Number of items: 52.
Aditya, Paarijaat and Zhao, Mingchen and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill
(2012)
Reliable Client Accounting for P2P-infrastructure Hybrids.
Akkus, Istemi Ekin and Chen, Ruichuan and Hardt, Michaela and Francis, Paul and Gehrke, Johannes
(2012)
Non-tracking Web Analytics.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
Harmony and dissonance: organizing the people's voices on political controversies.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
OpinioNetIt: A Structured and Faceted Knowledge-base of Opinions.
Awadallah, Rawia and Ramanath, Maya and Weikum, Gerhard
(2012)
PolariCQ: polarity classification of political quotations.
Backes, Michael and Bendun, Fabian and Unruh, Dominique
(2012)
Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification.
(Unpublished)
Benz, Florian and Hildebrandt, Andreas and Hack, Sebastian
(2012)
A dynamic program analysis to find floating-point accuracy problems.
Berrang, Pascal and Bogdoll, Jonathan and Hahn, Ernst Moritz and Hartmanns, Arnd and Hermanns, Holger
(2012)
Dependability Results for Power Grids with Decentralized Stabilization Strategies.
AVACS Technical Report (83).
ISSN 1860-9821
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2012)
Affine Refinement Types for Authentication and Authorization.
Böhm, Christoph and de, Gerard Melo and Naumann, Felix and Weikum, Gerhard
(2012)
LINDA: distributed web-of-data-scale entity matching.
Carreira, João Carlos Menezes and Rodrigues, Rodrigo and Candea, George and Majumdar, Rupak
(2012)
Scalable Testing of File System Checkers.
Chatterjee, Krishnendu and Chmelik, Martin and Majumdar, Rupak
(2012)
Equivalence of Games with Probabilistic Uncertainty and Partial-Observation Games.
Cheikhrouhou, Lassaad and Stephan, Werner and Fischlin, Marc and Ullmann, Markus
(2012)
Merging the Cryptographic Security Analysis and the Algebraic-Logic Security Proof of PACE.
Chen, Ruichuan and Reznichenko, Alexey and Francis, Paul and Gehrke, Johannes
(2012)
Towards Statistical Queries over Distributed Private User Data.
Clement, Allen and Junqueira, Flavio and Kate, Aniket and Rodrigues, Rodrigo
(2012)
On the (limited) power of non-equivocation.
Dallmeier, Valentin and Knopp, Nikolai and Mallon, Christoph and Fraser, Gordon and Hack, Sebastian and Zeller, Andreas
(2012)
Automatically Generating Test Cases for Specification Mining.
IEEE Transactions on Software Engineering, 38 (2).
pp. 243-257.
Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo
(2012)
Efficient Big Data Processing in Hadoop MapReduce.
The Proceedings of the VLDB Endowment (PVLDB), 5 (12).
pp. 2014-2015.
Dittrich, Jens and Quiané-Ruiz, Jorge-Arnulfo and Richter, Stefan and Schuh, Stefan and Jindal, Alekh and Schad, Jorg
(2012)
Only Aggressive Elephants are Fast Elephants.
The Proceedings of the VLDB Endowment (PVLDB), 5 (11).
pp. 1591-1602.
Druschel, Peter
(2012)
Accountability and Trust in Cooperative Information Systems.
Elmasry, Amr and Mehlhorn, Kurt and Schmidt, Jens M.
(2012)
An O(n+m) Certifying Triconnnectivity Algorithm for Hamiltonian Graphs.
Algorithmica, 62 (3-4).
pp. 754-766.
Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2012)
A Perfect Model for Bounded Verification.
Fischer, Jeffrey and Majumdar, Rupak and Esmaeilsabzali, Shahram
(2012)
Engage: A Deployment Management System.
Fischlin, Marc and Lehmann, Anja and Schröder, Dominique
(2012)
History-Free Sequential Aggregate Signatures.
Ganty, Pierre and Majumdar, Rupak
(2012)
Algorithmic Verification of Asynchronous Programs.
ACM Transactions on Programming Languages and Systems, 34 (1).
6:1-6:48.
Garg, Deepak and Genovese, Valerio and Negri, Sara
(2012)
Countermodels from Sequent Calculi in Multi-Modal Logics.
Garg, Deepak and Pfenning, Frank
(2012)
Stateful authorization logic - Proof theory and a case study.
Journal of Computer Security, 20 (4).
pp. 353-391.
Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012)
Labeled Goal-Directed Search in Access Control Logic.
Genovese, Valerio and Garg, Deepak and Rispoli, Daniele
(2012)
Labeled Sequent Calculi for Access Control Logics: Countermodels, Saturation and Abduction.
Ghosh, Saptarshi and Viswanath, Bimal and Kooti, Farshad and Sharma, Naveen Kumar and Korlam, Gautam and Benevenuto, Fabrício and Ganguly, Niloy and Gummadi, Krishna P.
(2012)
Understanding and combating link farming in the twitter social network.
Hartmanns, Arnd and Hermanns, Holger and Berrang, Pascal
(2012)
A comparative analysis of decentralized power grid stabilization strategies.
Hoffart, Johannes and Seufert, Stephan and Nguyen, Dat Ba and Theobald, Martin and Weikum, Gerhard
(2012)
KORE: keyphrase overlap relatedness for entity disambiguation.
Katoen, Joost-Pieter and Klink, Daniel and Leucker, Martin and Wolf, Verena
(2012)
Three-valued abstraction for probabilistic systems.
Journal of Logic and Algebraic Programming, 81 (4).
pp. 356-389.
Kooti, Farshad and Mason, Winter A and Gummadi, Krishna P. and Cha, Meeyoung
(2012)
Predicting emerging social conventions in online social networks.
Krishnaswami, Neelakantan R. and Turon, Aaron and Dreyer, Derek and Garg, Deepak
(2012)
Superficially substructural types.
Lee, Jonathan K. and Palsberg, Jens and Majumdar, Rupak and Hong, Hong
(2012)
Efficient May Happen in Parallel Analysis for Async-finish Parallelism.
Long, Zhenyue and Calin, Georgel and Majumdar, Rupak and Meyer, Roland
(2012)
Language-Theoretic Abstraction Refinement.
Majumdar, Rupak and Saha, Indranil and Shashidhar, K C and Wang, Zilong
(2012)
CLSE: Closed-Loop Symbolic Execution.
Majumdar, Rupak and Saha, Indranil and Zamani, Majid
(2012)
Synthesis of minimal-error control software.
Majumdar, Rupak and Zamani, Majid
(2012)
Approximately Bisimilar Symbolic Models for Digital Control Systems.
Maksoud, Mohamed Abdel and Reineke, Jan
(2012)
An Empirical Evaluation of the Influence of the Load-Store Unit on WCET Analysis.
Mondal, Mainack and Viswanath, Bimal and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012)
Defending Against Large-scale Crawls in Online Social Networks.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012)
Discovering and Exploring Relations on the Web.
Proc. of the Very Large Database Endowment (PVLDB), 5 (12).
pp. 1982-1985.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2012)
PATTY: A Taxonomy of Relational Patterns with Semantic Types.
Pishchulin, Leonid and Jain, Arjun and Andriluka, Mykhaylo and Thormählen, Thorsten and Schiele, Bernt
(2012)
Articulated People Detection and Pose Estimation: Reshaping the Future.
Qu, Lizhen and Gemulla, Rainer and Weikum, Gerhard
(2012)
A Weakly Supervised Model for Sentence-Level Semantic Orientation Analysis with Multiple Experts.
Saha, Indranil and Majumdar, Rupak
(2012)
Trigger memoization in self-triggered control.
Santos, Nuno and Rodrigues, Rodrigo and Gummadi, Krishna P. and Saroiu, Stefan
(2012)
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services.
Streit, Kevin and Hammacher, Clemens and Zeller, Andreas and Hack, Sebastian
(2012)
Sambamba: A Runtime System for Online Adaptive Parallelization.
Tabuada, Paulo and Balkan, Ayca and Caliskan, Sina Yamac and Shoukry, Yasser and Majumdar, Rupak
(2012)
Input-Output stability for discrete systems.
Vahldiek, Anjo and Elnikety, Eslam and Post, Ansley and Druschel, Peter and Garg, Deepak and Gehrke, Johannes and Rodrigues, Rodrigo
(2012)
Trusted Storage.
Viswanath, Bimal and Mondal, Mainack and Clement, Allen and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan and Post, Ansley
(2012)
Exploring the design space of social network-based Sybil defense.
Weikum, Gerhard and Hoffart, Johannes and Nakashole, Ndapandula and Spaniol, Marc and Suchanek, Fabian M and Yosef, Mohamed Amir
(2012)
Big Data Methods for Computational Linguistics.
IEEE Data Engineering Bulletin, 35 (3).
pp. 46-64.
This list was generated on Thu Nov 21 12:51:08 2024 CET.