Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2019
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (2019).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd Symposium on Applications of Contextual Integrity.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Jin, Y., Scott C., Dhamdhere A., Giotsas V., Krishnamurthy A., & Shenker S. J. (2019).  Stable and Practical AS Relationship Inference with ProbLink. Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).
Martin, C.. H., & Mahoney M. (2019).  Statistical Mechanics Methods for Discovering Knowledge from Modern Production Quality Neural Networks. Proceedings of the 25th Annual SIGKDD. 3239-3240.
Roosta-Khorasani, F.., & Mahoney M. (2019).  Sub-Sampled Newton Methods. Mathematical Programming. 293-326.
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Chakraborty, R., Wang J., & Yu S. X. (2019).  SurReal: Fr'echet Mean and Distance Transform for Complex-Valued Deep Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Luby, M. (2019).  Systems and methods for storing, maintaining, and accessing objects in storage system clusters. US Patent 10,191,808.
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
McCauley, J., Panda A., Krishnamurthy A., & Shenker S. J. (2019).  Thoughts on Load Distribution and the Role of Programmable Switches. Newsletter of ACM SIGCOMM Computer Communication Review. 49(1), 18-23.
Wang, R., & Shapiro V. (2019).  Topological semantics for lumped parameter systems modeling. Advanced Engineering Informatics. 42,
Martin, C.. H., & Mahoney M. (2019).  Traditional and Heavy-Tailed Self Regularization in Neural Network Models. Proceeding of the 36th ICML Conference. 4284-4293.
Yao, Z.., Gholami A.., Xu P.., Keutzer K.., & Mahoney M. (2019).  Trust Region Based Adversarial Attack on Neural Networks. Proceedings of the 32nd CVPR Conference. 11350-11359.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
Sap, D., & Shapiro V. (2019).  On Verification of Interoperability of CAD Systems with a Focus on Invariant Properties. Computer-Aided Design. 115, 256-266.
Pan, X., Chakraborty R., & Yu S. X. (2019).  Visual Similarity from Optimizing Feature and Memory On A Hypersphere. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
2020
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (2020).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Weaver, N. (2020).  Apple vs FBI: Pensacola Isn’t San Bernardino. Lawfare.
Narayan, A., Panda A., Alizadeh M., Balakrishnan H., Krishnamurthy A., & Shenker S. J. (2020).  Bertha: Tunneling through the Network API. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
Weaver, N. (2020).  Blocking International Students Is an Attack on America’s Future. Lawfare.
Amaro, E., Branner-Augmon C., Luo Z., Ousterhout A., Aguilera M. K., Panda A., et al. (2020).  Can far memory improve job throughput?. EuroSys '20: Proceedings of the Fifteenth European Conference on Computer Systems. 1-16.

Pages