Publications
Found 748 results
Author [ Title] Type Year Filters: First Letter Of Last Name is H [Clear All Filters]
The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens.
Proceedings of CHI '16.
(2016).
(2009).
(2009). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015). Answering Questions Using Advanced Semantics and Probabilistic Inference.
Proceedings of the Pragmatics of Question Answering Workshop at the North American Chapter of the Association for Computational Linguistics Human Language Technologies Conference (NAACL HLT 2004).
(2004).
(2010).
(2009). On the Applicability of Speaker Diarization to Audio Concept Detection for Multimedia Retrieval.
446-451.
(2011).
(1989).
(2001).
(1990). Applying Reliability Theory for Future Wireless Communication Networks.
Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
(2017).
(1998). Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models.
Evolutionary Computation. 18(4), 617-633.
(2010). Approximating Covering Problems by Randomized Search Heuristics using Multi-Objective Models.
Evolutionary Computation. 18(4), 617-633.
(2010).
(1994).
(2008).
(1998). The Architecture of PIER: An Internet-Scale Query Processor.
Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
(2005). The Architecture of PIER: An Internet-Scale Query Processor.
Proceedings of Second Biennial Conference on Innovative Data Systems Research (CIDR 2005). 28-43.
(2005).
(2007). Association Mapping and Significance Estimation via the Coalescent.
Journal of Human Genetics. 83(6), 675-683.
(2008). Asymmetric K-Center Is Log* N-Hard to Approximate.
Journal of the ACM. 52(4), 538-551.
(2005).
(1990).
(1995).