101. A New Randomized Algorithm to Approximate the Star Discrepancy Based on Threshold Accepting Gnewuch, Michael; Wahlstrom, Magnus; Winzen, Carola 2011 Reports Computer science
102. Beyond Trending Topics: Real-World Event Identification on Twitter Becker, Hila; Naaman, Mor; Gravano, Luis 2011 Reports Computer science
103. BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports Wu, Leon Li; Xie, Boyi; Kaiser, Gail E.; Passonneau, Rebecca 2011 Reports Computer science
104. Cells: A Virtual Mobile Smartphone Architecture Andrus, Jeremy Christian; Dall, Christoffer; Van't Hof, Alexander Edward; Laadan, Oren; Nieh, Jason 2011 Reports Computer science
105. Columbia University WiMAX Campus Deployment and Installation Seo, SungHoon; Janak, Jan; Schulzrinne, Henning G. 2011 Reports Computer science
106. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
107. Computational Cameras: Approaches, Benefits and Limits Nayar, Shree K. 2011 Reports Computer science
108. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
109. Constructing Subtle Concurrency Bugs Using Synchronization-CentricSecond-Order Mutation Operators Wu, Leon Li; Kaiser, Gail E. 2011 Reports Computer science
110. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
111. Data Quality Assurance and Performance Measurement of Data Mining for Preventive Maintenance of Power Grid Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Anderson, Roger N. 2011 Reports Computer science
112. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
113. DYSWIS: Collaborative Network Fault Diagnosis - Of End-users, By End-users, For End-users Kim, Kyung Hwa; Singh, Vishal; Schulzrinne, Henning G. 2011 Reports Computer science
114. Efficient, Deterministic and Deadlock-free Concurrency Vasudevan, Nalini 2011 Reports Computer science
115. Entropy, Randomization, Derandomization, and Discrepancy Gnewuch, Michael 2011 Reports Computer science
116. Estimation of System Reliability Using a Semiparametric Model Wu, Leon Li; Teravainen, Timothy Kaleva; Kaiser, Gail E.; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia 2011 Reports Computer science
117. Evaluating Machine Learning for Improving Power Grid Reliability Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Waltz, David L.; Anderson, Roger N.; Boulanger, Albert G.; Salleb-Aouissi, Ansaf; Dutta, Haimonti; Pooleery, Manoj 2011 Reports Computer science
118. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
119. GRAND: Git Revisions As Named Data Janak, Jan; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
120. HALO (Highly Addictive, sociaLly Optimized) Software Engineering Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2011 Reports Computer science
121. Implementing Zeroconf in Linphone Srivastava, Abhishek Ajit; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
122. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2011 Reports Computer science
123. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2011 Reports Computer science
124. Markov Models for Network-Behavior Modeling and Anonymization Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Reports Computer science
125. Money for Nothing and Privacy for Free? Sheth, Swapneel Kalpesh; Malkin, Tal G.; Kaiser, Gail E. 2011 Reports Computer science
126. NetServ Framework Design and Implementation 1.0 Lee, Jae Woo; Francescangeli, Roberto; Song, Wonsang; Janak, Jan; Srinivasan, Suman Ramkumar; Kester, Michael S.; Baset, Salman Abdul; Liu, Eric; Schulzrinne, Henning G.; Hilt, Volker; Despotovic, Zoran; Kellerer, Wolfgang 2011 Reports Computer science
127. NetServ on OpenFlow 1.0 Maccherani, Emanuele; Lee, Jae Woo; Femminella, Mauro; Reali, Gianluca; Schulzrinne, Henning G. 2011 Reports Computer science
128. On Effective Testing of Health Care Simulation Software Murphy, Christian; Raunak, M. S.; King, Andrew; Chen, Sanjien; Imbriano, Christopher; Kaiser, Gail E.; Lee, Insup; Sokolsky, Oleg; Clarke, Lori; Osterweil, Leon 2011 Reports Computer science
129. POWER: Parallel Optimizations With Executable Rewriting Arora, Nipun; Bell, Jonathan Schaffer; Kim, Martha Allen; Singh, Vishal; Kaiser, Gail E. 2011 Reports Computer science
130. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
131. Protocols and System Design, Reliability, and Energy Efficiency in Peer-to-Peer Communication Systems Baset, Salman Abdul 2011 Reports Computer science
132. Secret Ninja Testing with HALO Software Engineering Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
133. Stable Flight and Object Tracking with a Quadricopter Using an Android Device Bardin, Benjamin Alexander; Brown, William Haldean; Blaer, Paul S. 2011 Reports Computer science
134. The Benefits of Using Clock Gating in the Design of Networks-on-Chip Petracca, Michele; Carloni, Luca 2011 Reports Computer science
135. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
136. Towards Diversity in Recommendations Using Social Networks Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Arora, Nipun; Kaiser, Gail E. 2011 Reports Computer science
137. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
138. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
139. Automatic Detection of Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
140. Automatic Detection of Previously-Unseen Application States for Deployment Environment Testing and Analysis Murphy, Christian; Vaughan, Moses; Ilahi, Waseem; Kaiser, Gail E. 2010 Reports Computer science
141. Baseline: Metrics for setting a baseline for web vulnerability scanners Dai, Huning; Glass, Michael; Kaiser, Gail E. 2010 Reports Computer science
142. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
143. Comparing Speed of Provider Data Entry: Electronic Versus Paper Methods Jackson, Kevin M.; Kaiser, Gail E.; Wong, Lyndon; Rabinowitz, Daniel; Chiang, Michael F. 2010 Reports Computer science
144. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
145. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning 2010 Reports Computer science
146. Empirical Evaluation of Approaches to Testing Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
147. Empirical Study of Concurrency Mutation Operators for Java Wu, Leon Li; Kaiser, Gail E. 2010 Reports Computer science
148. Infinite-Dimensional Integration on Weighted Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
149. Metamorphic Testing Techniques to Detect Defects in Applications without Test Oracles Murphy, Christian 2010 Reports Computer science
150. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
151. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
152. NetServ: Early Prototype Experiences Kester, Michael S.; Liu, Eric; Lee, Jae Woo; Schulzrinne, Henning G. 2010 Reports Computer science
153. ONEChat: Enabling Group Chat and Messaging in Opportunistic Networks Cui, Heming; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2010 Reports Computer science
154. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
155. Quasi-Polynomial Tractability Gnewuch, Michael; Wozniakowski, Henryk 2010 Reports Computer science
157. Simple-VPN: Simple IPsec Configuration Srivatsan, Shreyas; Johnson, Maritza Lupe; Bellovin, Steven Michael 2010 Reports Computer science
158. Testing and Validating Machine Learning Classifiers by Metamorphic Testing Xie, Xiaoyuan; Ho, Joshua W. K.; Murphy, Christian; Kaiser, Gail E.; Xu, Baowen; Chen, Tsong Yueh 2010 Reports Computer science
159. The Tradeoffs of Societal Computing Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2010 Reports Computer science
160. The weHelp Reference Architecture for Community-Driven Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
161. Towards Using Cached Data Mining for Large Scale Recommender Systems Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2010 Reports Computer science
162. Tractability of the Fredholm problem of the second kind Werschulz, Arthur G.; Wozniakowski, Henryk 2010 Reports Computer science
163. Trade-offs in Private Search Pappas, Vasileios; Raykova, Mariana Petrova; Vo, Binh D.; Bellovin, Steven Michael; Malkin, Tal G. 2010 Reports Computer science
164. Weighted Geometric Discrepancies and Numerical Integration on Reproducing Kernel Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
165. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
166. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
167. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
168. Apiary: Easy-to-use Desktop Application Fault Containment on Commodity Operating Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
169. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
170. A Software Checking Framework Using Distributed Model Checking and Checkpoint/Resume of Virtualized PrOcess Domains Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2009 Reports Computer science
171. Automatic System Testing of Programs without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2009 Reports Computer science
172. Behavior-Profile Clustering For False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa 2009 Reports Computer science
173. COMPASS: A Community-driven Parallelization Advisor for Sequential Software Sethumadhavan, Lakshminarasimhan; Kaiser, Gail E. 2009 Reports Computer science
174. Configuration Fuzzing for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
176. Example application under PRET environment: Programming a MultiMediaCard Dedhia, Devesh 2009 Reports Computer science
177. Exploiting Local Logic Structures to Optimize Multi-Core SoC Floorplanning Li, Cheng-Hong; Sonalka, Sampada; Carloni, Luca 2009 Reports Computer science
178. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Reports Computer science
179. Flexible Filters: Load Balancing through Backpressure for Stream Programs Collins, Rebecca L.; Carloni, Luca 2009 Reports Computer science
180. Guidelines for Specifying the Use of IPsec Version 2 Bellovin, Steven Michael 2009 Reports Computer science
181. Have I Met You Before? Using Cross-Media Relations to Reduce SPIT Ono, Kumiko; Schulzrinne, Henning G. 2009 Reports Computer science
182. Improving the Quality of Computational Science Software by Using Metamorphic Relations to Test Machine Learning Applications Xie, Xiaoyuan; Ho, Joshua; Murphy, Christian; Kaiser, Gail E.; Xu, Baowen; Chen, Tsong Yueh 2009 Reports Computer scienceMachine learningComputers--Scientific applicationsSoftware engineering
183. Improving Virtual Appliance Management through Virtual Layered File Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
184. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
185. Metamorphic Runtime Checking of Non-Testable Programs Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
186. Metamorphic Runtime Checking of Non-Testable Programs Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
187. Mouth-to-Ear Latency in Popular VoIP Clients Agastya, Chitra; Mechanic, Daniel; Kothari, Neha 2009 Reports Computer science
188. Multi-perspective Evaluation of Self-Healing Systems Using Simple Probabilistic Models Griffith, Rean; Kaiser, Gail E.; LoÌpez, Javier Alonso 2009 Reports Computer science
189. On TCP-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G. 2009 Reports Computer science
191. PBS: Signaling Architecture for Network Traffic Authorization Hong, Se Gi; Schulzrinne, Henning G.; Weiland, Swen 2009 Reports Computer science
192. Rank-Aware Subspace Clutering for Structured Datasets Stoyanovich, Julia; Amer-Yahia, Sihem 2009 Reports Computer science
193. Rapid Parallelization by Collaboration Sethumadhavan, Lakshminarasimhan; Kaiser, Gail E. 2009 Reports Computer science
194. Record and Transplay: Partial Checkpointing for Replay Debugging Subhraveti, Dinesh Kumar; Nieh, Jason 2009 Reports Computer science
195. Retrocomputing on an FPGA: Reconstructing an 80's-Era Home Computer with Programmable Logic Edwards, Stephen A. 2009 Reports Computer science
196. Self-monitoring Monitors Stolfo, Salvatore; Greenbaum, Isaac; Sethumadhavan, Lakshminarasimhan 2009 Reports Computer science
197. Semantic Ranking and Result Visualization for Life Sciences Publications Stoyanovich, Julia; Mee, William; Ross, Kenneth A. 2009 Reports Computer scienceInformation science
198. Serving Niche Video-on-Demand Content in a Managed P2P Environment Brosh, Eli; Agastya, Chitra; Morales, John; Misra, Vishal; Rubenstein, Daniel Stuart 2009 Reports Computer science
199. Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode Prabhu, Pratap; Song, Yingbo; Stolfo, Salvatore 2009 Reports Computer science
200. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science