Journal Article Graph Estimation From Multi-Attribute Data 2014 • Journal of machine learning research • 15:1713-1750 Kolar M, Liu H, Xing EP
Journal Article Evolution styles: foundations and models for software architecture evolution 2014 • Software and Systems Modeling (SoSyM) • 13(2):649-678 Barnes JM, Garlan D, Schmerl B
Conference Stochastic Game Analysis and Latency Awareness for Proactive Self-Adaptation 2014 • 9TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2014) • 155-164 Camara J, Moreno GA, Garlan D
Conference Marhaba, how may i help you? 2014 • ACM/IEEE International Conference on Human-Robot Interaction • 74-81 Salem M, Ziadee M, Sakr M
Conference Multiple Hypothesis for Object Class Disambiguation from Multiple Observations 2014 91-98 Brandão S, Veloso M, Costeira JP
Journal Article Depth-based short-sighted stochastic shortest path problems 2014 • Artificial Intelligence • 216:179-205 Trevizan FW, Veloso MM
Conference SEM2 suite - Towards a tool suite for supporting knowledge management in situation awareness systems 2014 • Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration IEEE Iri 2014 • 351-360 Salfinger A, Neidhart D, Retschitzegger W, Schwinger W, Mitsch S
Conference Task based dialog for service mobile robot 2014 • Aaai Fall Symposium Technical Report • FS-14-01:124-125 Perera V, Veloso M
Conference Missive: Fast application launch from an untrusted buffer cache 2014 • Proceedings of the 2014 Usenix Annual Technical Conference Usenix Atc 2014 • 145-156 Howell J, Elson J, Parno B, Douceur JR
Conference Is min-wise hashing optimal for summarizing set intersection? 2014 109-120 Pagh R, Stöckel M, Woodruff DP
Conference Natural temporal difference learning 2014 • Proceedings of the National Conference on Artificial Intelligence • 3:1767-1773 Dabney W, Thomas PS
Journal Article Structural Focalization 2014 • ACM Transactions on Computational Logic • 15(3): Simmons RJ
Preprint Universal and Distinct Properties of Communication Dynamics: How to Generate Realistic Inter-event Times 2014 de Melo POSV, Faloutsos C, Assunção R, Alves R, Loureiro AAF
Preprint Revisit Behavior in Social Media: The Phoenix-R Model and Discoveries 2014 Figueiredo F, Almeida JM, Matsubara Y, Ribeiro B, Faloutsos C
Preprint How to Convexify the Intersection of a Second Order Cone and a Nonconvex Quadratic 2014 Burer S, Kilinc-Karzan F
Journal Article Exact analysis of the M/M/k/setup class of Markov chains via recursive renewal reward 2014 • Queueing Systems • 77(2):177-209 Gandhi A, Doroudi S, Harchol-Balter M, Scheller-Wolf A
Journal Article Constraint Handling Rules with Multiset Comprehension Patterns 2014 Lam ESL, Cervesato I
Conference Hardness of Robust Graph Isomorphism, Lasserre Gaps, and Asymmetry of Random Graphs 2014 1659-1677 O'Donnell R, Wright J, Wu C, Zhou Y
Journal Article End-to-end verification of stack-space bounds for C programs 2014 • ACM Sigplan Notices • 49(6):270-281 Carbonneaux Q, Hoffmann J, Ramananandro T, Shao Z
Conference A passively safe and gravity-counterbalanced anthropomorphic robot arm 2014 • IEEE International Conference on Robotics and Automation • 6168-6173 Whitney JP, Hodgins JK
Conference Modal Ranking: A Uniquely Robust Voting Rule 2014 • Proceedings of the ... AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence • 616-622 Caragiannis I, Procaccia AD, Shah N
Journal Article Exploring the Candidate/Donor Compatibility Matrix to Identify Opportunities to Improve the OPTN KPD Pilot Program's Priority Point Schedule. 2014 • Transplantation • 98:481 Stewart D, Leishman R, Kucheryavaya A, Formica R, Aeder M, Bingaman A, Gentry S, Sandholm T, Ashlagi I
Journal Article Super-mature society and quality of life technology 2014 • Journal- Institute of Electronics Information and Communication Engineers • 97(1):39-42 Kanade T
Conference Inferring Strange Behavior from Connectivity Pattern in Social Networks 2014 • Lecture Notes in Computer Science • 8443:126-138 Jiang M, Cui P, Beutel A, Faloutsos C, Yang S
Conference Lightweight Source Authentication and Path Validation 2014 • Computer Communication Review • 271-282 Kim TH-J, Basescu C, Jia L, Lee SB, Hu Y-C, Perrig A
Journal Article CONSTANT FACTOR LASSERRE INTEGRALITY GAPS FOR GRAPH PARTITIONING PROBLEMS 2014 • SIAM Journal on Optimization • 24(4):1698-1717 Guruswami V, Sinop AK, Zhou Y
Conference Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing 2014 • PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM • 17-32 Fredrikson M, Lantz E, Jha S, Lin S, Page D, Ristenpart T
Journal Article Identifying Autism from Neural Representations of Social Interactions: Neurocognitive Markers of Autism 2014 • PLoS ONE • 9(12): Just MA, Cherkassky VL, Buchweitz A, Keller TA, Mitchell TM
Journal Article Exploiting Genome Structure in Association Analysis 2014 • Journal of Computational Biology • 21(4):345-360 Kim S, Xing EP
Journal Article Bayesian Inference with Posterior Regularization and Applications to Infinite Latent SVMs 2014 • Journal of machine learning research • 15:1799-1847 Zhu J, Chen N, Xing EP
Journal Article Multivariate analysis of correlation between electrophysiological and hemodynamic responses during cognitive processing 2014 • NeuroImage • 92:207-216 Kujala J, Sudre G, Vartiainen J, Liljeström M, Mitchell T, Salmelin R
Journal Article On the Strengths of Connectivity and Robustness in General Random Intersection Graphs 2014 • Proceedings of the ... IEEE Conference on Decision & Control / IEEE Control Systems Society. IEEE Conference on Decision & Control • 3661-3668 Zhao J, Yagan O, Gligor V
Conference Security Limitations of Virtualization and How to Overcome Them (Transcript of Discussion) 2014 • Lecture Notes in Computer Science • 7061:252-265 Gligor V
Journal Article Characterizing Web Page Complexity and Its Impact 2014 • IEEE/ACM Transactions on Networking • 22(3):943-956 Butkiewicz M, Madhyastha HV, Sekar V
Journal Article A Framework to Quantify the Benefits of Network Functions Virtualization in Cellular Networks 2014 Qazi ZA, Sekar V, Das S
Journal Article Contract-Based Integration of Cyber-Physical Analyses 2014 Ruchkin I, De Niz D, Chaki S, Garlan D
Conference Algorithmic improvements for fast concurrent Cuckoo hashing 2014 1-14 Li X, Andersen DG, Kaminsky M, Freedman MJ
Conference Scaling distributed machine learning with the parameter server 2014 • Proceedings of the 11th Usenix Symposium on Operating Systems Design and Implementation Osdi 2014 • 583-598 Li M, Andersen DG, Park JW, Smola AJ, Ahmed A, Josifovski V, Long J, Shekita EJ, Su BY
Conference Min(e)d Your Tags: Analysis of Question Response Time in StackOverflow 2014 • 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014) • 328-335 Bhat V, Gokhale A, Jadhav R, Pudipeddi J, Akoglu L
Conference User Churn in Focused Question Answering Sites: Characterizations and Prediction 2014 • WWW'14 COMPANION: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON WORLD WIDE WEB • 469-474 Pudipeddi J, Akoglu L, Tong H
Chapter Network Anomaly Detection Using Co-clustering 2014 1054-1068 Papalexakis EE, Beutel A, Steenkiste P
Conference Toward efficient, privacy-aware media classification on public databases 2014 49-56 Fanti G, Finiasz M, Friedland G, Ramchandran K
Conference How Experts Can Solve LPs Online 2014 • Lecture Notes in Computer Science • 8737:517-529 Gupta A, Molinaro M
Journal Article Optimal Lower Bounds for Locality-Sensitive Hashing (Except When q is Tiny) 2014 • ACM Transactions on Computation Theory • 6(1):1-13 O’Donnell R, Wu Y, Zhou Y