Publications
Found 271 results
Author [ Title] Type Year Filters: First Letter Of Last Name is V [Clear All Filters]
50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System.
Proceedings of the 24th USENIX Security Symposium.
(2019). Abstract Interpretation of Stateful Networks.
Proceedings of SAS 2018.
(2018).
(1997).
(2009).
(1996). Adblocking and Counter-Blocking: A Slice of the Arms Race.
Proceedings of the 6th USENIX Workshop on Free and Open Communications on the Internet (FOCI '16).
(2016).
(2011). Almost an expert: The effects of rubrics and expertise on perceived value of crowdsourced design critiques.
Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing. 1005-1017.
(2016). Analysis of Handover Failures in Heterogeneous Networks With Fading.
IEEE Transactions on Vehicular Technology. 66(7),
(2017). An Analysis of Pre-Installed Android Software.
IEEE Sympsium on Security and Privacy 2020.
(2020). An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps.
Proceedings of ACM Internet Measurement Conference.
(2016).
(2009). Apache Spark: a unified engine for big data processing.
Communications of the ACM. 59(11), 56-65.
(2016). On the Application of Formal Description Techniques to the Design of Interception Systems for GSM Mobile Terminals.
Journal of Systems and Software. 60(1), 49-56.
(2002). Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions.
Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
(2005). Apps, Trackers, Privacy and Regulators: A Global Study of the Mobile Tracking Ecosystem.
Proceedings of NDSS 2018.
(2018).
(2012).
(2011). An ATM Distributed Simulator for Network Management Research.
Proceedings of the 34th Annual Simulation Symposium (SS 2001). 185-192.
(2001).
(2011).
(2011). Average case analysis of a heuristic for the assignment problem.
Mathematics of Operations Research. 19(3), 513-522.
(1994). Barter Trade Improves Message Delivery in Opportunistic Networks.
Ad Hoc Networks. 8(1), 1-14.
(2010). Better than Real: Complex-valued Neural Networks for MRI Fingerprinting.
Proceedings of the International Conference on Image Processing 2017.
(2017).
(2014).