Publications

Found 332 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
Conference Paper
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.
Bradonjic, M.., Elsässer R., Friedrich T., Sauerwald T., & Stauffer A. (2010).  Efficient Broadcast on Random Geometric Graphs. 1412-1421.
Etzioni, O., Hanks S., Jiang T., & Karp R. M. (1996).  Efficient Information Gathering on the Internet. Proceedings. Thirty-Seventh Annual Symposium Foundations of Computer Science. 234-243.
Magimai-Doss, M., Hakkani-Tür D., etin Ö. Ç., Shriberg E., Fung J., & Mirghafori N. (2007).  Entropy Based Classifier Combination for Sentence Segmentation. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 189-192.
Jones, B., Ensafi R., Feamster N., Paxson V., & Weaver N. (2015).  Ethical Concerns for Censorship Measurement. Proc. SIGCOMM Workshop on Ethics in Networked Systems Research.
Ensafi, R., Fifield D., Winter P., Feamster N., Weaver N., & Paxson V. (2015).  Examining How the Great Firewall Discovers Hidden Circumvention Servers. Proceedings of ACM Internet Measurement Conference.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Salzmann, M., Ek C. Henrik, Urtasun R., & Darrell T. (2010).  Factorized Orthogonal Latent Spaces. 701-708.
Zamir, O.., Etzioni O., Madani O.., & Karp R. M. (1997).  Fast and Intuitive Clustering of Web Documents. Proceedings of the Third International Conference on Knowledge Discovery and Data Mining. 287-290.
Wijesekera, P., Baokar A., Tsai L., Reardon J., Egelman S., Wagner D., et al. (2017).  The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences . Proceedings of the 2017 IEEE Symposium on Security and Privacy (Oakland ’17).
Graciarena, M., Alwan A., Ellis D. P. W., Franco H., Ferrer L., Hansen J. H. L., et al. (2013).  Feature Combination for Highly Channel-Degraded Speech Activity Detection.
Sharma, S., Ellis D. P. W., Kajarekar S., Jain P., & Hermansky H. (2000).  Feature Extraction Using Non-Linear Transformation for Robust Speech Recognition on the Aurora Database. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000).
Eden, A., C. Christoudias M., & Darrell T. (2011).  Finding Lost Children.
Cotton, C.., & Ellis D. P. W. (2009).  Finding Similar Acoustic Events Using Matching Pursuit and Locality-Sensitive Hashing. 125-128.
Fifield, D., & Egelman S. (2015).  Fingerprinting Web Users through Font Metrics. Proceedings of the 19th international conference on Financial Cryptography and Data Security.
Bergemann, D., Eisenbach T.., Feigenbaum J., & Shenker S. J. (2005).  Flexibility as an Instrument in DRM Systems. Proceedings of 2005 Workshop on the Economics of Information Security (WEIS 2005).
Zhou, T., Lee Y. Jae, Yu S. X., & Efros A. A. (2015).  FlowWeb: Joint Image Set Alignment by Weaving Consistent, Pixel-Wise Correspondences.
Ellsworth, M., Baker C. F., & Petruck M. R. L. (2021).  FrameNet and Linguistic Typology. Third Workshop on Computational Typology and Multilingual NLP. 61-66.
Ellsworth, M., Ohara K. Hirose, Subirats-Rüggeberg C., & Schmidt T.. (2006).  Frame-semantic Analysis of Motion Scenarios in English, German, Spanish, and Japanese. Proceedings of Fourth International Conference on Construction Grammar (ICCG4).
Stolcke, A., Anguera X., Boakye K., etin Ö. Ç., Grezl F., Janin A., et al. (2005).  Further Progress in Meeting Recognition: The ICSI-SRI Spring 2005 Speech-to-Text Evaluation System. Proceedings of the Second Joint Workshop on Multimodal Interaction and Related Machine Learning Algorithms (MLMI 2005). 463-475.
He, D., Zaitlen N., Pasaniuc B., Eskin E., & Halperin E. (2011).  Genotyping Common and Rare Variation Using Overlapping Pool Sequencing. Proceedings of the First Annual RECOMB Satellite Workshop on Massively Parallel Sequencing (RECOMB-seq). 26-27.
Elson, J.., Karp R. M., Papadimitriou C. H., & Shenker S. J. (2004).  Global Synchronization in Sensornets. Proceedings of the 6th Latin American Theoretical Informatics Symposium (LATIN '04). 2976, 609-624.

Pages