Items where Division is "Unspecified" and Year is 2015

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Author(s)/Creator(s) | Item Type | No Grouping
Jump to: A | B | C | D | F | G | H | J | K | M | N | P | R | S | T | V | Y | Z
Number of items: 68.

A

Abiteboul, Serge and Dong, Xin Luna and Etzioni, Oren and Srivastava, Divesh and Weikum, Gerhard and Stoyanovich, Julia and Suchanek, Fabian M
(2015) The elephant in the room: getting value from Big Data.
In: Proceedings of the 18th International Workshop on Web and Databases (WebDB '15).

Altmeyer, Sebastian and Davis, Robert I. and Indrusiak, Leandro Soares and Maiza, Claire and Nélis, Vincent and Reineke, Jan
(2015) A generic and compositional framework for multicore response time analysis.
In: Proceedings of the 23rd International Conference on Real Time Networks and Systems, RTNS 2015, Lille, France, November 4-6, 2015.

Andriesse, Dennis and Rossow, Christian and Bos, Herbert
(2015) Reliable Recon in Adversarial Peer-to-Peer Botnets.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

B

Babaei, Mahmoudreza and Grabowicz, Przemyslaw A. and Valera, Isabel and Gomez-Rodriguez, Manuel
(2015) Quantifying Information Overload in Social Media and its Impact on Social Contagions.
In: ICWSM '15: Proceedings of the 9th International AAAI Conference on Weblogs and Social Media.

Bhatotia, Pramod and Fonseca, Pedro and Acar, Umut A. and Brandenburg, Björn B. and Rodrigues, Rodrigo
(2015) iThreads: A Threading Library for Parallel Incremental Computation.
In: Proc. of the 20th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '15).
Conference: ASPLOS Architectural Support for Programming Languages and Operating Systems

Birkedal, Lars and Dreyer, Derek and Gardner, Philippa and Shao, Zhong
(2015) Compositional Verification Methods for Next-Generation Concurrency (Dagstuhl Seminar 15191).
Dagstuhl Reports, 5 (5). pp. 1-23.

Blond, Stevens Le and Choffnes, David R. and Caldwell, William and Druschel, Peter and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
In: Proc. of the 2015 ACM Conference on Special Interest Group on Data Communication (SIGCOMM '15).
Conference: SIGCOMM ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication

Budhathoki, Kailash and Vreeken, Jilles
(2015) The Difference and the Norm — Characterising Similarities and Differences between Databases.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

C

Chistikov, Dmitry and Dimitrova, Rayna and Majumdar, Rupak
(2015) Approximate Counting in SMT and Value Estimation for Probabilistic Programs.
In: Proc. 21st International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 15).
Conference: TACAS Tools and Algorithms for Construction and Analysis of Systems

Choffnes, David and Druschel, Peter and Blond, Stevens Le and Caldwell, William and Merritt, Nicholas
(2015) Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems.
ACM Computer Communication Review, 45 (5). pp. 639-652.

Chowdhury, Omar and Garg, Deepak and Jia, Limin and Datta, Anupam
(2015) Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
In: Proceedings of the 22nd ACM conference on Computer and communications security (ACM CCS 2015).
Conference: CCS ACM Conference on Computer and Communications Security

Correa, Denzil and Silva, Leandro Araújo and Mondal, Mainack and Benevenuto, Fabrício and Gummadi, Krishna P.
(2015) The Many Shades of Anonymity: Characterizing Anonymous Social Media Content.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

D

Datta, Anupam and Garg, Deepak and Jia, Limin and Sen, Shayak
(2015) System M: A Program Logic for Code Sandboxing and Identification.
The Computing Research Repository (CoRR).

Deshmukh, Jyotirmoy V. and Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Quantifying Conformance Using the Skorokhod Metric.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Dimitrova, Rayna and Majumdar, Rupak
(2015) Reachability Analysis of Reversal-bounded Automata on Series-Parallel Graphs.
In: Proceedings of 6th International Symposium on Games, Automata, Logics and Formal Verification (GandALF 2015).

Domshlak, Carmel and Hoffmann, Jörg and Katz, Michael
(2015) Red-black planning: A new systematic approach to partial delete relaxation.
Artif. Intell., 221. pp. 73-114.

Doychev, Goran and Köpf, Boris and Mauborgne, Laurent and Reineke, Jan
(2015) CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 18 (1). 4:1-4:32.

Durand-Gasselin, Antoine and Esparza, Javier and Ganty, Pierre and Majumdar, Rupak
(2015) Model Checking Parameterized Asynchronous Shared-Memory Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

F

Farajtabar, M. and Wang, Y and Gomez-Rodriguez, Manuel and Li, S and Zha, H and Song, Le
(2015) COEVOLVE: A Joint Point Process Model for Information Diffusion and Network Co-evolution.
In: NIPS '15: Advances in Neural Information Processing Systems.
Conference: NeurIPS Conference on Neural Information Processing Systems

Farajtabar, Mehrdad and Gomez-Rodriguez, Manuel and Du, Nan and Zamani, Mohammad and Zha, Hongyuan and Song, Le
(2015) Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades.
In: Proceedings of the 18th International Conference on Artificial Intelligence and Statistics (AISTATS).
Conference: AISTATS International Conference on Artificial Intelligence and Statistics

Finkbeiner, Bernd and Gieseking, Manuel and Olderog, Ernst-Rüdiger
(2015) Adam: Causality-Based Synthesis of Distributed Systems.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Finkbeiner, Bernd and Rabe, Markus N. and Sanchez, Cesar
(2015) Algorithms for Model Checking HyperLTL and HyperCTL ^*.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

G

Garg, Deepak and Çiçek, Ezgi and Acar, Umut A.
(2015) Refinement Types for Incremental Computational Complexity.
In: Proceedings of the 24th European Symposium on Programming (ESOP '15).
Conference: ESOP European Symposium on Programming

Gavran, Ivan and Niksic, Filip and Kanade, Aditya and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Rely/Guarantee Reasoning for Asynchronous Programs.
In: Proceedings of the 26th International Conference on Concurrency Theory (CONCUR '15).
Conference: CONCUR International Conference on Concurrency Theory

Gnad, Daniel and Hoffmann, Jörg
(2015) Red-Black Planning: A New Tractability Analysis and Heuristic Function.
In: Proceedings of the 8th Annual Symposium on Combinatorial Search (SOCS'15).

Goga, Oana and Loiseau, Patrick and Sommer, Robin and Teixeira, Renata and Gummadi, Krishna P.
(2015) On the Reliability of Profile Matching Across Large Online Social Networks.
In: Proc. of the 21st ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD'15).
Conference: KDD ACM International Conference on Knowledge Discovery and Data Mining

Goga, Oana and Venkatadri, Giridhari and Gummadi, Krishna P.
(2015) The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

Grabowicz, Przemyslaw A. and Ganguly, Niloy and Gummadi, Krishna P.
(2015) Microscopic Description and Prediction of Information Diffusion in Social Media: Quantifying the Impact of Topical Interests.
In: Proc. of the 24th International Conference on World Wide Web (WWW 2015).
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Gujarati, Arpan and Brandenburg, Björn B.
(2015) When Is CAN the Weakest Link? A Bound on Failures-in-Time in CAN-Based Real-Time Systems.
In: Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15).
Conference: RTSS Real Time Systems Symposium

H

Hanser, Christian and Rabkin, Max and Schröder, Dominique
(2015) Verifiably Encrypted Signatures: Security Revisited and a New Construction.
In: Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015).
Conference: ESORICS European Symposium On Research In Computer Security

Hemed, Nir and Rinetzky, Noam and Vafeiadis, Viktor
(2015) Modular Verification of Concurrency-Aware Linearizability.
In: Distributed Computing - 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings.
Conference: DISC International Symposium on Distributed Computing (was WDAG)

Hoffart, Johannes and Preda, Nicoleta and Suchanek, Fabian M and Weikum, Gerhard
(2015) Knowledge Bases for Web Content Analytics.
In: Proccedings of the 24th International Conference on World Wide Web (WWW '15), Companion Volume.
Conference: WWW The Web Conference (Formerly: International World Wide Web Conference)

Hoffmann, Jörg
(2015) Simulated Penetration Testing: From "Dijkstra" to "Turing Test++".
In: Proceedings of the 25th International Conference on Automated Planning and Scheduling (ICAPS 2015).
Conference: ICAPS International Conference on Automated Planning and Scheduling

J

Jawanpuria, Pratik and Lapin, Maksim and Hein, Matthias and Schiele, Bernt
(2015) Efficient Output Kernel Learning for Multiple Tasks.
In: Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada.
Conference: NeurIPS Conference on Neural Information Processing Systems

Jung, Ralf and Swasey, David and Sieczkowski, Filip and Svendsen, Kasper and Turon, Aaron and Birkedal, Lars and Dreyer, Derek
(2015) Iris: Monoids and Invariants as an Orthogonal Basis for Concurrent Reasoning.
In: Proceedings of the 43nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'15).
Conference: POPL ACM-SIGACT Symposium on Principles of Programming Languages

K

Kang, Jeehoon and Hur, Chung-Kil and Mansky, William and Garbuzov, Dmitri and Zdancewic, Steve and Vafeiadis, Viktor
(2015) A formal C memory model supporting integer-pointer casts.
In: Proc. of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2016).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

Karaev, Sanjar and Miettinen, Pauli and Vreeken, Jilles
(2015) Getting to Know the Unknown Unknowns: Destructive-Noise Resistant Boolean Matrix Factorization.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Karuppayah, Shankar and Roos, Stefanie and Rossow, Christian and Mühlhäuser, Max and Fischer, Mathias
(2015) Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
In: Proc. of the 35th IEEE International Conference on Distributed Computing Systems (ICDCS'15).
Conference: ICDCS International Conference on Distributed Computing Systems

Khoreva, Anna and Galasso, Fabio and Hein, Matthias and Schiele, Bernt
(2015) Classifier based graph construction for video segmentation.
In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR'15).
Conference: CVPR IEEE Conference on Computer Vision and Pattern Recognition

Kloos, Johannes and Majumdar, Rupak and Vafeiadis, Viktor
(2015) Asynchronous Liquid Separation Types.
In: Proceedings of the 29th European Conference on Object-Oriented Programming (ECOOP'16).
Conference: ECOOP European Conference on Object-Oriented Programming

Koutra, Danai and Kang, U and Vreeken, Jilles and Faloutsos, Christos
(2015) Summarizing and Understanding Large Graphs.
Statistical Analysis and Data Mining, 8 (3). pp. 183-202.

Kulshrestha, Juhi and Zafar, Muhammad Bilal and Noboa, Lisette Espin and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Characterizing Information Diets of Social Media Users.
In: Proceedings of the Ninth International Conference on Web and Social Media, ICWSM 2015, University of Oxford, Oxford, UK, May 26-29, 2015.

Kührer, Marc and Hupperich, Thomas and Bushart, Jonas and Rossow, Christian and Holz, Thorsten
(2015) Going Wild: Large-Scale Classification of Open DNS Resolvers.
In: Proc. of the 2015 Internet Measurement Conference (IMC'15).
Conference: IMC Internet Measurement Conference

M

Maffei, Matteo and Malavolta, Giulio and Reinert, Manuel and Schröder, Dominique
(2015) Privacy and Access Control for Outsourced Personal Records.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Majumdar, Rupak and Prabhu, Vinayak S.
(2015) Computing the Skorokhod distance between polygonal traces.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).

Majumdar, Rupak and Wang, Zilong
(2015) Bbs: A Phase-Bounded Model Checker for Asynchronous Programs.
In: Proc. of the 27th International Conference on Computer Aided Verification (CAV 2015).
Conference: CAV Computer Aided Verification

Mehta, Aastha and Vahldiek-Oberwanger, Anjo and Post, Ansley and Garg, Deepak and Elnikety, Eslam and Gehrke, Johannes and Druschel, Peter and Rodrigues, Rodrigo
(2015) Guardat: enforcing data policies at the storage layer.
In: Proceedings of the 10th European Conference on Computer Systems (EuroSys '15).
Conference: EuroSys Eurosys Conference

Moreno-Sanchez, Pedro and Kate, Aniket and Maffei, Matteo and Pecina, Kim
(2015) Privacy Preserving Payments in Credit Networks.
In: Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15).
Conference: NDSS Network and Distributed System Security Symposium

N

Neis, Georg and Hur, Chung-Kil and Kaiser, Jan-Oliver and McLaughlin, Craig and Dreyer, Derek and Vafeiadis, Viktor
(2015) Pilsner: a compositionally verified compiler for a higher-order imperative language.
In: Proceedings of the 20st ACM SIGPLAN International Conference on Functional Programming (ICFP '15).
Conference: ICFP International Conference on Functional Programming

Nguyen, Hoang-Vu and Vreeken, Jilles
(2015) Non-Parametric Jensen-Shannon Divergence.
In: Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECMLPKDD).
Conference: ECML PKDD European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Database (PKDD and ECML combined from 2008)

P

Pa, Yin Minn Pa and Suzuki, Shogo and Yoshioka, Katsunari and Matsumoto, Tsutomu and Kasama, Takahiro and Rossow, Christian
(2015) IoTPOT: Analysing the Rise of IoT Compromises.
In: 9th USENIX Workshop on Offensive Technologies (WOOT 15).

Pewny, Jannik and Garmany, Behrad and Gawlik, Robert and Rossow, Christian and Holz, Thorsten
(2015) Cross-Architecture Bug Search in Binary Executables.
In: Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P).
Conference: SP IEEE Symposium on Security and Privacy

Pfaff, David and Hack, Sebastian and Hammer, Christian
(2015) Learning How to Prevent Return-Oriented Programming Efficiently.
In: Engineering Secure Software and Systems.

Pienta, Robert and Lin, Zhang and Kahng, M. and Vreeken, Jilles and Talukdar, Partha and Abello, J. and Parameswaran, G. and Chau, D.H.
(2015) AdaptiveNav: Adaptive Discovery of Interesting and Surprising Nodes in Large Graphs.
In: Proceedings of the IEEE Conference on Visualization (VIS).

R

Richter, Stefan and Alvarez, Victor and Dittrich, Jens
(2015) A Seven-Dimensional Analysis of Hashing Methods and its Implications on Query Processing.
PVLDB, 9 (3). pp. 96-107.

S

Saha, Indranil and Baruah, Sanjoy and Majumdar, Rupak
(2015) Dynamic scheduling for networked control systems.
In: Proc. of the 18th International Conference on Hybrid Systems: Computation and Control (HSCC 2015).

Schneider, Sigurd and Smolka, Gert and Hack, Sebastian
(2015) A Linear First-Order Functional Intermediate Language for Verified Compilers.
In: Interactive Theorem Proving - 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings.
Conference: ITP Conference on Interactive Theorem Proving (previously TPHOLs, changed in 2009)

Schröder, Dominique and Döttling, Nico
(2015) Efficient Pseudorandom Functions via On-the-Fly Adaptation.
In: Proceedings of the 35th International Cryptology Conference (CRYPTO '15).
Conference: CRYPTO Advances in Cryptology

Schröder, Dominique and Simkin, Mark
(2015) VeriStream - A Framework for Verifiable Data Streaming.
In: Financial Cryptography and Data Security - 19th International Conference, FC 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers.

Sundareisan, Shashi and Vreeken, Jilles and Prakash, B. Aditya
(2015) Hidden Hazards: Finding Missing Nodes in Large Graph Epidemics.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

T

Tassarotti, Joseph and Dreyer, Derek and Vafeiadis, Viktor
(2015) Verifying read-copy-update in a logic for weak memory.
In: Proc. of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2015).
Conference: PLDI ACM-SIGPLAN Conference on Programming Language Design and Implementation

V

Verbeek, Freek and Havle, Oto and Schmaltz, Julien and Tverdyshev, Sergey and Blasum, Holger and Langenstein, Bruno and Stephan, Werner and Wolff, Burkhart and Nemouchi, Yakoub
(2015) Formal API Specification of the PikeOS Separation Kernel.
In: Proc. 7th NASA Formal Methods Symposium (NFM 2015).

Viswanath, Bimal and Bashir, Muhammad Ahmad and Zafar, Muhammad Bilal and Bouget, Simon and Guha, Saikat and Gummadi, Krishna P. and Kate, Aniket and Mislove, Alan
(2015) Strength in Numbers: Robust Tamper Detection in Crowd Computations.
In: Proceedings of the 2015 ACM on Conference on Online Social Networks, COSN 2015, Palo Alto, California, USA, November 2-3, 2015.

Vreeken, Jilles
(2015) Causal Inference by Direction of Information.
In: Proceedings of the SIAM International Conference on Data Mining (SDM).
Conference: SDM SIAM International Conference on Data Mining

Y

Yang, Maolin and Wieder, Alexander and Brandenburg, Björn B.
(2015) Global Real-Time Semaphore Protocols: A Survey, Unified Analysis, and Comparison.
In: Proceedings of the IEEE 36th Real-Time Systems Symposium (RTSS'15).
Conference: RTSS Real Time Systems Symposium

Z

Zafar, Muhammad Bilal and Bhattacharya, Parantapa and Ganguly, Niloy and Gummadi, Krishna P. and Ghosh, Saptarshi
(2015) Sampling Content from Online Social Networks: Comparing Random vs. Expert Sampling of the Twitter Stream.
TWEB, 9 (3). 12:1-12:33.

Ziliani, Beta and Dreyer, Derek and Krishnaswami, Neelakantan R. and Nanevski, Aleksandar and Vafeiadis, Viktor
(2015) Mtac: A monad for typed tactic programming in Coq.
J. Funct. Program., 25.

Zimek, Arthur and Vreeken, Jilles
(2015) The Blind Men and the Elephant: About Meeting the Problem of Multiple Truths in Data from Clustering and Pattern Mining Perspectives.
Machine Learning, 98 (1). pp. 121-155.

This list was generated on Fri Dec 3 00:02:45 2021 CET.