Publications

Found 4079 results
Author Title Type [ Year(Asc)]
2016
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Karbasi, M., Abdelaziz A. Hussen, Meutzner H., & Kolossa D. (2016).  Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs. Proceedings of Interspeech 2016.
Vasuna, J., Scott C., Buettner M., Piatek M., Krishnamurthy A., & Shenker S. (2016).  Caching Doesn't Improve Mobile Web Performance (Much). Proceedings of the 2016 USENIX Annual Technical Conference (USENIC ATC ’16).
Chen, G., Davis D., Krause M., Aivaloglou E., Hauff C., & Houben G-J. (2016).  Can Learners be Earners? Investigating a Design to Enable MOOC Learners to Apply their Skills and Earn Money in an Online Market Place. IEEE Transactions on Learning Technologies.
Gao, Y., Beijbom O., Zhang N., & Darrell T. (2016).  Compact Bilinear Pooling. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 317-326.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Pathak, D., Krahenbuhl P., Donahue J., Darrell T., & Efros A. A. (2016).  Context Encoders: Feature Learning by Inpainting. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2536-2544.
Bertasius, G., Torresani L., Yu S. X., & Shi J. (2016).  Convolutional Random Walk Networks for Semantic Image Segmentation.
Hoffman, J., Gupta S., Leong J., Guadarrama S., & Darrell T. (2016).  Cross-modal adaptation for RGB-D detection. IEEE International Conference on Robotics and Automation (ICRA). 5032-5039.
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Deep compositional question answering with neural module networks. IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Gao, Y., Hendricks L. Anne, Kuchenbecker K. J., & Darrell T. (2016).  Deep learning for tactile understanding from visual and haptic data. IEEE International Conference on Robotics and Automation (ICRA). 536-543.
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
Dodge, E. (2016).  A deep semantic corpus-based approach to metaphor analysis: A case study of metaphoric conceptualizations of poverty. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Finn, C., Tan X. Yu, Duan Y., Darrell T., Levine S., & Abbeel P. (2016).  Deep spatial autoencoders for visuomotor learning. IEEE International Conference on Robotics and Automation (ICRA). 512-519.
Marczak, B. (2016).  Defending Dissidents from Targeted Digital Surveillance.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2016).  The Deforestation of L2.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Gergen, S., Zeiler S., Abdelaziz A. Hussen, Nickel R., & Kolossa D. (2016).  Dynamic Stream Weighting for Turbo-Decoding-Based Audiovisual ASR. Proceedings of Interspeech 2016.

Pages