Publications
(1989).
Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016).
(2013).
(2010).
(2013). The Berkeley FrameNet Project.
Proceedings of the Joint Conference of the International Committee on Computational Linguistics and the Association for Computational Linguistics (COLING-ACL).
(1998). The Berkeley Restaurant Project.
Proceedings of the Third International Conference on Spoken Language Processing (ICSLP 94). 2139-2142.
(1994). The Berkeley Restaurant Project.
Proceedings of the Speech Research Symposium XIII. 119-128.
(1993). Bertha: Tunneling through the Network API.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
(2020). Best Papers from the 10th IEEE International Symposium on Multimedia.
(Friedland, G., & Chen S-C., Ed.).International Journal of Semantic Computing. 3,
(2009). Best Papers from the Second IEEE International Conference on Semantic Computing (IJSC).
(Friedland, G., & Martell C.., Ed.).International Journal of Semantic Computing. 2,
(2008). Best-Effort versus Reservations: A Simple Comparative Analysis.
ACM Computer Communication Review. 28, 3-16.
(1998).
(1992).
(1994).
(2006).
(2018). Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias.
Proceedings of WEIS '18.
(2018). Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
(2015). Better than Real: Complex-valued Neural Networks for MRI Fingerprinting.
Proceedings of the International Conference on Image Processing 2017.
(2017).
(2009).
(2012). Beyond Online Aggregation: Parallel and Incremental Data Mining with Online Map-Reduce.
Proceedings of the Workshop on Massive Data Analytics on the Cloud (MDAC 2010).
(2010).
(2014).
(2008).
(2012).