Publications

Found 199 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Last Name is N  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Feldman, J., Lakoff G., & Narayanan S. (2000).  Active Schemas for Generation, Recognition, and Understanding of Action. Proceedings of the First Mirror Neuron Conference.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Zhang, L., Michel S.., Nguyen K.., Rosenstein A.., Floyd S., & Jacobson V. (1998).  Adaptive Web Caching: Towards a New Global Caching Architecture. Proceedings of the Third International WWW Caching Workshop.
Nithyanand, R., Khattak S., Javed M., Vallina-Rodriguez N., Falahrastegar M., Powles J. E., et al. (2016).  Adblocking and Counter-Blocking: A Slice of the Arms Race. Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Feldman, J., & Narayanan S. (2014).  Affordances, Actionability, and Simulation.
Feigenbaum, J., Nisan N., Ramachandran V., Sami R., & Shenker S. J. (2002).  Agents' Privacy In Distributed Algorithmic Mechanisms (Position Paper).
Narayanan, S., & McIlraith S. (2003).  Analysis and Simulation of Web Services. Computer Networks. 42, 675-693.
Nakamura, T., & Berlekamp E. (2002).  Analysis of Composite Corridors.
Narayanan, S., & Harabagiu S. (2004).  Answering Questions Using Advanced Semantics and Probabilistic Inference. Proceedings of the Pragmatics of Question Answering Workshop at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
Friedrich, T., He J., Hebbinghaus N., Neumann F., & Witt C. (2010).  Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models. Evolutionary Computation. 18(4), 617-633.
Razaghpanah, A., Nithyanand R., Vallina-Rodriguez N., Sundaresan S., Allman M., Kreibich C., et al. (2018).  Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem. Proceedings of NDSS 2018.
Batliner, A., Steidl S., & Nöth E.. (2011).  Associating Children’s Non-Verbal and Verbal Behaviour: Body Movements, Emotions, and Laughter in a Human-Robot Interaction. 22-27.
Chuzhoy, J., Guha S., Halperin E., Khanna S., Kortsarz G., Krauthgamer R., et al. (2005).  Asymmetric K-Center Is Log* N-Hard to Approximate. Journal of the ACM. 52(4), 538-551.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
Gramm, J., Guo J., Hüffner F., & Niedermeier R. (2004).  Automated Generation of Search Tree Algorithms for Hard Graph-Modification Problems. Algorithmica. 39(4), 321-347.
Wernicke, S., Alber J., Gramm J., Guo J., & Niedermeier R. (2004).  Avoiding Forbidden Submatrices by Row Deletions. 2832, 349-360.

Pages