Found 4138 results
[ Author(Asc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
Widyono, R. (1994).  The Design and Evaluation of Routing Algorithms for Real-Time Channels.
Widom, M., & Shenker S. (1984).  Topological Phase Transitions. 46-51.
Widom, M., Bensimon D., Kadanoff L. P., & Shenker S. (1983).  Strange Objects in the Complex Plane. Journal of Statistical Physics. 443-454.
Widmer, J. (2000).  A Mobile Network Architecture for Vehicles.
Widmer, J., & Handley M. (2001).  Extending Equation-Based Congestion Control to Multicast Applications. Proceedings of ACM SIGCOMM 2001.
Whitlock, S., Scott C., & Shenker S. (2013).  Brief Announcement: Techniques for Programmatically Troubleshooting Distributed Systems. 1-3.
Whetton, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2000).  Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Whetten, B., Vicisano L., Kermode R., Handley M., Floyd S., & Luby M. (2001).  RFC 3048: Reliable Multicast Transport Building Blocks for One-to-Many Bulk-Data Transfer.
Westermann, M. (2002).  Distributed Caching Independent of the Network Size.
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Wester, M., & Fosler-Lussier E. (2000).  A Comparison of Data-Derived and Knowledge-Based Modeling of Pronunciation Variation. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Werther, T. (1993).  Sparse Interpolation from Multiple Derivatives.
Werther, T. (1993).  Generalized Vandermonde Determinants Over the Chebyshev Basis.
Wernicke, S., Alber J., Gramm J., Guo J., & Niedermeier R. (2004).  Avoiding Forbidden Submatrices by Row Deletions. 2832, 349-360.
Wermter, S. (1997).  Hybrid Approaches to Neural Network-based Language Processing.
Wendelken, C., & Shastri L. (2003).  Acquisition of concepts and causal rules in Shruti. Proceedings of the 25th Annual Conference of the Cognitive Science Society.
Wendelken, C. (2003).  Shruti-agent: A structured connectionist architecture for reasoning and decision-making.
Wendelken, C. (2002).  The Role of Mid-Dorsolateral Prefrontal Cortex in Working Memory: A Connectionist Model. Neurocomputing. 44-46, 1009-1016.
Wendelken, C., & Shastri L. (2004).  Connectionist Mechanisms for Cognitive Control.
Wendelken, C., & Shastri L. (2002).  Combining Belief and Utility in a Structured Connectionist Agent Architecture. Proceedings of the 24th Annual Conference of the Cognitive Science Society (CogSci 2002).
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).