Publications

Found 332 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Enos, F.., Shriberg E., Graciarena M., Hirschberg J., & Stolcke A. (2007).  Detecting Deception Using Critical Segments. 2281-2284.
Lee, K., Ellis D. P. W., & Loui A. (2010).  Detecting Local Semantic Concepts in Environmental Sounds Using Markov Model Based Clustering.
Lee, K., & Ellis D. P. W. (2008).  Detecting Music in Ambient Audio by Long-Window Autocorrelation. 9-12.
Lee-Goldman, R., Rhodes R., & Ellsworth M. (2009).  Determination and Modification: Interaction and Interpretation.
Alomar, N., & Egelman S. (2022).  Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps. Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Elsevier Journal of Ad Hoc Networks. 1,
Greenstein, B., Estrin D., Govindan R., Ratnasamy S., & Shenker S. J. (2003).  DIFS: A Distributed Index for Features in Sensor Networks. Proceedings of the First IEEE Workshop on Sensor Networks Protocols and Applications 2003 (SNPA). 163-173.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.
Effelsberg, W., & Müller-Menrad E. (1993).  Dynamic Join and Leave for Real-Time Multicast.
E
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Etzioni, O., Hanks S., Jiang T., & Karp R. M. (1996).  Efficient Information Gathering on the Internet. Proceedings. Thirty-Seventh Annual Symposium Foundations of Computer Science. 234-243.
Eskin, E., Halperin E., & Karp R. M. (2003).  Efficient Reconstruction of Haplotype Structure Via Perfect Phylogeny. Journal of Bioinformatics and Computational Biology. 1(1), 1-20.
Magimai-Doss, M., Hakkani-Tür D., etin Ö. Ç., Shriberg E., Fung J., & Mirghafori N. (2007).  Entropy Based Classifier Combination for Sentence Segmentation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 189-192.
Suthram, S.., Beyer A.., Karp R. M., Eldar Y.., & Ideker T. E. (2008).  E-QED: An Efficient Method for Interpreting eQTL Associations Using Protein Networks. Molecular Systems Biology.
Allman, M., Eddy W. M., & Ostermann S. (2003).  Estimating Loss Rates With TCP. ACM Performance Evaluation Review.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Krishnan, R., Sterbenz J. P. G., Eddy W. M., Partridge C., & Allman M. (2004).  Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks. 46(3), 343-362.
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Pfoser, D., Efentakis A., Voisard A., & Wenk C. (2009).  Exploiting Road Network Properties in Efficient Shortest‐Path Computation.
Radoslavov, P., Estrin D., & Govindan R. (1999).  Exploiting the Bandwidth-Memory Tradeoff in Multicast State Aggregation.

Pages