Publications

Found 1074 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2020
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Zhang, W., Fang V., Panda A., & Shenker S. J. (2020).  Kappa: a programming framework for serverless computing. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 328-343.
Harchol, Y., Mushtaq A., Fang V., McCauley J. Murphy, Panda A., & Shenker S. J. (2020).  Making edge-computing resilient. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
2019
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (2019).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (2019).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
Friedman, E. J., Gkatzelis V., Psomas C-A., & Shenker S. J. (2019).  Fair and Efficient Memory Sharing: Confronting Free Riders. Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.
Scheuvens, L., Simsek M., Noll-Berrato A., Franchi N., & Fettweis G. (2019).  Framework for Adaptive Controller Design Over Wireless Delay-Prone Communication Channels. IEEE Access. 7,
Scheuvens, L., Simsek M., Noll-Berrato A., Franchi N., & Fettweis G. (2019).  Framework for Adaptive Controller Design Over Wireless Delay-Prone Communication Channels. IEEE Access. 7,
Choi, J., Larson M., Friedland G., & Hanjalic A. (2019).  From Intra-Modal to Inter-Modal Space: Multi-Task Learning of Shared Representations for Cross-Modal Retrieval. Proceedings of 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM). 1-10.

Pages