Publications

Found 100 results
[ Author(Desc)] Title Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Eddy, W. M., & Allman M. (2002).  A Comparison of RED's Byte and Packet Modes.
Eddy, W. M., & Allman M. (2003).  A Comparison of RED's Byte and Packet Modes.
Eddy, W. M., Ostermann S., & Allman M. (2004).  New Techniques for Making Transport Protocols Robust to Corruption-Based Loss. ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
Eddy, W. M., & Allman M. (2000).  Advantages of Parallel Processing and the Effects of Communications Time.
Eden, A., C. Christoudias M., & Darrell T. (2011).  Finding Lost Children.
Edmonds, J., & Karp R. M. (1972).  Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems. Journal of the Association for Computing Machinery. 19(2), 248-264.
Edwards, J. (2004).  The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers. Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
Edwards, J. (2001).  Chapter 17: The Transcription of Discourse. 321-348.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Ee, C. Tien, Shenker S. J., & Subramanian L. (2006).  Sapheniea: Simplifying Configuration Using Classes.
Ee, C. Tien, Ramachandran V., Chun B-G., & Shenker S. J. (2006).  Resolving BGP Disputes.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Ee, C. Tien, Fonseca R., Kim S., Moon D., Tavakoli A., Culler D. E., et al. (2006).  A Modular Network Layer for Sensornets. Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Effelsberg, W., & Müller-Menrad E. (1993).  Dynamic Join and Leave for Real-Time Multicast.
Efros, A., & Halperin E. (2012).  Haplotype Reconstruction Using Perfect Phylogeny and Sequence Data. 13,
Egecioglu, O.., Smith T.. R., & Moody J. (1987).  Computable Functions and Complexity in Neural Networks.
Egelman, S., & Peer E. (2015).  Predicting Privacy and Security Attitudes. Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Egelman, S., & Pe'er E. (2021).  The Key to Getting People to Be Safer Online: Make the Appeals More Personal. Wall Street Journal.
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.

Pages