Items where Division is "Unspecified" and Year is 2014

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | E | F | G | H | I | K | L | M | N | O | P | R | S | T | V | W | Z
Number of items: 101.

A

Abel, Andreas and Reineke, Jan
(2014) Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
In: 2014 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2014, Monterey, CA, USA, March 23-25, 2014.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3). pp. 49-54.

Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014) Brave new world: privacy risks for mobile users.
In: Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, SPME@MobiCom 2014, Maui, Hawaii, USA, September 11, 2014.

Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014) EnCore: Private, Context-based Communication for Mobile Social Apps.
In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services.

Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014) Main Memory Adaptive Indexing for Multi-core Systems.
In: Proceedings of the 10th International Workshop on Data Management on New Hardware (DaMoN).

Alvin, Christopher and Gulwani, Sumit and Mukhopadhyay, Supratik and Majumdar, Rupak
(2014) Synthesis of Geometry Proof Problems.
In: Proc. of the 28th Conference of Artificial Intelligence (AAAI 2014).
Conference: AAAI National Conference of the American Association for Artificial Intelligence

Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014) Optimizing Planning Domains by Automatic Action Schema Splitting.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014) PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security.

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Interaction Model to Predict Subjective-Specificity of Search Results.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Supporting Exploratory Search Through User Modelling.
In: Posters, Demos, Late-Breaking Results and Workshop Proceedings of the 22nd Conference on User Modelling, Adaptation, and Personalization (UMAP).

Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014) Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
In: Proceedings of ACM Conference on Information and Knowledge Management (CIKM).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Axer, Philip and Ernst, Rolf and Falk, Heiko and Girault, Alain and Grund, Daniel and Guan, Nan and Jonsson, Bengt and Marwedel, Peter and Reineke, Jan and Rochange, Christine and Sebastian, Maurice and Hanxleden, Reinhard von and Wilhelm, Reinhard and Yi, Wang
(2014) Building timing predictable embedded systems.
ACM Transactions on Embedded Computing Systems, 13 (4). p. 82.

B

Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014) Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2). pp. 301-353.

Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014) Deep Twitter diving: exploring topical groups in microblogs at scale.
In: Proc. of the Computer Supported Cooperative Work (CSCW '14).
Conference: CSCW ACM Conference on Computer Supported Cooperative Work

Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014) Inferring user interests in the Twitter social network.
In: Proc. of the 8th ACM Conference on Recommender Systems (RecSys '14).

Bichhawat, Abhishek
(2014) Exception Handling for Dynamic Information Flow Control.
In: Companion Proceedings of the 36th International Conference on Software Engineering (Student Research Competition).

Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014) Probabilistic Prediction of Privacy Risks in User Search Histories.
In: Proceedings of the First International Workshop on Privacy and Secuirty of Big Data (PSBD@CIKM '14).

Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014) A Look at Targeted Attacks Through the Lense of an NGO.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Brandenburg, Björn B.
(2014) Blocking Optimality in Distributed Real-Time Locking Protocols.
LITES, 1 (2). 01: 1-01: 22.

Brandenburg, Björn B.
(2014) The FMLP+: An Asymptotically Optimal Real-Time Locking Protocol for Suspension-Aware Analysis.
In: 26th Euromicro Conference on Real-Time Systems, ECRTS 2014, Madrid, Spain, July 8-11, 2014.
Conference: ECRTS Euromicro Conference on Real-Time Systems

Brandenburg, Björn B.
(2014) A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014) A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3). pp. 1-33.

Böhmer, Matthias and Krüger, Antonio
(2014) A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2). pp. 32-45.

Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014) Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
In: Proceedings of the ACM SIGCHI International Conference on Human Factors in Computing Systems (CHI).
Conference: CHI International Conference on Human Factors in Computing Systems

C

Cerqueira, Felipe and Gujarati, Arpan and Brandenburg, Björn B.
(2014) Linux's Processor Affinity API, Refined: Shifting Real-Time Tasks Towards Higher Schedulability.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Cerqueira, Felipe and Vanga, Manohar and Brandenburg, Björn B.
(2014) Scaling global scheduling with message passing.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2014).
Conference: RTAS IEEE Real-Time and Embedded Technology and Applications Symposium

Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Majumdar, Rupak
(2014) Edit Distance for Timed Automata.
In: Proc. of the 17th International Conference on Hybrid Systems: Computation and Control (HSCC 2014).

Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014) Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.

Chistikov, Dmitry and Majumdar, Rupak
(2014) Unary Pushdown Automata and Straight-Line Programs.
In: Proc. of the 41st International Colloquium on Automata, Languages and Programming (ICALP 2014).
Conference: ICALP International Colloquium on Automata Languages and Programming

Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proc. 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sanchez, Cesar
(2014) Temporal Logics for Hyperproperties.
In: Proc. of the 3rd Conference on Principles of Security and Trust (POST 2014).

Corro, Luciano Del and Gemulla, Rainer and Weikum, Gerhard
(2014) Werdy: Recognition and Disambiguation of Verbs and Verb Phrases with Syntactic and Semantic Pruning.
In: Proc. of the 2014 Conference on Empirical Methods in Natural Language Processing (EMNLP 2014).
Conference: EMNLP Empirical Methods in Natural Language Processing

D

Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014) Interacting with 3D Content on Stereoscopic Displays.
In: Proceedings of the International Symposium on Pervasive Displays (PerDis).

Damm, Werner and Finkbeiner, Bernd
(2014) Automatic Compositional Synthesis of Distributed Systems.
In: Proceedings of the 19th International Symposium on Formal Methods (FM'14).

Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014) Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
In: Proceedings of the 27th IEEE Computer Security Foundations Symposium (CSF '14).
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Dimitrova, Rayna and Majumdar, Rupak
(2014) Deductive control synthesis for alternating-time logics.
In: Proc. of the International Conference on Embedded Software (EMSOFT 2014).
Conference: EMSOFT ACM Conference on Embedded Software

Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014) On the (In)Security of Mobile Two-Factor Authentication.
In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers.

E

Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014) KnowLife: a Knowledge Graph for Health and Life Sciences.
In: Proc. of the 30th IEEE International Conference on Data Engineering (ICDE'14).
Conference: ICDE International Conference on Data Engineering

Esmaeilsabzali, Shahram and Majumdar, Rupak and Wies, Thomas and Zufferey, Damien
(2014) Dynamic package interfaces.
In: Proc. of the 17th International Conference on Fundamental Approaches to Software Engineering (FASE 2014).

Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014) An SMT-based Approach to Coverability Analysis.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

F

Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014) Improved Features for Runtime Prediction of Domain-Independent Planners.
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2014).
Conference: ICAPS International Conference on Automated Planning and Scheduling

Faymonville, Peter and Finkbeiner, Bernd and Peled, Doron
(2014) Monitoring Parametric Temporal Logic.
In: Proceedings of the 15th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'14).

Finkbeiner, Bernd and Olderog, Ernst-Rüdiger
(2014) Petri Games: Synthesis of Distributed Systems with Causal Memory.
In: Proceedings of Fifth International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2014).

Finkbeiner, Bernd and Tentrup, Leander
(2014) Detecting Unrealizable Specifications of Distributed Systems.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Finkbeiner, Bernd and Tentrup, Leander
(2014) Fast DQBF refutation.
In: Theory and Applications of Satisfiability Testing (SAT 2014).
Conference: SAT International Conference on Theory and Applications of Satisfiability Testing

Finkbeiner, Bernd and Torfah, Hazem
(2014) Counting Models of Linear-Time Temporal Logic.
In: 8th International Conference on Language and Automata Theory and Applications (LATA 2014).

Fonseca, Pedro and Rodrigues, Rodrigo and Brandenburg, Björn B.
(2014) SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration.
In: Proc. of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14).
Conference: OSDI Usenix Symposium on Operating Systems Design and Implementation

G

Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014) Regression Test Selection for Distributed Software Histories.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014) Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
In: Proceedings of the Eighth International Conference on Weblogs and Social Media, ICWSM 2014, Ann Arbor, Michigan, USA, June 1-4, 2014..

H

Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014) Discovering Emerging Entities with Ambiguous Names.
In: Proc. of the 23rd International Conference on World Wide Web (WWW 2014).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014) AESTHETICS: Analytics with Strings, Things, and Cats.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014) Bounds on mobility.
In: Proc. of the 25th International Conference on Concurrency Theory (CONCUR 2014).
Conference: CONCUR International Conference on Concurrency Theory

I

Ibrahim, Yusra and Yosef, Mohamed Amir and Weikum, Gerhard
(2014) AIDA-Social: Entity Linking on the Social Stream.
In: Proc. of the 7th International Workshop on Exploiting Semantic Annotations in Information Retrieval (ESAIR 2014).

K

Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014) JTACO: Test Execution for Faster Bounded Verification.
In: Proc. of the 8th International Conference on Tests and Proofs (TAP 2014).

Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014) On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
In: Proceedings of the 2014 IEEE International Conference on Communications (ICC 2014).

Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014) Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
In: Proceedings of the 16th International Conference on Human-Computer Interaction with Mobile Devices and Services (MobileHCI).

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014) VoG: Summarizing and Understanding Large Graphs.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Kovalev, Mikhail and Müller, Silvia M. and Paul, Wolfgang J.
(2014) A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof.
UNSPECIFIED.

Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014) Learning Pruning Rules for Heuristic Search Planning.
In: Proc. of the 21st European Conference on Artificial Intelligence (ECAI 2014).
Conference: ECAI European Conference on Artificial Intelligence

Kupriyanov, Andrey and Finkbeiner, Bernd
(2014) Causal Termination of Multi-threaded Programs.
In: Proc. of the 26th International Conference on Computer Aided Verification (CAV 2014).
Conference: CAV Computer Aided Verification

Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014) A Fresh Look on Knowledge Bases: Distilling Named Events from News.
In: Proc. of the 23rd ACM International Conference on Information and Knowledge Management (CIKM'14).
Conference: CIKM ACM International Conference on Information and Knowledge Management

Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014) Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014) Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
In: Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses.

L

Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014) Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53. pp. 95-108.

Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014) Scalable Multitask Representation Learning for Scene Classification.
In: 2014 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2014, Columbus, OH, USA, June 23-28, 2014.
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014) SDDR: Light-Weight, Secure Mobile Encounters.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

Li, Cheng and Leitão, João and Clement, Allen and Preguiça, Nuno M. and Rodrigues, Rodrigo and Vafeiadis, Viktor
(2014) Automating the Choice of Consistency Levels in Replicated Systems.
In: 2014 USENIX Annual Technical Conference, USENIX ATC '14, Philadelphia, PA, USA, June 19-20, 2014..

M

Maiya, Pallavi and Kanade, Aditya and Majumdar, Rupak
(2014) Race Detection for Android Applications.
In: Proc. of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Majumdar, Rupak and Tetali, Sai Deep and Wang, Zilong
(2014) Kuai: A model checker for software-defined networks.
In: Proc. of Formal Methods in Computer-Aided Design (FMCAD 2014).

Miettinen, Pauli and Vreeken, Jilles
(2014) MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4). pp. 1-31.

Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014) Beyond Access Control: Managing Online Privacy via Exposure.
In: Proceedings of the Workshop on Useable Security (USEC'14).

Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014) Understanding and Specifying Social Access Control Lists.
In: Proceedings of the 10th Symposium on Usable Privacy and Security (SOUPS 2014).

Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014) People on Drugs: Credibility of User Statements in Health Communities.
In: Proc. of the 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'14).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

N

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014) Multivariate Maximal Correlation Analysis.
In: Proceedings of the International Conference on Machine Learning (ICML).
Conference: ICML International Conference on Machine Learning

Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014) Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5). pp. 1366-1397.

Noschinski, Lars and Rizkallah, Christine and Mehlhorn, Kurt
(2014) Verification of Certifying Computations through AutoCorres and Simpl.
In: Proc. 6th NASA Formal Methods Symposium (NFM 2014).

O

Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014) Privacy-preserving audit for broker-based health information exchange.
In: Proceedings of the 4th ACM conference on Data and application security and privacy (CODASPY'14).

P

Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014) Zero-Communication Seed Establishment for Anti-Jamming Techniques.
In: Proceedings of the NDSS Workshop on Security of Emerging Networking Technologies (SENT).
Conference: NDSS Network and Distributed System Security Symposium

Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014) Leveraging semantic signatures for bug search in binary programs.
In: Proc. of the 30th Annual Computer Security Applications Conference (ACSAC'14).
Conference: ACSAC Annual Computer Security Applications Conference

Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014) Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1). pp. 35-59.

R

Reineke, Jan and Doerfert, Johannes
(2014) Architecture-parametric timing analysis.
In: 20th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2014, Berlin, Germany, April 15-17, 2014.

Reineke, Jan and Maksoud, Mohamed Abdel
(2014) A Compiler Optimization to Increase the Efficiency of WCET Analysis.
In: 22nd International Conference on Real-Time Networks and Systems, RTNS '14, Versaille, France, October 8-10, 2014.

Reineke, Jan and Tripakis, Stavros
(2014) Basic Problems in Multi-View Modeling.
In: Proc. 20th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 14).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Reznichenko, Alexey and Francis, Paul
(2014) Private-by-Design Advertising Meets the Real World.
In: Proc. of the 20th ACM Conference on Computer and Communication Security (CCS 2014).
Conference: CCS ACM Conference on Computer and Communications Security

Rossberg, Andreas and Russo, Claudio V and Dreyer, Derek
(2014) F-ing modules.
J. Funct. Program., 24 (5). pp. 529-607.

Rossow, Christian
(2014) Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
In: Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS '14).
Conference: NDSS Network and Distributed System Security Symposium

S

Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014) Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
In: Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I.
Conference: ESORICS European Symposium On Research In Computer Security

Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014) Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6). pp. 280-287.

Spliet, Roy and Vanga, Manohar and Brandenburg, Björn B. and Dziadek, Sven
(2014) Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Suchanek, Fabian M and Weikum, Gerhard
(2014) Knowledge Bases in the Age of Big Data Analytics.
PVLDB, 7 (13). pp. 1713-1714.

T

Tandon, Niket and de, Gerard Melo and Suchanek, Fabian M and Weikum, Gerhard
(2014) WebChild: harvesting and organizing commonsense knowledge from the web.
In: Proc. of the 7th ACM International Conference on Web Search and Data Mining (WSDM'14).
Conference: WSDM ACM International Conference on Web Search and Data Mining

Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014) Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1). pp. 58-69.

Turon, Aaron and Vafeiadis, Viktor and Dreyer, Derek
(2014) GPS: navigating weak memory with ghosts, protocols, and separation.
In: Proc. of the 2014 ACM SIGPLAN International Conference on Object Oriented Programming Systems, Languages, and Applications (OOPSLA 2014).
Conference: OOPSLA ACM Conference on Object Oriented Programming Systems Languages and Applications

V

Verbeek, Freek and Tverdyshev, Sergey and Havle, Oto and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Nemouchi, Yakoub and Feliachi, Abderrahmane and Wolff, Burkhart and Schmaltz, Julien
(2014) Formal Specification of a Generic Separation Kernel.
Archive of Formal Proofs, 2014.

Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014) Towards Detecting Anomalous User Behavior in Online Social Networks.
In: Proceedings of the 23rd USENIX Security Symposium (USENIX '14).
Conference: USENIX-Security Usenix Security Symposium

W

Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014) On Measuring the Impact of DDoS Botnets.
In: Proceedings of the Seventh European Workshop on System Security (EuroSec '14).

Wieder, Alexander and Brandenburg, Björn B.
(2014) On the Complexity of Worst-Case Blocking Analysis of Nested Critical Sections.
In: Proceedings of the IEEE 35th Real-Time Systems Symposium (RTSS'14).
Conference: RTSS Real Time Systems Symposium

Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014) SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
In: Proceedings of the 32nd ACM CHI Conference on Human Factors in Computing Systems. ACM International Conference on Human Factors in Computing Systems (CHI-14), 32nd, April 26 - May 1, Toronto,, Ontario.
Conference: CHI International Conference on Human Factors in Computing Systems

Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014) Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5). pp. 1398-1428.

Wuhrer, Stefanie and Pishchulin, Leonid and Brunton, Alan and Shu, Chang and Lang, Jochen
(2014) Estimation of Human Body Shape and Posture Under Clothing.
Computer Vision and Image Understanding, 127. pp. 31-42.

Z

Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014) Frequent Pattern Mining.
Springer.

This list was generated on Thu Oct 10 21:23:30 2024 CEST.