Publications

Found 332 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
Conference Paper
Cocchi, R., Estrin D., Shenker S. J., & Zhang L. (1991).  A Study of Priority Pricing in Multiple Service Class Networks. Proceedings of the ACM SIGCOMM '91 Conference on Communications Architecture & Protocols. 123-130.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1996).  A Study of Reservation Dynamics in Integrated Services Packet Networks. Proceedings of the 15th IEEE Annual Joint Conference on Networking the Next Generation. 2, 871-879.
Bozonnet, S., Evans N., Anguera X., Vinyals O., Friedland G., & Fredouille C. (2010).  System Output Combination for Improved Speaker Diarization. 2642-2645.
Ellis, D. P. W., Singh R.., & Sivadas S. (2001).  Tandem Acoustic Modeling in Large-Vocabulary Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001).
Hermansky, H., Ellis D. P. W., & Sharma S. (2000).  Tandem Connectionist Feature Stream Extraction for Conventional HMM Systems. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2000).
Egelman, S., Bernd J., Friedland G., & Garcia D. D. (2016).  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. 591-596.
Colmenares, J. A., Eads G., Hofmeyr S., Bird S., Moretó M., Chou D., et al. (2013).  Tessellation: Refactoring the OS around Explicit Resource Containers with Continuous Adaptation.
Elizalde, B. Martinez, Friedland G., Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media. 27-32.
Egelman, S., Kannavara R., & Chow R. (2015).  Is This Thing On? Crowdsourcing Privacy Indicators for Ubiquitous Sensing Platforms. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Elsässer, R., & Sauerwald T. (2009).  Tight Bounds for the Cover Time of Multiple Random Walks. 415-426.
Radoslavov, P., Govindan R., & Estrin D. (2001).  Topology-Informed Internet Replica Placement. Proceedings of the Sixth International Workshop on Web Caching and Content Distribution.
Andrew, L., Marcondes C.., Floyd S., Dunn L., Guillier R., Gang W., et al. (2008).  Towards a Common TCP Evaluation Suite.
Subramanian, L., Caesar M., Ee C. Tien, Handley M., Mao Z. Morley, Shenker S. J., et al. (2004).  Towards a Next Generation Inter-domain Routing Protocol. Proceedings of the Third ACM Workshop on Hot Topics in Networks (HotNets-III), San Diego, California.
Culler, D. E., Dutta P., Ee C. Tien, Fonseca R., Hui J., Levis P., et al. (2005).  Towards a Sensor Network Architecture: Lowering the Waistline. Proceedings of the 10th Workshop on Hot Topics in Operating Systems (HotOS X). 10, 24-30.
Scott, C., Wundsam A., Raghavan B., Liu Z., Whitlock S., El-Hassany A., et al. (2014).  Troubleshooting Blackbox SDN Control Software with Minimal Causal Sequences. 395-406.
Tsai, L., Wijesekera P., Reardon J., Reyes I., Chen J-W., Good N., et al. (2017).  TurtleGuard: Helping Android Users Apply Contextual Privacy Preferences. Proceedings of SOUPS '17.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
Lee, L., Fifield D., Malkin N., Iyer G., Egelman S., & Wagner D. (2017).  A Usability Evaluation of Tor Launcher. Proceedings on Privacy Enhancing Technologies 2017.
López, J. Ferreiros, & Ellis D. P. W. (2000).  Using Acoustic Condition Clustering to Improve Acoustic Change Detection on Broadcast News. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000). 4, 568-571.
Ellis, D. P. W., & Bilmes J. A. (2000).  Using Mutual Information to Design Feature Combinations. Proceedings of the 6th International Conference on Spoken Language Processing (ICSLP 2000).
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Frampton, M., Fernández R.., Ehlen P.., C. Christoudias M., Darrell T., & Peters S. (2009).  Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue. 273-281.
Reyes, I., Wijesekera P., Reardon J., Elazari A., Razaghpanah A., Vallina-Rodriguez N., et al. (2018).  "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA. Proceedings on Privacy Enhancing Technologies.

Pages