Publications

Found 332 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
O
Luby, M., & Ertel W. (1993).  Optimal Parallelization of Las Vegas Algorithms.
Eskin, E., Halperin E., & Sharan R. (2004).  Optimally Phasing Long Genomic Regions using Local Haplotype Predictions. Proceedings of the Second RECOMB Satellite Workshop on Computational Methods for SNPs and Haplotypes. 13-16.
Wijesekera, P., Razaghpanah A., Reardon J., Reyes I., Vallina-Rodriguez N., Egelman S., et al. (2017).  “Is Our Children’s Apps Learning?” Automatically Detecting COPPA Violations. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’17).
etin, Ö. Ç., & Shriberg E. (2006).  Overlap in Meetings: ASR Effects and Analysis by Dialog Factors, Speakers, and Collection Site. Proceedings of the Third Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2006). 212-224.
Cook, G.., Christie J.., Ellis D. P. W., Fosler-Lussier E., Gotoh Y.., Kingsbury B., et al. (1999).  An Overview of the SPRACH System for the Transcription of Broadcast News. Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop.
P
Ellsworth, M., Lee-Goldman R., & Rhodes R. (2008).  A Paradox of English Determination: The Construction of Complex Number Expressions.
Wittkop, T., Emig D., Lange S.. J., Rahmann S., Albrecht M., Morris J.. H., et al. (2010).  Partitioning Biological Data with Transitivity Clustering. Nature Methods. 7(6), 419-420.
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Chang, S-Y., Edwards E., Morgan N., Ellis D. P. W., Mesgarani N., & Chang E. (2015).  Phone Recognition for Mixed Speech Signals: Comparison of Human Auditory Cortex and Machine Performance.
Kennedy, L.., & Ellis D. P. W. (2003).  Pitch-Based Emphasis Detection for Characterization of Meeting Recordings. Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding (ASRU 2003).
Choi, J., Thomee B., Friedland G., Cao L., Ni K., Borth D., et al. (2014).  The Placing Task: A Large-Scale Geo-Estimation Challenge for Social-Media Videos and Images. 27-31.
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Lee-Goldman, R., Ruppenhofer J., Ellsworth M., & Baker C. F. (2009).  Pragmatic Factors in Null Instantiation: Beyond Definiteness and Genre.
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Ellis, D. P. W. (1996).  Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures. Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.

Pages