Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
D
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Venkataraman, A., Liu Y., Shriberg E., & Stolcke A. (2005).  Does Active Learning Help Automatic Dialog Act Tagging in Meeting Data?. Proceedings of the 9th European Conference on Speech Communication and Technology (Interspeech 2005-Eurospeech 2005). 2777-2780.
Tangmunarunkit, H., Doyle J., Govindan R., Jamin S., Shenker S. J., & Willinger W. (2001).  Does AS Size Determine Degree in AS Topology?. ACM Computer Communication Review. 31(5), 7-10.
Metere, A. (2018).  Does free will exist in the universe? (That would be a no.).
Shriberg, E., Kajarekar S., & Scheffer N. (2009).  Does Session Variability Compensation in Speaker Recognition Model Intrinsic Variation Under Mismatched Conditions?. 1551-1554.
Maier, G., Feldmann A., Paxson V., & Allman M. (2009).  On Dominant Characteristics of Residential Broadband Internet Traffic. 90-102.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters. 323-336.
Ghodsi, A., Zaharia M., Hindman B., Konwinski A., Shenker S. J., & Stoica I. (2011).  Dominant Resource Fairness: Fair Allocation of Multiple Resources in Datacenters.
Hermelin, D., Mnich M., van Leeuwen E. J., & Woeginger G. (2011).  Domination When the Stars Are Out. 432-473.
Bringmann, K., & Friedrich T. (2009).  Don’t Be Greedy When Calculating Hypervolume Contributions.. 103-112.
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Gillick, D., Gillick L., & Wegmann S. (2011).  Don't Multiply Lightly: Quantifying Problems with the Acoustic Model Assumptions in Speech Recognition.
Walfish, M., Balakrishnan H., Karger D. R., & Shenker S. J. (2005).  DoS: Fighting Fire with Fire. Proceedings of the Fourth Workshop on Hot Topics in Networks (HotNets-IV).
Gelbart, D., & Morgan N. (2002).  Double the Trouble: Handling Noise and Reverberation in Far-Field Automatic Speech Recognition. Proceedings of the 7th International Conference on Spoken Language Processing (ICSLP 2002).
Fillmore, C. J. (2003).  Double-Decker Definitions: The Role of Frames in Meaning Explanations. Sign Language Studies. 3(3), 263-295.
Gloe, T., & Boehme R. (2010).  The "Dresden Image Database" for Benchmarking Digital Image Forensics. Proceedings of the 25th ACM Symposium on Applied Computing (ACM SAC 2010). 1584-1590.
Hornauer, S., Yellapragada B., Ranjbar A., & Yu S. X. (2019).  Driving Scene Retrieval by Example from Large-Scale Data. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Privitera, C. M., & Shastri L. (1996).  A DSOM Hierarchical Model for Reflexive Processing: An Application to Visual Trajectory Classification.
Tur, G., Shriberg E., Stolcke A., & Kajarekar S. (2007).  Duration and Pronunciation Conditioned Lexical Modeling for Speaker Verification. 2049-2052.
Wester, M., Greenberg S., & Chang S. (2001).  A Dutch Treatment of an Elitist Approach to Articulatory-Acoustic Feature Classification. Proceedings of the 7th European Conference on Speech Communication and Technology (Eurospeech 2001).
Dreger, H., Feldmann A., Mai M.., Paxson V., & Sommer R. (2006).  Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. Proceedings of the 15th USENIX Security Symposium (Security '06).
Bansal, D., Balakrishnan H., Floyd S., & Shenker S. J. (2001).  Dynamic Behavior of Slowly-Responsive Congestion Control Algorithms. Proceedings of the ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '01). 263-274.
Estrin, D., Handley M., Helmy A., Huang P., & Thaler D. (1999).  A Dynamic Bootstrap Mechanism for Rendezvous-Based Multicast Routing. Proceedings of Infocom 1999.

Pages