Conference Shedding Light on the Structure of Internet Video Quality Problems in the Wild 2013 • PROCEEDINGS OF THE 2013 ACM INTERNATIONAL CONFERENCE ON EMERGING NETWORKING EXPERIMENTS AND TECHNOLOGIES (CONEXT '13) • 357-368 Jiang J, Sekar V, Stoica I, Zhang H
Conference Understanding internet video viewing behavior in the wild 2013 379-380 Balachandran A, Sekar V, Akella A, Seshan S
Conference Software Engineering for Self-Adaptive Systems: A Second Research Roadmap 2013 • Lecture Notes in Computer Science • 7475:1-32 Shaw M, and others
Conference Interruptable autonomy: Towards dialog-based robot task management 2013 • Aaai Workshop Technical Report • WS-13-10:92-97 Sun Y, Coltin B, Veloso M
Conference Fast Human Detection for Indoor Mobile Robots Using Depth Images 2013 • IEEE International Conference on Robotics and Automation • 1108-1113 Choi B, Mericli C, Biswas J, Veloso M
Journal Article Heterogeneous Context-Aware Robots Providing a Personalized Building Tour Regular Paper 2013 • International Journal of Advanced Robotic Systems • 10: Hristoskova A, Agueero CE, Veloso M, De Turck F
Journal Article Formal verification of synchronous data-flow program transformations toward certified compilers 2013 • Frontiers of Computer Science • 7(5):598-616 Ngo VC, Talpin J-P, Gautier T, Le Guernic P, Besnard L
Conference Low latency via redundancy. 2013 • CoNEXT • 283-294 Vulimiri A, Godfrey PB, Mittal R, Sherry J, Ratnasamy S, Shenker S
Conference Reducing contention through priority updates 2013 299-300 Shun J, Blelloch GE, Fineman JT, Gibbons PB
Conference Using Human Approach Paths to Improve Social Navigation 2013 • ACM/IEEE International Conference on Human-Robot Interaction • 73-74 Avrunin E, Simmons R
Conference A Stochastic Probing Problem with Applications 2013 • Lecture Notes in Computer Science • 7801:205-216 Gupta A, Nagarajan V
Conference Applicability of Rough Set Technique for Data Investigation and Optimization of Intrusion Detection System 2013 • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering • 115:479-484 Roy SS, Viswanatham VM, Krishna PV, Saraf N, Gupta A, Mishra R
Conference Analysis and optimization of multi-dimensional percentile mechanisms 2013 • IJCAI International Joint Conference on Artificial Intelligence • 367-374 Sui X, Boutilier C, Sandholm T
Conference Monotonic Maximin: A Robust Stackelberg Solution against Boundedly Rational Followers 2013 • Lecture Notes in Computer Science • 8252:119-139 Jiang AX, Nguyen TH, Tambe M, Procaccia AD
Journal Article Discriminative Data Transform for Image Feature Extraction and Classification 2013 • Lecture Notes in Computer Science • 8150:452-459 Song Y, Cai W, Huh S, Chen M, Kanade T, Zhou Y, Feng D
Conference The Secrecy Capacity of Minimum Bandwidth Cooperative Regenerating Codes 2013 • IEEE International Symposium on Information Theory - Proceedings • 1421-1425 Koyluoglu OO, Rawat AS, Vishwanath S
Journal Article Optimizing Storage Performance for VM-Based Mobile Computing 2013 • ACM Transactions on Computer Systems • 31(2): Smaldone S, Gilbert B, Harkes J, Iftode L, Satyanarayanan M
Journal Article OpenSlide: A vendor-neutral software foundation for digital pathology 2013 • Journal of Pathology Informatics • 4(1):27 Goode A, Gilbert B, Harkes J, Jukic D, Satyanarayanan M
Conference Cooperative empirical failure avoidance for multithreaded programs 2013 39-50 Lucia B, Ceze L
Conference EEG-MINE: Mining and Understanding Epilepsy Data 2013 • Lecture Notes in Computer Science • 7867:155-167 Kim S, Faloutsos C, Yang H-J
Conference F-Trail: Finding Patterns in Taxi Trajectories 2013 • Lecture Notes in Computer Science • 7818:86-98 Matsubara Y, Li L, Papalexakis E, Lo D, Sakurai Y, Faloutsos C
Conference D elta C on : A Principled Massive-Graph Similarity Function 2013 162-170 Koutra D, Vogelstein JT, Faloutsos C
Conference Analysis of the reputation system and user contributions on a question answering website 2013 886-893 Movshovitz-Attias D, Movshovitz-Attias Y, Steenkiste P, Faloutsos C
Chapter Universality, Turing Incompleteness and Observers 2013 • COMPUTABLE UNIVERSE: UNDERSTANDING AND EXPLORING NATURE AS COMPUTATION • 435-449 Sutner K
Journal Article Dynamic well-spaced point sets 2013 • Computational Geometry: Theory and Applications • 46(6):756-773 Acar UA, Cotter A, Hudson B, Turkoglu D
Conference Modeling and Detecting Community Hierarchies 2013 • Lecture Notes in Computer Science • 7953:160-175 Balcan MF, Liang Y
Conference Detecting Insider Threats in a Real corporate Database of Computer Usage Activity 2013 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 1393-1401 Faloutsos C, and others
Journal Article Restricted Isometry of Fourier Matrices and List Decodability of Random Linear Codes 2013 • PROCEEDINGS OF THE TWENTY-FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA 2013) • 432-442 Cheraghchi M, Guruswami V, Velingker A
Conference Introducing Tool-Supported Architecture Review into Software Design Education 2013 • Software Engineering Education Conference, Proceedings • 70-79 Cai Y, Kazman R, Jaspan C, Aldrich J
Conference Combinatorial Limitations of Average-Radius List Decoding 2013 • Lecture Notes in Computer Science • 8096:591-606 Guruswami V, Narayanan S
Journal Article Structured association analysis leads to insight into <i>Saccharomyces cerevisiae</i> gene regulation by finding multiple contributing eQTL hotspots associated with functional gene modules 2013 • BMC Genomics • 14: Curtis RE, Kim S, Woolford JLJ, Xu W, Xing EP
Conference The Crossfire Attack 2013 • IEEE Symposium on Security and Privacy: Proceedings • 127-141 Kang MS, Lee SB, Gligor VD
Conference Accountable key infrastructure (AKI) 2013 679-690 Kim TH-J, Huang L-S, Perrig A, Jackson C, Gligor V
Conference Integrating document clustering and topic modeling 2013 • Uncertainty in Artificial Intelligence Proceedings of the 29th Conference Uai 2013 • 694-703 Xie P, Xing EP
Book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 2013 • Lecture Notes in Computer Science • 7475 LNCS:V-VIII De Lemos R, Giese H, Müller HA, Shaw M
Conference Large-scale Probabilistic Forecasting in Energy Systems using Sparse Gaussian Conditional Random Fields 2013 • Proceedings of the ... IEEE Conference on Decision & Control / IEEE Control Systems Society. IEEE Conference on Decision & Control • 1019-1024 Wytock M, Kolter JZ
Conference Practical Batch-Updatable External Hashing with Sorting 2013 • Proceedings of the Workshop on Algorithm Engineering and Experiments • 173-182 Lim H, Andersen DG, Kaminsky M
Conference Web-based remote assistance to overcome robot perceptual limitations 2013 • Aaai Workshop Technical Report • WS-13-10:114-116 Ventura R, Coltin B, Veloso M
Journal Article AN EMPIRICAL INVESTIGATION OF SPARSE LOG-LINEAR MODELS FOR IMPROVED DIALOGUE ACT CLASSIFICATION 2013 • Proceedings of the ... IEEE International Conference on Acoustics, Speech, and Signal Processing / sponsored by the Institute of Electrical and Electronics Engineers Signal Processing Society. ICASSP (Conference) • 8317-8321 Chen Y-N, Wang WY, Rudnicky AI
Conference Bringing cross-layer MIMO to today's wireless LANs 2013 387-398 Kumar S, Cifuentes D, Gollakota S, Katabi D
Conference CCSW chairs' welcome 2013 • Proceedings of the ACM Conference on Computer and Communications Security Juels A, Parno B
Chapter A Tight Lower Bound for High Frequency Moment Estimation with Small Error 2013 • Lecture Notes in Computer Science • 8096:623-638 Li Y, Woodruff DP
Conference PARROT: A Practical Runtime for Deterministic, Stable, and Reliable Threads 2013 • SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES • 388-405 Cui H, Simsa J, Lin Y-H, Li H, Blum B, Xu X, Yang J, Gibson GA, Bryant RE
Conference Scalable Dynamic Partial Order Reduction 2013 • Lecture Notes in Computer Science • 7687:19-34 Simsa J, Bryant R, Gibson G, Hickey J