Conference The first workshop on language support for privacy-enhancing technologies (PETShop'13) 2013 • Proceedings of the ACM Conference on Computer and Communications Security • 1485-1486 Franz M, Holzer A, Majumdar R, Parno B, Veith H
Conference Communication-Efficient Distributed Multiple Reference Pattern Matching for M2M Systems 2013 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 787-796 Wang J-P, Lu Y-C, Yeh M-Y, Lin S-D, Gibbons PB
Journal Article Android Apps: What are they doing with your precious Internet? 2013 • Adv. Math. Commun. • 2: Tang A, Rao A, Sherry J, Choffnes DR
Conference Model-Checking Signal Transduction Networks through Decreasing Reachability Sets 2013 • Lecture Notes in Computer Science • 8044:85-100 Claessen K, Fisher J, Ishtiaq S, Piterman N, Wang Q
Conference Trimming while Checking Clausal Proofs 2013 • 2013 FORMAL METHODS IN COMPUTER-AIDED DESIGN (FMCAD) • 181-188 Heule MJH, Hunt WAJ, Wetzler N
Chapter Mechanical Verification of SAT Refutations with Extended Resolution 2013 • Lecture Notes in Computer Science • 7998:229-244 Wetzler N, Heule MJH, Hunt WAJ
Preprint Cops, Robbers, and Threatening Skeletons: Padded Decomposition for Minor-Free Graphs 2013 Abraham I, Gavoille C, Gupta A, Neiman O, Talwar K
Conference Ligra: A Lightweight Graph Processing Framework for Shared Memory 2013 • ACM Sigplan Notices • 48(8):135-146 Shun J, Blelloch GE
Conference Foreword 2013 • Annual ACM Symposium on Parallelism in Algorithms and Architectures Vöcking B, Blelloch G
Journal Article DETERMINISTIC ALGORITHMS FOR THE LOVASZ LOCAL LEMMA 2013 • SIAM journal on computing (Print) • 42(6):2132-2155 Chandrasekaran K, Goyal N, Haeupler B
Preprint Distributed k-Means and k-Median Clustering on General Topologies 2013 Balcan MF, Ehrlich S, Liang Y
Conference Packing Interdiction and Partial Covering Problems 2013 • Lecture Notes in Computer Science • 7801:157-168 Dinitz M, Gupta A
Preprint Contextually Supervised Source Separation with Application to Energy Disaggregation 2013 Wytock M, Kolter JZ
Conference Action translation in extensive-form games with large action spaces: Axioms, paradoxes, and the pseudo-harmonic mapping 2013 • IJCAI International Joint Conference on Artificial Intelligence • 120-128 Ganzfried S, Sandholm T
Journal Article Apoptosis Detection for Non-adherent Cells in Time-lapse Phase Contrast Microscopy 2013 • Lecture Notes in Computer Science • 8150:59-66 Huh S, Kanade T
Conference Scheduling Algorithms for MU-MIMO with Partial Current CSIT and Full Delayed CSIT 2013 • IEEE Vehicular Technology Conference • 1-7 Rawat AS, Bursalioglu OY, Papadopoulos HC
Conference Lowering the barriers to large-scale mobile crowdsensing 2013 1-6 Xiao Y, Simoens P, Pillai P, Ha K, Satyanarayanan M
Conference Cooperative empirical failure avoidance for multithreaded programs 2013 • ACM Sigplan Notices • 48(4):39-50 Lucia B, Ceze L
Journal Article Cooperative empirical failure avoidance for multithreaded programs 2013 • Computer architecture news • 41(1):39-50 Lucia B, Ceze L
Conference Developing a predictive model of quality of experience for internet video 2013 339-350 Balachandran A, Sekar V, Akella A, Seshan S, Stoica I, Zhang H
Conference D elta C on : A Principled Massive-Graph Similarity Function 2013 162-170 Koutra D, Vogelstein JT, Faloutsos C
Conference Analysis of the reputation system and user contributions on a question answering website 2013 886-893 Movshovitz-Attias D, Movshovitz-Attias Y, Steenkiste P, Faloutsos C
Chapter Universality, Turing Incompleteness and Observers 2013 • COMPUTABLE UNIVERSE: UNDERSTANDING AND EXPLORING NATURE AS COMPUTATION • 435-449 Sutner K
Journal Article Dynamic well-spaced point sets 2013 • Computational Geometry: Theory and Applications • 46(6):756-773 Acar UA, Cotter A, Hudson B, Turkoglu D
Conference Modeling and Detecting Community Hierarchies 2013 • Lecture Notes in Computer Science • 7953:160-175 Balcan MF, Liang Y
Conference Detecting Insider Threats in a Real corporate Database of Computer Usage Activity 2013 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 1393-1401 Faloutsos C, and others
Journal Article Restricted Isometry of Fourier Matrices and List Decodability of Random Linear Codes 2013 • PROCEEDINGS OF THE TWENTY-FOURTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS (SODA 2013) • 432-442 Cheraghchi M, Guruswami V, Velingker A
Conference Introducing Tool-Supported Architecture Review into Software Design Education 2013 • Software Engineering Education Conference, Proceedings • 70-79 Cai Y, Kazman R, Jaspan C, Aldrich J
Conference Combinatorial Limitations of Average-Radius List Decoding 2013 • Lecture Notes in Computer Science • 8096:591-606 Guruswami V, Narayanan S
Journal Article Structured association analysis leads to insight into <i>Saccharomyces cerevisiae</i> gene regulation by finding multiple contributing eQTL hotspots associated with functional gene modules 2013 • BMC Genomics • 14: Curtis RE, Kim S, Woolford JLJ, Xu W, Xing EP
Conference The Crossfire Attack 2013 • IEEE Symposium on Security and Privacy: Proceedings • 127-141 Kang MS, Lee SB, Gligor VD
Conference Accountable key infrastructure (AKI) 2013 679-690 Kim TH-J, Huang L-S, Perrig A, Jackson C, Gligor V
Conference Integrating document clustering and topic modeling 2013 • Uncertainty in Artificial Intelligence Proceedings of the 29th Conference Uai 2013 • 694-703 Xie P, Xing EP
Book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 2013 • Lecture Notes in Computer Science • 7475 LNCS:V-VIII De Lemos R, Giese H, Müller HA, Shaw M
Conference Large-scale Probabilistic Forecasting in Energy Systems using Sparse Gaussian Conditional Random Fields 2013 • Proceedings of the ... IEEE Conference on Decision & Control / IEEE Control Systems Society. IEEE Conference on Decision & Control • 1019-1024 Wytock M, Kolter JZ
Conference Practical Batch-Updatable External Hashing with Sorting 2013 • Proceedings of the Workshop on Algorithm Engineering and Experiments • 173-182 Lim H, Andersen DG, Kaminsky M
Conference Web-based remote assistance to overcome robot perceptual limitations 2013 • Aaai Workshop Technical Report • WS-13-10:114-116 Ventura R, Coltin B, Veloso M
Journal Article AN EMPIRICAL INVESTIGATION OF SPARSE LOG-LINEAR MODELS FOR IMPROVED DIALOGUE ACT CLASSIFICATION 2013 • Proceedings of the ... IEEE International Conference on Acoustics, Speech, and Signal Processing / sponsored by the Institute of Electrical and Electronics Engineers Signal Processing Society. ICASSP (Conference) • 8317-8321 Chen Y-N, Wang WY, Rudnicky AI
Conference Bringing cross-layer MIMO to today's wireless LANs 2013 387-398 Kumar S, Cifuentes D, Gollakota S, Katabi D
Journal Article Formal verification of synchronous data-flow program transformations toward certified compilers 2013 • Frontiers of Computer Science • 7(5):598-616 Ngo VC, Talpin J-P, Gautier T, Le Guernic P, Besnard L
Conference Low latency via redundancy. 2013 • CoNEXT • 283-294 Vulimiri A, Godfrey PB, Mittal R, Sherry J, Ratnasamy S, Shenker S
Conference Reducing contention through priority updates 2013 299-300 Shun J, Blelloch GE, Fineman JT, Gibbons PB
Conference Using Human Approach Paths to Improve Social Navigation 2013 • ACM/IEEE International Conference on Human-Robot Interaction • 73-74 Avrunin E, Simmons R
Conference A Stochastic Probing Problem with Applications 2013 • Lecture Notes in Computer Science • 7801:205-216 Gupta A, Nagarajan V