Search concepts
|
Selected Filters
|
- 107,550 - 107,600 out of 128,585 results
Search results
-
Conference contribution
Preserving privacy at IXPS
Hu, X., Gupta, A., Feamster, N., Panda, A. & Shenker, S., Aug 1 2018, APNet 2018 - Proceedings of the 2018 Asia-Pacific Workshop on Networking. Association for Computing Machinery, p. 43-49 7 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pressing the button for European elections: Verifiable e-voting and public attitudes toward internet voting in Greece
Delis, A., Gavatha, K., Kiayias, A., Koutalakis, C., Nikolakopoulos, E., Paschos, L., Rousopoulou, M., Sotirellis, G., Stathopoulos, P., Vasilopoulos, P., Zacharias, T. & Zhang, B., Jan 1 2015, 2014 6th International Conference on Electronic Voting: Verifying the Vote - IEEE Proceedings EVOTE 2014. Krimmer, R. & Volkamer, M. (eds.). Institute of Electrical and Electronics Engineers Inc., 7001141. (2014 6th International Conference on Electronic Voting: Verifying the Vote - IEEE Proceedings EVOTE 2014).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pressure infiltration synthesis of lightweight syntactic aluminum matrix composites
Rohatgi, P. K., Alaraj, S. & Gupta, N., 2005, 20th Technical Conference of the American Society for Composites 2005. p. 869-879 11 p. (20th Technical Conference of the American Society for Composites 2005; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pretzel: Email encryption and provider-supplied functions are compatible
Gupta, T., Fingler, H., Alvisi, L. & Walfish, M., Aug 7 2017, SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication. Association for Computing Machinery, Inc, p. 169-182 14 p. (SIGCOMM 2017 - Proceedings of the 2017 Conference of the ACM Special Interest Group on Data Communication).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Prevalence of confusing code in software projects: Atoms of confusion in the wild
Gopstein, D., Zhou, H. H., Frankl, P. & Cappos, J., May 28 2018, Proceedings - 2018 ACM/IEEE 15th International Conference on Mining Software Repositories, MSR 2018. IEEE Computer Society, p. 281-291 11 p. (Proceedings - International Conference on Software Engineering).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Preventing TCP incast throughput collapse at the initiation, continuation, and termination
Tam, A. S. W., Xi, K., Xu, Y. & Chao, H. J., 2012, 2012 IEEE 20th International Workshop on Quality of Service, IWQoS 2012. 6245995. (IEEE International Workshop on Quality of Service, IWQoS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Preventing web application injections with complementary character coding
Mui, R. & Frankl, P., 2011, Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings. p. 80-99 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6879 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
PREVENTION OF HIGH CURRENT CONCENTRATIONS IN THE NOZZLE OF MHD GENERATORS.
Kuo, S., Levi, E. & Schachter, H., 1984, Symposium - Engineering Aspects of Magnetohydrodynamics. Univ of MississippiResearch output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pri3D: Can 3D Priors Help 2D Representation Learning?
Hou, J., Xie, S., Graham, B., Dai, A. & Nießner, M., 2021, Proceedings - 2021 IEEE/CVF International Conference on Computer Vision, ICCV 2021. Institute of Electrical and Electronics Engineers Inc., p. 5673-5682 10 p. (Proceedings of the IEEE International Conference on Computer Vision).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Price and Variance of Anarchy in mean-variance cost density-shaping stochastic differential games
Zyskowski, M. & Zhu, Q., 2013, 2013 IEEE 52nd Annual Conference on Decision and Control, CDC 2013. Institute of Electrical and Electronics Engineers Inc., p. 1720-1725 6 p. 6760130. (Proceedings of the IEEE Conference on Decision and Control).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Priceless: The role of payments in abuse-advertised goods
McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G. M. & Savage, S., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 845-856 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Price of anarchy and price of information in n-person linear-quadratic differential games
Zhu, Q. & Başar, T., 2010, Proceedings of the 2010 American Control Conference, ACC 2010. p. 762-767 6 p. 5530924. (Proceedings of the 2010 American Control Conference, ACC 2010).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pricing design of power control game in WDM optical networks via state-space approach
Zhu, Q. & Pavel, L., 2007, 2007 IEEE Globecom Workshops. 4437834. (GLOBECOM - IEEE Global Telecommunications Conference).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pricing guidance in Ad sale negotiations: The PrintAds example
Juda, A. I., Muthukrishnan, S. & Rastogi, A., 2009, Proceedings of the 3rd International Workshop on Data Mining and Audience Intelligence for Advertising, ADKDD 2009 in Conjunction with SIGKDD'09. p. 61-68 8 p. 1592757. (Proceedings of the 3rd International Workshop on Data Mining and Audience Intelligence for Advertising, ADKDD 2009 in Conjunction with SIGKDD'09).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pricing network edges for heterogeneous selfish users
Cole, R., Dodis, Y. & Roughgarden, T., 2003, Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 521-530 10 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pricing networks with selfish routing (survey)
Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003, Workshop on Economics of Peer-to-Peer Systems.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Primal-dual interior-point methods for semidefinite programming: numerical experience with block-diagonal problems
Nayakkankuppam, M. V. & Overton, M. L., 1996, Proceedings of the IEEE International Symposium on Computer-Aided Control System Design. Anon (ed.). p. 235-239 5 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Primal-improv: Towards co-evolutionary musical improvisation
Scirea, M., Eklund, P., Togelius, J. & Risi, S., Nov 8 2017, 2017 9th Computer Science and Electronic Engineering Conference, CEEC 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 172-177 6 p. 8101620. (2017 9th Computer Science and Electronic Engineering Conference, CEEC 2017 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Principal component projection without principal component analysis
Frosting, R., Musco, C., Musco, C. & Sidford, A., 2016, 33rd International Conference on Machine Learning, ICML 2016. Weinberger, K. Q. & Balcan, M. F. (eds.). International Machine Learning Society (IMLS), p. 3495-3503 9 p. (33rd International Conference on Machine Learning, ICML 2016; vol. 5).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Printing paper technology for development
Ming, J., Ghosh, I., Chen, J. & Abouzied, A., Dec 5 2014, ACM DEV-5 2014 - Proceedings of the 2014 Annual Symposium on Computing for Development. Association for Computing Machinery, p. 117-118 2 p. (ACM DEV-5 2014 - Proceedings of the 2014 Annual Symposium on Computing for Development).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Printr: Exploring the potential of paper-based tools in low-resource settings
Chen, J., Abouzied, A., Hutchful, D., Ming, J. & Ghosh, I., Jun 3 2016, Proceedings of the 8th International Conference on Information and Communication Technologies and Development, ICTD 2016. Association for Computing Machinery, 2909649. (ACM International Conference Proceeding Series; vol. 03-06-June-2016).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Prioritized buffer control in two-tier 360 video streaming
Duanmu, F., Kurdoglu, E., Hosseini, S. A., Liu, Y. & Wang, Y., Aug 11 2017, VR/AR Network 2017 - Proceedings of the 2017 Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2017. Association for Computing Machinery, Inc, p. 13-18 6 p. (VR/AR Network 2017 - Proceedings of the 2017 Workshop on Virtual Reality and Augmented Reality Network, Part of SIGCOMM 2017).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Priority cell departing and discarding in ATM switch nodes
Chao, J. & Pekcan, I. H., 1993, IEEE Workshop on High-Performance Communication Subsystems, Williamsburg, Virginia, September 1993.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy, anonymity, and perceived risk in open collaboration: A study of tor users and wikipedians
Forte, A., Andalibi, N. & Greenstadt, R., Feb 25 2017, CSCW 2017 - Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 1800-1811 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Privacy, anonymity, and perceived risk in open collaboration: A study of service providers
McDonald, N., Hill, B. M., Greenstadt, R. & Forte, A., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy amplification and non-malleable extractors via character sums
Dodis, Y., Li, X., Wooley, T. D. & Zuckerman, D., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 668-677 10 p. 6108229. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy and contextual integrity: Framework and applications
Barth, A., Datta, A., Mitchell, J. C. & Nissenbaum, H., 2006, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006. p. 184-198 15 p. 1624011. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2006).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy detective: Detecting private information and collective privacy behavior in a large social network
Caliskan-Islam, A., Walsh, J. & Greenstadt, R., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 35-46 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy-enabling social networking over untrusted networks
Anderson, J., Diaz, C., Bonneau, J. & Stajano, F., Aug 17 2009, SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009. Association for Computing Machinery, Inc, p. 1-6 6 p. (SIGCOMM 2009 - Proceedings of the 2009 SIGCOMM Conference and Co-Located Workshops, Proceedings of the 2nd ACM Workshop on Online Social Networks, WOSN 2009).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Privacy-enhanced public view for social graphs
Kim, H. & Bonneau, J., 2009, 2nd ACM Workshop on Social Web Search and Mining, SWSM'09, Co-located with the 18th ACM International Conference on Information and Knowledge Management, CIKM 2009. p. 41-48 8 p. (International Conference on Information and Knowledge Management, Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy in online review sites
Burkholder, M. & Greenstadt, R., 2012, Proceedings - IEEE CS Security and Privacy Workshops, SPW 2012. p. 45-52 8 p. 6227683. (Proceedings - IEEE CS Security and Privacy Workshops, SPW 2012).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
PRIVACY-PRESERVING FEDERATED MULTI-TASK LINEAR REGRESSION: A ONE-SHOT LINEAR MIXING APPROACH INSPIRED BY GRAPH REGULARIZATION
Lee, H., Bertozzi, A. L., Kovačević, J. & Chi, Y., 2022, 2022 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 5947-5951 5 p. (ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings; vol. 2022-May).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Konstantinou, C., Keliris, A. & Maniatakos, M., Apr 22 2015, Proceedings of the 2015 Design, Automation and Test in Europe Conference and Exhibition, DATE 2015. Institute of Electrical and Electronics Engineers Inc., p. 333-338 6 p. 7092410. (Proceedings -Design, Automation and Test in Europe, DATE; vol. 2015-April).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy with imperfect randomness
Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privacy with imperfect randomness
Dodis, Y. & Yao, Y., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 463-482 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Private decayed predicate sums on streams
Bolot, J., Fawaz, N., Muthukrishnan, S., Nikolov, A. & Taft, N., 2013, ICDT 2013 - 16th International Conference on Database Theory, Proceedings. p. 284-295 12 p. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privatizing constraint optimization, thesis abstract
Greenstadt, R., 2006, Proceedings of the 21st National Conference on Artificial Intelligence and the 18th Innovative Applications of Artificial Intelligence Conference, AAAI-06/IAAI-06. p. 1916-1917 2 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Privilege escalation attack through address space identifier corruption in untrusted modern processors
Maniatakos, M., 2013, Proceedings of the 2013 8th International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2013. p. 161-166 6 p. 6527798. (Proceedings of the 2013 8th International Conference on Design and Technology of Integrated Systems in Nanoscale Era, DTIS 2013).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
PRNU based source attribution with a collection of seam-carved images
Taspinar, S., Mohanty, M. & Memon, N., Aug 3 2016, 2016 IEEE International Conference on Image Processing, ICIP 2016 - Proceedings. IEEE Computer Society, p. 156-160 5 p. 7532338. (Proceedings - International Conference on Image Processing, ICIP; vol. 2016-August).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Proactive aging mitigation in CGRAs through utilization-aware allocation
Brandalero, M., Lignati, B. N., Carlos Schneider Beck, A., Shafique, M. & Hubner, M., Jul 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Institute of Electrical and Electronics Engineers Inc., 9218586. (Proceedings - Design Automation Conference; vol. 2020-July).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Proactive Defense Against Physical Denial of Service Attacks Using Poisson Signaling Games
Pawlick, J. & Zhu, Q., 2017, Decision and Game Theory for Security - 8th International Conference, GameSec 2017, Proceedings. Kiekintveld, C., Schauer, S., An, B., Rass, S. & Fang, F. (eds.). Springer Verlag, p. 336-356 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10575 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Proactive Discovery of Fake News Domains from Real-Time Social Media Feeds
Chen, Z. & Freire, J., Apr 20 2020, The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020. Association for Computing Machinery, p. 584-592 9 p. (The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Proactive two-party signatures for user authentication
Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003, Network and Distributed System Security Symposium (NDSS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Probabilistic abstract interpretation
Cousot, P. & Monerau, M., 2012, Programming Languages and Systems - 21st European Symposium on Programming, ESOP 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Proceedings. p. 169-193 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7211 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Probabilistic causal analysis of social influence
Bonchi, F., Mishra, B., Gullo, F. & Ramazzotti, D., Oct 17 2018, CIKM 2018 - Proceedings of the 27th ACM International Conference on Information and Knowledge Management. Paton, N., Candan, S., Wang, H., Allan, J., Agrawal, R., Labrinidis, A., Cuzzocrea, A., Zaki, M., Srivastava, D., Broder, A. & Schuster, A. (eds.). Association for Computing Machinery, p. 1003-1012 10 p. (International Conference on Information and Knowledge Management, Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Probabilistic depth image registration incorporating nonvisual information.
Wüthrich, M., Pastor, P., Righetti, L., Billard, A. & Schaal, S., 2012, IEEE International Conference on Robotics and Automation (ICRA): Saint-Paul. p. 3637-3644 8 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Probabilistic fasttext for multi-sense word embeddings
Athiwaratkun, B., Wilson, A. G. & Anandkumar, A., 2018, ACL 2018 - 56th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers). Association for Computational Linguistics (ACL), p. 1-11 11 p. (ACL 2018 - 56th Annual Meeting of the Association for Computational Linguistics, Proceedings of the Conference (Long Papers); vol. 1).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Probabilistic fiber tracking using particle filtering
Zhang, F., Goodlett, C., Hancock, E. & Gerig, G., 2007, Medical Image Computing and Computer-Assisted Intervention - MICCAI 2007 - 10th International Conference, Proceedings. PART 2 ed. Springer Verlag, p. 144-152 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4792 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open Access -
Probabilistic fiber tracking using particle filtering and von mises-fisher sampling
Zhang, F., Goodlett, C., Hancock, E. & Gerig, G., 2007, Energy Minimization Methods in Computer Vision and Pattern Recognition - 6th International Conference, EMMCVPR, 2007 Proceedings. Springer Verlag, p. 303-317 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4679 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Probabilistic formal verification methodology for decentralized thermal management in on-chip systems
Iqtedar, S., Hasan, O., Shafique, M. & Henkel, J., Aug 12 2015, Proceedings - 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2015. Reddy, S. M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 210-215 6 p. 7194362. (Proceedings - 2015 IEEE 24th International Conference on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2015).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution