Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
M
Mahoney, M., Rao S., Wang D., & Zhang P. (2016).  Approximating the Solution to Mixed Packing and Covering LPs in parallel time.
Mahoney, M., Duchi J. C., & Gilbert A. C. (2018).  The Mathematics of Data. 25,
Maier, G., Feldmann A., Paxson V., Sommer R., & Vallentin M. (2011).  An Assessment of Overt Malicious Activity Manifest in Residential Networks.
Maier, G., Schneider F., & Feldmann A. (2010).  A First Look at Mobile Hand-held Device Traffic. 161-170.
Maier, G., Schneider F., & Feldmann A. (2011).  NAT Usage in Residential Broadband Networks.
Maier, G., Sommer R., Dreger H., Feldmann A., Paxson V., & Schneider F. (2008).  Enriching Network Security Analysis with Time Travel. 183-194.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Maire, M., Yu S. X., & Perona P. (2011).  Object Detection and Segmentation from Joint Embedding of Parts and Pixels. Proceedings of International Conference on Computer Vision.
Maire, M., Yu S. X., & Perona P. (2014).  Reconstructive Sparse Code Transfer for Contour Detection and Semantic Labeling.
Maire, M., Narihira T., & Yu S. X. (2016).  Affinity CNN: Learning Pixel-Centric Pairwise Relations for Figure/Ground Embedding. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Maire, M., & Yu S. X. (2013).  Progressive Multigrid Eigensolvers for Multiscale Spectral Segmentation.
Maire, M., Yu S. X., & Perona P. (2013).  Hierarchical Scene Annotation.
Makhoul, J.., Baron A.., Bulyko I., Nguyen L.., Ramshaw L.., Stallard D.., et al. (2005).  The Effects of Speech Recognition and Punctuation on Information Extraction Performance. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 57-60.
Makin, J., & Narayanan S. (2013).  A Hybrid-System Model of the Coagulation Cascade. 206-212.
Makin, J. (2008).  A Computational Model of Human Blood Clotting: Simulation, Analysis, Control, and Validation.
Makin, J., & Narayanan S. (2008).  Hybrid-System Modeling of Human Blood Clotting.
Makin, J., & Narayanan S. (2012).  Real-Time Control of Human Coagulation. IET Control Theory and Applications. 6(17), 2630-2643.
Maletti, A. (2008).  Minimizing Deterministic Weighted Tree Automata. 357-372.
Maletti, A. (2008).  Myhill Nerode Theorem for Recognizable Tree Series --- Revisited. 106-120.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (2019).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Malkin, N., Mathur A., Harbach M., & Egelman S. (2017).  Personalized Security Messaging: Nudges for Compliance with Browser Warnings. Proceedings of the European Workshop on Usable Security (EuroUSEC '17).
Malkoc, G., Kay P., & Webster M. A. (2005).  Variations in Normal Color Vision. IV. Binary Hues and Hue Scaling. Journal of the Optical Society of America A. 22(10), 2154-2168.
Mandal, A., Vergyri D., Wang W., Zheng J., Stolcke A., Tur G., et al. (2008).  Efficient Data Selection for Machine Translation. 261-264.

Pages