Conference Coordination for Multi-robot Exploration Using Topological Maps 2015 • Lecture Notes in Electrical Engineering • 321:515-524 Pereira T, Moreira AP, Veloso M
Journal Article Effects of tag usage on question response time 2015 • Social Network Analysis and Mining • 5(1): Bhat V, Gokhale A, Jadhav R, Pudipeddi J, Akoglu L
Conference Translation Validation for Clock Transformations in a Synchronous Compiler 2015 • Lecture Notes in Computer Science • 9033:171-185 Ngo VC, Talpin J-P, Gautier T, Le Guernic P
Conference Polarized Substructural Session Types 2015 • Lecture Notes in Computer Science • 9034:3-22 Pfenning F, Griffith D
Journal Article Session details: Session 5B: Programming Models I 2015 • ACM Sigplan Notices • 50(1): Pfenning F
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic. 2015 • IACR Cryptol. ePrint Arch. • 2015:264-264 Sherry J, Lan C, Popa RA, Ratnasamy S
Conference High confidence policy improvement 2015 • 32nd International Conference on Machine Learning Icml 2015 • 3:2370-2378 Thomas PS, Theocharous G, Ghavamzadeh M
Journal Article A SAT Approach to Clique-Width 2015 • ACM Transactions on Computational Logic • 16(3): Heule MJH, Szeider S
Conference Distributed Resource Discovery in Sub-Logarithmic Time 2015 • Proceedings of the Annual ACM Symposium on Principles of Distributed Computing • 413-419 Haeupler B, Malkhi D
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Conference Compositional certified resource bounds 2015 • ACM Sigplan Notices • 467-478 Carbonneaux Q, Hoffmann J, Shao Z
Conference Preface 2015 • Electronic Proceedings in Theoretical Computer Science • Cervesato I, Schuermann C
Journal Article Gaze-Driven Video Re-Editing 2015 • ACM Transactions on Graphics • 34(2):1-12 Jain E, Sheikh Y, Shamir A, Hodgins J
Conference Monitoring Stealthy Diffusion 2015 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 151-160 Haghtalab N, Laszka A, Procaccia AD, Vorobeychik Y, Koutsoukos X
Conference Beyond Dominant Resource Fairness 2015 • ACM Transactions on Economics and Computation • 3(1):1-22 Parkes DC, Procaccia AD, Shah N
Journal Article Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes 2015 • IEEE Transactions on Information Theory • 61(11):5765-5778 Silberstein N, Rawat AS, Vishwanath S
Conference The Case for Offload Shaping 2015 • 16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15) • 51-56 Hu W, Amos B, Chen Z, Ha K, Richter W, Pillai P, Gilbert B, Harkes J, Satyanarayanan M
Conference Data Provenance Tracking for Concurrent Programs 2015 • 2015 IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO) • 146-156 Lucia B, Ceze L
Conference Extracting Taxonomies from Bipartite Graphs 2015 51-52 Kötter T, Günnemann S, Faloutsos C, Berthold MR
Conference SocNL: Bayesian Label Propagation with Confidence 2015 • Lecture Notes in Computer Science • 9077:633-645 Yamaguchi Y, Faloutsos C, Kitagawa H
Journal Article A PROGRAM LOGIC FOR VERIFYING SECURE ROUTING PROTOCOLS 2015 • Logical Methods in Computer Science • 11(4): Chen C, Jia L, Xu H, Luo C, Zhou W, Loo BT
Conference Run-time Monitoring and Formal Analysis of Information Flows in Chromium 2015 • 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) Bauer L, Cai S, Jia L, Passaro T, Stroucken M, Tian Y
Conference Towards a characterization of approximation resistance for Symmetric CSPs 2015 • Leibniz International Proceedings in Informatics • 40:305-322 Guruswami V, Lee E
Conference Efficient and Expressive Knowledge Base Completion Using Subgraph Feature Extraction 2015 1488-1498 Gardner M, Mitchell T
Journal Article $k$ -Connectivity in Random Key Graphs With Unreliable Links 2015 • IEEE Transactions on Information Theory • 61(7):3810-3836 Zhao J, Yağan O, Gligor V
Conference Large-scale Distributed Dependent Nonparametric Trees 2015 • INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37 • 37:1651-1659 Hu Z, Ho Q, Dubey A, Xing EP
Conference An architecture style for Android security analysis 2015 1-2 Schmerl B, Gennari J, Garlan D
Conference Task Planning of Cyber-Human Systems 2015 • Lecture Notes in Computer Science • 9276:293-309 Sukkerd R, Garlan D, Simmons R
Journal Article Scalable Testing of Context-Dependent Policies over Stateful Data Planes with Armstrong 2015 Fayaz SK, Tobioka Y, Chaki S, Sekar V
Conference Architectural Abstractions for Hybrid Programs 2015 • 2015 18TH INTERNATIONAL ACM SIGSOFT SYMPOSIUM ON COMPONENT-BASED SOFTWARE ENGINEERING (CBSE) • 65-74 Ruchkin I, Schmerl B, Garlan D
Conference Effects of Culture on the Credibility of Robot Speech: A Comparison between English and Arabic 2015 • ACM/IEEE International Conference on Human-Robot Interaction • 157-164 Andrist S, Ziadee M, Boukaram H, Mutlu B, Sakr M
Conference Disciplined Convex Stochastic Programming: A New Framework for Stochastic Optimization 2015 • UNCERTAINTY IN ARTIFICIAL INTELLIGENCE • 62-71 Ali A, Kolter JZ, Diamond S, Boyd S
Journal Article Detecting high-quality posts in community question answering sites 2015 • Information Sciences • 302:70-82 Yao Y, Tong H, Xie T, Akoglu L, Xu F, Lu J
Conference Adaptive Interaction of Persistent Robots to User Temporal Preferences 2015 • Lecture Notes in Computer Science • 9388:61-71 Baraka K, Veloso M
Conference Translation Validation for Synchronous Data-Flow Specification in the SIGNAL Compiler 2015 • Lecture Notes in Computer Science • 9039:66-80 Chan Ngo V, Talpin J-P, Gautier T
Journal Article BlindBox: Deep Packet Inspection over Encrypted Traffic. 2015 • Comput. Commun. Rev. • 45:213-226 Sherry J, Lan C, Popa RA, Ratnasamy S
Conference Ad Recommendation Systems for Life-Time Value Optimization 2015 1305-1310 Theocharous G, Thomas PS, Ghavamzadeh M
Conference What's Hot in the SAT and ASP Competitions 2015 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 4322-4323 Heule MJH, Schaub T
Conference Foreword 2015 • Annual ACM Symposium on Parallelism in Algorithms and Architectures • 2015-June:iii Agrawal K, Blelloch G
Journal Article Bounded-Contention Coding for the additive network model 2015 • Distributed Computing • 28(5):297-308 Censor-Hillel K, Haeupler B, Lynch N, Medard M
Conference Optimal Scheduling for Jobs with Progressive Deadlines 2015 • IEEE Infocom. Proceedings Gardner K, Borst S, Harchol-Balter M
Conference Single-cell genetic analysis reveals insights into clonal development of cervical cancer and confirms TERC as an early and dominant aberration 2015 • Cancer Research • 75: Hernandez LS, Bradley A, Gaiser T, Andersson S, Gertz EM, Chowdhury SA, Schwartz R, Schaeffer A, Heselmeyer-Haddad K, Ried T
Conference Preface 2015 • Electronic Proceedings in Theoretical Computer Science • 176: Alves S, Cervesato I, Chaudhuri K, Fernández M, Florido M, Gay S, Martini S, Paolini L, Della Rocca SR, Schürmann C, Simmons R, Vasconcelos V
Journal Article Automatic Static Cost Analysis for Parallel Programs 2015 • Lecture Notes in Computer Science • 9032:132-157 Hoffmann J, Shao Z
Conference Let's Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems 2015 • Proceedings / ACM-SIGMOD International Conference on Management of Data. ACM-Sigmod International Conference on Management of Data • 707-722 Arulraj J, Pavlo A, Dulloor SR
Journal Article Cooperative local repair in distributed storage 2015 • Eurasip Journal on Advances in Signal Processing • 1-17 Rawat AS, Mazumdar A, Vishwanath S