Number of items: 101.
A
Abel, Andreas and Reineke, Jan
(2014)
Reverse engineering of cache replacement policies in Intel microprocessors and their evaluation.
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave New World: Privacy Risks for Mobile Users.
Mobile Computing and Communications Review, 18 (3).
pp. 49-54.
Aditya, Paarijaat and Bhattacharjee, Bobby and Druschel, Peter and Erdelyi, Viktor and Lentz, Matthew
(2014)
Brave new world: privacy risks for mobile users.
Aditya, Paarijaat and Erdelyi, Viktor and Lentz, Matthew and Shi, Elaine and Bhattacharjee, Bobby and Druschel, Peter
(2014)
EnCore: Private, Context-based Communication for Mobile Social Apps.
Alvarez, Victor and Schuhknecht, Felix Martin and Dittrich, Jens and Richter, Stefan
(2014)
Main Memory Adaptive Indexing for Multi-core Systems.
Alvin, Christopher and Gulwani, Sumit and Mukhopadhyay, Supratik and Majumdar, Rupak
(2014)
Synthesis of Geometry Proof Problems.
Areces, Carlos and Bustos, Facundo and Dominguez, Martín Ariel and Hoffmann, Jörg
(2014)
Optimizing Planning Domains by Automatic Action Schema Splitting.
Asghar, Muhammad Rizwan and Gehani, Ashish and Crispo, Bruno and Russello, Giovanni
(2014)
PIDGIN: Privacy-preserving Interest and Content Sharing in Opportunistic Networks.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Interaction Model to Predict Subjective-Specificity of Search Results.
Athukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Supporting Exploratory Search Through User Modelling.
Atukorala, Kumaripaba and Oulasvirta, Antti and Glowacka, Dorata and Vreeken, Jilles and Jaccuci, Giulio
(2014)
Narrow or Broad? Estimating Subjective Specificity in Exploratory Search.
Axer, Philip and Ernst, Rolf and Falk, Heiko and Girault, Alain and Grund, Daniel and Guan, Nan and Jonsson, Bengt and Marwedel, Peter and Reineke, Jan and Rochange, Christine and Sebastian, Maurice and Hanxleden, Reinhard von and Wilhelm, Reinhard and Yi, Wang
(2014)
Building timing predictable embedded systems.
ACM Transactions on Embedded Computing Systems, 13 (4).
p. 82.
B
Backes, Michael and Hriţcu, Cătălin and Maffei, Matteo
(2014)
Union, intersection and refinement types and reasoning about type disjointness for secure protocol implementations.
Journal of Computer Security, 22 (2).
pp. 301-353.
Bhattacharya, Parantapa and Ghosh, Saptarshi and Kulshrestha, Juhi and Mondal, Mainack and Zafar, Muhammad Bilal and Ganguly, Niloy and Gummadi, Krishna P.
(2014)
Deep Twitter diving: exploring topical groups in microblogs at scale.
Bhattacharya, Parantapa and Zafar, Muhammad Bilal and Ganguly, Niloy and Ghosh, Saptarshi and Gummadi, Krishna P.
(2014)
Inferring user interests in the Twitter social network.
Bichhawat, Abhishek
(2014)
Exception Handling for Dynamic Information Flow Control.
Biega, Joanna Asia and Mele, Ida and Weikum, Gerhard
(2014)
Probabilistic Prediction of Privacy Risks in User Search Histories.
Blond, Stevens Le and Uritesc, Adina and Gilbert, Cedric and Chua, Zheng Leong and Saxena, Prateek and Kirda, Engin
(2014)
A Look at Targeted Attacks Through the Lense of an NGO.
Brandenburg, Björn B.
(2014)
Blocking Optimality in Distributed Real-Time Locking Protocols.
LITES, 1 (2).
01: 1-01: 22.
Brandenburg, Björn B.
(2014)
The FMLP+: An Asymptotically Optimal Real-Time Locking Protocol for Suspension-Aware Analysis.
Brandenburg, Björn B.
(2014)
A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-Criticality Systems.
Bulling, Andreas and Blanke, Ulf and Schiele, Bernt
(2014)
A Tutorial on Human Activity Recognition Using Body-worn Inertial Sensors.
ACM Computing Surveys, 46 (3).
pp. 1-33.
Böhmer, Matthias and Krüger, Antonio
(2014)
A Case Study of Research through the App Store: Leveraging the System UI as a Playing Field for Improving the Design of Smartphone Launchers.
International Journal of Mobile Human Computer Interaction (IJMHCI), 6 (2).
pp. 32-45.
Böhmer, Matthias and Lander, Christian and Gehring, Sven and Burmby, Duncon P and Krüger, Antonio
(2014)
Interrupted by a phone call: exploring designs for lowering the impact of call notifications for smartphone users.
C
Cerqueira, Felipe and Gujarati, Arpan and Brandenburg, Björn B.
(2014)
Linux's Processor Affinity API, Refined: Shifting Real-Time Tasks Towards Higher Schedulability.
Cerqueira, Felipe and Vanga, Manohar and Brandenburg, Björn B.
(2014)
Scaling global scheduling with message passing.
Chatterjee, Krishnendu and Ibsen-Jensen, Rasmus and Majumdar, Rupak
(2014)
Edit Distance for Timed Automata.
Chau, Duen Horng and Vreeken, Jilles and Matthijs, van Leeuwen and Faloutsos, Christos
(2014)
Proceedings of the ACM SIGKDD Workshop on Interactive Data Exploration and Analytics (IDEA).
UNSPECIFIED, pp. 1-130.
Chistikov, Dmitry and Majumdar, Rupak
(2014)
Unary Pushdown Automata and Straight-Line Programs.
Chowdhury, Omar and Jia, Limin and Garg, Deepak and Datta, Anupam
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Clarkson, Michael R. and Finkbeiner, Bernd and Koleini, Masoud and Micinski, Kristopher K. and Rabe, Markus N. and Sanchez, Cesar
(2014)
Temporal Logics for Hyperproperties.
Corro, Luciano Del and Gemulla, Rainer and Weikum, Gerhard
(2014)
Werdy: Recognition and Disambiguation of Verbs and Verb Phrases with Syntactic and Semantic Pruning.
D
Daiber, Florian and Speicher, Marco and Gehring, Sven and Löchtefeld, Markus and Krüger, Antonio
(2014)
Interacting with 3D Content on Stereoscopic Displays.
Damm, Werner and Finkbeiner, Bernd
(2014)
Automatic Compositional Synthesis of Distributed Systems.
Datta, Anupam and Garg, Deepak and Jia, Limin and Chowdhury, Omar
(2014)
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Dimitrova, Rayna and Majumdar, Rupak
(2014)
Deductive control synthesis for alternating-time logics.
Dmitrienko, Alexandra and Liebchen, Christopher and Rossow, Christian and Sadeghi, Ahmad-Reza
(2014)
On the (In)Security of Mobile Two-Factor Authentication.
E
Ernst, Patrick and Meng, Cynthia and Siu, Amy and Weikum, Gerhard
(2014)
KnowLife: a Knowledge Graph for Health and Life Sciences.
Esmaeilsabzali, Shahram and Majumdar, Rupak and Wies, Thomas and Zufferey, Damien
(2014)
Dynamic package interfaces.
Esparza, Javier and Ledesma-Garza, Ruslán and Majumdar, Rupak and Meyer, Philipp J. and Niksic, Filip
(2014)
An SMT-based Approach to Coverability Analysis.
F
Fawcett, Chris and Vallati, Mauro and Hutter, Frank and Hoffmann, Jörg and Hoos, Holger H. and Leyton-Brown, Kevin
(2014)
Improved Features for Runtime Prediction of Domain-Independent Planners.
Faymonville, Peter and Finkbeiner, Bernd and Peled, Doron
(2014)
Monitoring Parametric Temporal Logic.
Finkbeiner, Bernd and Olderog, Ernst-Rüdiger
(2014)
Petri Games: Synthesis of Distributed Systems with Causal Memory.
Finkbeiner, Bernd and Tentrup, Leander
(2014)
Detecting Unrealizable Specifications of Distributed Systems.
Finkbeiner, Bernd and Tentrup, Leander
(2014)
Fast DQBF refutation.
Finkbeiner, Bernd and Torfah, Hazem
(2014)
Counting Models of Linear-Time Temporal Logic.
Fonseca, Pedro and Rodrigues, Rodrigo and Brandenburg, Björn B.
(2014)
SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration.
G
Gligoric, Milos and Majumdar, Rupak and Sharma, Rohan and Eloussi, Lamyaa and Marinov, Darko
(2014)
Regression Test Selection for Distributed Software Histories.
Gomez-Rodriguez, Manuel and Gummadi, Krishna P. and Schölkopf, Bernhard
(2014)
Quantifying Information Overload in Social Media and Its Impact on Social Contagions.
H
Hoffart, Johannes and Altun, Yasemin and Weikum, Gerhard
(2014)
Discovering Emerging Entities with Ambiguous Names.
Hoffart, Johannes and Milchevski, Dragan and Weikum, Gerhard
(2014)
AESTHETICS: Analytics with Strings, Things, and Cats.
Hüchting, Reiner and Majumdar, Rupak and Meyer, Roland
(2014)
Bounds on mobility.
I
Ibrahim, Yusra and Yosef, Mohamed Amir and Weikum, Gerhard
(2014)
AIDA-Social: Entity Linking on the Social Stream.
K
Kampmann, Alexander and Galeotti, Juan Pablo and Zeller, Andreas
(2014)
JTACO: Test Execution for Faster Bounded Verification.
Karuppayah, Shankar and Fischer, Mathias and Rossow, Christian and Mühlhäuser, Max
(2014)
On Advanced Monitoring in Resilient and Unstructured P2P Botnets.
Kerber, Frederic and Krüger, Antonio and Löchtefeld, Markus
(2014)
Investigating the effectiveness of peephole interaction for smartwatches in a map navigation task.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2014)
VoG: Summarizing and Understanding Large Graphs.
Kovalev, Mikhail and Müller, Silvia M. and Paul, Wolfgang J.
(2014)
A Pipelined Multi-core MIPS Machine -- Hardware Implementation and Correctness Proof.
UNSPECIFIED.
Krajnanský, Michal and Hoffmann, Jörg and Buffet, Olivier and Fern, Alan
(2014)
Learning Pruning Rules for Heuristic Search Planning.
Kupriyanov, Andrey and Finkbeiner, Bernd
(2014)
Causal Termination of Multi-threaded Programs.
Kuzey, Erdal and Vreeken, Jilles and Weikum, Gerhard
(2014)
A Fresh Look on Knowledge Bases: Distilling Named Events from News.
Kührer, Marc and Hupperich, Thomas and Rossow, Christian and Holz, Thorsten
(2014)
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks.
Kührer, Marc and Rossow, Christian and Holz, Thorsten
(2014)
Paint it Black: Evaluating the Effectiveness of Malware Blacklists.
L
Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2014)
Learning using privileged information: SV M+ and weighted SVM.
Neural Networks, 53.
pp. 95-108.
Lapin, Maksim and Schiele, Bernt and Hein, Matthias
(2014)
Scalable Multitask Representation Learning for Scene Classification.
Lentz, Matthew and Erdelyi, Viktor and Aditya, Paarijaat and Shi, Elaine and Druschel, Peter and Bhattacharjee, Bobby
(2014)
SDDR: Light-Weight, Secure Mobile Encounters.
Li, Cheng and Leitão, João and Clement, Allen and Preguiça, Nuno M. and Rodrigues, Rodrigo and Vafeiadis, Viktor
(2014)
Automating the Choice of Consistency Levels in Replicated Systems.
M
Maiya, Pallavi and Kanade, Aditya and Majumdar, Rupak
(2014)
Race Detection for Android Applications.
Majumdar, Rupak and Tetali, Sai Deep and Wang, Zilong
(2014)
Kuai: A model checker for software-defined networks.
Miettinen, Pauli and Vreeken, Jilles
(2014)
MDL4BMF : Minimum Description Length for Boolean Matrix Factorization.
Transactions on Knowledge Discovery from Data, 8 (4).
pp. 1-31.
Mondal, Mainack and Druschel, Peter and Gummadi, Krishna P. and Mislove, Alan
(2014)
Beyond Access Control: Managing Online Privacy via Exposure.
Mondal, Mainack and Liu, Yabing and Viswanath, Bimal and Gummadi, Krishna P. and Mislove, Alan
(2014)
Understanding and Specifying Social Access Control Lists.
Mukherjee, Subhabrata and Weikum, Gerhard and Danescu-Niculescu-Mizil, Cristian
(2014)
People on Drugs: Credibility of User Statements in Health Communities.
N
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Böhm, Klemens
(2014)
Multivariate Maximal Correlation Analysis.
Nguyen, Hoang-Vu and Müller, Emmanuel and Vreeken, Jilles and Klemens, Böhm
(2014)
Unsupervised Interaction-Preserving Discretization of Multivariate Data.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1366-1397.
Noschinski, Lars and Rizkallah, Christine and Mehlhorn, Kurt
(2014)
Verification of Certifying Computations through AutoCorres and Simpl.
O
Oh, Se Eun and Chun, Ji Young and Jia, Limin and Garg, Deepak and Gunter, Carl A. and Datta, Anupam
(2014)
Privacy-preserving audit for broker-based health information exchange.
P
Pecina, Kim and Mohammadi, Esfandiar and Pöpper, Christina
(2014)
Zero-Communication Seed Establishment for Anti-Jamming Techniques.
Pewny, Jannik and Schuster, Felix and Bernhard, Lukas and Holz, Thorsten and Rossow, Christian
(2014)
Leveraging semantic signatures for bug search in binary programs.
Prakash, B. Aditya and Vreeken, Jilles and Faloutsos, Christos
(2014)
Efficiently Spotting the Starting Points of an Epidemic in a Large Graph.
Knowledge and Information Systems, 38 (1).
pp. 35-59.
R
Reineke, Jan and Doerfert, Johannes
(2014)
Architecture-parametric timing analysis.
Reineke, Jan and Maksoud, Mohamed Abdel
(2014)
A Compiler Optimization to Increase the Efficiency of WCET Analysis.
Reineke, Jan and Tripakis, Stavros
(2014)
Basic Problems in Multi-View Modeling.
Reznichenko, Alexey and Francis, Paul
(2014)
Private-by-Design Advertising Meets the Real World.
Rossberg, Andreas and Russo, Claudio V and Dreyer, Derek
(2014)
F-ing modules.
J. Funct. Program., 24 (5).
pp. 529-607.
Rossow, Christian
(2014)
Amplification Hell: Revisiting Network Protocols for DDoS Abuse.
S
Simkin, Mark and Schröder, Dominique and Bulling, Andreas and Fritz, Mario
(2014)
Ubic: Bridging the Gap between Digital Cryptography and the Physical World.
Snelting, Gregor and Giffhorn, Dennis and Graf, Jürgen and Hammer, Christian and Hecker, Martin and Mohr, Martin and Wasserrab, Daniel
(2014)
Checking probabilistic noninterference using JOANA.
it - Information Technology, 56 (6).
pp. 280-287.
Spliet, Roy and Vanga, Manohar and Brandenburg, Björn B. and Dziadek, Sven
(2014)
Fast on Average, Predictable in the Worst Case: Exploring Real-Time Futexes in LITMUSRT.
Suchanek, Fabian M and Weikum, Gerhard
(2014)
Knowledge Bases in the Age of Big Data Analytics.
PVLDB, 7 (13).
pp. 1713-1714.
T
Tandon, Niket and de, Gerard Melo and Suchanek, Fabian M and Weikum, Gerhard
(2014)
WebChild: harvesting and organizing commonsense knowledge from the web.
Tang, Siyu and Andriluka, Mykhaylo and Schiele, Bernt
(2014)
Detection and Tracking of Occluded People.
International Journal of Computer Vision (IJCV), 110 (1).
pp. 58-69.
Turon, Aaron and Vafeiadis, Viktor and Dreyer, Derek
(2014)
GPS: navigating weak memory with ghosts, protocols, and separation.
V
Verbeek, Freek and Tverdyshev, Sergey and Havle, Oto and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Nemouchi, Yakoub and Feliachi, Abderrahmane and Wolff, Burkhart and Schmaltz, Julien
(2014)
Formal Specification of a Generic Separation Kernel.
Archive of Formal Proofs, 2014.
Viswanath, Bimal and Bashir, Ahmad M and Crovella, Mark and Guha, Saikat and Gummadi, Krishna P. and Krishnamurthy, Balachander and Mislove, Alan
(2014)
Towards Detecting Anomalous User Behavior in Online Social Networks.
W
Welzel, Arne and Rossow, Christian and Bos, Herbert
(2014)
On Measuring the Impact of DDoS Botnets.
Wieder, Alexander and Brandenburg, Björn B.
(2014)
On the Complexity of Worst-Case Blocking Analysis of Nested Critical Sections.
Winkler, Christian and Löchtefeld, Markus and Dobbelstein, David and Krüger, Antonio and Rukzio, Enrico
(2014)
SurfacePhone: A Mobile Projection Device for Single- and Multiuser Everywhere Tabletop Interaction.
Wu, Hao and Vreeken, Jilles and Tatti, Nikolaj and Ramakrishnan, Naren
(2014)
Uncovering the Plot: Detecting Surprising Coalitions of Entities in Multi-Relational Schemas.
Data Mining and Knowledge Discovery, 28 (5).
pp. 1398-1428.
Wuhrer, Stefanie and Pishchulin, Leonid and Brunton, Alan and Shu, Chang and Lang, Jochen
(2014)
Estimation of Human Body Shape and Posture Under Clothing.
Computer Vision and Image Understanding, 127.
pp. 31-42.
Z
Zimek, Arthur and Assent, Ira and Vreeken, Jilles
(2014)
Frequent Pattern Mining.
Springer.
This list was generated on Thu Nov 21 12:45:30 2024 CET.