Conference Active Sample Selection and Correction Propagation on a Gradually-Augmented Graph 2015 • Proceedings / CVPR, IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society Conference on Computer Vision and Pattern Recognition • 1975-1983 Su H, Yin Z, Kanade T, Huh S
Conference Challenge 2015 89-94 Chatzipapas A, Pediaditakis D, Rotsos C, Mancuso V, Crowcroft J, Moore A
Conference Valor: Efficient, Software-Only Region Conflict Exceptions 2015 • ACM Sigplan Notices • 50(10):241-259 Biswas S, Zhang M, Bond MD, Lucia B
Conference Modular translation validation of a full-sized synchronous compiler using off-the-shelf verification tools 2015 109-112 Ngo V-C, Talpin J-P, Gautier T, Besnard L, Le Guernic P
Chapter Linearized and Single-Pass Belief Propagation 2015 • Proceedings of the VLDB Endowment • 8(5):581-592 Gatterbauer W, Guennemann S, Koutra D, Faloutsos C
Conference TimeCrunch: Interpretable Dynamic Graph Summarization 2015 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 1055-1064 Shah N, Koutra D, Zou T, Gallagher B, Faloutsos C
Conference A Hierarchy of Proof Rules for Checking Differential Invariance of Algebraic Sets 2015 • Lecture Notes in Computer Science • 8931:431-448 Ghorbal K, Sogokon A, Platzer A
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security Plas 2015 Clarkson M, Jia L
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic. 2015 • IACR Cryptol. ePrint Arch. • 2015:264-264 Sherry J, Lan C, Popa RA, Ratnasamy S
Conference Never-Ending Learning 2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 2302-2310 Mitchell T, and others
Journal Article A SAT Approach to Clique-Width 2015 • ACM Transactions on Computational Logic • 16(3): Heule MJH, Szeider S
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Conference Model-Instance Object Mapping 2015 • Lecture Notes in Computer Science • 8992:525-536 Biswas J, Veloso M
Conference Adaptation from sparse observations through detection and correction of model anomalies (doctoral consortium) 2015 • Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS • 3:1999-2000 Mendoza JP, Veloso M, Simmons R
Conference Sample complexity of episodic fixed-horizon reinforcement learning 2015 • Advances in Neural Information Processing Systems • 2015-January:2818-2826 Dann C, Brunskill E
Journal Article Two-term disjunctions on the second-order cone 2015 • Mathematical programming • 154(1-2):463-491 Kilinc-Karzan F, Yildiz S
Conference The Case for Offload Shaping 2015 • 16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15) • 51-56 Hu W, Amos B, Chen Z, Ha K, Richter W, Pillai P, Gilbert B, Harkes J, Satyanarayanan M
Chapter Linear Cellular Automata and Decidability 2015 • AUTOMATA, UNIVERSALITY, COMPUTATION: TRIBUTE TO MAURICE MARGENSTERN • 12:259-276 Sutner K
Journal Article Securing jammed network using reliability behavior value through neuro-fuzzy analysis 2015 • Sadhana - Academy Proceedings in Engineering Sciences • 40(4):1139-1153 RATNA SR, RAVI R
Conference Smaller and Faster: Parallel Processing of Compressed Graphs with Ligra 2015 • Data Compression Conference Proceedings • 403-412 Shun J, Dhulipala L, Blelloch GE
Journal Article Between 2-and 3-colorability 2015 • Electronic Journal of Combinatorics • 22(1): Frieze A, Pegden W
Journal Article Efficient Algorithms for Three-Dimensional Axial and Planar Random Assignment Problems 2015 • Random structures & algorithms (Print) • 46(1):160-196 Frieze A, Sorkin GB
Conference Searching the State Space: A Qualitative Study of API Protocol Usability 2015 • Proceedings - IEEE Workshop on Program Comprehension • 82-93 Sushine J, Herbsleb JD, Aldrich J
Conference Tight Bounds on Vertex Connectivity Under Vertex Sampling 2015 2006-2018 Censor-Hillel K, Ghaffari M, Giakkoupis G, Haeupler B, Kuhn F
Conference Strong Inapproximability Results on Balanced Rainbow-Colorable Hypergraphs 2015 822-836 Guruswami V, Lee E
Conference Communication with partial noiseless feedback 2015 • Leibniz International Proceedings in Informatics • 40:881-897 Haeupler B, Kamath P, Velingker A
Conference An active learning approach to coreference resolution 2015 • IJCAI International Joint Conference on Artificial Intelligence • 2015-January:1312-1318 Sachan M, Hovy E, Xing EP
Journal Article Random intersection graphs and their applications in security, wireless communication, and social networks 2015 Zhao J, Yağan O, Gligor V
Conference Modular Multiset Rewriting 2015 • Lecture Notes in Computer Science • 9450:515-531 Cervesato I, Lam ESL
Conference KLOTSKI: ReprioritizingWeb content to improve user experience on mobile devices 2015 • Proceedings of the 12th Usenix Symposium on Networked Systems Design and Implementation Nsdi 2015 • 439-453 Butkiewicz M, Wang D, Wu Z, Madhyastha HV, Sekar V
Journal Article Efficient representations for lifelong learning and autoencoding 2015 • Journal of machine learning research • 40(2015): Balcan MF, Blum A, Vempala S
Conference The Ladder: A reliable leaderboard for machine learning competitions 2015 • 32nd International Conference on Machine Learning Icml 2015 • 2:1006-1014 Hardt M, Blum A
Journal Article Effects of tag usage on question response time 2015 • Social Network Analysis and Mining • 5(1): Bhat V, Gokhale A, Jadhav R, Pudipeddi J, Akoglu L
Conference Translation Validation for Clock Transformations in a Synchronous Compiler 2015 • Lecture Notes in Computer Science • 9033:171-185 Ngo VC, Talpin J-P, Gautier T, Le Guernic P
Conference Real-Time Dense 3D Face Alignment from 2D Video with Automatic Facial Action Unit Coding 2015 • 2015 11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG), VOL. 4 Jeni LA, Girard JM, Cohn JF, Kanade T, IEEE
Conference Scalable Community Discovery from Multi-Faceted Graphs 2015 1053-1062 Metwally A, Pan J-Y, Doan M, Faloutsos C
Conference Fraud Detection through Graph-Based User Behavior Modeling 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1696-1697 Beutel A, Akoglu L, Faloutsos C
Conference HaTen2: Billion-Scale Tensor Decompositions 2015 • Proceedings - International Conference on Data Engineering • 1047-1058 Jeon I, Papalexakis EE, Kang U, Faloutsos C
Conference Formal Verification of ACAS X, an Industrial Airborne Collision Avoidance System 2015 • 2015 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE (EMSOFT) • 127-136 Jeannin J-B, Ghorbal K, Kouskoulas Y, Gardner R, Schmidt A, Zawadzki E, Platzer A
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic. 2015 • Comput. Commun. Rev. • 45:213-226 Sherry J, Lan C, Popa RA, Ratnasamy S
Conference Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures 2015 • Proceedings of the ACM Conference on Computer and Communications Security • 1322-1333 Fredrikson M, Jha S, Ristenpart T
Conference What's Hot in the SAT and ASP Competitions 2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 4322-4323 Heule MJH, Schaub T
Conference Gather-Scatter DRAM: In-DRAM Address Translation to Improve the Spatial Locality of Non-unit Strided Accesses 2015 • Micro -Annual Workshop then Annual International Symposium- • 267-280 Seshadri V, Mullins T, Boroumand A, Mutlu O, Gibbons PB, Kozuch MA, Mowry TC
Journal Article Software Engineering for Smart Cyber-Physical Systems -- Towards a Research Agenda 2015 • Software Engineering Notes • 40(6):28-32 Bures T, Weyns D, Berger C, Biffl S, Daun M, Gabor T, Garlan D, Gerostathopoulos I, Julien C, Krikava F, Mordinyi R, Pronios N
Conference Single-cell genetic analysis reveals insights into clonal development of cervical cancer and confirms TERC as an early and dominant aberration 2015 • Cancer Research • 75: Hernandez LS, Bradley A, Gaiser T, Andersson S, Gertz EM, Chowdhury SA, Schwartz R, Schaeffer A, Heselmeyer-Haddad K, Ried T
Journal Article Reasoning about Human Participation in Self-Adaptive Systems 2015 Camara J, Moreno GA, Garlan D
Conference Scaling Up Clustered Network Appliances with ScaleBricks 2015 • Computer Communication Review • 241-254 Zhou D, Fan B, Lim H, Andersen DG, Kaminsky M, Mitzenmacher M, Wang R, Singh A
Conference AutoRef: Towards Real-Robot Soccer Complete Automated Refereeing 2015 • Lecture Notes in Computer Science • 8992:419-430 Zhu D, Biswas J, Veloso M