Publications

Found 512 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is W  [Clear All Filters]
2014
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Vallina-Rodriguez, N., Sundaresan S., Kreibich C., Weaver N., & Paxson V. (2014).  Beyond the Radio: Illuminating the Higher Layers of Mobile Networks.
van Hout, J., Ferrer L., Vergyri D., Scheffer N., Lei Y., Mitra V., et al. (2014).  Calibration and Multiple System Fusion for Spoken Term Detection Using Linear Logistic Regression.
Vinyals, O., & Wegmann S. (2014).  Chasing the Metric: Smoothing Learning Algorithms for Keyword Detection.
Friedman, E., Young K., Asif D., Jutla I., Liang M., Wilson S., et al. (2014).  Directed Progression Brain Networks in Alzheimer's Disease: Properties and Classification. Brain Connectivity. 4(5), 384-393.
Weaver, N., Kreibich C., Dam M., & Paxson V. (2014).  Here Be Web Proxies. 8362, 183-192.
Durumeric, Z., Li F., Kasten J., Amann J., Beekman J., Payer M., et al. (2014).  The Matter of Heartbleed.
Karayev, S., Hertzmann A., Winnemoeller H., Agarwala A., & Darrell T. (2014).  Recognizing Image Style.
Vallina-Rodriguez, N., Amann J., Kreibich C., Weaver N., & Paxson V. (2014).  A Tangled Mass: The Android Root Certificate Stores.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
2013
Parthasarathi, S. Hari Krish, Chang S-Y., Cohen J., Morgan N., & Wegmann S. (2013).  The Blame Game in Meeting Room ASR: An Analysis of Feature versus Model Errors in Noisy and Mismatched Conditions.
Whitlock, S., Scott C., & Shenker S. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Vo, H., Lee Y., Waterman A., & Asanović K. (2013).  A Case for OS-Friendly Hardware Accelerators.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Morgan, N., Cohen J., Parthasarathi S. Hari Krish, Chang S-Y., & Wegmann S. (2013).  Final Report: OUCH Project (Outing Unfortunate Characteristics of HMMs).
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Scott, C., Wundsam A., Whitlock S., Or A., Huang E., Zarifis K., et al. (2013).  How Did We Get Into This Mess? Isolating Fault-Inducing Inputs to SDN Control Software.
Kirchner, M., Winkler P., & Farid H. (2013).  Impeding Forgers at Photo Inception.
Heller, B., Scott C., McKeown N., Shenker S., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Heller, B., Scott C., McKeown N., Shenker S., Wundsam A., Zeng H., et al. (2013).  Leveraging SDN Layering to Systematically Troubleshoot Networks.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.

Pages