Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2015
Finn, C., Tan X. Yu, Duan Y., Darrell T., Levine S., & Abbeel P. (2015).  Learning Visual Feature Spaces for Robotic Manipulation with Deep Spatial Autoencoders. arXiv.
Jeub, L. G. S., Mahoney M., Mucha P. J., & Porter M. A. (2015).  A Local Perspective on Community Structure in Multilayer Networks.
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Darrell, T., Kloft M., Pontil M., Rätsch G., & Rodner E. (2015).  Machine Learning with Interdependent and Non-identically Distributed Data (Dagstuhl Seminar 15152). Dagstuhl Reports. 5, 18–55.
Narihira, T., Borth D., Yu S. X., Ni K., & Darrell T. (2015).  Mapping Images to Sentiment Adjective Noun Pairs with Factorized Neural Nets.
Javed, M., Herley C., Peinado M., & Paxson V. (2015).  Measurement and Analysis of Traffic Exchange Services. Proceedings of ICM Internet Measurement Conference.
Tschantz, M. Carl, Datta A., Datta A., & Wing J. M. (2015).  A Methodology for Information Flow Experiments. 2015 IEEE 28th Computer Security Foundations Symposium. 554-568.
Lakoff, G., & Wehling E. (2015).  The Moral Brain: A Dialogue About Embodiment, Morality, and Framing in Politics.
Tsai, T.. J., Stolcke A., & Slaney M. (2015).  Multimodal Addressee Detection in Multiparty Dialogue Systems.
[Anonymous] (2015).  Multimodal Location Estimation of Videos and Images. (Choi, J., & Friedland G., Ed.).
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Feldman, J., Trott S., & Khayrallah H. (2015).  Natural Language For Human Robot Interaction.
Fisher, J., Darrell T., Galup L., How J., Krause A., & Soatto S. (2015).  Nonparametric Representations for Integrated Inference, Control, and Sensing.
Zhu, R., Ma P., Mahoney M., & Yu B. (2015).  Optimal Subsampling Approaches for Large Sample Linear Regression.
Friedman, E., Psomas C-A., & Vardi S. (2015).  Pareto Optimal Dynamic Fair Division with Minimal Disruptions.
Marczak, B., Scott-Railton J., Senft A., Poetranto I., & McKune S. (2015).  Pay No Attention to the Server Behind the Proxy: Mapping FinFisher’s Continuing Proliferation. The Citizen Lab.
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Sargent, M., Czyz J., Allman M., & Bailey M. (2015).  On The Power and Limitations of Detecting Network Filtering via Passive Observation. Proceedings of the Passive and Active Management Conference (PAM 2015).
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Krause, M., & Kulkarni A. (2015).  Predicting Sales E-Mail Responders using a Natural Language Model. Communications of the ACM. 38(11), 39-41.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Amann, J., & Sommer R. (2015).  Providing Dynamic Control to Passive Network Security Monitoring. Proceedings of 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
Beijbom, O., Hoffman J., Yao E., Darrell T., Rodriguez-Ramirez A., Gonzalez-Rivero M., et al. (2015).  Quantification in-the-wild: data-sets and baselines. CoRR. abs/1510.04811,
Liu, X., & Shapiro V. (2015).  Random heterogeneous materials via texture synthesis. Computational Materials Science. 99, 177-189.
Nelaturi, S., & Shapiro V. (2015).  Representation and analysis of additively manufactured parts. Computer-Aided Design. 67,

Pages