1. Artificial Intelligence for Climate Change Mitigation Roadmap Sandalow, David B.; McCormick, Colin; Kucukelbir, Alp; Friedman, Julio; Nagrani, Trishna; Fan, Zhiyuan; Halff, Antoine M.; d'Aspremont, Alexandre; Glatt, Ruben; Méndez Leal, Elena; Karl, Kevin; Ruane, Alexander 2023 Reports Climatic changesClimatic changes--Government policyClimate change mitigationArtificial intelligenceGreenhouse gases
2. A New Doctrine for Hardware Security Hastings, Adam K.; Sethumadhavan, Simha 2020 Reports ComputersComputer securityComputers--Economic aspects
3. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
4. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
5. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
6. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
7. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
8. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
9. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
10. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
11. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
12. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
13. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
14. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
15. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
16. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
17. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
18. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
19. Hardware in Haskell: Implementing Memories in a Stream-Based World Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports ComputersMemory--Computer programsHaskell (Computer program language)Computer science
20. Hardware Synthesis from a Recursive Functional Language Zhai, Kuangya; Townsend, Richard Morse; Lairmore, Lianne Elizabeth; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports Computer science
21. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2015 Reports Cooperating objects (Computer systems)Reliability (Engineering)--EvaluationComputer science
22. Parikshan: Live Debugging of Production Systems in Isolation Arora, Nipun; Ivancic, Franjo; Kaiser, Gail E. 2015 Reports Service-oriented architecture (Computer science)Computer softwareDebugging in computer science--Computer programsComputer science
23. Setting budgets for live debugging Arora, Nipun; Sharma, Abhishek; Kaiser, Gail E. 2015 Reports Queuing theory--Computer programsBudgetDebugging in computer scienceComputer science
24. Use of Fast Multipole to Accelerate Discrete Circulation-Preserving Vortex Sheets for Soap Films and Foams Da, Fang; Batty, Christopher; Wotjan, Chris; Grinspun, Eitan 2015 Reports Computer science
25. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
26. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
27. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
28. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
29. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
30. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
31. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
32. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
33. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
34. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
35. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
36. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
37. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
38. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
39. Prosodic Entrainment in Mandarin and English: A Cross-Linguistic Comparison Xia, Zhihua; Levitan, Rivka; Hirschberg, Julia Bell 2014 Reports Computer scienceLinguistics
40. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
41. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
42. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
45. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
46. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
47. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
49. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
50. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
51. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
52. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
53. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
54. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
55. Diversity Maximization Under Matroid Constraints Abbassi, Zeinab; Mirrokni, Vahab S.; Thakur, Mayur 2013 Reports Computer science
56. Effective Dynamic Detection of Alias Analysis Errors Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng 2013 Reports Computer science
57. Effectiveness of Teaching Metamorphic Testing, Part II Mishra, Kunal S.; Kaiser, Gail E.; Sheth, Swapneel Kalpesh 2013 Reports Computer science
58. Enabling the Virtual Phones to remotely sense the Real Phones in real-time: A Sensor Emulation initiative for virtualized Android-x86 Santhanam, Raghavan 2013 Reports Computer science
60. FARE: A Framework for Benchmarking Reliability of Cyber-Physical Systems Wu, Leon; Kaiser, Gail E. 2013 Reports Computer science
61. Finding 9-1-1 Callers in Tall Buildings Song, Wonsang; Lee, Jae; Lee, Byung; Schulzrinne, Henning G. 2013 Reports Computer science
63. Heterogeneous Access: Survey and Design Considerations Singh, Amandeep; Ormazabal, Gaston; Addepalli, Sateesh; Schulzrinne, Henning G. 2013 Reports Computer science
64. Hybrid Continuous-Discrete Computer: from ISA to Microarchitecture Huang, Yipeng; Sethumadhavan, Simha 2013 Reports Computer science
65. KVM/ARM: Experiences Building the Linux ARM Hypervisor Dall, Christoffer; Nieh, Jason 2013 Reports Computer science
66. Make Parallel Programs Reliable with Stable Multithreading Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng; Cui, Heming; Gallagher, John; Tsai, Chia-Che 2013 Reports Computer science
67. Metamorphic Runtime Checking of Applications without Test Oracles Murphy, Christian; Kaiser, Gail E.; Bell, Jonathan Schaffer; Su, Fang-Hsiang 2013 Reports Computer science
68. Mobile Video Is Inefficient: A Traffic Analysis Nam, Hyunwoo; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
69. N Heads Are Better Than None Hopkins, Morris; Casteneda, Mauricio; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
70. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
71. Principles and Techniques of Schlieren Imaging Systems Mazumdar, Amrita 2013 Reports Computer science
72. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
73. Towards A Dynamic QoS-aware Over-The-Top Video Streaming in LTE Nam, Hyunwoo; Kim, Kyung Hwa; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
74. Towards Dynamic Network Condition-Aware Video Server Selection Algorithms over Wireless Networks Nam, Hyunwoo; Kim, Kyung Hwa; Schulzrinne, Henning G.; Calin, Doru 2013 Reports Computer science
75. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
76. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
77. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
78. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
79. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
80. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
81. Automatic Detection of Metamorphic Properties of Software Hasan, Sahar 2012 Reports Computer science
82. Bethe Bounds and Approximating the Global Optimum Weller, Adrian; Jebara, Tony 2012 Reports Computer science
83. Chronicler: Lightweight Recording to Reproduce Field Failures Bell, Jonathan Schaffer; Sarda, Nikhil; Kaiser, Gail E. 2012 Reports Computer science
84. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
85. Effectiveness of Teaching Metamorphic Testing Mishra, Kunal Swaroop; Kaiser, Gail E. 2012 Reports Computer science
86. End-User Regression Testing for Privacy Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2012 Reports Computer science
87. Experiments of Image Retrieval Using Weak Attributes Yu, Xinnan; Ji, Rongrong; Tsai, Ming-Hen; Ye, Guangnan; Chang, Shih-Fu 2012 Reports Computer scienceInformation science
88. Focal Sweep Camera for Space-Time Refocusing Zhou, Changyin; Miau, Daniel; Nayar, Shree K. 2012 Reports Computer science
90. Hardware-Accelerated Range Partitioning Wu, Lisa K.; Barker, Raymond John; Kim, Martha Allen; Ross, Kenneth A. 2012 Reports Computer science
91. High Availability for Carrier-Grade SIP Infrastructure on Cloud Platforms Kim, Jong Yul; Schulzrinne, Henning G. 2012 Reports Computer science
92. High Throughput Heavy Hitter Aggregation Polychroniou, Orestis; Ross, Kenneth A. 2012 Reports Computer science
93. Improving Efficiency and Reliability of Building Systems Using Machine Learning and Automated Online Evaluation Wu, Leon Li; Kaiser, Gail E.; Solomon, David M.; Winter, Rebecca Lynn; Boulanger, Albert G.; Anderson, Roger N. 2012 Reports Computer science
94. Improving the Vertical Accuracy of Indoor Positioning for Emergency Communication Song, Wonsang; Lee, Jae Woo; Lee, Byung Suk; Schulzrinne, Henning G. 2012 Reports Computer science
95. Increasing Student Engagement in Software Engineering with Gamification Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
96. NetServ: Reviving Active Networks Lee, Jae Woo; Francescangeli, Roberto; Song, Wonsang; Janak, Jan; Maccherani, Emanuele; Srinivasan, Suman Ramkumar; Kester, Michael S.; Baset, Salman A.; Schulzrinne, Henning G. 2012 Reports Computer science
97. Partitioned Blockmap Indexes for Multidimensional Data Access Ross, Kenneth A.; Sitaridi, Evangelia 2012 Reports Computer science
99. Statically Unrolling Recursion to Improve Opportunities for Parallelism Deshpande, Neil Ashish; Edwards, Stephen A. 2012 Reports Computer science
100. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science