Preprint Building a RAPPOR with the Unknown: Privacy-Preserving Learning of Associations and Data Dictionaries 2015 Fanti G, Pihur V, Erlingsson Ú
Conference Understanding Contention-Based Channels and Using Them for Defense 2015 639-650 Hunger C, Kazdagli M, Rawat A, Dimakis A, Vishwanath S, Tiwari M
Journal Article Singularity-Based Four-Bar Linkage Mechanism for Impulsive Torque With High Energy Efficiency 2015 • Journal of Mechanisms and Robotics • 7(3): Mashimo T, Urakubo T, Kanade T
Journal Article Distributed Intelligent MEMS: Progresses and Perspectives 2015 • IEEE Systems Journal • 9(3):1057-1068 Bourgeois J, Goldstein SC
Conference Dense 3D Face Alignment from 2D Videos in Real-Time 2015 • 2015 11TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG), VOL. 4 Jeni LA, Cohn JF, Kanade T, IEEE
Conference Estimation from pairwise comparisons: Sharp minimax bounds with topology dependence 2015 • Journal of machine learning research • 38:856-865 Shah NB, Parekh A, Balakrishnan S, Ramchandran K, Bradley J, Wainwright M
Conference RSC 2015 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 269-278 Costa AF, Yamaguchi Y, Traina AJM, Traina C, Faloutsos C
Preprint Estimation from Pairwise Comparisons: Sharp Minimax Bounds with Topology Dependence 2015 Shah NB, Balakrishnan S, Bradley J, Parekh A, Ramchandran K, Wainwright MJ
Journal Article The Visual System's Internal Model of the World 2015 • Proceedings of the IEEE • 103(8):1359-1378 Lee TS
Conference Preface 2015 • Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015 Clarkson M, Jia L
Journal Article Monitors and Blame Assignment for Higher-Order Session Types (CMU-CyLab-15-004) 2015 Jia L, Gommerstadt H, Pfenning F
Journal Article Optimal rate algebraic list decoding using narrow ray class fields 2015 • Journal of combinatorial theory. Series A • 129:160-183 Guruswami V, Xing C
Journal Article Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences 2015 Wu X, Fredrikson M, Wu W, Jha S, Naughton JF
Journal Article Toward <i>k</i>-Connectivity of the Random Graph Induced by a Pairwise Key Predistribution Scheme With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(11):6251-6271 Yavuz F, Zhao J, Yagan O, Gligor V
Journal Article Network Adversary Attacks against Secure Encryption Schemes 2015 • IEICE Transactions on Communications • E98B(2):267-279 Gligor VD, Parno B, Shin JS
Conference Minimizing Nonconvex Non-Separable Functions 2015 • JMLR workshop and conference proceedings • 38:1107-1115 Yu Y, Zheng X, Marchetti-Bowick M, Xing EP
Journal Article Session details: Middleboxes and network services 2015 • Computer Communication Review • 44(4): Sekar V
Conference Raising the bar for Using GPUs in software packet processing 2015 • Proceedings of the 12th Usenix Symposium on Networked Systems Design and Implementation Nsdi 2015 • 409-423 Kalia A, Zhou D, Kaminsky M, Andersen DG
Conference Multi-Robot Task Acquisition through Sparse Coordination 2015 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 2823-2828 Klee SD, Gemignani G, Nardi D, Veloso M
Journal Article Using random sampling trees for automated planning 2015 • AI Communications • 28(4):665-681 Alcazar V, Fernandez S, Borrajo D, Veloso M
Conference Computing bisimulation functions using SOS optimization and δ -decidability over the reals 2015 78-87 Murthy A, Islam A, Smolka SA, Grosu R
Conference KeYmaera X: An axiomatic tactical theorem prover for hybrid systems 2015 • Lecture Notes in Computer Science • 9195:527-538 Fulton N, Mitsch S, Quesel JD, Völp M, Platzer A
Conference Towards more practical reinforcement learning 2015 • IJCAI International Joint Conference on Artificial Intelligence • 2015-January:4381-4382 Mandel T, Brunskill E, Popović Z
Conference Identifying the root cause of video streaming issues on mobile devices 2015 1-13 Dimopoulos G, Leontiadis I, Barlet-Ros P, Papagiannaki K, Steenkiste P
Conference Tight bounds for graph problems in insertion streams 2015 • Leibniz International Proceedings in Informatics • 40:435-448 Sun X, Woodruff DP
Journal Article Rollback-Recovery for Middleboxes 2015 • Computer Communication Review • 45(4):227-240 Sherry J, Gao PX, Basu S, Panda A, Krishnamurthy A, Maciocco C, Manesh M, Martins J, Ratnasamy S, Rizzo L, Shenker S
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic 2015 • Computer Communication Review • 45(4):213-226 Sherry J, Lan C, Popa RA, Ratnasamy S
Conference Policy evaluation using the Ω-return 2015 • Advances in Neural Information Processing Systems • 2015-January:334-342 Thomas PS, Niekum S, Theocharous G, Konidaris G
Conference A Game-Theoretic Approach to Quality Control for Collecting Privacy-Preserving Data 2015 474-479 Wang W, Ying L, Zhang J
Journal Article RAINBOW CONNECTION OF RANDOM REGULAR GRAPHS 2015 • SIAM Journal on Discrete Mathematics • 29(4):2255-2266 Dudek A, Frieze AM, Tsourakakis CE
Preprint Synthesis of correct adaptors for protocol enhancement in component-based systems 2015 Autili M, Inverardi P, Tivoli M, Garlan D
Conference “Olá, My Name is Ana”: A Study on Brazilians Interacting with a Receptionist Robot 2015 66-71 Trovato G, Ramos JG, Azevedo H, Moroni A, Magossi S, Ishii H, Simmons R, Takanishi A
Preprint Communication Efficient Distributed Kernel Principal Component Analysis 2015 Balcan M-F, Liang Y, Song L, Woodruff D, Xie B
Preprint Monotone Increasing Properties and Their Phase Transitions in Uniform Random Intersection Graphs 2015 Zhao J, Yağan O, Gligor V
Conference How to Refute a Random CSP 2015 • Annual Symposium on Foundations of Computer Science • 689-708 Allen SR, O'Donnell R, Witmer D
Conference Tartanian7: A Champion Two-Player No-Limit Texas Hold'em Poker-Playing Program 2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 4270-4271 Brown N, Ganzfried S, Sandholm T
Journal Article Emerging Hardware Trends in Large-Scale Transaction Processing 2015 • IEEE Internet Computing • 19(3):68-71 Pavlo A
Conference Endgame solving in large imperfect-information games 2015 • Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS • 1:37-45 Ganzfried S, Sandholm T
Journal Article Mix and match: A strategyproof mechanism for multi-hospital kidney exchange 2015 • Games and Economic Behavior • 91:284-296 Ashlagi I, Fischer F, Kash IA, Procaccia AD
Journal Article Practical, Real-time Centralized Control for CDN-based Live Video Delivery. 2015 • Comput. Commun. Rev. • 45:311-324 Mukerjee MK, Naylor D, Jiang J, Han D, Seshan S, Zhang H
Conference An Integrated Environment for Open-Source Network Softwarization 2015 1-2 Han JH, Antichi G, Zilberrnan N, Moors AW, Rotsos C
Conference Energy-interference-free System and Toolchain Support for Energy-harvesting Devices 2015 • 2015 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES) • 35-36 Colin A, Sample AP, Lucia B
Journal Article Energy-aware parallel self-reconfiguration for chains microrobot networks 2015 • Journal of Parallel and Distributed Computing • 75:67-80 Lakhlef H, Bourgeois J, Mabed H, Goldstein SC
Conference Automatic Taxonomy Extraction from Bipartite Graphs 2015 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 221-230 Tobias K, Giinnemann S, Berthold MR, Christos F
Conference Graph-Based User Behavior Modeling: From Prediction to Fraud Detection 2015 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 2309-2310 Beutel A, Akoglu L, Faloutsos C