Publications

Found 289 results
Author [ Title(Desc)] Type Year
Filters: First Letter Of Title is P  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
P. Godfrey, B., & Karp R. M. (2009).  On the Price of Heterogeneity in Parallel Systems. Theory of Computing Systems. 45(2), 280-301.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Cocchi, R., Shenker S., Estrin D., & Zhang L. (1993).  Pricing in Computer Networks: Motivation, Formulation, and Example. IEEE/ACM Transactions on Networking. 1(6), 614-627.
Clark, D. D., Estrin D., Herzog S., & Shenker S. (1996).  Pricing in Computer Networks: Reshaping the Research Agenda. 97-126.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Moody, J., & Utans J. (1992).  Principled Architecture Selection for Neural Networks: Application to Corporate Bond Rating Prediction. 4,
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Albanese, A., Blömer J., Edmonds J., & Luby M. (1994).  Priority Encoding Transmission.
Larson, M., Choi J., Slokom M., Erkin Z., Friedland G., & de Vries A. P. (2019).  Privacy and audiovisual content: Protecting users as big multimedia data grows bigger. Big Data Analytics for Large-Scale Multimedia Search.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Asharov, G., Demmler D., Sachapira M., Schneider T., Segev G., Shenker S., et al. (0).  Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings of PoPETs 2017.
Karp, R. M. (1979).  Probabilistic Analysis of Graph-theoretic Algorithms. Proceedings of the Computer Science and Statistics 12th Annual Symposium on the Interface.
Daskalakis, C., Dimakis A.. G., Karp R. M., & Wainwright M.. J. (2008).  Probabilistic Analysis of Linear Programming Decoding. IEEE Transactions on Information Theory. 54(8), 3565-3578.
Karp, R. M., Motwani R., & Nisan N. (1993).  Probabilistic analysis of network flow algorithms. Mathematics of Operations Research. 18(1), 71-97.
Karp, R. M. (1977).  Probabilistic Analysis of Partitioning Algorithms for the Traveling-salesman Problem in the Plane. Mathematics of Operations Research. 2(3), 209-224.
Karp, R. M., & Matula D. W. (1975).  Probabilistic Behavior of a Naive Coloring Algorithm on Random Graphs.
Karp, R. M., & Matula D. W. (1975).  Probabilistic Behavior of a Naive Coloring Algorithm on Random Graphs. Bulletin of the Operations Research Society of America. 23,
Nishimura, J., & Friedman E. (2012).  Probabilistic Convergence Guarantees for Type-II Pulse-Coupled Oscillators. Physical Review E. 86,
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
Zagordi, O., Töpfer A., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2012).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. 342-354.

Pages