Conference CoBots: Robust Symbiotic Autonomous Mobile Service Robots 2015 • IJCAI International Joint Conference on Artificial Intelligence • 4423-4429 Veloso M, Biswas J, Coltin B, Rosenthal S
Journal Article Push-manipulation of complex passive mobile objects using experimentally acquired motion models 2015 • Autonomous Robots • 38(3):317-329 Mericli T, Veloso M, Akin HL
Conference Quantum Spectrum Testing 2015 • Annual ACM Symposium on Theory of Computing • 529-538 O'Donnell R, Wright J
Conference Hierarchical Abstraction, Distributed Equilibrium Computation, and Post-Processing, with Application to a Champion No-Limit Texas Hold'em Agent 2015 • Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS • 7-15 Brown N, Ganzfried S, Sandholm T
Journal Article Using data transformations for low-latency time series analysis 2015 • Hp Laboratories Technical Report Hpl • Cui H, Keeton K, Roy I, Viswanathan K, Ganger GR
Conference Learning Better while Sending Less: Communication-Efficient Online Semi-Supervised Learning in Client-Server Settings 2015 1-10 Xiao H, Lin S-D, Yeh M-Y, Gibbons PB, Eckert C
Journal Article Detection and prevention of unknown vulnerabilites on enterprise IP networks 2015 • International Journal of Applied Engineering Research • 10(23):43469-43474 Masthan M, Ravi R
Journal Article An improved bound on the fraction of correctable deletions 2015 Bukh B, Guruswami V, Håstad J
Journal Article Loose Hamilton Cycles in Regular Hypergraphs 2015 • Combinatorics Probability and Computing • 24(1):179-194 Dudek A, Frieze A, Rucinski A, Sileikis M
Journal Article Simple, Fast and Deterministic Gossip and Rumor Spreading 2015 • Journal of the ACM • 62(6): Haeupler B
Conference Distributed Resource Discovery in Sub-Logarithmic Time 2015 • PODC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING • 413-419 Haeupler B, Malkhi D
Conference Mining User Interests from Personal Photos 2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 1896-1902 Xie P, Pei Y, Xie Y, Xing E
Journal Article Compositional certified resource bounds 2015 • ACM Sigplan Notices • 50(6):467-478 Carbonneaux Q, Hoffmann J, Shao Z
Conference Learning Cooperative Games 2015 • IJCAI International Joint Conference on Artificial Intelligence • 475-481 Balcan M-F, Procaccia AD, Zick Y
Conference AFRAID: Fraud Detection via Active Inference in Time-evolving Social Networks 2015 • PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015) • 659-666 Van Vlasselaer V, Eliassi-Rad T, Akoglu L, Snoeck M, Baesens B
Conference KeYmaera X: An Axiomatic Tactical Theorem Prover for Hybrid Systems 2015 • Lecture Notes in Computer Science • 9195:527-538 Fulton N, Mitsch S, Quesel J-D, Voelp M, Platzer A
Conference Extreme Data-rate Scheduling for the Data Center 2015 351-352 Bojan NM, Zilberman N, Antichi G, Moore AW
Conference Real-Time Dense 3D Face Alignment from 2D Video with Automatic Facial Action Unit Coding 2015 • 2015 11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG), VOL. 3 Jeni LA, Girard JM, Cohn JF, Kanade T, IEEE
Conference Location Based Social Network Analysis Using Tensors and Signal Processing Tools 2015 93-96 Papalcxakis EE, Pelechrinis K, Faloutsos C
Conference Amplification of One-Way Information Complexity via Codes and Noise Sensitivity 2015 • Lecture Notes in Computer Science • 9134:960-972 Molinaro M, Woodruff DP, Yaroslavtsev G
Conference A Formally Verified Hybrid System for the Next-Generation Airborne Collision Avoidance System 2015 • Lecture Notes in Computer Science • 9035:21-36 Jeannin J-B, Ghorbal K, Kouskoulas Y, Gardner R, Schmidt A, Zawadzki E, Platzer A
Journal Article Statistical Active Learning Algorithms for Noise Tolerance and Differential Privacy 2015 • Algorithmica • 72(1):282-315 Balcan MF, Feldman V
Conference 2<SUP>5</SUP> Years of Model Checking 2015 • Lecture Notes in Computer Science • 8974:26-40 Clarke EM, Wang Q
Conference A Minimax Distortion View of Differentially Private Query Release 2015 1046-1050 Wang W, Ying L, Zhang J
Chapter Expressing Symmetry Breaking in DRAT Proofs 2015 • Lecture Notes in Computer Science • 9195:591-606 Heule MJH, Hunt WAJ, Wetzler N
Conference Sense Discovery via Co-Clustering on Images and Text 2015 • Proceedings / CVPR, IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society Conference on Computer Vision and Pattern Recognition • 5298-5306 Chen X, Ritter A, Gupta A, Mitchell T
Chapter Blocked Literals Are Universal 2015 • Lecture Notes in Computer Science • 9058:436-442 Heule MJH, Seidl M, Biere A
Conference Weakly Supervised Extraction of Computer Security Events from Twitter 2015 896-905 Ritter A, Wright E, Casey W, Mitchell T
Journal Article Fast Bulk Bitwise AND and OR in DRAM 2015 • IEEE Computer Architecture Letters • 14(2):127-131 Seshadri V, Hsieh K, Boroum A, Lee D, Kozuch MA, Mutlu O, Gibbons PB, Mowry TC
Preprint Proceedings Tenth International Workshop on Logical Frameworks and Meta Languages: Theory and Practice 2015 Cervesato I, Chaudhuri K
Conference SASS: Self-adaptation using stochastic search 2015 • 2015 IEEE/ACM 10TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS • 168-174 Coker Z, Garlan D, Le Goues C
Journal Article Inferring models of multiscale copy number evolution for single-tumor phylogenetics 2015 • Bioinformatics • 31(12):258-267 Chowdhury SA, Gertz EM, Wangsa D, Heselmeyer-Haddad K, Ried T, Schaeffer AA, Schwartz R
Conference Handling Complex Commands as Service Robot Task Requests 2015 • IJCAI International Joint Conference on Artificial Intelligence • 1177-1183 Perera V, Veloso M
Conference On Task Recognition and Generalization in Long-Term Robot Teaching 2015 • Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS • 1879-1880 Gemignani G, Klee SD, Veloso M, Nardi D
Conference Beating the random assignment on constraint satisfaction problems of bounded degree 2015 • Leibniz International Proceedings in Informatics • 40:110-123 Barak B, Moitra A, O'Donnell R, Raghavendra P, Regev O, Steurer D, Trevisan L, Vijayaraghavan A, Witmer D, Wright J
Conference Handling a trillion (unfixable) flaws on a billion devices 2015 1-7 Yu T, Sekar V, Seshan S, Agarwal Y, Xu C
Journal Article A specialized assault adjacent to the aes and its function to system implementations 2015 • International Journal of Applied Engineering Research • 10(23):43395-43400 Navaneetha Krishnan M, Ravi R
Journal Article Ray Specialized Contraction on Bounding Volume Hierarchies 2015 • Computer Graphics Forum • 34(7):309-318 Gu Y, He Y, Blelloch GE
Conference Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme 2015 • 2013 National Conference on Communications, NCC 2013 • 6277-6283 Yavuz F, Zhao J, Yagan O, Gligor V
Journal Article Efficient cost-sharing mechanisms for prize-collecting problems 2015 • Mathematical programming • 152(1-2):147-188 Gupta A, Koenemann J, Leonardi S, Ravi R, Schaefer G
Conference Influence in Classification via Cooperative Game Theory 2015 • IJCAI International Joint Conference on Artificial Intelligence • 511-517 Datta A, Datta A, Procaccia AD, Zick Y
Conference Identifying trends in enterprise data protection systems 2015 • Proceedings of the 2015 Usenix Annual Technical Conference Usenix Atc 2015 • 151-164 Amvrosiadis G, Bhadkamkar M
Conference Guilt-by-Constellation: Fraud Detection by Suspicious Clique Memberships 2015 • Proceedings of the Annual Hawaii International Conference on System Sciences • 918-927 Van Vlasselaer V, Akoglu L, Eliassi-Rad T, Snoeck M, Baesens B