Conference Sparsest Cut on Bounded Treewidth Graphs: Algorithms and Hardness Results 2013 • Annual ACM Symposium on Theory of Computing • 281-290 Gupta A, Talwar K, Witmer D
Conference Approximability and proof complexity 2013 • PROCEEDINGS OF THE TWENTY-FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA 2013) • 1537-1556 O'Donnell R, Zhou Y
Conference Perceptual Effects of Damped and Exaggerated Facial Motion in Animated Characters 2013 • 2013 10TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOPS ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG) Hyde J, Carter EJ, Kiesler S, Hodgins JK
Conference Strong Nash equilibrium is in smoothed P 2013 • Aaai Workshop Technical Report • WS-13-17:29-31 Gatti N, Rocco M, Sandholm T
Conference Externalities in cake cutting 2013 • IJCAI International Joint Conference on Artificial Intelligence • 55-61 Brânzei S, Procaccia AD, Zhang J
Conference Low Power Optical Transceivers for Switched Interconnect Networks 2013 • International Conference on Advanced Technologies for Communications • 301-306 Audzevich Y, Watts PM, West A, Mujumdar A, Crowcroft J, Moore AW
Conference FCP: A Flexible Transport Framework for Accommodating Diversity 2013 • Computer Communication Review • 43(4):135-146 Han D, Grandl R, Akella A, Seshan S
Conference Improving Learning and Inference in a Large Knowledge-Base using Latent Syntactic Cues 2013 833-838 Gardner M, Talukdar PP, Kisiel B, Mitchell T
Chapter Computational Equivalence and Classical Recursion Theory 2013 • Emergence, Complexity and Computation • 2:297-307 Sutner K
Journal Article Mobile SCALe: Rules and Analysis for Secure Java and Android Coding 2013 Bauer L, Flynn L, Jia L, Klieber W, Long F, Sutherland DF, Svoboda D
Journal Article Polar Codes: Speed of polarization and polynomial gap to capacity 2013 • Annual Symposium on Foundations of Computer Science • 310-319 Guruswami V, Xia P
Chapter Clustering methods for moderate-to-high dimensionality data 2013 • SpringerBriefs in Computer Science • 0(9781447148890):21-32 Cordeiro RLF, Faloutsos C, Traina Júnior C
Journal Article A New Privacy-Enhanced Matchmaking Protocol 2013 • IEICE Transactions on Communications • E96B(8):2049-2059 Shin JS, Gligor VD
Conference Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference 2013 • Lecture Notes in Computer Science • 7862:112-130 Kim TH-J, Gligor V, Guajardo J, Hong J, Perrig A
Conference Multi-modal distance metric learning 2013 • IJCAI International Joint Conference on Artificial Intelligence • 1806-1812 Xie P, Xing EP
Conference Towards automatic software lineage inference 2013 • Proceedings of the 22nd Usenix Security Symposium • 81-96 Jang J, Woo M, Brumley D
Conference A cognitive assistive system for monitoring the use of home medical devices 2013 59-66 Cai Y, Yang Y, Hauptmann AG, Wactlar HD
Conference Scheduling mobile exploration tasks for environment learning 2013 • 12th International Conference on Autonomous Agents and Multiagent Systems 2013 Aamas 2013 • 2:1255-1256 Korein M, Coltin B, Veloso M
Conference Learning the Synergy of a New Teammate 2013 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 5246-5251 Liemhetcharat S, Veloso M
Journal Article Want a Good Answer? Ask a Good Question First! 2013 Yao Y, Tong H, Xie T, Akoglu L, Xu F, Lu J
Conference Accelerating K-12 computational thinking using scaffolding, staging, and abstraction 2013 609-614 Touretzky DS, Marghitu D, Ludi S, Bernstein D, Ni L
Conference Sequential transfer in multi-armed bandit with finite set of models 2013 • Advances in Neural Information Processing Systems Azar MG, Lazaric A, Brunskill E
Conference PETShop'13 welcome message 2013 • Proceedings of the ACM Conference on Computer and Communications Security Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference Topology Reconfiguration in Wi-Fi Home Networks 2013 • 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013) • 1179-1182 Nogueira J, Sargento S, Steenkiste P
Conference Reducing contention through priority updates 2013 152-163 Shun J, Blelloch GE, Fineman JT, Gibbons PB
Journal Article The Convergence of Machine and Biological Intelligence 2013 • IEEE Intelligent Systems • 28(5):28-33 Wu Z, Reddy R, Wu Z, Pan G, Zheng N
Journal Article Fast Structuring of Radio Networks Large for Multi-message Communications 2013 • Lecture Notes in Computer Science • 8205:492-506 Ghaffari M, Haeupler B
Preprint Expressing Ethnicity through Behaviors of a Robot Character 2013 Makatchev M, Simmons R, Sakr M, Ziadee M
Conference Clustering under Approximation Stability 2013 • Journal of the ACM • 60(2): Balcan M-F, Blum A, Gupta A
Journal Article Evaluating the Distinctiveness and Attractiveness of Human Motions on Realistic Virtual Bodies 2013 • ACM Transactions on Graphics • 32(6): Hoyet L, Ryall K, Zibrek K, Park H, Lee J, Hodgins J, O'Sullivan C
Conference Using IF-scale delays to emulate the effects of site-specific multipath in a digital wireless channel emulator 2013 41-48 Matusiak J, Graham R, Taylor K, Anderson E, Walker B
Journal Article Style and Abstraction in Portrait Sketching 2013 • ACM Transactions on Graphics • 32(4): Berger I, Shamir A, Mahler M, Carter E, Hodgins J
Preprint Low latency via redundancy 2013 Vulimiri A, Godfrey PB, Mittal R, Sherry J, Ratnasamy S, Shenker S
Conference Audit games 2013 • IJCAI International Joint Conference on Artificial Intelligence • 41-47 Blocki J, Christin N, Datta A, Procaccia AD, Sinha A
Conference Maneuver-Based Autonomous Navigation of a Small Fixed-Wing UAV 2013 • IEEE International Conference on Robotics and Automation • 3961-3968 Hwangbo M, Kanade T
Conference Classifier Introducing Transition Likelihood Model Based on Quantization Residual 2013 • 2013 SECOND IAPR ASIAN CONFERENCE ON PATTERN RECOGNITION (ACPR 2013) • 272-277 Yamauchi Y, Kanade T, Fujiyoshi H
Conference A Reference Architecture for Mobile Code Offload in Hostile Environments 2013 • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering • 110:274-293 Simanta S, Ha K, Lewis G, Morris E, Satyanarayanan M
Conference Authentication for Resilience: The Case of SDN 2013 • Lecture Notes in Computer Science • 8263:39-44 Yu D, Moore AW, Hall C, Anderson R
Conference Fast Outlier Detection Despite the Duplicates 2013 • PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION) • 195-196 Lee J-Y, Kang U, Koutra D, Faloutsos C
Conference Fractional immunization in networks 2013 • Proceedings of the 2013 SIAM International Conference on Data Mining Sdm 2013 • 659-667 Prakash BA, Adamic L, Iwashyna T, Tong H, Faloutsos C
Conference Mixed Membership Subspace Clustering 2013 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 221-230 Guennemann S, Faloutsos C
Journal Article Augmented intelligence: the Web and human intelligence 2013 • Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences • 371(1987):20120383 von Ahn L
Conference Learning Discriminative Sufficient Statistics Score Space for Classification 2013 • Lecture Notes in Computer Science • 7908:49-64 Li X, Wang B, Liu Y, Lee TS