Found 211 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is T  [Clear All Filters]
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Martin, C.. H., & Mahoney M. W. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M.. W. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Bernd, J., & Corley J. (2017).  Teach Global Impact: A Resource for CSP (or Any CS Class!). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education. 699.
Cox, R., Bird S., & Meyer B. (2017).  Teaching Computer Science in the Victorian Certificate of Education: A Pilot Study. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
VanderSloot, B., Amann J., Bernhard M., Durumeric Z., Bailey M., & J. Halderman A. (2016).  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Schomp, K., Rabinovich M., & Allman M. (2016).  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Jain, S., Javed M., & Paxson V. (2016).  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Vallina-Rodriguez, N., Sundaresan S., Razaghpanah A., Nithyanand R., Allman M., Kreibich C., et al. (2016).  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Murali, A., Garg A., Krishnan S., Pokory F. T., Abbeel P., Darrell T., et al. (2016).  TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning. IEEE International Conference on Robotics and Automation (ICRA). 4150-4157.
Karbasi, M., Abdelaziz A. Hussen, & Kolossa D. (2016).  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Song, X., Babu N., Rave W., Majhi S., & Fettweis G. (2016).  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737,