Conference Realizing the transformative impact of computing and data in a networked world 2014 1-2 Jahanian F
Conference Certifying equality with limited interaction 2014 • Leibniz International Proceedings in Informatics • 28:545-581 Brody J, Chakrabarti A, Kondapally R, Woodruff DP, Yaroslavtsev G
Journal Article Position-Based Cryptography 2014 • SIAM journal on computing (Print) • 43(4):1291-1341 Chandran N, Goyal V, Moriarty R, Ostrovsky R
Conference BatchFS: Scaling the File System Control Plane with Client-Funded Metadata Servers 2014 • 2014 9TH PARALLEL DATA STORAGE WORKSHOP (PDSW) • 1-6 Zheng Q, Ren K, Gibson G
Book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 2014 • Lecture Notes in Computer Science • 8503 LNCS: Ravi R, Gørtz IL
Conference Spectral Machine Learning for Predicting Power Wheelchair Exercise Compliance 2014 • Lecture Notes in Computer Science • 8502:174-183 Fisher R, Simmons R, Chung C-S, Cooper R, Grindle G, Kelleher A, Liu H, Wu YK
Journal Article On a Greedy 2-Matching Algorithm and Hamilton Cycles in Random Graphs with Minimum Degree at Least Three 2014 • Random structures & algorithms (Print) • 45(3):443-497 Frieze A
Preprint Scalable Kernel Methods via Doubly Stochastic Gradients 2014 Dai B, Xie B, He N, Liang Y, Raj A, Balcan M-F, Song L
Journal Article A Novel Subset of Human Tumors That Simultaneously Overexpress Multiple E2F-responsive Genes Found in Breast, Ovarian, and Prostate Cancers 2014 • Cancer Informatics • 13:89-100 Shackney S, Chowdhury S, Schwartz R
Journal Article Nearly-Linear Work Parallel SDD Solvers, Low-Diameter Decomposition, and Low-Stretch Subgraphs 2014 • Theory of Computing Systems • 55(3):521-554 Blelloch GE, Gupta A, Koutis I, Miller GL, Peng R, Tangwongsan K
Journal Article VERTEX SPARSIFIERS: NEW RESULTS FROM OLD TECHNIQUES 2014 • SIAM journal on computing (Print) • 43(4):1239-1262 Englert M, Gupta A, Krauthgamer R, Raecke H, Talgam-Cohen I, Talwar K
Conference Learning optimal commitment to overcome insecurity 2014 • Advances in Neural Information Processing Systems • 2(January):1826-1834 Blum A, Haghtalab N, Procaccia AD
Conference Secure Distributed Storage Systems: Local Repair with Minimum Bandwidth Regeneration 2014 5-8 Rawat AS, Silberstein N, Koyluoglu OO, Vishwanath S
Conference Balancing accountability and privacy in the network 2014 • Proceedings of the 2014 ACM conference on SIGCOMM • 75-86 Naylor D, Mukerjee MK, Steenkiste P
Conference Net-Ray: Visualizing and Mining Billion-Scale Graphs 2014 • Lecture Notes in Computer Science • 8443:348-361 Kang U, Lee J-Y, Koutra D, Faloutsos C
Journal Article SHARKFIN: Spatio-temporal mining of software adoption and penetration 2014 • Social Network Analysis and Mining • 4(1): Papalexakis EE, Dumitras T, Chau DH, Prakash BA, Faloutsos C
Conference CatchSync 2014 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 941-950 Jiang M, Cui P, Beutel A, Faloutsos C, Yang S
Conference Influence function learning in information diffusion networks 2014 • 31st International Conference on Machine Learning Icml 2014 • 5:4118-4135 Du N, Liang Y, Balcan MF, Song L
Journal Article ROBUST REVERSE ENGINEERING OF DYNAMIC GENE NETWORKS UNDER SAMPLE SIZE HETEROGENEITY 2014 • Pacific Symposium on Biocomputing. Pacific Symposium on Biocomputing • 265-276 Parikh AP, Wu W, Xing EP
Conference Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 303-317 Egele M, Woo M, Chapman P, Brumley D
Chapter Distributed Programming for the Cloud <i>Models</i>, <i>Challenges</i>, <i>and Analytics Engines</i> 2014 • LARGE SCALE AND BIG DATA: PROCESSING AND MANAGEMENT • 1-37 Hammoud M, Sakr MF
Conference Constrained Scheduling of Robot Exploration Tasks 2014 • AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS • 429-436 Korein M, Coltin B, Veloso M
Conference ConnotationWordNet: Learning Connotation over the Word plus Sense Network 2014 • PROCEEDINGS OF THE 52ND ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, VOL 1 • 1544-1554 Kang JS, Feng S, Akoglu L, Choi Y
Conference LTE Radio Analytics Made Easy and Accessible 2014 • Computer Communication Review • 44(4):211-222 Kumar S, Hamed E, Katabi D, Li LE
Conference Online stochastic optimization under correlated bandit feedback 2014 • 31st International Conference on Machine Learning Icml 2014 • 4:3493-3519 Azar MG, Lazaric A, Brunskill E
Conference Self-Automated Parking Lots for Autonomous Vehicles based on Vehicular Ad Hoc Networking 2014 • 2014 IEEE INTELLIGENT VEHICLES SYMPOSIUM PROCEEDINGS • 472-479 Ferreira M, Damas L, Conceicao H, d'Orey PM, Fernandes R, Steenkiste P
Conference Optimal CUR matrix decompositions 2014 • Annual ACM Symposium on Theory of Computing • 353-362 Boutsidis C, Woodruff DP
Chapter Interactive Proofs under Continual Memory Leakage 2014 • Lecture Notes in Computer Science • 8617:164-182 Ananth P, Goyal V, Pandey O
Conference Sending Secrets Swiftly: Approximation Algorithms for Generalized Multicast Problems 2014 • Lecture Notes in Computer Science • 8573:568-607 Nikzad A, Ravi R
Conference Validating Unsatisfiability Results of Clause Sharing Parallel SAT Solvers 2014 • EPiC series in computing • 27:12-13 Heule M, Manthey N, Philipp T
Chapter MUS Extraction Using Clausal Proofs 2014 • Lecture Notes in Computer Science • 8561:48-57 Belov A, Heule MJH, Marques-Silva J
Conference Phase-Concurrent Hash Tables for Determinism 2014 • PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON PARALLELISM IN ALGORITHMS AND ARCHITECTURES (SPAA'14) • 96-107 Shun J, Blelloch GE
Conference Repeated Deletion Channels 2014 • 2014 IEEE INFORMATION THEORY WORKSHOP (ITW) • 152-156 Haeupler B, Mitzenmacher M
Preprint Active Learning and Best-Response Dynamics 2014 Balcan M-F, Berlind C, Blum A, Cohen E, Patnaik K, Song L
Journal Article Phenotypic Signatures Arising from Unbalanced Bacterial Growth 2014 • PLoS Computational Biology • 10(8): Tan C, Smith RP, Tsai M-C, Schwartz R, You L
Journal Article Thresholded covering algorithms for robust and max-min optimization 2014 • Mathematical programming • 146(1-2):583-615 Gupta A, Nagarajan V, Ravi R
Preprint On Topological Properties of Wireless Sensor Networks under the q-Composite Key Predistribution Scheme with On/Off Channels 2014 Zhao J, Yağan O, Gligor V
Conference Simulating Spatial Cross-Correlation in Vehicular Networks 2014 • IEEE Vehicular Networking Conference, VNC Wang X, Anderson E, Steenkiste P, Bai F
Journal Article E-Store: Fine-Grained Elastic Partitioning for Distributed Transaction Processing Systems 2014 • Proceedings of the VLDB Endowment • 8(3):245-256 Taft R, Mansour E, Serafini M, Duggan J, Elmore AJ, Aboulnaga A, Pavlo A, Stonebraker M
Conference Finding the Pareto Curve in Bimatrix Games is Easy 2014 • AAMAS'14: PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS • 1217-1224 Gatti N, Sandholm T
Conference Diverse randomized agents vote to win 2014 • Advances in Neural Information Processing Systems • 3(January):2573-2581 Jiang AX, Marcolino LS, Procaccia AD, Sandholm T, Shah N, Tambe M
Conference Design and Implementation of a Multithreaded Virtual Machine for Executing Linear Logic Programs 2014 • PPDP'14: PROCEEDINGS OF THE 16TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING • 43-53 Cruz F, Rocha R, Goldstein SC
Conference Influence Propagation: Patterns, Model and a Case Study 2014 • Lecture Notes in Computer Science • 8443:386-397 Lin Y, Raza AA, Lee J-Y, Koutra D, Rosenfeld R, Faloutsos C