1. A Microrobotic System For Protein Streak Seeding Georgiev, Atanas; Allen, Peter K.; Song, Ting; Laine, Andrew F.; Edstrom, William; Hunt, John F. 2004 Reports Computer science
2. An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Baset, Salman Abdul; Schulzrinne, Henning G. 2004 Reports Computer science
3. An Investigation Into the Detection of New Information Schiffman, Barry; McKeown, Kathleen 2004 Reports Computer science
4. Asymptotic bounds for M^X/G/1 processor sharing queues Feng, Hanhua; Misra, Vishal 2004 Reports Computer science
5. A Theoretical Analysis of the Conditions for Unambiguous Node Localization in Sensor Networks Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2004 Reports Computer science
6. Automating Content Extraction of HTML Documents Gupta, Suhit; Kaiser, Gail E.; Grimm, Peter; Starren, Justin 2004 Reports Computer science
7. Autonomic Control for Quality Collaborative Video Viewing Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2004 Reports Computer science
8. Blurring of Light Due to Multiple Scattering by the Medium: A Path Integral Approach Ashikhmin, Michael; Premoze, Simon; Ramamoorthi, Ravi; Nayar, Shree K. 2004 Reports Computer science
9. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2004 Reports Computer science
10. Collaborative Distributed Intrusion Detection Locasto, Michael E.; Parekh, Janak J.; Stolfo, Salvatore; Keromytis, Angelos D.; Malkin, Tal G.; Misra, Vishal 2004 Reports Computer science
11. Cross-Dimensional Gestural Interaction Techniques for Hybrid Immersive Environments Benko, Hrvoje; Ishak, Edward W.; Feiner, Steven K. 2004 Reports Computer science
13. Determining Interfaces Using Type Inference Li, Chun; Edwards, Stephen A. 2004 Reports Computer science
14. DotSlash: A Scalable and Efficient Rescue System for Handling Web Hotspots Zhao, Weibin; Schulzrinne, Henning G. 2004 Reports Computer science
15. Efficient Algorithms for the Design of Asynchronous Control Circuits Theobald, Michael 2004 Reports Computer science
16. Efficient Shadows from Sampled Environment Maps Ben-Artzi, Aner; Agrawala, Maneesh; Ramamoorthi, Ravi 2004 Reports Computer science
17. Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
18. Elastic Block Ciphers: The Feistel Cipher Case Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2004 Reports Computer science
20. Exploiting the Structure in DHT Overlays for DoS Protection Stavrou, Angelos; Keromytis, Angelos D.; Rubenstein, Daniel Stuart 2004 Reports Computer science
21. Extracting Context To Improve Accuracy For HTML Content Extraction Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore 2004 Reports Computer science
22. Failover and Load Sharing in SIP Telephony Singh, Kundan; Schulzrinne, Henning G. 2004 Reports Computer science
23. Feature Interactions in Internet Telephony End Systems Wu, Xiaotao; Schulzrinne, Henning G. 2004 Reports Computer science
24. Group Ratio Round-Robin: O(1) Proportional Share Scheduling for Uniprocessor and Multiprocessor Systems Caprita, Bogdan; Chan, Wong Chun; Nieh, Jason; Stein, Clifford S.; Zheng, Haoqiang 2004 Reports Computer science
25. Host-based Anomaly Detection Using Wrapping File Systems Hershkop, Shlomo; Bui, Linh H.; Ferst, Ryan; Stolfo, Salvatore 2004 Reports Computer science
26. Improved Controller Synthesis from Esterel Soviani, Cristian; Zeng, Jia; Edwards, Stephen A. 2004 Reports Computer science
27. Information Structures to Secure Control of Rigid Formations with Leader-Follower Structure Eren, Tolga; Whiteley, Walter; Morse, A. Stephen; Anderson, Brian D. O.; Belhumeur, Peter N. 2004 Reports Computer science
28. Jitter-Camera: High Resolution Video from a Low Resolution Detector Ben-Ezra, Moshe; Zomet, Assaf; Nayar, Shree K. 2004 Reports Computer science
30. Machine Learning and Text Segmentation in Novelty Detection Schiffman, Barry; McKeown, Kathleen 2004 Reports Computer science
31. MobiDesk: Mobile Virtual Desktop Computing Baratto, Ricardo A.; Potter, Shaya; Su, Gong; Nieh, Jason 2004 Reports Computer science
32. Modeling and Managing Content Changes in Text Databases Ipeirotis, Panagiotis G.; Ntoulas, Alexandros; Cho, Junghoo; Gravano, Luis 2004 Reports Computer science
33. Obstacle Avoidance and Path Planning Using a Sparse Array of Sonars Ciocarlie, Matei 2004 Reports Computer science
34. On Decision Trees, Influences, and Learning Monotone Decision Trees O'Donnell, Ryan; Servedio, Rocco Anthony 2004 Reports Computer science
35. Optimizing Quality for Collaborative Video Viewing Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Gupta, Suhit 2004 Reports Computer science
36. Orchestrating the Dynamic Adaptation of Distributed Software with Process Technology Valetto, Giuseppe 2004 Reports Computer science
37. Peer-to-Peer Internet Telephony using SIP Singh, Kundan; Schulzrinne, Henning G. 2004 Reports Computer science
38. Preventing Spam For SIP-based Instant Messages and Sessions Srivastava, Kumar; Schulzrinne, Henning G. 2004 Reports Computer science
39. Programmable Conference Server Schulzrinne, Henning G.; Singh, Kundan; Wu, Xiaotao 2004 Reports Computer science
40. Remotely Keyed CryptoGraphics - Secure Remote Display Access Using (Mostly) Untrusted Hardware - Extended Version Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2004 Reports Computer science
41. Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2004 Reports Computer science
42. Secure Isolation and Migration of Untrusted Legacy Applications Potter, Shaya; Nieh, Jason; Subhraveti, Dinesh Kumar 2004 Reports Computer science
43. Self-Managing Systems: A Control Theory Foundation Diao, Yixin; Hellerstein, Joseph L.; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2004 Reports Computer science
44. Sequential Challenges in Synthesizing Esterel Soviani, Cristian; Zeng, Jia; Edwards, Stephen A. 2004 Reports Computer science
45. Service Learning in Internet Telephony Wu, Xiaotao; Schulzrinne, Henning G. 2004 Reports Computer science
46. The Complexity of Fredholm Equations of the Second Kind: Noisy Information About Everything Werschulz, Arthur G. 2004 Reports Computer science
47. The Simplicity and Safety of the Language for End System Services (LESS) Wu, Xiaotao; Schulzrinne, Henning G. 2004 Reports Computer science
48. THINC: A Remote Display Architecture for Thin-Client Computing Baratto, Ricardo A.; Nieh, Jason; Kim, Leo 2004 Reports Computer science
49. Using Execution Transactions To Recover From Buffer Overflow Attacks Sidiroglou, Stelios; Keromytis, Angelos D. 2004 Reports Computer science
50. Virtual Environment for Collaborative Distance Learning With Video Synchronization Gupta, Suhit; Kaiser, Gail E. 2004 Reports Computer science
52. WebPod: Persistent Web Browsing Sessions with Pocketable Storage Devices Potter, Shaya; Nieh, Jason 2004 Reports Computer science
53. When one Sample is not Enough: Improving Text Database Selection Using Shrinkage Ipeirotis, Panagiotis G.; Gravano, Luis 2004 Reports Computer science