Publications

Found 100 results
[ Author(Asc)] Title Type Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Egelman, S., & Pe'er E. (2021).  The Key to Getting People to Be Safer Online: Make the Appeals More Personal. Wall Street Journal.
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Egelman, S., Kannavara R., & Chow R. (2015).  Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Egecioglu, O.., Smith T.. R., & Moody J. (1987).  Computable Functions and Complexity in Neural Networks.
Efros, A., & Halperin E. (2012).  Haplotype Reconstruction Using Perfect Phylogeny and Sequence Data. 13,
Effelsberg, W., & Müller-Menrad E. (1993).  Dynamic Join and Leave for Real-Time Multicast.
Ee, C. Tien, Fonseca R., Kim S., Moon D., Tavakoli A., Culler D. E., et al. (2006).  A Modular Network Layer for Sensornets. Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06). 249-262.
Ee, C. Tien, Lee J., Maltz D., Shenker S. J., & Subramanian L. (2007).  Simplifying Access Control in Enterprise Networks.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. ACM SIGCOMM Computer Communication Review. 37(4), 157-168.
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Ee, C. Tien, Shenker S. J., & Subramanian L. (2006).  Sapheniea: Simplifying Configuration Using Classes.
Ee, C. Tien, Ramachandran V., Chun B-G., & Shenker S. J. (2006).  Resolving BGP Disputes.
Ee, C. Tien, Ramachandran V., Chun B-G., Lakshminarayanan K., & Shenker S. J. (2007).  Resolving Inter-Domain Policy Disputes. 157-168.
Edwards, J. (2001).  Chapter 17: The Transcription of Discourse. 321-348.
Edwards, J. (2004).  The ICSI Meeting Corpus: Close-Talking and Far-Field, Multi-Channel Transcriptions for Speech and Language Researchers. Proceedings of the Workshop on Compiling and Processing Spoken Language Corpora at the Fourth International Conference on Language Resources and Evaluation (LREC 2004). 8-11.
Edmonds, J., & Karp R. M. (1972).  Theoretical Improvements in Algorithmic Efficiency for Network Flow Problems. Journal of the Association for Computing Machinery. 19(2), 248-264.
Eden, A., C. Christoudias M., & Darrell T. (2011).  Finding Lost Children.
Eddy, W. M., & Allman M. (2000).  Advantages of Parallel Processing and the Effects of Communications Time.
Eddy, W. M., & Allman M. (2002).  A Comparison of RED's Byte and Packet Modes.
Eddy, W. M., & Allman M. (2003).  A Comparison of RED's Byte and Packet Modes.
Eddy, W. M., Ostermann S., & Allman M. (2004).  New Techniques for Making Transport Protocols Robust to Corruption-Based Loss. ACM SIGCOMM Computer Communication Review. 34(5), 75-88.

Pages