201. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
202. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
204. Analysis of Clocks in X10 Programs (Extended) Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2008 Reports Computer science
205. Application Layer Feedback-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G.; Nahum, Erich 2008 Reports Computer science
206. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
207. Automatic User Interaction Detection and Scheduling with RSIO Zheng, Haoqiang; Nieh, Jason 2008 Reports Computer science
208. Autotagging to Improve Text Search for 3D Models Goldfeder, Corey; Allen, Peter K. 2008 Reports Computer science
209. Classifying High-Dimensional Text and Web Data using Very Short Patterns Malik, Hassan H.; Kender, John R. 2008 Reports Computer science
210. CPU Torrent -- CPU Cycle Offloading to Reduce User Wait Time and Provider Resource Requirements Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2008 Reports Computer science
211. Deux: Autonomic Testing System for Operating System Upgrades Wu, Leon L.; Kaiser, Gail E.; Nieh, Jason; Murphy, Christian 2008 Reports Computer science
212. Distributed eXplode: A High-Performance Model Checking Engine to Scale Up State-Space Coverage Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2008 Reports Computer science
213. Distributed Firewall For MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2008 Reports Computer science
214. Exploring a Few Good Tuples From a Text Database Jain, Alpa; Srivastava, Divesh 2008 Reports Computer science
215. Exploring Computation and Communication Trade-offs in the Design of Automatic Video Surveillance Networks Pinto, Alessandro; Carloni, Luca; Sangiovanni-Vincentelli, Alberto 2008 Reports Computer science
216. FairTorrent: Bringing Fairness to Peer-to-Peer Systems Sherman, Alex; Nieh, Jason; Stein, Clifford S. 2008 Reports Computer science
217. genSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Murphy, Christian; Sheth, Swapneel Kalpesh; Kaiser, Gail E.; Wilcox, Lauren 2008 Reports Computer science
218. IEEE 802.11 in the Large: Observations at an IETF Meeting Forte, Andre G.; Shin, Sangho; Schulzrinne, Henning G. 2008 Reports Computer science
219. Improving the Dependability of Machine Learning Applications Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
220. Leveraging Local Intra-Core Information to Increase Global Performance in Block-Based Design of Systems-on-Chip Li, Cheng-Hong; Carloni, Luca 2008 Reports Computer science
221. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer science
222. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems Salem, Malek Ben; Stolfo, Salvatore 2008 Reports Computer science
223. Measurements of Multicast Service Discovery in a Campus Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2008 Reports Computer science
225. Mitigating the Effect of Free-Riders in BitTorrent using Trusted Agents Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S. 2008 Reports Computer science
226. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
227. One Server Per City: Using TCP for Very Large SIP Servers Ono, Kumiko; Schulzrinne, Henning G. 2008 Reports Computer science
228. Operating System Virtualization: Practice and Experience Laadan, Oren; Nieh, Jason 2008 Reports Computer science
229. Opportunistic Use of Client Repeaters to Improve Performance of WLANs Bahl, Victor; Chandra, Ranveer; Lee, Patrick Pak-Ching; Misra, Vishal; Padhye, Jitendra; Rubenstein, Daniel Stuart; Yu, Yan 2008 Reports Computer science
230. Optimal Splitters for Database Partitioning with Size Bounds Ross, Kenneth A.; Cieslewicz, John 2008 Reports Computer science
231. Path-based Access Control for Enterprise Networks Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Reports Computer science
232. Properties of Machine Learning Applications for Use in Metamorphic Testing Murphy, Christian; Kaiser, Gail E.; Hu, Lifeng 2008 Reports Computer science
233. Quality Assurance of Software Applications Using the In Vivo Testing Approach Murphy, Christian; Kaiser, Gail E.; Vo, Ian; Chu, Matt 2008 Reports Computer science
234. ReoptSMART: A Learning Query Plan Cache Stoyanovich, Julia; Ross, Kenneth A.; Rao, Jun; Fan, Wei; Markl, Volker; Lohman, Guy 2008 Reports Computer science
235. Retina: Helping Students and Instructors Based on Observed Programming Activities Murphy, Christian; Kaiser, Gail E.; Loveland, Kristin; Hasan, Sahar 2008 Reports Computer science
236. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
237. SHIM Optimization: Elimination Of Unstructured Loops Ganapathi, Ravindra Babu; Edwards, Stephen A. 2008 Reports Computer science
238. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore 2008 Reports Computer science
239. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Reports Computer science
240. Spreadable Connected Autonomic Networks (SCAN) Reich, Joshua; Misra, Vishal; Rubenstein, Daniel Stuart; Zussman, Gil 2008 Reports Computer science
241. Static Deadlock Detection in SHIM with an Automata Type Checking System Vasudevan, Nalini; Edwards, Stephen A.; Smith, Dave Aaron 2008 Reports Computer science
242. Stored Media Streaming in BitTorrent-like P2P Networks Hwang, Kyung-Wook; Misra, Vishal; Rubenstein, Daniel Stuart 2008 Reports Computer science
243. Summary-Based Pointer Analysis Framework for Modular Bug Finding Buss, Marcio 2008 Reports Computer science
244. The 7U Evaluation Method: Evaluating Software Systems via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models Griffith, Rean 2008 Reports Computer science
245. The Columbia Grasp Database Goldfeder, Corey; Ciocarlie, Matei; Dang, Hao; Allen, Peter K. 2008 Reports Computer scienceMathematics
246. The Delay-Friendliness of TCP Brosh, Eli; Baset, Salman Abdul; Misra, Vishal; Rubenstein, Daniel Stuart; Schulzrinne, Henning G. 2008 Reports Computer science
247. The Impact of SCTP on Server Scalability and Performance Ono, Kumiko; Schulzrinne, Henning G. 2008 Reports Computer science
248. The In Vivo Approach to Testing Software Applications Murphy, Christian; Kaiser, Gail E.; Chu, Matt 2008 Reports Computer science
249. Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems Collins, Rebecca L.; Carloni, Luca 2008 Reports Computer science
250. Towards the Quality of Service for VoIP traffic in IEEE 802.11 Wireless Networks Shin, Sangho; Schulzrinne, Henning G. 2008 Reports Computer science
251. Tractability of multivariate approximation over a weighted unanchored Sobolev space: Smoothness sometimes hurts Werschulz, Arthur G.; Wozniakowski, Henryk 2008 Reports Computer science
253. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
254. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
255. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
256. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
257. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
258. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
259. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
260. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
261. An Approach to Software Testing of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science
262. A New Framework for Unsupervised Semantic Discovery Schiffman, Barry 2007 Reports Computer science
263. A Precomputed Polynomial Representation for Interactive BRDF Editing with Global Illumination Ben-Artzi, Aner; Egan, Kevin; Durand, Fredo; Ramamoorthi, Ravi 2007 Reports Computer science
264. A Recursive Data-Driven Approach to Programming Multicore Systems Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
265. Automated Social Hierarchy Detection through Email Network Analysis Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore 2007 Reports Computer science
266. Backstop: A Tool for Debugging Runtime Errors Murphy, Christian; Kim, Eunhee; Kaiser, Gail E.; Cannon, Adam 2007 Reports Computer science
267. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
268. Can P2P Replace Direct Download for Content Distribution Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2007 Reports Computer science
269. Combining Ontology Queries with Text Search in Service Discovery Arabshian, Knarig; Schulzrinne, Henning G. 2007 Reports Computer scienceInformation science
270. Design, Implementation, and Validation of a New Class of Interface Circuits for Latency-Insensitive Design Li, Cheng-Hong; Collins, Rebecca L.; Sonalkar, Sampada; Carloni, Luca 2007 Reports Computer science
271. Distributed In Vivo Testing of Software Applications Chu, Matt; Murphy, Christian; Kaiser, Gail E. 2007 Reports Computer science
272. Experiences in Teaching eXtreme Programming in a Distance Learning Program Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2007 Reports Computer science
273. Generalized Tractability for Multivariate Problems: Part II: Linear Tensor Product Problems, Linear Information, and Unrestricted Tractability Gnewuch, Michael; Wozniakowski, Henryk 2007 Reports Computer science
274. High Level Synthesis for Packet Processing Pipelines Soviani, Cristian 2007 Reports Computer science
275. Improving Virtual Appliances through Virtual Layered File Systems Potter, Shaya; Nieh, Jason 2007 Reports Computer science
276. MutaGeneSys: Making Diagnostic Predictions Based on Genome-Wide Genotype Data in Association Studies Stoyanovich, Julia; Pe'er, Itshack G. 2007 Reports Computer science
277. Oblivious Image Matching Avidan, Shai; Elbaz, Ariel; Malkin, Tal G.; Moriarty, Ryan 2007 Reports Computer science
278. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
279. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
280. Optimizing Frequency Queries for Data Mining Applications Malik, Hassan H.; Kender, John R. 2007 Reports Computer science
281. Parameterizing Random Test Data According to Equivalence Classes Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science
282. Partial Evaluation for Code Generation from Domain-Specific Languages Zeng, Jia 2007 Reports Computer science
283. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
284. Post-Patch Retraining for Host-Based Anomaly Detection Locasto, Michael E.; Cretu, Gabriela F.; Hershkop, Shlomo; Stavrou, Angelos 2007 Reports Computer science
285. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
286. RAS-Models: A Building Block for Self-Healing Benchmarks Griffith, Rean; Virmani, Ritika; Kaiser, Gail E. 2007 Reports Computer science
287. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
288. Schema Polynomials and Applications Ross, Kenneth A.; Stoyanovich, Julia 2007 Reports Computer science
289. Service Composition in a Global Service Discovery System Arabshian, Knarig; Dickmann, Christian; Schulzrinne, Henning G. 2007 Reports Computer science
290. Speech Enabled Avatar from a Single Photograph Bitouk, Dmitri; Nayar, Shree K. 2007 Reports Computer science
291. STAND: Sanitization Tool for ANomaly Detection Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
292. The Delay-Friendliness of TCP Brosh, Eli; Baset, Salman Abdul; Misra, Vishal; Rubenstein, Daniel Stuart; Schulzrinne, Henning G. 2007 Reports Computer science
293. The PBS Policy: Some Properties and Their Proofs Feng, Hanhua; Misra, Vishal; Rubenstein, Daniel Stuart 2007 Reports Computer science
294. The Role of Reliability, Availability and Serviceability (RAS) Models in the Design and Evaluation of Self-Healing Systems Griffith, Rean; Virmani, Ritika; Kaiser, Gail E. 2007 Reports Computer science
295. Topology-Based Optimization of Maximal Sustainable Throughput in a Latency-Insensitive System Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
296. Towards In Vivo Testing of Software Applications Murphy, Christian; Kaiser, Gail E.; Chu, Matt 2007 Reports Computer science
297. Tractability of the Helmholtz equation with non-homogeneous Neumann boundary conditions: Relation to L2-approximation Werschulz, Arthur G. 2007 Reports Computer science
298. Using boosting for automated planning and trading systems Creamer, German 2007 Reports Computer science
299. Using Functional Independence Conditions to Optimize the Performance of Latency-Insensitive Systems Li, Cheng-Hong; Carloni, Luca 2007 Reports Computer science
300. Whitepaper: The Value of Improving the Separation of Concerns Eaddy, Marc; Cyment, Alan; Laar, Pierre van de; Schmied, Fabian; Schult, Wolfgang 2007 Reports Computer science