Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Ehrenfeucht, A., & Karpinski M. (1990).  The Computational Complexity of (XOR, AND)-Counting Problems.
Eisenhofer, T., Quiring E., Möller J., Riepel D., Holz T., & Rieck K. (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proceedings of 32nd USENIX Security Symposium.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive Analysis of Financial Games.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive analysis of financial games. Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
El-Yaniv, R., & Karp R. M. (1997).  Nearly Optimal Competitive Online Replacement Policies. 22,
El-Yaniv, R., & Karp R. M. (1993).  The mortgage problem. Proceedings of the Second Israel Symposium on Theory and Computing Systems . 304-312.
Elizalde, B. Martinez, Friedland G., Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media. 27-32.
Elizalde, B. Martinez, Lei H., & Friedland G. (2013).  An I-Vector Representation of Acoustic Environments for Audio-Based Video Event Detection on User Generated Content. 114-117.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concepts for Video Event Detection on User-Generated Content.
Elizalde, B. Martinez, & Friedland G. (2013).  Taming the Wild: Acoustic Segmentation in Consumer?Produced Videos.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concept Ranking for Video Event Detection on User-Generated Content.
Elizalde, B. Martinez, Lei H., Friedland G., & Peters N. (2013).  Capturing the Acoustic Scene Characteristics for Audio Scene Detection.
Elizalde, B. Martinez, & Friedland G. (2013).  Lost in Segmentation: Three Approaches for Speech/Non-Speech Detection in Consumer-Produced Videos.
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Elkon, R.., Linhart C.., Sharan R., Shamir R., & Shiloh Y.. (2003).  Genome-Wide In-silico Determination of Transcriptional Regulation Modules Controlling Cell Cycle in Human Cells. Genome Research. 773-780.
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
Ellis, D. P. W., & Morgan N. (1999).  Size Matters: An Empirical Study of Neural Network Training for Large Vocabulary Continuous Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).

Pages