Publications

Found 456 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is S  [Clear All Filters]
In Press
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (In Press).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Zaslavsky, N., Regier T., Tishby N., & Kemp C. (In Press).  Semantic categories of artifacts and animals reflect efficient coding. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (In Press).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Bernd, J., Frik A., Johnson M., & Malkin N. (In Press).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Ye, Z., Choi J., & Friedland G. (In Press).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
2019
QasemiZadeh, B., Petruck M. R. L., Stodden R., Kallmeyer L., & Candito M. (2019).  SemEval-2019 Task 2: Unsupervised Lexical Frame Induction. Proceedings of the 13th International Workshop on Semantic Evaluation (SemEval-2019). 16-30.
Jin, Y., Scott C., Dhamdhere A., Giotsas V., Krishnamurthy A., & Shenker S. (2019).  Stable and Practical AS Relationship Inference with ProbLink. Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
2017
Panda, A., Zheng W., Hu X., Krishnamurthy A., & Shenker S. (2017).  SCL: Simplifying Distributed SDN Control Planes. Proceedings of NSDI '17.
Raghuram, V., Trott S., Shen K., Goldberg E., & Oderberg S. (2017).  Semantically-Driven Coreference Resolution with Embodied Construction Grammar. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Marczak, B., & Paxson V. (2017).  Social Engineering Attacks on Government Opponents: Target Perspectives. Proceedings on Privacy Enhancing Technologies. 2, 152-164.
Razaghpanah, A., Niaki A. Akhavan, Vallina-Rodriguez N., Sundaresan S., Amann J., & Gill P. (2017).  Studying TLS Usage in Android Apps.
Amirshahi, S. Ali, Anoosheh A., Yu S. X., Suchan J., Schultz C., & Bhatt M. (2017).  Symmetry in the Eye of the Beholder . Proceedings of Vision Sciences Society Annual Meeting.
2016
Jannesari, A., Sato Y., & Winter S. (2016).  SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems. SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
Veldt, N., Gleich D., & Mahoney M. W. (2016).  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Tschantz, M. Carl, Afroz S., Anonymous, & Paxson V. (2016).  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Caselli, M., Zambon E., Amann J., Sommer R., & Kargl F. (2016).  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. 790-806.
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Maresca, M. (2016).  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9), 78-85.
Mahoney, M. W., & Drineas P. (2016).  Structural properties underlying high-quality Randomized Numerical Linear Algebra algorithms. Handbook of Big Data. 137-154.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani, F., & Mahoney M. W. (2016).  Sub-Sampled Newton Methods II: Local Convergence Rates.
Xu, P., Yang J., Roosta-Khorasani F., Re C., & Mahoney M. W. (2016).  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
2015
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).

Pages