Publications
Found 823 results
Author Title [ Type] Year Filters: First Letter Of Last Name is B [Clear All Filters]
Accountable Internet Protocol (AIP).
339-350.
(2008).
(2015).
(2009).
(2009).
(2009).
(2009). An Admission Control Approach for Elastic Flows in the Internet.
Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
(2001). Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
(2014). AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
(2019).
(2010). All in a Day's Week.
Proceedings of the Workshop on Frame Semantics.
(2003). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015). ANODEV2: A Coupled Neural ODE Evolution Framework.
Proceedings of the 2019 NeurIPS Conference.
(2019).
(2009). Applying Fuzzy Logic to Model User Preferences on Multimedia Sessions.
Proceedings of the XII Congreso Espanol Sobre Tecnologias y Logica Fuzzy. 467-470.
(2005). Approximate Fairness Through Differential Dropping.
ACM SIGCOMM Computer Communication Review. 33(2), 23-39.
(2003).
(2009). Approximating the Volume of Unions and Intersections of High-Dimensional Geometric Objects.
436-447.
(2008). An Architecture for Developing Behavioral History.
Proceedings of the First Conference on Steps to Reduce Unwanted Traffic in the Internet (SRUTI '05). 45-51.
(2005).
(2007).
(2007).
(2007). An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
(2007).
(2012).