Publications

Found 823 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is B  [Clear All Filters]
2019
Byers, J. W., Luby M., & Mitzenmacher M. (2019).  A digital fountain retrospective. ACM SIGCOMM Computer Communication Review. 49(5), 82-85.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Rabinovich, M., Allman M., Brennan S., Pollack B., & Xu J. (2019).  Rethinking Home Networks in the Ultrabroadband Era. Proceedings of IEEE International Conference on Distributed Computing Systems.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (2019).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd Symposium on Applications of Contextual Integrity.
2018
Wijesekera, P., Reardon J., Reyes I., Tsai L., Chen J-W., Good N., et al. (2018).  Contextualizing Privacy Decisions for Better Prediction (and Protection). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Bird, S. (2018).  Designing Mobile Applications for Endangered Languages. The Oxford Handbook of Endangered Languages.
Adams, O., Cohn T., Neubig G., Cruz H., Bird S., & Michaud A. (2018).  Evaluating phonemic transcription of low-resource tonal languages for language documentation. Proceedings of the LREC 2018 Workshop.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Bettinson, M., & Bird S. (2018).  Image-Gesture-Voice: A Web Component for Eliciting Speech. Proceedings of the LREC 2018 Workshop.
Gilardi, L., & Baker C. F. (2018).  Learning to Align across Languages: Toward Multilingual FrameNet.
Torrent, T. Timponi, Ellsworth M., Baker C. F., & Matos E. Edison da (2018).  The Multilingual FrameNet Shared Annotation Task: a Preliminary Report.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
2017
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M., et al. (2017).  DCAR: A Discriminative and Compact Audio Representation for Audio Processing. IEEE Transactions on Multimedia. PP(99), 
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).

Pages