Conference Do You Know Where Your Headers Are? Comparing the Privacy of Network Architectures with Share Count Analysis 2015 1-7 Naylor D, Steenkiste P
Journal Article Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS 2015 • Computer Communication Review • 45(4):199-212 Naylor D, Schomp K, Varvello M, Leontiadis I, Blackburn J, Lopez D, Papagiannaki K, Rodriguez Rodriguez P, Steenkiste P
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic 2015 • Computer Communication Review • 213-226 Sherry J, Lan C, Popa RA, Ratnasamy S
Journal Article Silo 2015 • Computer Communication Review • 45(4):435-448 Jang K, Sherry J, Ballani H, Moncaster T
Chapter Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma 2015 • Lecture Notes in Computer Science • 9014:260-289 Goyal V, Lin H, Pandey O, Pass R, Sahai A
Preprint GMine: A System for Scalable, Interactive Graph Visualization and Mining 2015 Rodrigues J, Tong H, Traina A, Faloutsos C, Leskovec J
Conference Designing a receptionist robot: effect of voice and appearance on anthropomorphism 2015 • 2015 24TH IEEE INTERNATIONAL SYMPOSIUM ON ROBOT AND HUMAN INTERACTIVE COMMUNICATION (RO-MAN) • 235-240 Trovato G, Ramos JG, Azevedo H, Moroni A, Magossi S, Ishii H, Simmons R, Takanishi A
Conference Capacity of Interactive Communication over Erasure Channels and Channels with Feedback 2015 1296-1311 Gelles R, Haeupler B
Conference Programmable Orchestration of Time-Synchronized Events Across Decentralized Android Ensembles 2015 • 2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB) • 659-666 Lam ESL, Cervesato I, Elgazar A
Preprint Designing Securely and Reliably Connected Wireless Sensor Networks 2015 Zhao J, Yağan O, Gligor V
Conference Improved NP-inapproximability for 2-variable linear equations 2015 • Leibniz International Proceedings in Informatics • 40:341-360 Håstad J, Huang S, Manokaran R, O'Donnell R, Wright J
Conference Simultaneous Abstraction and Equilibrium Finding in Games 2015 • IJCAI International Joint Conference on Artificial Intelligence • 489-496 Brown N, Sandholm T
Conference BenchPress: Dynamic Workload Control in the OLTP-Bench Testbed 2015 • Proceedings / ACM-SIGMOD International Conference on Management of Data. ACM-Sigmod International Conference on Management of Data • 1069-1073 Van Aken D, Difallah DE, Pavlo A, Curino C, Cudre-Mauroux P
Conference Safe Opponent Exploitation 2015 • ACM Transactions on Economics and Computation • 3(2):1-28 Ganzfried S, Sandholm T
Conference On Adversarial Joint Source Channel Coding 2015 • IEEE International Symposium on Information Theory - Proceedings • 271-275 Mazumdar A, Rawat AS
Journal Article Graph metrics as summary statistics for Approximate Bayesian Computation with application to network model parameter estimation 2015 • Journal of Complex Networks • 3(1):52-83 Fay D, Moore AW, Brown K, Filosi M, Jurman G
Conference Concurrency Debugging with Differential Schedule Projections 2015 • ACM Sigplan Notices • 50(6):586-595 Machado N, Lucia B, Rodrigues L
Journal Article ParCube 2015 • ACM Transactions on Knowledge Discovery from Data • 10(1):1-25 Papalexakis EE, Faloutsos C, Sidiropoulos ND
Conference A Work-Efficient Algorithm for Parallel Unordered Depth-First Search 2015 • International Conference for High Performance Computing, Networking, Storage and Analysis, SC Acar UA, Chargueraud A, Rainey M
Journal Article Efficient learning of linear separators under bounded noise 2015 • Journal of machine learning research • 40(2015): Awasthi P, Balcan MF, Haghtalab N, Urner R
Conference Limitations on Testable Affine-Invariant Codes in the High-Rate Regime 2015 1312-1325 Guruswami V, Sudan M, Velingker A, Wang C
Conference "A Spousal Relation Begins with a Deletion of engage and Ends with an Addition of divorce": Learning State Changing Verbs from Wikipedia Revision History 2015 518-523 Wijaya DT, Nakashole N, Mitchell T
Conference Semantic concept discovery for large-scale zero-shot event detection 2015 • IJCAI International Joint Conference on Artificial Intelligence • 2015-January:2234-2240 Chang X, Yang Y, Hauptmann AG, Xing EP, Yu YL
Conference Combining vector space embeddings with symbolic logical inference over open-domain text 2015 • Aaai Spring Symposium Technical Report • SS-15-03:61-65 Gardner M, Talukdar P, Mitchell T
Journal Article Dancing with Giants: Wimpy Kernels for On-Demand I/O Isolation 2015 • IEEE Security and Privacy • 13(2):38-46 Zhou Z, Yu M, Gligor VD
Conference The human kernel 2015 • Advances in Neural Information Processing Systems • 2015-January:2854-2862 Wilson AG, Dann C, Lucas CG, Xing EP
Journal Article Kernel methods for large-scale genomic data analysis 2015 • Briefings in Bioinformatics • 16(2):183-192 Wang X, Xing EP, Schaid DJ
Conference Scalable overlapping community detection in internet-scale networks 2015 • 25th Annual Workshop on Information Technologies and Systems Wits 2015 Yin J, Ho Q, Xing EP
Conference C3: Internet-scale control plane for video quality optimization 2015 • Proceedings of the 12th Usenix Symposium on Networked Systems Design and Implementation Nsdi 2015 • 131-144 Ganjam A, Jiang J, Liu X, Sekar V, Siddiqi F, Stoica I, Zhan J, Zhang H
Conference Impact Models for Architecture-Based Self-adaptive Systems 2015 • Lecture Notes in Computer Science • 8997:89-107 Moreno JC, Lopes A, Garlan D, Schmerl B
Conference Bohatei: Flexible and elastic DDoS defense 2015 • Proceedings of the 24th Usenix Security Symposium • 817-832 Fayaz SK, Tobioka Y, Sekar V, Bailey M
Conference Non-myopic negotiators see what's best 2015 • IJCAI International Joint Conference on Artificial Intelligence • 2015-January:2047-2054 Zick Y, Bachrach Y, Kash IA, Key P
Conference Indoor Trajectory Identification: Snapping with Uncertainty 2015 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 4901-4906 Wang R, Shroff R, Zha Y, Seshan S, Veloso M
Conference Disciplined convex stochastic programming: A new framework for stochastic optimization 2015 • Uncertainty in Artificial Intelligence Proceedings of the 31st Conference Uai 2015 • 62-71 Ali A, Kolter JZ, Diamond S, Boyd S
Conference Language-Based Sensing Descriptors for Robot Object Grounding 2015 • Lecture Notes in Computer Science • 9513:3-15 Gemignani G, Veloso M, Nardi D
Conference Plan Execution Monitoring through Detection of Unmet Expectations about Action Outcomes 2015 • IEEE International Conference on Robotics and Automation • 3247-3252 Mendoza JP, Veloso M, Simmons R
Conference Correlation of Node Importance Measures: An Empirical Study through Graph Robustness 2015 • WWW'15 COMPANION: PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB • 275-281 Baig MB, Akoglu L
Journal Article Silo: Predictable Message Latency in the Cloud 2015 • Computer Communication Review • 435-448 Jang K, Sherry J, Ballani H, Moncaster T
Conference Silo: Predictable Message Latency in the Cloud. 2015 • SIGCOMM • 435-448 Jang K, Sherry J, Ballani H, Moncaster T
Chapter Concurrent Secure Computation via Non-Black Box Simulation 2015 • Lecture Notes in Computer Science • 9216:23-42 Goyal V, Gupta D, Sahai A
Chapter Functional Encryption for Randomized Functionalities 2015 • Lecture Notes in Computer Science • 9015:325-351 Goyal V, Jain A, Koppula V, Sahai A
Chapter The Implication Problem of Computing Policies 2015 • Lecture Notes in Computer Science • 9212:109-123 Reaz R, Ali M, Gouda MG, Heule MJH, Elmallah ES
Conference Sorting with Asymmetric Read and Write Costs 2015 • SPAA'15: PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES • 1-12 Blelloch GE, Fineman JT, Gibbons PB, Gu Y, Shun J
Journal Article Cache Efficient Functional Algorithms 2015 • Communications of the ACM • 58(7):101-108 Blelloch GE, Harper R
Journal Article WALKER-BREAKER GAMES 2015 • SIAM Journal on Discrete Mathematics • 29(3):1476-1485 Espig L, Frieze A, Krivelevich M, Pegden W
Preprint EdgeCentric: Anomaly Detection in Edge-Attributed Networks 2015 Shah N, Beutel A, Hooi B, Akoglu L, Gunnemann S, Makhija D, Kumar M, Faloutsos C
Journal Article Power of <i>k</i> choices and rainbow spanning trees in random graphs 2015 • Electronic Journal of Combinatorics • 22(1): Bal D, Bennett P, Frieze A, Pralat P