Publications

Found 1845 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
In Press
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (In Press).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
2020
Shen, S.., Dong Z.., Ye J.., Ma L.., Yao Z.., Gholami A.., et al. (2020).  Q-BERT: Hessian Based Ultra Low Precision Quantization of BERT. Proceedings of the AAAI-20 Conference.
2019
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Zarchy, D., Mittal R., Schapira M., & Shenker S. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Zarchy, D., Mittal R., Schapira M., & Shenker S. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Friedman, E. J., Gkatzelis V., Psomas C-A., & Shenker S. (2019).  Fair and Efficient Memory Sharing: Confronting Free Riders. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
Scheuvens, L., Simsek M., Noll-Berrato A., Franchi N., & Fettweis G. (2019).  Framework for Adaptive Controller Design Over Wireless Delay-Prone Communication Channels. IEEE Access. 7,
Scheuvens, L., Simsek M., Noll-Berrato A., Franchi N., & Fettweis G. (2019).  Framework for Adaptive Controller Design Over Wireless Delay-Prone Communication Channels. IEEE Access. 7,
Shapiro, V., & Liu X. (2019).  Homogenization of material properties in additively manufactured structures. US Patent 10353378.
Simsek, M., Hößler T., Jorswieck E., Klessig H., & Fettweis G. (2019).  Multiconnectivity in Multicellular, Multiuser Systems: A Matching- Based Approach. Proceedings of the IEEE. 107(2), 394-413.
Larson, M., Choi J., Slokom M., Erkin Z., Friedland G., & de Vries A. P. (2019).  Privacy and audiovisual content: Protecting users as big multimedia data grows bigger. Big Data Analytics for Large-Scale Multimedia Search.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (2019).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Sap, D. (2019).  A Review of Geometric Integrity Criteria for Military Standards – 31000A.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.

Pages