21. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
22. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
23. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
24. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
25. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
26. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
27. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
28. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
29. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
30. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
31. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
32. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
33. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
34. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
35. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
38. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
39. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
40. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science