Joshua

Results: 3854



#Item
151

Missing Pieces Joshua’s Story October 2017 Oct. 4, 2017

Add to Reading List

Source URL: www.bcasw.org

- Date: 2017-10-04 18:49:57
    152

    How Short is Too Short? Implications of Length and Framing on the Effectiveness of Privacy Notices Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie Faith Cranor, Yuvraj Agarwal School of Compu

    Add to Reading List

    Source URL: www.synergylabs.org

    - Date: 2016-06-24 11:10:14
      153

      How to Design a Good API and Why it Matters Joshua Bloch Principal Software Engineer 1

      Add to Reading List

      Source URL: zoomq.dn.qbox.me

      - Date: 2015-06-17 05:00:04
        154

        1 LoRa Backscatter: Enabling The Vision of Ubiquitous Connectivity VAMSI TALLA† , MEHRDAD HESSAR† , BRYCE KELLOGG, ALI NAJAFI, JOSHUA R. SMITH AND SHYAMNATH GOLLAKOTA, University of Washington

        Add to Reading List

        Source URL: arxiv.org

        - Date: 2017-05-17 20:47:14
          155

          Battery-Free Cellphone VAMSI TALLA, BRYCE KELLOGG, SHYAMNATH GOLLAKOTA AND JOSHUA R. SMITH, Paul G. Allen School of Computer Science and Engineering and Department of Electrical Engineering, University of Washington We p

          Add to Reading List

          Source URL: batteryfreephone.cs.washington.edu

          - Date: 2017-07-01 10:57:53
            156

            FM Backscatter: Enabling Connected Cities and Smart Fabrics † † Anran Wang , Vikram Iyer , Vamsi Talla, Joshua R. Smith and Shyamnath Gollakota

            Add to Reading List

            Source URL: smartcities.cs.washington.edu

            - Date: 2017-02-24 00:39:12
              157

              Embracing Error to Enable Rapid Crowdsourcing Ranjay Krishna1 , Kenji Hata1 , Stephanie Chen1 , Joshua Kravitz1 , David A. Shamma2 , Li Fei-Fei1 , Michael S. Bernstein1 Stanford University1 , Yahoo! Labs2 {ranjaykrishna,

              Add to Reading List

              Source URL: arxiv.org

              - Date: 2016-02-15 20:27:56
                158

                Weak Keys Remain Widespread in Network Devices Marcella Hastings Joshua Fried Nadia Heninger

                Add to Reading List

                Source URL: www.cis.upenn.edu

                - Date: 2017-01-10 09:33:37
                  159

                  Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging Hazim Almuhimedi,1 Florian Schaub,1 Norman Sadeh,1 Idris Adjerid,2 Alessandro Acquisti,1 Joshua Gluck,1 Lorrie Cranor,1 Yuvraj Agarwa

                  Add to Reading List

                  Source URL: www.cs.cmu.edu

                  - Date: 2015-02-18 00:23:22
                    UPDATE