Publications

Found 739 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
2016
Chen, G., Davis D., Krause M., Aivaloglou E., Hauff C., & Houben G-J. (2016).  Can Learners be Earners? Investigating a Design to Enable MOOC Learners to Apply their Skills and Earn Money in an Online Market Place. IEEE Transactions on Learning Technologies.
Krause, M., Hall M., Williams J. Jay, Paritosh P., Prip J., & Caton S. (2016).  Connecting Online Work and Online Education at Scale. Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems. 3536-3541.
Hoffman, J., Gupta S., Leong J., Guadarrama S., & Darrell T. (2016).  Cross-modal adaptation for RGB-D detection. IEEE International Conference on Robotics and Automation (ICRA). 5032-5039.
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Gao, Y., Hendricks L. Anne, Kuchenbecker K. J., & Darrell T. (2016).  Deep learning for tactile understanding from visual and haptic data. IEEE International Conference on Robotics and Automation (ICRA). 536-543.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Friedman, E., Landsberg A. S., Owen J., Hsieh W., Kam L., & Mukherjee P. (2016).  Edge correlations in spatial networks. Journal of Complex Networks. 1-14.
Peng, X., Hoffman J., Yu S. X., & Saenko K. (2016).  Fine-to-Coarse Knowledge Transfer for Low-Res Image Classification. Proceedings of International Conference on Image Processing.
Stickles, E., David O., Dodge E., & Hong J. (2016).  Formalizing contemporary conceptual metaphor theory: A structured repository for metaphor analysis. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Harbach, M., De Luca A., Malkin N., & Egelman S. (2016).  Keep on Lockin’ in the Free World: A Multi-National Comparison of Smartphone Locking. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Hoffman, J., Pathak D., Tzeng E., Long J., Guadarrama S., Darrell T., et al. (2016).  Large Scale Visual Recognition Through Adaptation Using Joint Representation and Multiple Instance Learning. J. Mach. Learn. Res.. 17, 4954–4984.
Hoffman, J., Gupta S., & Darrell T. (2016).  Learning With Side Information Through Modality Hallucination. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 826-834.
Gittens, A., Devarakonda A., Racah E., Ringenburg M., Gerhardt L., Kottalam J., et al. (2016).  Matrix Factorization at Scale: a Comparison of Scientific Data Analytics in Spark and C+MPI Using Three Case Studies.
Zhu, L., Amann J., & Heidemann J. (2016).  Measuring the Latency and Pervasiveness of TLS Certificate Revocation. Proceedings of Passive and Active Measurement Conference (PAM).
Hu, R., Xu H., Rohrbach M., Feng J., Saenko K., & Darrell T. (2016).  Natural Language Object Retrieval. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. J. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
VanderSloot, B., Amann J., Bernhard M., Durumeric Z., Bailey M., & J. Halderman A. (2016).  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.

Pages