Publications

Found 715 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
In Press
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (In Press).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hermalin, N., & Regier T. (In Press).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
2019
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Simsek, M., Hößler T., Jorswieck E., Klessig H., & Fettweis G. (2019).  Multiconnectivity in Multicellular, Multiuser Systems: A Matching- Based Approach. Proceedings of the IEEE. 107(2), 394-413.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
2018
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Woo, S., Sherry J., Han S., Moon S., Ratnasamy S., & Shenker S. (2018).  Elastic Scaling of Stateful Network Functions. Proceedings of NSDI '18.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Savary, A., Ramisch C., Hwang J., Schneider N., Andresen M., Pradhan S., et al. (2018).  Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions. Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions.
2017
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Simsek, M., Zhang D., hmann D. Ö., Matthé M., & Fettweis G. (2017).  On the Flexibility and Autonomy of 5G Wireless Networks View Document. IEEE Access. 5,
Choi, J., Larson M., Li X., Li K., Friedland G., & Hanjalic A. (2017).  The Geo-Privacy Bonus of Popular Photo Enhancements. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. 84-92.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of Wireless Communications and Networking Conference (WCNC) 2017.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC).
Amann, J., Gasser O., Scheitle Q., Brent L., Carle G., & Holz R. (2017).  Mission Accomplished? HTTPS Security after DigiNotar. Proceedings of the IMC 2017.
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
2016
Tzeng, E., Devin C., Hoffman J., Finn C., Abbeel P., Levine S., et al. (2016).  Adapting deep visuomotor representations with weak pairwise constraints. Workshop on the Algorithmic Foundations of Robotics (WAFR).
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
Yuan, A., Luther K., Krause M., Vennix S. Isabel, Dow S. P., & Hartmann B. (2016).  Almost an expert: The effects of rubrics and expertise on perceived value of crowdsourced design critiques. Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1005-1017.
Song, X., Hälsig T., Rave W., Lankl B., & Fettweis G. (2016).  Analog equalization and low resolution quantization in strong line-of-sight MIMO communication. 2016 IEEE International Conference on Communications (ICC). 1-7.
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).

Pages