Publications

Found 297 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is R  [Clear All Filters]
2022
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
2021
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
McClure, S., Ratnasamy S., Bansal D., & Padhye J. (2021).  Rethinking networking abstractions for cloud tenants. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 41-48.
Balakrishnan, H., Banerjee S., Cidon I., Culler D. E., Estrin D., Katz-Basset E. B., et al. (2021).  Revitalizing the public internet by making it extensible. ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
2020
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
2019
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (2019).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Friedland, G. (2019).  Reproducibility and Experimental Design for Machine Learning on Audio and Multimedia Data. Proceedings of the 27th ACM International Conference on Multimedia. 2709-2710.
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
Sap, D. (2019).  A Review of Geometric Integrity Criteria for Military Standards – 31000A.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
2018
Petruck, M. R. L., & Ellsworth M. (2018).  Representing Spatial Relations in FrameNet. Proceedings of SpLU 2018, First International Workshop on Spatial Language Understanding.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
2017
Chiesa, M., Nikolaevskiy I., Mitrovic S., Gurtov A., Madry A., Schapira M., et al. (2017).  On the Resiliency of Static Forwarding Tables. IEEE/ACM Transactions on Networking. 25(2), 
2016
Gallopoulos, E., Drineas P., Ipsen I., & Mahoney M. (2016).  RandNLA, Pythons, and the CUR for Your Data Problems: Reporting from G2S3 2015 in Delphi. SIAM News.
Drineas, P., & Mahoney M. (2016).  RandNLA: Randomized Numerical Linear Algebra. Communications of the ACM. 59, 80-90.
Dharmar, M., Simon A., Sadorra C., Friedland G., Sherwood J., Morrow H., et al. (2016).  Reducing Loss to Follow-Up with Tele-audiology Diagnostic Evaluations. 22,
Girshick, R., Donahue J., Darrell T., & Malik J. (2016).  Region-Based Convolutional Networks for Accurate Object Detection and Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 38(1), 142-158.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Petruck, M. R. L., & Ellsworth M. (2016).  Representing Support Verbs in FrameNet. Proceedings of the 12th Workshop on Multiword Expressions. 72–77.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Yiin-Chang, S., & Morgan N. (2016).  Robust CNN - based Speech Recognition With Gabor Filter Kernels. Proceedings of Interspeech 2016.
Kellman, M., & Morgan N. (2016).  Robust Multi-Pitch Tracking: a trained classifier based approach.

Pages