Publications
Found 340 results
Author [ Title] Type Year Filters: First Letter Of Last Name is T [Clear All Filters]
Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes.
Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
(2016). Does AS Size Determine Degree in AS Topology?.
ACM Computer Communication Review. 31(5), 7-10.
(2001).
(2007). A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing.
Proceedings of Infocom 1999.
(1999).
(1993). Editorial of Special Issue on Software Engineering for Parallel Systems.
Elsevier Journal of Systems and Software.
(2016).
(2008).
(1995). Electrophysiological Evidence for the Left-Lateralized Effect of Language on Preattentive Categorical Perception of Color.
108(34), 14026-14030.
(2011). Elephants and Algorithms: A Review of the Current and Future Role of AI in Elephant Monitoring.
arXiv.
(2023).
(2009). Energy-Efficient Routing on the Virtual Spanner.
Lecture Notes in Computer Science. 4104,
(2006).
(2009). Epidemic Algorithms for Replicated Database Maintenance.
Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing (PODC '87). 1-12.
(1987).
(1998). Evaluating Anti-Fingerprinting Privacy Enhancing Technologies.
Proceedings of the WWW'19 (World Wide Web Conference).
(2019). Evolution and efficiency in color naming: The case of Nafaanra.
Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
(2019).
(2009). An Experience Sampling Study of User Reactions to Browser Warnings in the Field.
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
(2018). Experimentation and Modeling of HTTP Over Satellite Channels.
International Journal of Satellite Communications.
(2001).
(1992).
(1994).
(1996). Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction.
Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
(2016).
(2008).