201. Bridging the Network Reservation Gap Using Overlays Stavrou, Angelos; Turner, David; Keromytis, Angelos D.; Prevelakis, Vassilis 2007 Articles Computer science
202. Characterizing Self-healing Software Systems Keromytis, Angelos D. 2007 Articles Computer science
203. Code Generation in the Columbia Esterel Compiler Edwards, Stephen A.; Zeng, Jia 2007 Articles Computer science
204. COVERAGE: Detecting and Reacting to Worm Epidemics Using Cooperation and Validation Anagnostakis, Kostas G.; Greenwald, Michael B.; Ioannidis, Sotiris; Keromytis, Angelos D. 2007 Articles Computer science
205. Data acquisition and view planning for 3-D modeling tasks Blaer, Paul S.; Allen, Peter K. 2007 Articles Artificial intelligence
206. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
207. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction Antonatos, Spiros; Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D.; Markatos, Evangelos 2007 Articles Computer science
208. Dimensionality reduction for hand-independent dexterous robotic grasping Ciocarlie, Matei; Goldfeder, Corey; Allen, Peter K. 2007 Articles Robotics
210. Elastic Block Ciphers in Practice: Constructions and Modes of Encryption Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
211. Elastic Block Ciphers: The Basic Design Cook, Debra L.; Keromytis, Angelos D.; Yung, Moti 2007 Articles Computer science
212. FIFO Sizing for High-Performance Pipelines Soviani, Cristian; Edwards, Stephen A. 2007 Articles Computer science
213. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
214. Grasp Planning via Decomposition Trees Goldfeder, Corey; Allen, Peter K.; Lackner, Claire; Pelossof, Raphael 2007 Articles Robotics
215. Instantaneous Transitions in Esterel Tardieu, Olivier; Edwards, Stephen A. 2007 Articles Computer science
216. In-vivo pan/tilt endoscope with integrated light source Hu, Tie; Allen, Peter K.; Fowler, Dennis 2007 Articles Diagnostic imagingRobotics
217. Mediated Overlay Services (MOSES): Network Security as a Composable Service Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2007 Articles Computer science
218. Online Training and Sanitization of AD Systems Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2007 Articles Computer science
219. On the Infeasibility of Modeling Polymorphic Shellcode Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Articles Computer scienceDigital signatures
220. Optimizing Sequential Cycles Through Shannon Decomposition and Retiming Soviani, Cristian; Tardieu, Olivier; Edwards, Stephen A. 2007 Articles Computer science
221. Recovering illumination and texture using ratio images Troccoli, Alejandro; Allen, Peter K. 2007 Articles Artificial intelligence
222. Requirements for Scalable Access Control and Security Management Architectures Keromytis, Angelos D.; Smith, Jonathan M. 2007 Articles Computer science
224. {sets} -- A lightweight constraint programming language based on ROBDDs Cohen, Haim; Edwards, Stephen A. 2007 Articles Computer science
225. Soft Finger Model with Adaptive Contact Geometry for Grasping and Manipulation Tasks Allen, Peter K.; Lackner, Claire; Ciocarlie, Matei 2007 Articles Robotics
226. SSARES: Secure Searchable Automated Remote Email Storage Aviv, Adam J.; Locasto, Michael E.; Potter, Shaya; Keromytis, Angelos D. 2007 Articles Computer science
227. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2007 Articles Computer science
228. The Pyramid Method: Incorporating human content selection variation in summarization evaluation. Nenkova, Ani; Passonneau, Rebecca; McKeown, Kathleen 2007 Articles Computer science
229. The Security of Elastic Block Ciphers Against Key-Recovery Attacks Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2007 Articles Computer science
230. Two Stage View Planning for Large-Scale Site Modeling Blaer, Paul S.; Allen, Peter K. 2007 Articles RoboticsArtificial intelligence
231. Using Rescue Points to Navigate Software Recovery Sidiroglou, Stelios; Laadan, Oren; Keromytis, Angelos D.; Nieh, Jason 2007 Articles Computer science
232. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications Ioannidis, Sotiris; Bellovin, Steven Michael; Ioannidis, John; Keromytis, Angelos D.; Anagnostakis, Kostas G.; Smith, Jonathan M. 2007 Articles Computer science
233. A Clean-Slate Design for the Next-Generation Secure Internet Bellovin, Steven Michael; Clark, David D.; Perrig, Adrian; Song, Dawn 2006 Articles Computer science
234. A Domain-Specific Language for Generating Dataflow Analyzers Zheng, Jia; Mitchell, Chuck; Edwards, Stephen A. 2006 Articles Computer science
235. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Articles Computer science
236. An Efficient Algorithm for the Analysis of Cyclic Circuits Neiroukh, Osama; Edwards, Stephen A.; Song, Xiaoyu 2006 Articles Computer science
237. A Processor Extension for Cycle-Accurate Real-Time Software Ip, Nicholas Jun Hao; Edwards, Stephen A. 2006 Articles Computer science
238. Behavior-Based Modeling and Its Application to Email Analysis Stolfo, Salvatore; Hershkop, Shlomo; Hu, Chia-wei; Li, Wei-Jen; Nimeskern, Olivier; Wang, Ke 2006 Articles Computer scienceComputer securityComputer virusesAnomaly detection (Computer security)
239. Conversion Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2006 Articles Computer science
240. Countering DDoS Attacks with Multi-Path Overlay Networks Stavrou, Angelos; Keromytis, Angelos D. 2006 Articles Computer science
241. Dark Application Communities Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
242. Deploying a New Hash Algorithm Bellovin, Steven Michael; Rescorla, Eric K. 2006 Articles Computer science
243. Efficient Code Generation from SHIM Models Edwards, Stephen A.; Tardieu, Olivier 2006 Articles Computer science
244. Execution transactions for defending against software failures: use and evaluation Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
245. Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks Cretu, Gabriela F.; Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer scienceAd hoc networks (Computer networks)Intrusion detection systems (Computer security)Anomaly detection (Computer security)
246. Low Latency Anonymity with Mix Rings Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Articles Computer science
247. Multi-scale Modeling of Trauma Injury Imielinska, Celina Z.; Przekwas, Andrzej; Tan, X. G. 2006 Articles Diagnostic imagingBiomedical engineeringBioinformatics
248. Next Generation Attacks on the Internet Markatos, Evangelos; Keromytis, Angelos D. 2006 Articles Computer science
249. On the Brittleness of Software and the Infeasibility of Security Metrics Bellovin, Steven Michael 2006 Articles Computer science
250. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
251. Prerendered User Interfaces for Higher-Assurance Electronic Voting Yee, Ka-Ping; Wagner, David A.; Hearst, Marti; Bellovin, Steven Michael 2006 Articles Computer science
252. Privacy as an Operating System Service Loannidis, Sotiris; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
253. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Articles Computer science
254. Protein Ranking by Semi-Supervised Network Propagation Weston, Jason; Kuang, Rui; Leslie, Christina; Noble, William 2006 Articles Sequence alignment (Bioinformatics)Supervised learning (Machine learning)Computer scienceBioinformatics
255. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation Anagnostakis, Kostas G.; Ioannidis, Sotiris; Keromytis, Angelos D.; Greenwald, Michael B. 2006 Articles Computer science
256. R-SHIM: Deterministic Concurrency with Recursion and Shared Variables Tardieu, Olivier; Edwards, Stephen A. 2006 Articles Computer science
257. Scheduling-Independent Threads and Exceptions in SHIM Tardieu, Olivier; Edwards, Stephen A. 2006 Articles Computer science
258. Security Implications of Applying the Communications Assistance to Law Enforcement Act to Voice over IP Bellovin, Steven Michael; Blaze, Matt; Brickell, Ernest; Brooks, Clinton; Cerf, Vinton; Diffie, Whitfield; Landau, Susan; Peterson, Jon; Treichler, John 2006 Articles Computer science
259. SHIM: A Deterministic Model for Heterogeneous Embedded Systems Edwards, Stephen A.; Tardieu, Olivier 2006 Articles Computer science
260. Software Self-Healing Using Collaborative Application Communities Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2006 Articles Computer science
261. Syntactic Simplification and Text Cohesion Siddharthan, Advaith 2006 Articles Computer scienceLinguistics
262. Synthesis of High-Performance Packet Processing Pipelines Soviani, Cristian; Hadzic, Ilija; Edwards, Stephen A. 2006 Articles Computer science
263. The Case for the Precision Timed (PRET) Machine Edwards, Stephen A.; Lee, Edward A. 2006 Articles Computer science
264. The Challenges of Synthesizing Hardware from C-Like Languages Edwards, Stephen A. 2006 Articles Computer science
266. Using Program Specialization to Speed SystemC Fixed-Point Simulation Edwards, Stephen A. 2006 Articles Computer science
267. View planning for automated site modeling Blaer, Paul S.; Allen, Peter K. 2006 Articles Computer science
268. W3Bcrypt: Encryption as a Stylesheet Stavrou, Angelos; Locasto, Michael E.; Keromytis, Angelos D. 2006 Articles Computer science
269. Worm propagation strategies in an IPv6 Internet Bellovin, Steven Michael; Cheswick, Bill; Keromytis, Angelos D. 2006 Articles Computer science
270. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
271. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
272. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
273. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
274. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
275. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
276. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
277. Approximate Reachability for Dead Code Elimination in Esterel* Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
278. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
279. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
280. Challenges in Synthesizing Fast Control-Dominated Circuits Soviani, Cristian; Edwards, Stephen A. 2005 Articles Computer science
281. Conversion and Proxy Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2005 Articles Computer science
282. Countering DoS Attacks With Stateless Multipath Overlays Stavrou, Angelos; Keromytis, Angelos D. 2005 Articles Computer science
283. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
284. CryptoGraphics: Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2005 Articles Computer science
285. Customization in a Unified Framework for Summarizing Medical Literature Elhadad, Noemie; Kan, M. Y.; Klavans, Judith L.; McKeown, Kathleen 2005 Articles Computer scienceMedicine
286. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science
287. Deterministic Receptive Processes are Kahn Processes Edwards, Stephen A.; Tardieu, Olivier 2005 Articles Computer science
288. e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing Kc, Gaurav S.; Keromytis, Angelos D. 2005 Articles Computer science
289. ErmineJ: Tool for functional analysis of gene expression data sets Lee, Homin; Braynen, William; Keshav, Kiran; Pavlidis, Paul 2005 Articles Hypergeometric distributionGene expression--Data processingBioinformaticsDNA microarrays--Data processingGenetics
290. Experiences Teaching an FPGA-based Embedded Systems Class Edwards, Stephen A. 2005 Articles Science--Study and teachingComputer science
291. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
292. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
293. FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing Aho, Alfred V.; Keromytis, Angelos D.; Misra, Vishal; Nieh, Jason; Ross, Kenneth A.; Yemini, Yechiam 2005 Articles Computer science
294. gore: Routing-Assisted Defense Against DDoS Attacks Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. 2005 Articles Computer science
295. Grasp analysis using deformable fingers Ciocarlie, Matei; Miller, Andrew T.; Allen, Peter K. 2005 Articles Robotics
296. High-Level Optimization by Combining Retiming and Shannon Decomposition Soviani, Cristian; Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
297. Incremental Algorithms for Inter-procedural Analysis of Safety Properties Conway, Christopher L.; Namjoshi, Kedar S.; Dams, Dennis; Edwards, Stephen A. 2005 Articles Computer science
298. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
299. Newsinessence: Summarizing Online News Topics Radev, Dragomir R.; Otterbacher, Jahna; Winkel, Adam; Blair-Goldensohn, Sasha 2005 Articles Information technologyComputer science
300. Pointer Analysis for Source-to-Source Transformations Buss, Marcio; Edwards, Stephen A.; Yao, Bin; Waddington, Daniel 2005 Articles Computer science