Publications

Found 572 results
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is C  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Y
Li, F., Durumeric Z., Czyz J., Karami M., Bailey M., McCoy D., et al. (2016).  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
W
Cook, R. S., Kay P., & Regier T. (2005).  The World Color Survey Database: History and Use. 224-242.
Kay, P., Berlin B., Maffi L., Merrifield W. R., & Cook R. S. (2010).  World Color Survey.
Hinds, D.. A., Stuve L.. L., Nilsen G.. B., Halperin E., Eskin E., Ballinger D.. G., et al. (2005).  Whole-Genome Patterns of Common DNA Variation in Three Human Populations. Science. 307(5712), 1072-1079.
Parton, K., McKeown K. R., Coyne B., Diab M. T., Grishman R., Hakkani-Tür D., et al. (2009).  Who, What, When, Where, Why? Comparing Multiple Approaches to the Cross-Lingual 5W Task. 423-431.
Frampton, M., Fernández R.., Ehlen P.., C. Christoudias M., Darrell T., & Peters S. (2009).  Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue. 273-281.
Choi, J., Larson M., Li X., Friedland G., & Hanjalic A. (2016).  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.
Bryant, J., Chang N., Porzel R., & Sanders K. (2001).  Where is natural language understanding? Toward context-dependent utterance interpretation. Proceedings of the 7th Annual Conference on Architectures and Mechanisms for Language Processing AMLaP.
Yang, J., Chow Y-L., Re C., & Mahoney M. (2015).  Weighted SGD for ℓp Regression with Randomized Preconditioning. Proceedings of the 27th Annual SODA Conference. 558-569.
Breslau, L., Cao P., Fan L., Phillips G., & Shenker S. J. (1999).  Web Caching and Zipf-Like Distributions: Evidence and Implications. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '99). 1, 126-134.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.

Pages