Publications
Found 100 results
[ Author] Title Type Year Filters: First Letter Of Last Name is E [Clear All Filters]
(2002).
(2003).
New Techniques for Making Transport Protocols Robust to Corruption-Based Loss.
ACM SIGCOMM Computer Communication Review. 34(5), 75-88.
(2004).
(2000).
(2011). Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems.
Journal of the Association for Computing Machinery. 19(2), 248-264.
(1972). The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers.
Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
(2004).
(2001).
(2007). Resolving Inter-Domain Policy Disputes.
ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
(2007). Practical Data-Centric Storage.
Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
(2006).
(2006).
(2006). Resolving Inter-Domain Policy Disputes.
157-168.
(2007). A Modular Network Layer for Sensornets.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
(2006).
(2007).
(1993).
(2012).
(1987). Predicting Privacy and Security Attitudes.
Computers and Society: The Newsletter of ACM SIGCAS. 45(1), 22-28.
(2015). The Teaching Privacy Curriculum.
Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
(2016). The Key to Getting People to Be Safer Online: Make the Appeals More Personal.
Wall Street Journal.
(2021). The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
(2015).
(2015).
(2014).