Publications

Found 1067 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is F  [Clear All Filters]
Conference Paper
Hung, H., Huang Y., Friedland G., & Gatica-Perez D. (2008).  Estimating the Dominant Person in Multi-Party Conversations Using Speaker Diarization Strategies. 2197-2200.
Casado, M., Freedman M. J., Pettit J., McKeown N., & Shenker S. J. (2007).  Ethane: Taking Control of the Enterprise. Proceedings of ACM Special Interest Group on Data Communications Conference (SIGCOMM 2007). 1-12.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Harborth, D., & Frik A. (2021).  Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. Seventeenth Symposium on Usable Privacy and Security (SOUPS) 2021. 513-534.
Favre, B., Bohnet B., & Hakkani-Tür D. (2010).  Evaluation of Semantic Role Labeling and Dependency Parsing of Automatic Speech Recognition Output. 5342-5345.
Feldman, J., & Shastri L. (1984).  Evidential Inference in Activation Networks. Proceedings of the 6th Cognitive Science Conference.
Shastri, L., & Feldman J. (1985).  Evidential Reasoning in Semantic Networks: A Formal Theory. Proceedings of the 9th International Joint Conference on Artificial Intelligence. 465-474.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Goga, O., Lei H., Parthasarathi S. Hari Krish, Friedland G., Sommer R., & Teixeira R. (2013).  Exploiting Innocuous Activity for Correlating Users Across Sites.
Knox, M. Tai, Mirghafori N., & Friedland G. (2013).  Exploring Methods of Improving Speaker Accuracy for Speaker Diarization.
Bailey, D. R., Chang N., Narayanan S., & Feldman J. (1998).  Extending Embodied Lexical Development. Proceedings of 20th Cognitive Science Society Conference. 84-90.
Friedman, E. J., Gkatzelis V., Psomas C-A., & Shenker S. J. (2019).  Fair and Efficient Memory Sharing: Confronting Free Riders. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Fast Cell Select for Mobility Robustness in Intra-frequency 5G Ultra Dense Networks. Proceedings of International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016.
Gonina, E., Friedland G., Cook H., & Keutzer K. (2011).  Fast Speaker Diarization Using a High-Level Scripting Language.
Mirghafori, N., Fosler-Lussier E., & Morgan N. (1995).  Fast Speakers in Large Vocabulary Continuous Speech Recognition: Analysis & Antidotes. Proceedings of the Fourth European Conference on Speech Communication and Technology (Eurospeech '95).
Huang, Y., Vinyals O., Friedland G., Müller C., Mirghafori N., & Wooters C. (2007).  A Fast-Match Approach for Robust, Faster than Real-Time Speaker Diarization. Proceedings of IEEE Workshop on Automatic Speech Recognition and Understanding. 693-698.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Floyd, S., & Karp R. M. (1986).  FED bin packing for item sizes with distributions on (0,1/2). Proceedings of the 27th Annual Symposium on Foundations of Computer Science. 322-330.
Fifield, D., & Egelman S. (2015).  Fingerprinting Web Users through Font Metrics. Proceedings of the 19th international conference on Financial Cryptography and Data Security.
Maier, G., Schneider F., & Feldmann A. (2010).  A First Look at Mobile Hand-held Device Traffic. 161-170.
Bergemann, D., Eisenbach T.., Feigenbaum J., & Shenker S. J. (2005).  Flexibility as an Instrument in DRM Systems. Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005).

Pages