Found 4181 results
Author Title Type [ Year(Asc)]
Luby, M. (2019).  Systems and methods for storing, maintaining, and accessing objects in storage system clusters. US Patent 10,191,808.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Martin, C.. H., & Mahoney M. W. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M.. W. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
Sap, D., & Shapiro V. (2019).  On Verification of Interoperability of CAD Systems with a Focus on Invariant Properties. Computer-Aided Design. 115, 256-266.
Pan, X., Chakraborty R., & Yu S. X. (2019).  Visual Similarity from Optimizing Feature and Memory On A Hypersphere. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
ICSI (2018).  2018 Audited Financial Statement.
Alpernas, K., Manevich R., Panda A., Sagiv M., Shenker S., Shoham S., et al. (2018).  Abstract Interpretation of Stateful Networks. Proceedings of SAS 2018.
Gittens, A.., Rothauge K.., Wang S.., Mahoney M.. W., Gerhardt L.., Prabhat, et al. (2018).  Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist. Proceedings of the 24th Annual SIGKDD. 293-301.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Incer, I., Theodorides M., Afroz S., & Wagner D. (2018).  Adversarially Robust Malware Detection Using Monotonic Classification. Proceedings of IWSPA 2018: 4th ACM International Workshop on Security And Privacy Analytics.
Gittens, A.., Rothauge K.., Mahoney M.. W., Wang S.., Gerhardt L.., Prabhat, et al. (2018).  Alchemist: An Apache Spark <=> MPI Interface. Concurrency and Computation: Practice and Experience (Special Issue of the Cray User Group, CUG 2018), e5026.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Afroz, S., Javed M., Paxson V., Qazi S. Asif, Sajid S., & Tschantz M. Carl (2018).  A Bestiary of Blocking The Motivations and Modes behind Website Unavailability.
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Iyer, A. Padmanabha, Panda A., Venkataraman S., Chowdhury M., Akella A., Shenker S., et al. (2018).  Bridging the GAP: towards approximate graph analytics. Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Kotzias, P., Razaghpanah A., Amann J., Paterson K. G., Vallina-Rodriguez N., & Caballero J. (2018).  Coming of Age: A Longitudinal Study of TLS Deployment. Proceedings of IMC 18.
Allman, M. (2018).  Comments on DNS Robustness. ACM Internet Measurement Conference.