1. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
2. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
3. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
4. Measuring discursive influence across scholarship Gerow, Aaron; Hu, Yuening; Boyd-Graber, Jordan; Blei, David Meir; Evans, James A. 2018 Articles Learning and scholarshipBibliographical citationsScholarly publishingInfluence (Literary, artistic, etc.)
5. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
6. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
7. Accelerated parallel algorithm for gene network reverse engineering He, Jing; Zhou, Zhou; Reed, Michael K.; Califano, Andrea 2017 Articles Parallel programming (Computer science)Gene regulatory networksGene expression--Data processingSystems biology
8. From Functional Programs to Pipelined Dataflow Circuits Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2017 Articles Compilers (Computer programs)Logic designData flow computing
9. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
10. Statistical correction of the Winner’s Curse explains replication variability in quantitative trait genome-wide association studies Palmer, Cameron Douglas; Pe'er, Itshack G. 2017 Articles DNA replicationGenomes--Data processingHuman genetics--VariationGeneticsStatistics
11. Subregional Nowcasts of Seasonal Influenza Using Search Trends Kandula, Sasikiran; Shaman, Jeffrey L. 2017 Articles InfluenzaEpidemiology--Statistical methodsForecasting
12. The time and place of European admixture in Ashkenazi Jewish history Xue, James; Lencz, Todd; Darvasi, Ariel; Pe'er, Itsik; Carmi, Shai 2017 Articles Gene flowGeneticsPopulation geneticsAshkenazimHistorical geography
13. Bias Characterization in Probabilistic Genotype Data and Improved Signal Detection with Multiple Imputation Palmer, Cameron Douglas; Pe’er, Itsik 2016 Articles Multiple imputation (Statistics)Missing observations (Statistics)Genetics--Statistical methodsGeneticsStatistics
14. Cutting Edge: Using mobile sequencers in an academic classroom Zaaijer, Sophie; Erlich, Yaniv; Columbia University Ubiquitous Genomics 2015 class 2016 Articles Nucleotide sequenceScience--Study and teaching--Technological innovationsGenomicsEducational technologyEducation--Curricula
15. Prior Design for Dependent Dirichlet Processes: An Application to Marathon Modeling Pradier, Melanie F.; Ruiz, Francisco Jesus Rodriguez; Perez-Cruz, Fernando 2016 Articles Marathon runningRunning races--Data processingNonparametric statisticsStochastic processesStatisticsInformation science
16. The Impact of Comprehensive Case Management on HIV Client Outcomes Brennan-Ing, Mark; Seidel, Liz; Rodgers, Leslie; Ernst, Jerome; Wirth, Doug; Tietz, Daniel; Moretti, Antonio; Karpiak, Stephen E. 2016 Articles Hospitals--Case management servicesHIV infections--EpidemiologyHIV-positive persons--Care--Government policyEpidemiologyHealth services administrationMedical carePublic health
17. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
18. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
19. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
20. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
21. Co-regulated Transcripts Associated to Cooperating eSNPs Define Bi-fan Motifs in Human Gene Networks Kreimer, Anat; Pe'er, Itsik G. 2014 Articles Single nucleotide polymorphismsGene expressionGene regulatory networksGeneticsBiology--Classification
22. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
23. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
24. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
25. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
26. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
27. Alcohol Interacts with Genetic Alteration of the Hippo Tumor Suppressor Pathway to Modulate Tissue Growth in Drosophila Ilanges, Anoj; Jahanshahi, Maryam; Balobin, Denis M.; Pfleger, Cathie M. 2013 Articles Cancer--EtiologyDrosophilaTumor suppressor proteinsAlcohol--Physiological effectOncology
28. Metaseq: Privacy Preserving Meta-analysis of Sequencing-based Association Studies Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik 2013 Articles BioinformaticsGeneticsComputer science
29. Variants in exons and in transcription factors affect gene expression in trans Kreimer, Anat; Pe'er, Itshack G. 2013 Articles Gene regulatory networksGene expressionGeneticsBiology--Classification
30. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
31. A Practical Approach to 3D Scanning in the Presence of Interreflections, Subsurface Scattering and Defocus Gupta, Mohit; Agrawal, Amit; Veeraraghavan, Ashok; Narasimhan, Srinivasa G. 2012 Articles Computer engineering
32. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
33. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
35. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
36. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
37. Implications for health and disease in the genetic signature of the Ashkenazi Jewish population Guha, Saurav; Rosenfeld, Jeffrey; Malhotra, Anil; Gregersen, Peter; Kane, John; Pe'er, Itsik; Darvasi, Ariel; Lencz, Todd 2012 Articles GeneticsBiometry
38. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
39. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
40. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science
42. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
43. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
44. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
45. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
46. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
47. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
48. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
49. A highly-underactuated robotic hand with force and joint angle sensors Wang, Long; DelPreto, Joseph Jeffrey; Weisz, Jonathan; Bhattacharyya, Sam; Allen, Peter K. 2011 Articles Robotics
50. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science