Journal Article Fast Memory-efficient Anomaly Detection in Streaming Heterogeneous Graphs 2016 • Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining • 1035-1044 Manzoor E, Milajerdi SM, Akoglu L
Conference Sequential Ensemble Learning for Outlier Detection: A Bias-Variance Perspective 2016 1167-1172 Rayana S, Zhong W, Akoglu L
Chapter Fall Prediction for New Sequences of Motions 2016 • Springer Tracts in Advanced Robotics • 109:849-864 Tay J, Chen I-M, Veloso M
Conference Communication lower bounds for statistical estimation problems via a distributed data processing inequality 2016 • Annual ACM Symposium on Theory of Computing • 1011-1020 Braverman M, Garg A, Ma T, Nguyen HL, Woodruff DP
Conference Autonomous Mapping between Motions and Labels 2016 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 3333-3338 Tay J, Chen I-M, Veloso M
Conference Energetic natural gradient descent 2016 • 33rd International Conference on Machine Learning, ICML 2016 • 6:4235-4247 Thomas PS, Da Silva BC, Dann C, Brunskill E
Conference Interface Design Optimization as a Multi-Armed Bandit Problem 2016 • Cost Engineering (Morgantown) • 4142-4153 Lomas JD, Forlizzi J, Poonwala N, Patel N, Shodhan S, Patel K, Koedinger K, Brunskill E
Conference LASP: Look-Ahead Spatial Protocol for Vehicular Multi-hop Communication 2016 • IEEE Vehicular Networking Conference, VNC Meireles R, Steenkiste P, Barros J, Moura DC
Conference The Quest for Perfect and Compact Symmetry Breaking for Graph Problems 2016 149-156 Heule MJH
Conference Analysis of computing policies using sat solvers 2016 • Lecture Notes in Computer Science • 10083 LNCS:190-194 Heule MJH, Reaz R, Acharya HB, Gouda MG
Chapter Distinct-Values Estimation over Data Streams 2016 • DATA STREAM MANAGEMENT: PROCESSING HIGH-SPEED DATA STREAMS • 121-147 Gibbons PB
Preprint Scalable Influence Maximization for Multiple Products in Continuous-Time Diffusion Networks 2016 Du N, Liang Y, Balcan M-F, Gomez-Rodriguez M, Zha H, Song L
Journal Article Modeling Effects of RNA on Capsid Assembly Pathways via Coarse-Grained Stochastic Simulation 2016 • PLoS ONE • 11(5): Smith GR, Xie L, Schwartz R
Journal Article Discovery Through Gossip 2016 • Random structures & algorithms (Print) • 48(3):565-587 Haeupler B, Pandurangan G, Peleg D, Rajaraman R, Sun Z
Journal Article Near-Optimal BFS-Tree Construction in Radio Networks 2016 • IEEE Communications Letters • 20(6):1172-1174 Ghaffari M, Haeupler B
Journal Article Low-Congestion Shortcuts without Embedding 2016 • Proceedings of the Annual ACM Symposium on Principles of Distributed Computing • 451-460 Haeupler B, Izumi T, Zuzic G
Preprint Formal Verification of Obstacle Avoidance and Navigation of Ground Robots 2016 Mitsch S, Ghorbal K, Vogelbacher D, Platzer A
Conference Position-Indexed Formulations for Kidney Exchange 2016 25-42 Dickerson JP, Manlove DF, Plaut B, Sandholm T, Trimble J
Conference On Hierarchical Routing in Doubling Metrics 2016 • ACM Transactions on Algorithms (TALG) • 12(4): Chan T-HH, Gupta A, Maggs BM, Zhou S
Conference Urgent Virtual Machine Eviction with Enlightened Post-Copy 2016 • ACM Sigplan Notices • 51(7):51-64 Abe Y, Geambasu R, Joshi K, Satyanarayanan M
Chapter Introduction to Computational Social Choice 2016 1-20 Brandt F, Conitzer V, Endriss U, Lang J, Procaccia AD
Journal Article Locality and Availability in Distributed Storage 2016 • IEEE Transactions on Information Theory • 62(8):4481-4493 Rawat AS, Papailiopoulos DS, Dimakis AG, Vishwanath S
Journal Article Scalable self-assembly process for the fabrication of sub-millimetre three-dimensional cylindrical tubes 2016 • Micro and Nano Letters • 11(1):4-8 Karagozler ME, Goldstein SC, Ricketts DS
Chapter Conclusions 2016 • Lecture Notes in Computer Science • 9802 LNCS:205-206 Hutchison D, Kanade T, Kittler J, Kleinberg JM, Mattern F, Mitchell JC, Naor M, Pandu Rangan C, Steffen B, Terzopoulos D, Tygar D, Weikum G, Skrzypczak M
Journal Article Unsupervised Tensor Mining for Big Data Practitioners 2016 • Big Data • 4(3):179-191 Papalexakis EE, Faloutsos C
Conference Nearly Optimal NP-Hardness of Unique Coverage 2016 • Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms • 1724-1730 Guruswami V, Lee E
Conference Monitoring Manhattan's Traffic at 5 Intersections? 2016 1270-1274 Chen S, Yang Y, Faloutsos C, Kovačević J
Conference A Methodology for Formalizing Model-Inversion Attacks 2016 • Proceedings of the Computer Security Foundations Workshop • 355-370 Wu X, Fredrikson M, Jha S, Naughton JF
Conference CoreScope: Graph Mining Using k-Core Analysis - Patterns, Anomalies and Algorithms 2016 469-478 Shin K, Eliassi-Rad T, Faloutsos C
Conference Estimating Accuracy from Unlabeled Data: A Bayesian Approach 2016 • INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 48 • 48: Platanios EA, Dubey A, Mitchell T
Conference Misrepresentation in district voting 2016 • IJCAI International Joint Conference on Artificial Intelligence • 2016-January:81-87 Bachrach Y, Lev O, Lewenberg Y, Zick Y
Conference Challenges in Physical Modeling for Adaptation of Cyber-Physical Systems 2016 • 2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT) • 210-215 Ruchkin I, Samuel S, Schmerl B, Rico A, Garlan D
Journal Article The politics of routing: Investigating the relationship between as connectivity and internet freedom 2016 • 6th USENIX Workshop on Free and Open Communications on the Internet, FOCI 2016, co-located with USENIX Security 2016 Singh R, Koo H, Miramirkhani N, Mirhaj F, Gill P, Akoglu L
Journal Article ACHIEVING ONE BILLION KEY-VALUE REQUESTS PER SECOND ON A SINGLE SERVER 2016 • IEEE Micro • 36(3):94-104 Li S, Lim H, Lee VW, Ahn JH, Kalia A, Kaminsky M, Andersen DG, Seongil O, Lee S, Dubey P
Conference Sublinear time orthogonal tensor decomposition 2016 • Advances in Neural Information Processing Systems • 793-801 Song Z, Woodruff DP, Zhang H
Conference Beating CountSketch for heavy hitters in insertion streams 2016 • Annual ACM Symposium on Theory of Computing • 740-753 Braverman V, Chestnut SR, Ivkin N, Woodruff DP
Conference Verbalization: Narration of autonomous robot experience 2016 • IJCAI International Joint Conference on Artificial Intelligence • 2016-January:862-868 Rosenthal S, Selvaraj SP, Veloso M
Journal Article Metadata-Conscious Anonymous Messaging 2016 • IEEE Transactions on Signal and Information Processing over Networks • 2(4):582-594 Fanti G, Kairouz P, Oh S, Ramchandran K, Viswanath P
Journal Article The Value of Privacy 2016 • Performance Evaluation Review • 44(1):249-260 Wang W, Ying L, Zhang J
Journal Article Human-Like Rewards to Train a Reinforcement Learning Controller for Planar Arm Movement 2016 • IEEE Transactions on Human-Machine Systems • 46(5):723-733 Jagodnik KM, Thomas PS, van den Bogert AJ, Branicky MS, Kirsch RF
Journal Article Medoidshift clustering applied to genomic bulk tumor data 2016 • BMC Genomics • 17: Roman T, Xie L, Schwartz R
Journal Article Parallel Shortest Paths Using Radius Stepping 2016 443-454 Blelloch GE, Gu Y, Sun Y, Tangwongsan K
Conference Parallel Algorithms for Asymmetric Read-Write Costs 2016 145-156 Ben-David N, Blelloch GE, Fineman JT, Gibbons PB, Gu Y, McGuffey C, Shun J
Journal Article Separating Subadditive Euclidean Functionals 2016 • Annual ACM Symposium on Theory of Computing • 22-35 Frieze A, Pegden W
Preprint Shedding Light on the Adoption of Let's Encrypt 2016 Manousis A, Ragsdale R, Draffin B, Agrawal A, Sekar V