Items where Division is "Unspecified" and Year is 2013

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | J | K | M | N | P | R | S | T | W | Y | Z
Number of items: 72.

A

Abel, Andreas and Reineke, Jan
(2013) Measurement-based modeling of the cache replacement policy.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Akoglu, Leman and Müller, Emmanuel and Vreeken, Jilles
(2013) Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description (ODD).
ACM Press, New York, NY, USA, pp. 1-57. ISBN 978-1-4503-2335-2

Akoglu, Leman and Vreeken, Jilles and Tong, Hanghang and Chau, Duen Horn and Tatti, Nikolaj and Faloutsos, Christos
(2013) Mining Connection Pathways for Marked Nodes in Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

Aksehirli, Emin and Goethals, Bart and Müller, Emmanuel and Vreeken, Jilles
(2013) Mining Frequently Co-occurring Object Sets over Multiple Neighborhoods.
In: Proceedings of the IEEE International Conference on Data Mining (ICDM).
Conference: ICDM - IEEE International Conference on Data Mining

Alkassar, Eyad and Böhme, Sascha and Mehlhorn, Kurt and Rizkallah, Christine
(2013) A Framework for the Verification of Certifying Computations.
Journal of Automated Reasoning. pp. 1-33.

Andalam, Sidharta and Girault, Alain and Sinha, Roopak and Roop, Partha S. and Reineke, Jan
(2013) Precise timing analysis for direct-mapped caches.
In: The 50th Annual Design Automation Conference 2013, DAC '13, Austin, TX, USA, May 29 - June 07, 2013.
Conference: DAC - Design Automation Conf

Angius, Alessio and Horváth, András and Wolf, Verena
(2013) Approximate Transient Analysis of Queuing Networks by Quasi Product Forms.
In: Analytical and Stochastic Modelling Techniques and Applications - 20th International Conference, ASMTA 2013, Ghent, Belgium, July 8-10, 2013. Proceedings.
Conference: None | Not Set

B

Baruah, Sanjoy and Brandenburg, Björn B.
(2013) Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS - Real Time Systems Symposium

Blond, Stevens Le and Choffnes, David and Zhou, Wenxuan and Druschel, Peter and Ballani, Hitesh and Francis, Paul
(2013) Towards Efficient Traffic-analysis Resistant Anonymity Networks.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM - ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Brandenburg, Björn B.
(2013) A Fully Preemptive Multiprocessor Semaphore Protocol for Latency-Sensitive Real-Time Applications.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS - Euromicro Conference on Real-Time Systems

Brandenburg, Björn B.
(2013) Improved analysis and evaluation of real-time semaphore protocols for P-FP scheduling.
In: 19th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2013, Philadelphia, PA, USA, April 9-11, 2013.
Conference: RTAS - IEEE Real-Time and Embedded Technology and Applications Symposium

Brandenburg, Björn B.
(2013) An asymptotically optimal real-time locking protocol for clustered scheduling under suspension-aware analysis.
SIGBED Review, 10 (2). p. 19.

Brandenburg, Björn B. and Anderson, James H.
(2013) The OMLP family of optimal multiprocessor real-time locking protocols.
Design Automation for Embedded Systems, 17 (2). pp. 277-342.

Bugliesi, Michele and Calzavara, Stefano and Eigner, Fabienne and Maffei, Matteo
(2013) Logical Foundations of Secure Resource Management.
In: Proc. of the 2nd Conference on Principles of Security and Trust (POST 2013).
Conference: None | Not Set

Böhmer, Matthias and Krüger, Antonio
(2013) A study on icon arrangement by smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI - International Conference on Human Factors in Computing Systems

Böhmer, Matthias and Lander, Christian and Krüger, Antonio
(2013) What's in the apps for context?: extending a sensor for studying app usage to informing context-awareness.
In: Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication. International Conference on Ubiquitous Computing (Ubicomp-13), September 8-12, Zurich, Switzerland.
Conference: UbiComp - ACM International Joint Conference on Pervasive and Ubiquitous Computing (PERVASIVE and UbiComp combined from 2013)

Bühler, Thomas and Rangapuram, Syama Sundar and Setzer, Simon and Hein, Matthias
(2013) Constrained fractional set programs and their application in local clustering and community detection.
In: Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 16-21 June 2013.
Conference: ICML - International Conference on Machine Learning

C

Calin, Georgel and Derevenetc, Egor and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Partitioned Global Address Spaces.
In: Proc. of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2013).
Conference: None | Not Set

Chau, Duen Horng and Vreeken, Jilles and van Leeuwen, Matthijs and Faloutsos, Christos
(2013) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
ACM Press, New York, NY, USA, pp. 1-104. ISBN 978-1-4503-2329-1

Chen, Ruichuan and Akkus, Istemi Ekin and Francis, Paul
(2013) SplitX: high-performance private analytics.
In: Proc. of the ACM SIGCOMM 2013 Conference.
Conference: SIGCOMM - ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Chistikov, Dmitry and Majumdar, Rupak
(2013) A Uniformization Theorem for Nested Word to Word Transductions.
In: Proc. of the 18th International Conference on Implementation and Application of Automata (CIAA 2013).
Conference: None | Not Set

D

Darulova, Eva and Kuncak, Viktor and Majumdar, Rupak and Saha, Indranil
(2013) Synthesis of fixed-point programs.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2013).
Conference: EMSOFT - ACM Conference on Embedded Software

Doychev, Goran and Feld, Dominik and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2013) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
In: Proceedings of the 22nd USENIX Security Symposium (USENIX '13).
Conference: USENIX-Security - Usenix Security Symposium

E

Ebert, Sandra and Schiele, Bernt
(2013) Where Next in Object Recognition and how much Supervision Do We Need?
In: Advances in Computer Vision and Pattern Recognition. Springer, pp. 35-64.

Eigner, Fabienne and Maffei, Matteo
(2013) Differential Privacy by Typing in Security Protocols.
In: Proc. 1st Workshop on Hot Issues in Security Principles and Trust (HotSpot 2013).
Conference: None | Not Set

Elmasry, Amr and Schmidt, Jens M. and Mehlhorn, Kurt
(2013) Every DFS Tree of a 3-Connected Graph Contains a Contractible Edge.
Journal of Graph Theory, 72 (1). pp. 112-121.

Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2013) Parameterized verification of asynchronous shared-memory systems.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV - Computer Aided Verification

F

Finkbeiner, Bernd and Seidl, Helmut and Kovács, Máté
(2013) Relational Abstract Interpretation for the Verification of 2-Hypersafety Properties.
In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13).
Conference: CCS - ACM Conference on Computer and Communications Security

Fischlin, Marc and Fleischhacker, Nils
(2013) Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.
In: Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Technique (EUROCRYPT '13).
Conference: EuroCrypt - International Conference on the Theory and Application of Cryptographic Techniques

G

Ghosh, Saptarshi and Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Sharma, Naveen Kumar and Ganguly, Niloy and Gummadi, Krishna P.
(2013) On sampling the wisdom of crowds: random vs. expert sampling of the twitter stream.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Gligoric, Milos and Majumdar, Rupak
(2013) Model Checking Database Applications.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS - Static Analysis Symposium

Gonthier, Georges and Ziliani, Beta and Nanevski, Aleksandar and Dreyer, Derek
(2013) How to make ad hoc proof automation less ad hoc.
J. Funct. Program., 23 (4). pp. 357-401.

Gujarati, Arpan and Cerqueira, Felipe and Brandenburg, Björn B.
(2013) Schedulability Analysis of the Linux Push and Pull Scheduler with Arbitrary Processor Affinities.
In: 25th Euromicro Conference on Real-Time Systems, ECRTS 2013, Paris, France, July 9-12, 2013.
Conference: ECRTS - Euromicro Conference on Real-Time Systems

H

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2013) A Theory of Name Boundedness.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR - International Conference on Concurrency Theory

J

Jindal, Alekh and Palatinus, Endre and Pavlov, Vladimir and Dittrich, Jens
(2013) A Comparison of Knives for Bread Slicing.
The Proceedings of the VLDB Endowment (PVLDB), 6 (6). pp. 361-372.

Jindal, Alekh and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) WWHow! Freeing Data Storage from Cages.
In: Proceedings of the 6th Biennial Conference on Innovative Data Systems Research (CIDR).
Conference: CIDR - Conference on Innovative Data Systems Research

K

Kahl, Gerrit and Paradowski, Denise
(2013) A Privacy-aware Shopping Scenario.
In: Proceedings of the Companion Publication of the 2013 International Conference on Intelligent User Interfaces. International Conference on Intelligent User Interfaces (IUI-13), March 19-22, Santa Monic.

Kloos, Johannes and Majumdar, Rupak
(2013) Supervisor Synthesis for Controller Upgrades.
In: Proc. of the Conference on Design, Automation and Test in Europe (DATE 2013).
Conference: None | Not Set

Kloos, Johannes and Majumdar, Rupak and Niksic, Filip and Piskac, Ruzica
(2013) Incremental Inductive Coverability.
In: Proc. of the 25th International Conference on Computer Aided Verification (CAV 2013).
Conference: CAV - Computer Aided Verification

Kontonasios, Kleanthis-Nikolaos and Vreeken, Jilles and De Bie, Tijl
(2013) Maximum Entropy Models for Iteratively Identifying Subjectively Interesting Structure in Real-Valued Data.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

M

Maffei, Matteo and Pecina, Kim and Reinert, Manuel
(2013) Security and Privacy by Declarative Design.
In: Proceedings of the IEEE 26th Computer Security Foundations Symposium (CSF '16).
Conference: CSF - IEEE Computer Security Foundations Symposium (was CSFW)

Majumdar, Rupak and Meyer, Roland and Wang, Zilong
(2013) Static Provenance Verification for Message Passing Programs.
In: Proc. of the 20th International Symposium on Static Analysis (SAS 2013).
Conference: SAS - Static Analysis Symposium

Majumdar, Rupak and Saha, Indranil and Ueda, Koichi and Yazarel, Hakan
(2013) Compositional Equivalence Checking for Models and Code of Control Systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC - IEEE Conference on Decision and Control

Majumdar, Rupak and Wang, Zilong
(2013) Expand, Enlarge, and Check for Branching Vector Addition Systems.
In: Proc. of the 24th International Conference on Concurrency Theory (CONCUR 2013).
Conference: CONCUR - International Conference on Concurrency Theory

Mampaey, Michael and Vreeken, Jilles
(2013) Summarizing Categorical Data by Clustering Attributes.
Data Mining and Knowledge Discovery, 26 (1). pp. 130-173.

Mikeev, Linar and Neuhäußer, Martin R. and Spieler, David and Wolf, Verena
(2013) On-the-fly verification and optimization of DTA-properties for large Markov chains.
Formal Methods in System Design, 43 (2). pp. 313-337.

N

Nakashole, Ndapandula and Tylenda, Tomasz and Weikum, Gerhard
(2013) Fine-grained Semantic Typing of Emerging Entities.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL - Association of Computational Linguistics

Nakashole, Ndapandula and Weikum, Gerhard and Suchanek, Fabian M
(2013) Discovering semantic relations from the web and organizing them with PATTY.
ACM SIGMOD Record, 42 (2). pp. 29-34.

Nanevski, Aleksandar and Banerjee, Anindya and Garg, Deepak
(2013) Dependent Type Theory for Verification of Information Flow and Access Control Policies.
ACM Transactions on Programming Languages and Systems, 35 (2).

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Keller, Fabian and Böhm, Klemens
(2013) CMI: An Information-Theoretic Contrast Measure for Enhancing Subspace Cluster and Outlier Detection.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM - SIAM International Conference on Data Mining

P

Pishchulin, Leonid and Andriluka, Mykhaylo and Gehler, Peter and Schiele, Bernt
(2013) Strong Appearance and Expressive Spatial Models for Human Pose Estimation.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

R

Ramon, Jan and Miettinen, Pauli and Vreeken, Jilles
(2013) Detecting Bicliques in GF[q].
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD - European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

Rangapuram, Syama Sundar and Bühler, Thomas and Hein, Matthias
(2013) Towards realistic team formation in social networks based on densest subgraphs.
In: 22nd International World Wide Web Conference, WWW '13, Rio de Janeiro, Brazil, May 13-17, 2013.
Conference: WWW - International World Wide Web Conference

Richter, Stefan and Dittrich, Jens and Schuh, Stefan and Frey, Tobias
(2013) Mosquito: Another One Bites the Data Upload STream.
The Proceedings of the VLDB Endowment (PVLDB), 6 (12). pp. 1274-1277.

Richter, Stefan and Quiané-Ruiz, Jorge-Arnulfo and Schuh, Stefan and Dittrich, Jens
(2013) Towards Zero-Overhead Static and Adaptive Indexing in Hadoop.
VLDB Journal, 23 (3). pp. 469-494.

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Identity-Based Steganography and Its Applications to Censorship Resistance.
In: 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2013).
Conference: None | Not Set

Ruffing, Tim and Schneider, Jonas and Kate, Aniket
(2013) Poster: Identity-Based Steganography and Its Applications to Censorship Resistance.
In: Proceedings of the 20th ACM Conference on Computer and Communication Security (CCS '13).
Conference: CCS - ACM Conference on Computer and Communications Security

S

Schad, Jorg and Quiané-Ruiz, Jorge-Arnulfo and Dittrich, Jens
(2013) Elephant, Do Not Forget Everything! Efficient Processing of Growing Datasets.
In: Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing (CLOUD).
Conference: None | Not Set

Schuhknecht, Felix Martin and Jindal, Alekh and Dittrich, Jens
(2013) The Uncracked Pieces in Database Cracking.
The Proceedings of the VLDB Endowment (PVLDB), 7 (2). pp. 97-108.

Sevcík, Jaroslav and Vafeiadis, Viktor and Nardelli, Francesco Zappa and Jagannathan, Suresh and Sewell, Peter
(2013) CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
Journal of the ACM, 60 (3). p. 22.

T

Taneva, Bilyana and Weikum, Gerhard
(2013) Gem-based Entity-Knowledge Maintenance.
In: Proc. of the 22nd ACM International Conference on Information and Knowledge Management (CIKM'13).
Conference: CIKM - ACM International Conference on Information and Knowledge Management

Tang, Siyu and Andriluka, Mykhaylo and Milan, Anton and Schindler, Konrad and Roth, Stefan and Schiele, Bernt
(2013) Learning People Detectors for Tracking in Crowded Scenes.
In: IEEE International Conference on Computer Vision (ICCV).
Conference: ICCV - IEEE International Conference on Computer Vision

Tetali, Sai Deep and Lesani, Mohsen and Majumdar, Rupak and Millstein, Todd
(2013) MrCrypt: Static Analysis for Secure Cloud Computations.
In: Proc. of the 2013 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2013).
Conference: OOPSLA - ACM Conference on Object Oriented Programming Systems Languages and Applications

W

Webb, Geoffrey and Vreeken, Jilles
(2013) Efficient Discovery of the Most Interesting Associations.
Transactions on Knowledge Discovery from Data, 8 (3). pp. 1-31.

Wieder, Alexander and Brandenburg, Björn B.
(2013) Efficient partitioning of sporadic real-time tasks with shared resources and spin locks.
In: 8th IEEE International Symposium on Industrial Embedded Systems, SIES 2013, Porto, Portugal, June 19-21, 2013.
Conference: None | Not Set

Wieder, Alexander and Brandenburg, Björn B.
(2013) On Spin Locks in AUTOSAR: Blocking Analysis of FIFO, Unordered, and Priority-Ordered Spin Locks.
In: Proceedings of the IEEE 34th Real-Time Systems Symposium, RTSS 2013, Vancouver, BC, Canada, December 3-6, 2013.
Conference: RTSS - Real Time Systems Symposium

Y

Yosef, Mohamed Amir and Bauer, Sandro and Hoffart, Johannes and Spaniol, Marc and Weikum, Gerhard
(2013) HYENA-live: Fine-Grained Online Entity Type Classification from Natural-language Text.
In: Proc. of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-51).
Conference: ACL - Association of Computational Linguistics

Young, Maxwell and Kate, Aniket and Goldberg, Ian and Karsten, Martin
(2013) Towards Practical Communication in Byzantine-Resistant DHTs.
Networking, IEEE/ACM Transactions on, 21 (1). pp. 190-203.

Z

Zamani, Majid and Esfahani, Peyman Mohajerin and Majumdar, Rupak and Abate, Alessandro and Lygeros, John
(2013) Bisimilar finite abstractions of stochastic control systems.
In: Proc. of the 52nd IEEE Conference on Decision and Control (CDC 2013).
Conference: CDC - IEEE Conference on Decision and Control

Zengin, Mustafa and Vafeiadis, Viktor
(2013) A Programming Language Approach to Fault Tolerance for Fork-Join Parallelism.
In: Seventh International Symposium on Theoretical Aspects of Software Engineering, TASE 2013, 1-3 July 2013, Birmingham, UK.
Conference: None | Not Set

Zhao, Mingchen and Aditya, Paarijaat and Chen, Ang and Lin, Yin and Haeberlen, Andreas and Druschel, Peter and Maggs, Bruce and Wishon, Bill and Ponec, Miroslav
(2013) Peer-assisted Content Distribution in Akamai Netsession.
In: Proc. of the 2013 Internet Measurement Conference (IMC'13).
Conference: IMC - Internet Measurement Conference

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2013) Mtac: a monad for typed tactic programming in Coq.
In: Proc of the 18th ACM SIGPLAN International Conference on Functional Programming (ICFP '13).
Conference: ICFP - International Conference on Functional Programming

This list was generated on Tue Jul 23 00:02:25 2019 CEST.