Chapter Blocked Literals Are Universal 2015 • Lecture Notes in Computer Science • 9058:436-442 Heule MJH, Seidl M, Biere A
Preprint Proceedings Tenth International Workshop on Logical Frameworks and Meta Languages: Theory and Practice 2015 Cervesato I, Chaudhuri K
Journal Article Randomized broadcast in radio networks with collision detection 2015 • Distributed Computing • 28(6):407-422 Ghaffari M, Haeupler B, Khabbazian M
Journal Article Inferring models of multiscale copy number evolution for single-tumor phylogenetics 2015 • Bioinformatics • 31(12):258-267 Chowdhury SA, Gertz EM, Wangsa D, Heselmeyer-Haddad K, Ried T, Schaeffer AA, Schwartz R
Conference Comingle: Distributed Logic Programming for Decentralized Mobile Ensembles 2015 • Lecture Notes in Computer Science • 9037:51-66 Lam ESL, Cervesato I, Fatima N
Journal Article Type-based amortized resource analysis with integers and arrays* 2015 • Journal of Functional Programming • 25:e17 HOFFMANN J, SHAO Z
Conference Beating the random assignment on constraint satisfaction problems of bounded degree 2015 • Leibniz International Proceedings in Informatics • 40:110-123 Barak B, Moitra A, O'Donnell R, Raghavendra P, Regev O, Steurer D, Trevisan L, Vijayaraghavan A, Witmer D, Wright J
Conference Is Approval Voting Optimal Given Approval Votes? 2015 • Advances in Neural Information Processing Systems • 28: Procaccia AD, Shah N
Journal Article Optimal social choice functions: A utilitarian view 2015 • Artificial Intelligence • 227:190-213 Boutilier C, Caragiannis I, Haber S, Lu T, Procaccia AD, Sheffet O
Journal Article Data-Driven Objectness 2015 • IEEE Transactions on Pattern Analysis and Machine Intelligence • 37(1):189-195 Kang H, Hebert M, Efros AA, Kanade T
Conference Associative memory via a sparse recovery model 2015 • Advances in Neural Information Processing Systems • 2015-January:2701-2709 Mazumdar A, Rawat AS
Journal Article Special Issue on New Theoretical Challenges in Machine Learning 2015 • Algorithmica • 72(1):191-192 Blum A, Long PM
Journal Article Anomaly detection in dynamic networks: a survey 2015 • WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS • 7(3):223-247 Ranshous S, Shen S, Koutra D, Harenberg S, Faloutsos C, Samatova NF
Conference Handling a trillion (unfixable) flaws on a billion devices 2015 1-7 Yu T, Sekar V, Seshan S, Agarwal Y, Xu C
Journal Article A specialized assault adjacent to the aes and its function to system implementations 2015 • International Journal of Applied Engineering Research • 10(23):43395-43400 Navaneetha Krishnan M, Ravi R
Conference Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme 2015 • 2013 National Conference on Communications, NCC 2013 • 6277-6283 Yavuz F, Zhao J, Yagan O, Gligor V
Journal Article Toggle-Aware Compression for GPUs 2015 • IEEE Computer Architecture Letters • 14(2):164-168 Pekhimenko G, Bolotin E, O'Connor M, Mutlu O, Mowry TC, Keckler SW
Conference A Case for Core-Assisted Bottleneck Acceleration in GPUs: Enabling Flexible Data Compression with Assist Warps 2015 • Proceedings / Annual International Symposium on Computer Architecture. International Symposium on Computer Architecture • 41-53 Vijaykumar N, Pekhimenko G, Jog A, Bhowmick A, Ausavarungnirun R, Das C, Kandemir M, Mowry TC, Mutlu O
Conference Detecting insider threats in software systems using graph models of behavioral paths 2015 1-2 Lamba H, Glazier TJ, Schmerl B, Pfeffer J, Garlan D
Conference Eliminating Inter-Domain Vulnerabilities in Cyber-Physical Systems 2015 11-22 Ruchkin I, Rao A, De Niz D, Chaki S, Garlan D
Journal Article Systemic Assurance 2015 Scherlis W, Aldrich J, Breaux TD, Garlan D, Kastner C, Le Goues C, Schmerl B, Sunshine J
Conference Using autonomous robots to diagnose wireless connectivity 2015 • CEUR Workshop Proceedings • 1484:11-14 Wang R, Veloso M, Seshan S
Conference Architecting to Achieve a Billion Requests Per Second Throughput on a Single Key-Value Store Server Platform 2015 • Proceedings / Annual International Symposium on Computer Architecture. International Symposium on Computer Architecture • 476-488 Li S, Lim H, Lee VW, Ahn JH, Kalia A, Kaminsky M, Andersen DG, Seongil O, Lee S, Dubey P
Journal Article Improving Prehensile Mobile Manipulation Performance Through Experience Reuse 2015 • International Journal of Advanced Robotic Systems • 12: Mericli T, Veloso M, Akin L
Conference Identifying trends in enterprise data protection systems 2015 • Proceedings of the 2015 Usenix Annual Technical Conference Usenix Atc 2015 • 151-164 Amvrosiadis G, Bhadkamkar M
Conference Guilt-by-Constellation: Fraud Detection by Suspicious Clique Memberships 2015 • Proceedings of the Annual Hawaii International Conference on System Sciences • 918-927 Van Vlasselaer V, Akoglu L, Eliassi-Rad T, Snoeck M, Baesens B
Journal Article Learning Task Knowledge from Dialog and Web Access 2015 • Robotics • 4(2):223-252 Perera V, Soetens R, Kollar T, Samadi M, Sun Y, Nardi D, van de Molengraft R, Veloso M
Conference Modular translation validation of a full-sized synchronous compiler using off-the-shelf verification tools 2015 109-112 Ngo V-C, Talpin J-P, Gautier T, Besnard L, Le Guernic P
Conference Robust Trajectory Selection for Rearrangement Planning as a Multi-Armed Bandit Problem 2015 • Proceedings of the ... IEEE/RSJ International Conference on Intelligent Robots and Systems. IEEE/RSJ International Conference on Intelligent Robots and Systems • 2678-2685 Koval MC, King JE, Pollard NS, Srinivasa SS
Conference Bootstrapping Evolvability for Inter-Domain Routing 2015 1-7 Sambasivan RR, Tran-Lam D, Akella A, Steenkiste P
Conference Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS 2015 • Computer Communication Review • 199-212 Naylor D, Schomp K, Varvello M, Leontiadis I, Blackburn J, Lopez D, Papagiannaki K, Rodriguez PR, Steenkiste P
Conference Amplification of One-Way Information Complexity via Codes and Noise Sensitivity 2015 • Lecture Notes in Computer Science • 9134:960-972 Molinaro M, Woodruff DP, Yaroslavtsev G
Conference 2<SUP>5</SUP> Years of Model Checking 2015 • Lecture Notes in Computer Science • 8974:26-40 Clarke EM, Wang Q
Conference A Minimax Distortion View of Differentially Private Query Release 2015 1046-1050 Wang W, Ying L, Zhang J
Journal Article A SAT Approach to Clique-Width 2015 • ACM Transactions on Computational Logic • 16(3): Heule MJH, Szeider S
Conference Distributed Resource Discovery in Sub-Logarithmic Time 2015 • Proceedings of the Annual ACM Symposium on Principles of Distributed Computing • 413-419 Haeupler B, Malkhi D
Preprint Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits 2015 Chowdhury O, Garg D, Jia L, Datta A
Conference Compositional certified resource bounds 2015 • ACM Sigplan Notices • 467-478 Carbonneaux Q, Hoffmann J, Shao Z
Conference Preface 2015 • Electronic Proceedings in Theoretical Computer Science • Cervesato I, Schuermann C
Journal Article Gaze-Driven Video Re-Editing 2015 • ACM Transactions on Graphics • 34(2):1-12 Jain E, Sheikh Y, Shamir A, Hodgins J
Conference Monitoring Stealthy Diffusion 2015 • Proceedings / IEEE International Conference on Data Mining. IEEE International Conference on Data Mining • 151-160 Haghtalab N, Laszka A, Procaccia AD, Vorobeychik Y, Koutsoukos X
Conference Beyond Dominant Resource Fairness 2015 • ACM Transactions on Economics and Computation • 3(1):1-22 Parkes DC, Procaccia AD, Shah N
Journal Article Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes 2015 • IEEE Transactions on Information Theory • 61(11):5765-5778 Silberstein N, Rawat AS, Vishwanath S
Conference The Case for Offload Shaping 2015 • 16TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS (HOTMOBILE' 15) • 51-56 Hu W, Amos B, Chen Z, Ha K, Richter W, Pillai P, Gilbert B, Harkes J, Satyanarayanan M