Number of items: 72.
Abel, Andreas and Reineke, Jan
(2013)
Measurement-based modeling of the cache replacement policy.
Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013)
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57.
ISBN 978-1-4503-2335-2
Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013)
Mining Connection Pathways for Marked Nodes in Large Graphs.
Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013)
Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2013)
A Framework for the Verification of Certifying Computations.
Journal of Automated Reasoning.
pp. 1-33.
Andalam, Sidharta and Girault, Alain and Sinha, Roopak and Roop, Partha S. and Reineke, Jan
(2013)
Precise timing analysis for direct-mapped caches.
Angius, Alessio and Horváth, András and Wolf, Verena
(2013)
Approximate Transient Analysis of Queuing Networks by Quasi Product Forms.
Baruah, Sanjoy and Brandenburg, Björn B.
(2013)
Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities.
Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013)
Towards Efficient Traffic-analysis Resistant Anonymity Networks.
Brandenburg, Björn B.
(2013)
A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications.
Brandenburg, Björn B.
(2013)
Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling.
Brandenburg, Björn B.
(2013)
An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2).
p. 19.
Brandenburg, Björn B. and Anderson, James H.
(2013)
The OMLP family of optimal multiprocessor real-time locking protocols.
Design Automation for Embedded Systems, 17 (2).
pp. 277-342.
Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013)
Logical Foundations of Secure Resource Management.
Böhmer, Matthias and Krüger, Antonio
(2013)
A study on icon arrangement by smartphone users.
Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013)
What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013)
Constrained fractional set programs and their application in local clustering and community detection.
Calin, Georgel and Derevenetc, Egor and Majumdar, Rupak and Meyer, Roland
(2013)
A Theory of Partitioned Global Address Spaces.
Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104.
ISBN 978-1-4503-2329-1
Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013)
SplitX: high-performance private analytics.
Chistikov, Dmitry and Majumdar, Rupak
(2013)
A Uniformization Theorem for Nested Word to Word Transductions.
Darulova, Eva and Kuncak, Viktor and Majumdar, Rupak and Saha, Indranil
(2013)
Synthesis of fixed-point programs.
Doychev, Goran and Feld, Dominik and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2013)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
Ebert, Sandra and Schiele, Bernt
(2013)
Where Next in Object Recognition and how much Supervision Do We Need?
In:
Advances in Computer Vision and Pattern Recognition.
Springer, pp. 35-64.
Eigner, Fabienne and Maffei, Matteo
(2013)
Differential Privacy by Typing in Security Protocols.
Elmasry, Amr and Schmidt, Jens M. and Mehlhorn, Kurt
(2013)
Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge.
Journal of Graph Theory, 72 (1).
pp. 112-121.
Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2013)
Parameterized verification of asynchronous shared-memory systems.
Finkbeiner, Bernd and Seidl, Helmut and Kovács, Máté
(2013)
Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties.
Fischlin, Marc and Fleischhacker, Nils
(2013)
Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013)
On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
Gligoric, Milos and Majumdar, Rupak
(2013)
Model Checking Database Applications.
Gonthier, Georges and Ziliani, Beta and Nanevski, Aleksandar and Dreyer, Derek
(2013)
How to make ad hoc proof automation less ad hoc.
J. Funct. Program., 23 (4).
pp. 357-401.
Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013)
Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2013)
A Theory of Name Boundedness.
Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013)
A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6).
pp. 361-372.
Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
WWHow! Freeing Data Storage from Cages.
Kahl, Gerrit and Paradowski, Denise
(2013)
A Privacy-aware Shopping Scenario.
Kloos, Johannes and Majumdar, Rupak
(2013)
Supervisor Synthesis for Controller Upgrades.
Kloos, Johannes and Majumdar, Rupak and Niksic, Filip and Piskac, Ruzica
(2013)
Incremental Inductive Coverability.
Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013)
Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013)
Security and Privacy by Declarative Design.
Majumdar, Rupak and Meyer, Roland and Wang, Zilong
(2013)
Static Provenance Verification for Message Passing Programs.
Majumdar, Rupak and Saha, Indranil and Ueda, Koichi and Yazarel, Hakan
(2013)
Compositional Equivalence Checking for Models and Code of Control Systems.
Majumdar, Rupak and Wang, Zilong
(2013)
Expand, Enlarge, and Check for Branching Vector Addition Systems.
Mampaey, Michael and Vreeken, Jilles
(2013)
Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1).
pp. 130-173.
Mikeev, Linar and Neuhäußer, Martin R. and Spieler, David and Wolf, Verena
(2013)
On-the-fly verification and optimization of DTA-properties for large Markov chains.
Formal Methods in System Design, 43 (2).
pp. 313-337.
Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013)
Fine-grained Semantic Typing of Emerging Entities.
Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013)
Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2).
pp. 29-34.
Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013)
Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013)
CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013)
Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013)
Detecting Bicliques in GF[q].
Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013)
Towards realistic team formation in social networks based on densest subgraphs.
Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013)
Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12).
pp. 1274-1277.
Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013)
Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3).
pp. 469-494.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Identity-Based Steganography and Its Applications to Censorship Resistance.
Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013)
Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013)
Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013)
The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2).
pp. 97-108.
Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2013)
CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
Journal of the ACM, 60 (3).
p. 22.
Taneva, Bilyana and Weikum, Gerhard
(2013)
Gem-based Entity-Knowledge Maintenance.
Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013)
Learning People Detectors for Tracking in Crowded Scenes.
Tetali, Sai Deep and Lesani, Mohsen and Majumdar, Rupak and Millstein, Todd
(2013)
MrCrypt: Static Analysis for Secure Cloud Computations.
Webb, Geoffrey and Vreeken, Jilles
(2013)
Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3).
pp. 1-31.
Wieder, Alexander and Brandenburg, Björn B.
(2013)
Efficient partitioning of sporadic real-time tasks with shared resources and spin locks.
Wieder, Alexander and Brandenburg, Björn B.
(2013)
On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks.
Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013)
HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013)
Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1).
pp. 190-203.
Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2013)
Bisimilar finite abstractions of stochastic control systems.
Zengin, Mustafa and Vafeiadis, Viktor
(2013)
A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism.
Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013)
Peer-assisted Content Distribution in Akamai Netsession.
Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2013)
Mtac: a monad for typed tactic programming in Coq.
This list was generated on Wed Nov 20 21:04:55 2024 CET.