Publications

Found 1067 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
Conference Paper
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
Feigenbaum, J., & Shenker S. J. (2002).  Distributed Algorithmic Mechanism Design: Recent Results and Future Directions. Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIALM'02). 1-13.
Feldman, J. (1979).  A Distributed Information Processing Model of Visual Memory. Proceedings of the Conference on Associative Memory and Parallel Computation.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Bansal, D., Balakrishnan H., Floyd S., & Shenker S. J. (2001).  Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01). 263-274.
Friedman, E., Racz M. Z., & Shenker S. J. (2015).  Dynamic Budget-Constrained Pricing in the Cloud.
Friedland, G., Hürst W., & Knipping L. (2007).  Educational Multimedia Systems: The Past, the Present, and a Glimpse into the Future. 1-4.
Liu, H., Levchenko K., Felegyhazi M., Kreibich C., Maier G., Voelker G. M., et al. (2011).  On the Effects of Registrar-Level Intervention.
Fosler-Lussier, E., & Morgan N. (1998).  Effects of Speaking Rate and Word Predictability on Conversational Pronunciations. Proceedings of the ESCA Workshop on Modeling Pronunciation Variation for Automatic Speech Recognition.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Faria, A., & Gelbart D. (2005).  Efficient Pitch-Based Estimation of VTLN Warp Factors. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 213-216.
Favre, B., Hakkani-Tür D., Petrov S., & Klein D. (2008).  Efficient Sentence Segmentation Using Syntactic Features. 77-80.
Feldman, J., Bergen B. K., & Narayanan S. (2003).  Embodied Verbal Semantics: Evidence from an Image-Verb Matching Task. Proceedings of Cognitive Science Conference.
de Melo, G., Baker C. F., Ide N., Passonneau R. J., & Fellbaum C. (2012).  Empirical Comparisons of MASC Word Sense Annotations.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Magimai-Doss, M., Hakkani-Tür D., etin Ö. Ç., Shriberg E., Fung J., & Mirghafori N. (2007).  Entropy Based Classifier Combination for Sentence Segmentation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 189-192.
Fillmore, C. J. (1990).  Epistemic Stance and Grammatical Form in English Conditional Sentences. Papers from the 26th Regional Meeting of the Chicago Linguistic Society (CLS 26). 137-162.
Floyd, S., Handley M., Padhye J., & Widmer J. (2000).  Equation-Based Congestion Control for Unicast Applications. Proceedings of ACM SIGCOMM 2000.

Pages