Publications

Found 575 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is L  [Clear All Filters]
In Press
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
2019
Byers, J. W., Luby M., & Mitzenmacher M. (2019).  A digital fountain retrospective. ACM SIGCOMM Computer Communication Review. 49(5), 82-85.
Liu, X. (2019).  Distributed Design of Two-Scale Structures With Unit Cells. Proceedings of ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Datta, A., Lu J., & Tschantz M. Carl (2019).  Evaluating Anti-Fingerprinting Privacy Enhancing Technologies. Proceedings of the WWW'19 (World Wide Web Conference).
Choi, J., Larson M., Friedland G., & Hanjalic A. (2019).  From Intra-Modal to Inter-Modal Space: Multi-Task Learning of Shared Representations for Cross-Modal Retrieval. Proceedings of 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM). 1-10.
Shapiro, V., & Liu X. (2019).  Homogenization of material properties in additively manufactured structures. US Patent 10353378.
Liu, Z., Miao Z., Zhan X., Wang J., Gong B., & Yu S. X. (2019).  Large-Scale Long-Tailed Recognition in An Open World. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Luby, M., Padovani R., Richardson T. J., Minder L., & Aggarwal P. (2019).  Liquid Cloud Storage. ACM Transactions on Storage. 15(1), 
Larson, M., Choi J., Slokom M., Erkin Z., Friedland G., & de Vries A. P. (2019).  Privacy and audiovisual content: Protecting users as big multimedia data grows bigger. Big Data Analytics for Large-Scale Multimedia Search.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Luby, M. (2019).  Systems and methods for storing, maintaining, and accessing objects in storage system clusters. US Patent 10,191,808.
QasemiZadeh, B., Petruck M. R. L., Kallmeyer L., Candito M., Maldonado A., Osswald R., et al. (2019).  Unsupervised Lexical Semantic Frame Induction: A SemEval 2019 Task Proposal.
2018
Ren, J., Lindorfer M., Dubois D. J., Rao A., Choffnes D., & Vallina-Rodriguez N. (2018).  Bug Fixes, Improvements, ... and Privacy Leaks - A Longitudinal Study of PII Leaks Across Android App Versions. NDSS 2018.
Lopes, M.. E., Wang S.., & Mahoney M.. W. (2018).  Error Estimation for Randomized Least-Squares Algorithms via the Bootstrap. Proceedings of the 35th ICML Conference. 3223-3232.
Liu, B.., Jing L.., Li J.., Yu J.., Gittens A.., & Mahoney M.. W. (2018).  Group Collaborative Representation for Image Set Classification. International Journal of Computer Vision. 1-26.
Liu, B.., Jing L.., Li J.., Yu J.., Gittens A.., & Mahoney M.. W. (2018).  Group Collaborative Representation for Image Set Classification. International Journal of Computer Vision. 1-26.
Yao, Z.., Gholami A.., Lei Q.., Keutzer K.., & Mahoney M.. W. (2018).  Hessian-based Analysis of Large Batch Training and Robustness to Adversaries. Proceedings of the 2018 NeurIPS Conference. 4954-4964.
Lorenzo, A., Metere A., & Dzugutov M. (2018).  Hexatic smectic phase with algebraically decaying bond-orientational order.
Luby, M. (2018).  ICSI 30th Anniversary Celebration. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Li, F.., & Paxson V.. (2018).   A Large-Scale Empirical Study of Security Patches. USENIX ;login:. 43(1), 
Liu, X., & Shapiro V. (2018).  Multiscale shape–material modeling by composition. Computer-Aided Design. 102, 194-203.
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V.. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
2017
Vasudeva, K., Simsek M., & López-Pérez D. (2017).  Analysis of Handover Failures in Heterogeneous Networks With Fading. IEEE Transactions on Vehicular Technology. 66(7), 

Pages