptography and Data Security.
Zhou, T., Lee Y. Jae, Yu S. X., & Efros A. A. (2015).  FlowWeb: Joint Image Set Alignment by Weaving Consistent, Pixel-Wise Correspondences.
Long, J., Shelhamer E., & Darrell T. (2015).  Fully Convolutional Networks for Semantic Segmentation. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 3431-3440.
Song, H. Oh, Girshick R., Zickler S., Geyer C., Felzenszwalb P., & Darrell T. (2015).  Generalized Sparselet Models for Real-Time Multiclass Object Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. 37, 1001-1012.
Baker, C. F., Schneider N.., Petruck M. R. L., & Ellsworth M. (2015).  Getting the Roles Right: FrameNet in NLP.
Gordo, B. (2015).  Guidelines for Socially Responsible, Inclusive Privacy Education. IEEE MultiMedia. 22(1), 13.
Marczak, B., Scott-Railton J., & McKune S. (2015).  Hacking Team Reloaded? US - Based Ethiopian Journalists Again Targeted with Spyware. The Citizen Lab.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., & Paxson V. (2015).  Header Enrichment or ISP Enrichment: Emerging Privacy Threats in Mobile Networks.
Yang, J., Rübel O., Prabhat, Mahoney M., & Bowen B. P. (2015).  Identifying Important Ions and Positions in Mass Spectrometry Imaging Data Using CUR Matrix Decompositions. Analytical Chemistry. 87(9), 4658-4666.
Yang, J., Meng X., & Mahoney M. (2015).  Implementing Randomized Matrix Algorithms in Parallel and Distributed Environments.
Tsai, T.. J., Friedland G., & Anguera X. (2015).  An Information-Theoretic Metric of Fingerprint Effectiveness.
Ravanelli, M., Elizalde B. Martinez, Bernd J., & Friedland G. (2015).  Insights into Audio-Based Multimedia Event Classification with Neural Networks. 19-23.
Bernd, J., Borth D., Carrano C., Choi J., Elizalde B. Martinez, Friedland G., et al. (2015).  Kickstarting the Commons: The YFCC100M and the YLI Corpora. 1-6.
Narihira, T., Maire M., & Yu S. X. (2015).  Learning Lightness from Human Judgement on Relative Reflectance.
Feng, J., & Darrell T. (2015).  Learning The Structure of Deep Convolutional Networks. The IEEE International Conference on Computer Vision (ICCV).
Song, H. Oh, Fritz M., Göhring D., & Darrell T. (2015).  Learning to Detect Visual Grasp Affordance.

Pages