![]() The Code That Never Ran: Modeling Attacks on Speculative EvaluationĬraig Disselkoen, Radha Jagadeesan, Alan Jeffrey, James Riely Hanlin Li, Nicholas Vincent, Janice Tsai, Jofish Kaye, Brent Hecht How Do People Change Their Technology Use in Protest?: Understanding “Protest Users” Giving a little ‘ayyy, I feel ya’ to someone’s personal post: Performing Support on Social Mediaĭanielle Lottridge, Nazanin Andalibi, Joy Kim, Jofish Kaye Music, Search, and IoT: How People (Really) Use Voice Assistants Sarah Bird, Vikas Mishra, Steven Englehardt, Rob Willoughby, David Zeber, Walter Rudametkin, Martin Lopatkaĭistributed Differential Privacy via ShufflingĪlbert Cheu, Adam Smith, Jonathan Ullman, David Zeber, Maxim Zhilyaevĭebris: Intermingling ethnography with design and artistic practice Smith, Ilana SegallĪctions speak louder than words: Semi-supervised learning for browser fingerprinting detection Gilbert Cockton, Kristina Höök, Jofish Kaye, Annika Waern, Eleanor Wynn, Julie Williamsonįederated Learning for Ranking Browser History Suggestionsįlorian Hartmann, Sunah Suh, Arkadiusz Komarzewski, Tim D. Moving Towards a Journal-centric Publication Model for CHI: Possible Paths, Opportunities and Risks Stevie Chancellor, Shion Guha, Jofish Kaye, Jen King, Niloufar Salehi, Sarita Schoenebeck, Elizabeth Stowell The Relationships between Data, Power, and Justice in CSCW Research Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth Schoen, Brad Warren Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Let’s Encrypt: An Automated Certificate Authority to Encrypt the Entire Web Understanding flaky tests: the developer’s perspectiveĢ7th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), 2019 ![]() Jess Hohenstein, Bill Selman, Gemma Petrie, Jofish Kaye, & Rebecca WeissĪn empirical study of patch uplift in rapid release development pipelinesĮmpirical Software Engineering (EMSE), 2019Īn empirical study of DLL injection bugs in the Firefox ecosystem “This Browser is Lightning Fast”: The Effects of Message Content on Perceived Performance ![]() The Representativeness of Automated Web Crawls as a Surrogate for Human Browsingĭavid Zeber, Sarah Bird, Camila Oliveira, Walter Rudametkin, Ilana Segall,Fredrik Wollsén, Martin Lopatka Vikas Mishra, Pierre Laperdrix, Antoine Vastel, Walter Rudametkin, Romain Rouvoy, Martin Lopatka Sarah Civil Conversation around a Difficult TopicĪlan Borning, Batya Friedman, Jofish Kaye, Cliff Lampe and Volker Wulfĭon’t count me out: On the relevance of IP addresses in the tracking ecosystem Tracking Measurement Obfuscations From Source URL Hardening Firefox against Injection AttacksĬhristoph Kerschbaumer, Tom Ritter, Frederik Braun Julia Cambre, Jessica Colnago, Jim Maddock, Janice Tsai, Jofish Kaye Shaowen Bardzell, Jofish Kaye, Katta SpielĮnhancing the Experience of Virtual Conferences in Social Virtual Environmentsĭuc Anh Le, Blair MacIntyre, Jessica OutlawĬhoice of Voices: A Large-Scale Evaluation of Text-to-Speech Voice Quality for Long-Form Content Moving Forward Together: Effective Activism for Change Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, and Deian Stefan Retrofitting Fine Grain Isolation in the Firefox Renderer Why We Still Can’t Browse in Peace: On the Uniqueness and Reidentifiability of Web Browsing Histories ![]() CastelluccioĮmpirical Evaluation Of Cost Of Annoying AdsĪyman Farahat, Jofish Kaye, Henriette Cramer Why Are Some Bugs Non-Reproducible? An Empirical Investigation using Data Fusionģ6th ACM/IEEE International Conference on Maintenance and Software Evolution (ICSME), 2020 Rust-code-analysis: A Rust library to analyze and extract maintainability information from source codes Who Gets to Define Success? Listening to Stories of How People Value Firefox to Redefine Metrics and Revive a Decommissioned ProductĮthnographic Praxis in Industry Conference Proceedings MadWeb – Measurements, Attacks, and Defenses for the WebĬhristoph Kerschbaumer, Julian Gaibler, Arthur Edelstein, Thyla van der Merwe HTTPS-Only: Upgrading all connections to https in Web Browsers Five Walled Gardens: Why Browsers are Essential to the Internet and How Operating Systems Are Holding Them Back ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |