Publications

Found 4258 results
Author Title [ Type(Asc)] Year
Conference Paper
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Arianfar, S., Koponen T., Raghavan B., & Shenker S. J. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Weaver, N., Hamadeh I.., Kesidis G.., & Paxson V. (2004).  Preliminary Results Using ScaleDown to Explore Worm Dynamics. Proceedings of the ACM Workshop on Rapid Malcode (WORM 2004).
Nechaev, B., Allman M., Paxson V., & Gurtov A. (2010).  A Preliminary Analysis of TCP Performance in an Enterprise Network.
Ellis, D. P. W. (1996).  Prediction-driven Computational Auditory Scene Analysis for Dense Sound Mixtures. Proceedings of the ESCA Workshop on the "Auditory Basis of Speech Perception".
Moody, J., Levin A.., & Rehfuss S. (1993).  Predicting the U.S. Index of Industrial Production. Proceedings of Parallel Applications in Statistics and Economics '93. 3(6), 791-794.
Dreger, H., Feldmann A., Paxson V., & Sommer R. (2008).  Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154.
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Martin, E., Vinyals O., Friedland G., & Bajcsy R.. (2010).  Precise Indoor Localization Using Smart Phones. 787-790.
Petruck, M. R. L., & de Melo G. (2012).  Precedes: A Semantic Relation in FrameNet. 45-49.
Schryen, G. (2008).  Practical Security of Large-scale Elections: An Exploratory Case Study of Internet Voting in Estonia. 37-50.
Hinrichs, T. L., Gude N. S., Casado M., Mitchell J. C., & Shenker S. J. (2009).  Practical Declarative Network Management. 1-10.
Ee, C. Tien, Ratnasamy S., & Shenker S. J. (2006).  Practical Data-Centric Storage. Proceedings of the Third Symposium on Networked Systems Design and Implementation (NSDI 2006). 325-338.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication over DNS.
Paxson, V., Christodorescu M., Javed M., Rao J., Sailer R., Schales D., et al. (2013).  Practical Comprehensive Bounds on Surreptitious Communication Over DNS. SEC'13: Proceedings of the 22nd USENIX conference on Security. 17-32.
Saenko, K., Karayev S., Jia Y., Shyr A., Janoch A., Long J., et al. (2011).  Practical 3-D Object Detection Using Category and Instance-Level Appearance Models. 793-800.
Zhang, W., Yu S. X., & Teng S-H. (2012).  Power SVM: Generalization with Exemplar Classification Uncertainty. 2144-2151.
Kramer, O., Satzger B., & Lässig J. (2010).  Power Prediction in Smart Grids with Evolutionary Local Kernel Regression. 262-269.
Ben-David, S., Borodin A., Karp R. M., Tardos G., & Wigderson A. (1990).  On the power of randomization in online algorithms. Proceedings of the 22nd Annual ACM Symposium on Theory of Computing. 379-386.

Pages