Number of items: 68.
A
Abiteboul, Serge and Dong, Xin Luna and Etzioni, Oren and Srivastava, Divesh and Weikum, Gerhard and Stoyanovich, Julia and Suchanek, Fabian M
(2015)
The elephant in the room: getting value from Big Data.
Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015)
A generic and compositional framework for multicore response time analysis.
Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015)
Reliable Recon in Adversarial Peer-to-Peer Botnets.
B
Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015)
Quantifying Information Overload in Social Media and its Impact on Social Contagions.
Bhatotia, Pramod and Fonseca, Pedro and Acar, Umut A. and Brandenburg, Björn B. and Rodrigues, Rodrigo
(2015)
iThreads: A Threading Library for Parallel Incremental Computation.
Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015)
Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5).
pp. 1-23.
Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
Budhathoki, Kailash and Vreeken, Jilles
(2015)
The Difference and the Norm — Characterising Similarities and Differences between Databases.
C
Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015)
Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015)
Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5).
pp. 639-652.
Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015)
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015)
The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
D
Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015)
System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).
Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Quantifying Conformance Using the Skorokhod Metric.
Dimitrova, Rayna and Majumdar, Rupak
(2015)
Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015)
Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221.
pp. 73-114.
Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015)
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1).
4:1-4:32.
Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015)
Model Checking Parameterized Asynchronous Shared-Memory Systems.
F
Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015)
COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015)
Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger
(2015)
Adam: Causality-Based Synthesis of Distributed Systems.
Finkbeiner, Bernd and Rabe, Markus N. and Sanchez, Cesar
(2015)
Algorithms for Model Checking HyperLTL and HyperCTL ^*.
G
Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015)
Refinement Types for Incremental Computational Complexity.
Gavran, Ivan and Niksic, Filip and Kanade, Aditya and Majumdar, Rupak and Vafeiadis, Viktor
(2015)
Rely/Guarantee Reasoning for Asynchronous Programs.
Gnad, Daniel and Hoffmann, Jörg
(2015)
Red-Black Planning: A New Tractability Analysis and Heuristic Function.
Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015)
On the Reliability of Profile Matching Across Large Online Social Networks.
Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015)
The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015)
Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
Gujarati, Arpan and Brandenburg, Björn B.
(2015)
When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems.
H
Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015)
Verifiably Encrypted Signatures: Security Revisited and a New Construction.
Hemed, Nir and Rinetzky, Noam and Vafeiadis, Viktor
(2015)
Modular Verification of Concurrency-Aware Linearizability.
Hoffart, Johannes and Preda, Nicoleta and Suchanek, Fabian M and Weikum, Gerhard
(2015)
Knowledge Bases for Web Content Analytics.
Hoffmann, Jörg
(2015)
Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
J
Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015)
Efficient Output Kernel Learning for Multiple Tasks.
Jung, Ralf and Swasey, David and Sieczkowski, Filip and Svendsen, Kasper and Turon, Aaron and Birkedal, Lars and Dreyer, Derek
(2015)
Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning.
K
Kang, Jeehoon and Hur, Chung-Kil and Mansky, William and Garbuzov, Dmitri and Zdancewic, Steve and Vafeiadis, Viktor
(2015)
A formal C memory model supporting integer-pointer casts.
Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015)
Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015)
Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015)
Classifier based graph construction for video segmentation.
Kloos, Johannes and Majumdar, Rupak and Vafeiadis, Viktor
(2015)
Asynchronous Liquid Separation Types.
Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015)
Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3).
pp. 183-202.
Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Characterizing Information Diets of Social Media Users.
Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015)
Going Wild: Large-Scale Classification of Open DNS Resolvers.
M
Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015)
Privacy and Access Control for Outsourced Personal Records.
Majumdar, Rupak and Prabhu, Vinayak S.
(2015)
Computing the Skorokhod distance between polygonal traces.
Majumdar, Rupak and Wang, Zilong
(2015)
Bbs: A Phase-Bounded Model Checker for Asynchronous Programs.
Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015)
Guardat: enforcing data policies at the storage layer.
Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015)
Privacy Preserving Payments in Credit Networks.
N
Neis, Georg and Hur, Chung-Kil and Kaiser, Jan-Oliver and McLaughlin, Craig and Dreyer, Derek and Vafeiadis, Viktor
(2015)
Pilsner: a compositionally verified compiler for a higher-order imperative language.
Nguyen, Hoang-Vu and Vreeken, Jilles
(2015)
Non-Parametric Jensen-Shannon Divergence.
P
Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015)
IoTPOT: Analysing the Rise of IoT Compromises.
Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015)
Cross-Architecture Bug Search in Binary Executables.
Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015)
Learning How to Prevent Return-Oriented Programming Efficiently.
Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015)
AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
R
Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015)
A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3).
pp. 96-107.
S
Saha, Indranil and Baruah, Sanjoy and Majumdar, Rupak
(2015)
Dynamic scheduling for networked control systems.
Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015)
A Linear First-Order Functional Intermediate Language for Verified Compilers.
Schröder, Dominique and Döttling, Nico
(2015)
Efficient Pseudorandom Functions via On-the-Fly Adaptation.
Schröder, Dominique and Simkin, Mark
(2015)
VeriStream - A Framework for Verifiable Data Streaming.
Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015)
Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
T
Tassarotti, Joseph and Dreyer, Derek and Vafeiadis, Viktor
(2015)
Verifying read-copy-update in a logic for weak memory.
V
Verbeek, Freek and Havle, Oto and Schmaltz, Julien and Tverdyshev, Sergey and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Wolff, Burkhart and Nemouchi, Yakoub
(2015)
Formal API Specification of the PikeOS Separation Kernel.
Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015)
Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Vreeken, Jilles
(2015)
Causal Inference by Direction of Information.
Y
Yang, Maolin and Wieder, Alexander and Brandenburg, Björn B.
(2015)
Global Real-Time Semaphore Protocols: A Survey, Unified Analysis, and Comparison.
Z
Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015)
Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3).
12:1-12:33.
Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2015)
Mtac: A monad for typed tactic programming in Coq.
J. Funct. Program., 25.
Zimek, Arthur and Vreeken, Jilles
(2015)
The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1).
pp. 121-155.
This list was generated on Thu Nov 21 13:04:20 2024 CET.