Found 289 results
Author Title [ Type(Asc)] Year
Filters: First Letter Of Title is P  [Clear All Filters]
Conference Paper
Asharov, G., Demmler D., Sachapira M., Schneider T., Segev G., Shenker S., et al. (0).  Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings of PoPETs 2017.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Arianfar, S., Koponen T., Raghavan B., & Shenker S. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Ellis, D. P. W. (1996).  Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures. Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
Moody, J., Levin A.., & Rehfuss S. (1993).  Predicting the U.S. Index of Industrial Production. Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Martin, E., Vinyals O., Friedland G., & Bajcsy R.. (2010).  Precise Indoor Localization Using Smart Phones. 787-790.
Petruck, M. R. L., & de Melo G. (2012).  Precedes: A Semantic Relation in FrameNet. 45-49.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Hinrichs, T. L., Gude N. S., Casado M., Mitchell J. C., & Shenker S. (2009).  Practical Declarative Network Management. 1-10.
Ee, C. Tien, Ratnasamy S., & Shenker S. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Saenko, K., Karayev S., Jia Y., Shyr A., Janoch A., Long J., et al. (2011).  Practical 3-D Object Detection Using Category and Instance-Level Appearance Models. 793-800.
Zhang, W., Yu S. X., & Teng S-H. (2012).  Power SVM: Generalization with Exemplar Classification Uncertainty. 2144-2151.