Publications

Found 4258 results
Author [ Title(Desc)] Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
P
Regier, T. (1994).  A Preliminary Study of the Semantics of Reduplication.
Bergen, B. K., & Chang N. (2000).  Prepositional semantics in embodied construction grammar.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Arianfar, S., Koponen T., Raghavan B., & Shenker S. J. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Padhukasahasram, B.., Halperin E., Wessel J.., Thomas D.. J., Silver E.., Trumbower H.., et al. (2010).  Presymptomatic Risk Assessment for Chronic Non-Communicable Diseases. PLoS ONE. 5,
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
P. Godfrey, B., & Karp R. M. (2009).  On the Price of Heterogeneity in Parallel Systems. Theory of Computing Systems. 45(2), 280-301.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Cocchi, R., Shenker S. J., Estrin D., & Zhang L. (1993).  Pricing in Computer Networks: Motivation, Formulation, and Example. IEEE/ACM Transactions on Networking. 1(6), 614-627.
Clark, D. D., Estrin D., Herzog S., & Shenker S. J. (1996).  Pricing in Computer Networks: Reshaping the Research Agenda. 97-126.
Richter, P., Allman M., Bush R., & Paxson V. (2015).  A Primer on IPv4 Scarcity. ACM SIGCOMM Computer Communication Review. 45(2), 21-31.
Moody, J., & Utans J. (1992).  Principled Architecture Selection for Neural Networks: Application to Corporate Bond Rating Prediction. 4,
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Albanese, A., Blömer J., Edmonds J., & Luby M. (1994).  Priority Encoding Transmission.
Larson, M., Choi J., Slokom M., Erkin Z., Friedland G., & de Vries A. P. (2019).  Privacy and audiovisual content: Protecting users as big multimedia data grows bigger. Big Data Analytics for Large-Scale Multimedia Search.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.
Tahaei, M., Frik A., & Vaniea K. (2021).  Privacy Champions in Sofware Teams: Understanding Their Motivations, Strategies, and Challenges. CHI Conference on Human Factors in Computing Systems. 2021,
Tschantz, M. Carl, & Friedland G. (2019).  Privacy Concerns of Multimodal Sensor Systems. The Handbook of Multimodal-Multisensor Interfaces: Foundations, User Modeling, and Common Modality Combinations . 1,
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Tahaei, M., Bernd J., & Rashid A. (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC. 117-130.

Pages