Publications

Found 495 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is W  [Clear All Filters]
Conference Paper
Wooters, C., Mirghafori N., Stolcke A., Pirinen T., Bulyko I., Gelbart D., et al. (2004).  The 2004 ICSI-SRI-UW Meeting Recognition System. 196-208.
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (In Press).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Wooters, C., & Morgan N. (1992).  Acoustic Sub-word Models in the Berkeley Restaurant Project. Proceedings of the International Conference on Spoken Language Processing (ICSLP'92). 1551-1554.
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Gomes, B., Weissman B., & Feldman J. (1998).  Active Threads: Enabling Fine-Grained Parallelism in Object-Oriented Languages. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA ’98).
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Yaman, S., Tur G., Vergyri D., Hakkani-Tür D., Harper M. P., & Wang W. (2009).  Anchored Speech Recognition for Question Answering. 265-268.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Mahoney, M. W., Rao S., Wang D., & Zhang P. (2016).  Approximating the Solution to Mixed Packing and Covering LPs in parallel time.
Krick, C., Räcke H., & Westermann M. (2001).  Approximation Algorithms for Data Management in Networks. Proceedings of the Thirteenth ACM Symposium on Parallel Algorithms and Architectures (SPAA). 237-246.
Paxson, V., Sommer R., & Weaver N. (2007).  An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. 1-7.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
Shenker, S., & Weinrib A. (1988).  Asymptotic Analysis of Large Heterogeneous Queuing Systems. Proceedings of the 1988 ACM SIGMETRICS Conference on Measurement and Modeling of Computer Systems (SIGMETRICS '88). 56-62.
Anguera, X., Wooters C., & Hernando J. (2006).  Automatic Cluster Complexity and Quantity Selection: Towards Robust Speaker Diarization. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 248-256.
Fosler-Lussier, E., Weintraub M., Wegmann S., Kao Y-H., Khudanpur S., Galles C., et al. (1996).  Automatic Learning of Word Pronunciation from Data. Proceedings of the Fourth International Conference on Spoken Language Processing (CSLP-96).

Pages