Publications

Found 4228 results
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
E
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Egelman, S., & Peer E. (2015).  Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
Egelman, S., & Peer E. (2015).  The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
Ehrenfeucht, A., & Karpinski M. (1990).  The Computational Complexity of (XOR, AND)-Counting Problems.
Eisenhofer, T., Quiring E., Möller J., Riepel D., Holz T., & Rieck K. (In Press).  No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning. Proceedings of 32nd USENIX Security Symposium.
Eklund, R., Bates R., Kuyper C., Willingham E., & Shriberg E. (2006).  The Annotation and Analysis of Importance in Meetings.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive Analysis of Financial Games.
El-Yaniv, R., Fiat A., Karp R. M., & Turpin G. (1992).  Competitive analysis of financial games. Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
El-Yaniv, R., & Karp R. M. (1997).  Nearly Optimal Competitive Online Replacement Policies. 22,
El-Yaniv, R., & Karp R. M. (1993).  The mortgage problem. Proceedings of the Second Israel Symposium on Theory and Computing Systems . 304-312.
Elizalde, B. Martinez, Friedland G., Lei H., & Divakaran A. (2012).  There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media. 27-32.
Elizalde, B. Martinez, Lei H., & Friedland G. (2013).  An I-Vector Representation of Acoustic Environments for Audio-Based Video Event Detection on User Generated Content. 114-117.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concepts for Video Event Detection on User-Generated Content.
Elizalde, B. Martinez, & Friedland G. (2013).  Taming the Wild: Acoustic Segmentation in Consumer?Produced Videos.
Elizalde, B. Martinez, Friedland G., & Ni K. (2013).  What You Hear Is What You Get: Audio-Based Video Content Analysis.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concept Ranking for Video Event Detection on User-Generated Content.
Elizalde, B. Martinez, Lei H., Friedland G., & Peters N. (2013).  Capturing the Acoustic Scene Characteristics for Audio Scene Detection.
Elizalde, B. Martinez, & Friedland G. (2013).  Lost in Segmentation: Three Approaches for Speech/Non-Speech Detection in Consumer-Produced Videos.
Elizalde, B. Martinez, Raj B., Friedland G., Nolazco J., & Garcia L. (2012).  Segment and Conquer.
Elkon, R.., Linhart C.., Sharan R., Shamir R., & Shiloh Y.. (2003).  Genome-Wide In-silico Determination of Transcriptional Regulation Modules Controlling Cell Cycle in Human Cells. Genome Research. 773-780.
Ellis, D. P. W., & Morgan N. (1999).  Size Matters: An Empirical Study of Neural Network Training for Large Vocabulary Continuous Speech Recognition. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
Ellis, D. P. W. (1997).  The Weft: A Representation for Periodic Sounds. The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.

Pages