Conference Higher-order functional reactive programming in bounded space 2012 • ACM Sigplan Notices • 47(1):45-58 Krishnaswami NR, Benton N, Hoffmann J
Conference A Framework for Automated Bundling and Pricing Using Purchase Data 2012 • Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering • 80:40-52 Benisch M, Sandholm T
Conference Optimal social choice functions 2012 197-214 Boutilier C, Caragiannis I, Haber S, Lu T, Procaccia AD, Sheffet O
Journal Article Phase Contrast Image Restoration via Dictionary Representation of Diffraction Patterns 2012 • Lecture Notes in Computer Science • 7512:615-622 Su H, Yin Z, Kanade T, Huh S
Journal Article Diversity or Difference? New Research Supports the Case for a Cultural Perspective on Women in Computing 2012 • Journal of Science Education and Technology • 21(4):423-439 Frieze C, Quesenberry JL, Kemp E, Velazquez A
Conference Mobile robot planning to seek help with spatially-situated tasks 2012 • Proceedings of the National Conference on Artificial Intelligence • 3:2067-2073 Rosenthal S, Yeloso M
Conference EigenBot 2012 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 1-8 Mao C-H, Lin C-C, Pan J-Y, Chang K-C, Faloutsos C, Lee H-M
Journal Article Active Clustering of Biological Sequences 2012 • Journal of machine learning research • 13:203-225 Voevodski K, Balcan M-F, Roeglin H, Teng S-H, Xia Y
Journal Article Islands and Bridges: Making Sense of Marked Nodes in Large Graphs 2012 Akoglu L, Vreeken J, Tong H, Chau DH, Faloutsos C
Book Graph Mining, Laws, Tools, and Case Studies 2012 • Synthesis Lectures on Data Mining and Knowledge Discovery Chakrabarti D, Faloutsos C
Journal Article Leveraging input and output structures for joint mapping of epistatic and marginal eQTLs 2012 • Bioinformatics • 28(12):I137-I146 Lee S, Xing EP
Conference Street-Level Trust Semantics for Attribute Authentication 2012 • Lecture Notes in Computer Science • 7622:96-115 Kim TH-J, Gligor V, Perrig A
Conference On Multiple Foreground Cosegmentation 2012 • Proceedings / CVPR, IEEE Computer Society Conference on Computer Vision and Pattern Recognition. IEEE Computer Society Conference on Computer Vision and Pattern Recognition • 837-844 Kim G, Xing EP
Conference Unleashing MAYHEM on Binary Code 2012 • IEEE Symposium on Security and Privacy: Proceedings • 380-394 Cha SK, Avgerinos T, Rebert A, Brumley D
Conference CCS 2012 program chairs' welcome 2012 • Proceedings of the ACM Conference on Computer and Communications Security Gligor V, Danezis G
Journal Article Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service 2012 • Computer Communication Review • 42(4):13-24 Sherry J, Hasan S, Scott C, Krishnamurthy A, Ratnasamy S, Sekar V
Journal Article What's the value proposition of distance education? 2012 • ACM Inroads • 3(3):26-28 Petre M, Shaw M
Conference Weighted Synergy Graphs for Role Assignment in Ad Hoc Heterogeneous Robot Teams 2012 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 5247-5254 Liemhetcharat S, Veloso M
Chapter Describing Timed System Behavior 2012 • Synthesis Lectures on Computer Science • 11-18 Kaynar DK, Lynch N, Segala R, Vaandrager F
Conference Nifty assignments 2012 475-476 Parlante N, Zelenski J, Zingaro D, Wayne K, O'Hallaron D, Guerin JT, Davies S, Kurmas Z, Debby K
Journal Article The AAAI 2011 Robot Exhibition 2012 • AI Magazine • 33(1):43-50 Chernova S, Dodds Z, Stilman M, Touretzky DS, Thomaz AL
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test Cset 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Impact of Data Collecting Techniques on the Performance of a Wireless Sensor Network 2012 • Proceedings of the International Symposium on Wireless Communication Systems • 1:111-115 Abdellatif MM, Oliveira JM, Ricardo M, Steenkiste P
Conference The Power and Challenges of Transformative I/O 2012 144-154 Manzanares A, Bent J, Wingate M, Gibson G
Conference Risk-variant policy switching to exceed reward thresholds 2012 • Icaps 2012 Proceedings of the 22nd International Conference on Automated Planning and Scheduling • 83-91 Kane B, Simmons R
Conference Some Typical Properties of the Spatial Preferred Attachment Model 2012 • Lecture Notes in Computer Science • 7323:29-40 Cooper C, Frieze A, Prałat P
Journal Article Network Coded Gossip with Correlated Data 2012 • IEEE International Symposium on Information Theory - Proceedings Haeupler B, Cohen A, Avin C, Medard M
Preprint Distributed Learning, Communication Complexity and Privacy 2012 Balcan M-F, Blum A, Fine S, Mansour Y
Journal Article On the (Im)possibility of Obfuscating Programs 2012 • Journal of the ACM • 59(2): Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K
Book Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface 2012 • Lecture Notes in Computer Science • 7292 LNBI: Bleris L, Mǎndoiu I, Schwartz R, Wang J
Conference Canonicity for 2-Dimensional Type Theory 2012 • Conference Record of the Annual ACM Symposium on Principles of Programming Languages • 337-348 Licata DR, Harper R
Conference ONLINE AND STOCHASTIC SURVIVABLE NETWORK DESIGN 2012 • SIAM journal on computing (Print) • 41(6):1649-1672 Gupta A, Krishnaswamy R, Ravi R
Preprint The Fast Cauchy Transform and Faster Robust Linear Regression 2012 Clarkson KL, Drineas P, Magdon-Ismail M, Mahoney MW, Meng X, Woodruff DP
Journal Article Apoptosis Detection for Adherent Cell Populations in Time-Lapse Phase-Contrast Microscopy Images 2012 • Lecture Notes in Computer Science • 7510:331-339 Huh S, Ker DFE, Su H, Kanade T
Journal Article On unified view of nullspace-type conditions for recoveries associated with general sparsity structures 2012 • CoRR • abs/1207.1119: Juditsky AB, Kilinç-Karzan F, Nemirovski A
Conference Signposts 2012 83-84 Chaudhry A, Madhavapeddy A, Rotsos C, Mortier R, Aucinas A, Crowcroft J, Eide SP, Hand S, Moore AW, Vallina-Rodriguez N
Conference Top-N recommendation through belief propagation 2012 2343-2346 Ha J, Kwon S-H, Kim S-W, Faloutsos C, Park S
Conference Mitigating the true cost of advertisement-supported "free" mobile applications 2012 1-6 Khan AJ, Subbaraju V, Misra A, Seshan S
Conference RPT: Re-architecting loss protection for content-aware networks 2012 • Proceedings of Nsdi 2012 9th Usenix Symposium on Networked Systems Design and Implementation • 71-84 Han D, Anand A, Akella A, Seshan S
Conference Iterating Invertible Binary Transducers 2012 • Lecture Notes in Computer Science • 7386:294-306 Sutner K, Lewi K
Journal Article Competing Memes Propagation on Networks: A Case Study of Composite Networks 2012 • Computer Communication Review • 42(5):5-11 Wei X, Valler N, Prakash BA, Neamtiu I, Faloutsos M, Faloutsos C
Conference GigaTensor 2012 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 316-324 Kang U, Papalexakis E, Harpale A, Faloutsos C
Journal Article Identifying bilingual semantic neural representations across languages 2012 • Brain and Language • 120(3):282-289 Buchweitz A, Shinkareva SV, Mason RA, Mitchell TM, Just MA
Conference Never Ending Learning 2012 • Frontiers in Artificial Intelligence and Applications • 242:5-5 Mitchell TM
Conference Monte Carlo methods for maximum margin supervised topic models 2012 • Advances in Neural Information Processing Systems • 2:1592-1600 Jiang Q, Zhu J, Sun M, Xing EP
Journal Article Robust Estimation of Local Genetic Ancestry in Admixed Populations Using a Nonparametric Bayesian Approach 2012 • Genetics • 191(4):1295-1308 Sohn K-A, Ghahramani Z, Xing EP