1. A Case Study in Distributed Deployment of Embedded Software for Camera Networks Leonardi, Francesco; Pinto, Alessandro; Carloni, Luca 2009 Reports Computer science
2. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating Cretu, Gabriela F.; Stavrou, Angelos; Locasto, Michael E.; Stolfo, Salvatore 2009 Reports Computer science
3. An Anonymous Credit Card System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
4. Apiary: Easy-to-use Desktop Application Fault Containment on Commodity Operating Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
5. A Secure and Privacy-Preserving Targeted Ad-System Androulaki, Elli; Bellovin, Steven Michael 2009 Reports Computer science
6. A Software Checking Framework Using Distributed Model Checking and Checkpoint/Resume of Virtualized PrOcess Domains Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2009 Reports Computer science
7. Automatic System Testing of Programs without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2009 Reports Computer science
8. Baiting Inside Attackers Using Decoy Documents Bowen, Brian M.; Hershkop, Shlomo; Keromytis, Angelos D.; Stolfo, Salvatore 2009 Articles Computer science
9. Behavior-Profile Clustering For False Alert Reduction in Anomaly Detection Sensors Frias-Martinez, Vanessa 2009 Reports Computer science
10. COMPASS: A Community-driven Parallelization Advisor for Sequential Software Sethumadhavan, Lakshminarasimhan; Kaiser, Gail E. 2009 Reports Computer science
11. Configuration Fuzzing for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
13. Example application under PRET environment: Programming a MultiMediaCard Dedhia, Devesh 2009 Reports Computer science
14. Exploiting Local Logic Structures to Optimize Multi-Core SoC Floorplanning Li, Cheng-Hong; Sonalka, Sampada; Carloni, Luca 2009 Reports Computer science
15. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services Burnside, Matthew Spindel; Keromytis, Angelos D. 2009 Reports Computer science
16. Flexible Filters: Load Balancing through Backpressure for Stream Programs Collins, Rebecca L.; Carloni, Luca 2009 Reports Computer science
17. Have I Met You Before? Using Cross-Media Relations to Reduce SPIT Ono, Kumiko; Schulzrinne, Henning G. 2009 Reports Computer science
18. Improving the Quality of Computational Science Software by Using Metamorphic Relations to Test Machine Learning Applications Xie, Xiaoyuan; Ho, Joshua; Murphy, Christian; Kaiser, Gail E.; Xu, Baowen; Chen, Tsong Yueh 2009 Reports Computer scienceMachine learningComputers--Scientific applicationsSoftware engineering
19. Improving Virtual Appliance Management through Virtual Layered File Systems Potter, Shaya; Nieh, Jason 2009 Reports Computer science
20. Masquerade Attack Detection Using a Search-Behavior Modeling Approach Ben Salem, Malek; Stolfo, Salvatore 2009 Reports Computer science
21. Metamorphic Runtime Checking of Non-Testable Programs Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
22. Metamorphic Runtime Checking of Non-Testable Programs Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
23. Mouth-to-Ear Latency in Popular VoIP Clients Agastya, Chitra; Mechanic, Daniel; Kothari, Neha 2009 Reports Computer science
24. Multi-perspective Evaluation of Self-Healing Systems Using Simple Probabilistic Models Griffith, Rean; Kaiser, Gail E.; LoÌpez, Javier Alonso 2009 Reports Computer science
25. On TCP-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G. 2009 Reports Computer science
27. PBS: Signaling Architecture for Network Traffic Authorization Hong, Se Gi; Schulzrinne, Henning G.; Weiland, Swen 2009 Reports Computer science
28. Rank-Aware Subspace Clutering for Structured Datasets Stoyanovich, Julia; Amer-Yahia, Sihem 2009 Reports Computer science
29. Rapid Parallelization by Collaboration Sethumadhavan, Lakshminarasimhan; Kaiser, Gail E. 2009 Reports Computer science
30. Record and Transplay: Partial Checkpointing for Replay Debugging Subhraveti, Dinesh Kumar; Nieh, Jason 2009 Reports Computer science
31. Retrocomputing on an FPGA: Reconstructing an 80's-Era Home Computer with Programmable Logic Edwards, Stephen A. 2009 Reports Computer science
32. Self-monitoring Monitors Stolfo, Salvatore; Greenbaum, Isaac; Sethumadhavan, Lakshminarasimhan 2009 Reports Computer science
33. Semantic Ranking and Result Visualization for Life Sciences Publications Stoyanovich, Julia; Mee, William; Ross, Kenneth A. 2009 Reports Computer scienceInformation science
34. Serving Niche Video-on-Demand Content in a Managed P2P Environment Brosh, Eli; Agastya, Chitra; Morales, John; Misra, Vishal; Rubenstein, Daniel Stuart 2009 Reports Computer science
35. Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode Prabhu, Pratap; Song, Yingbo; Stolfo, Salvatore 2009 Reports Computer science
36. Source Prefix Filtering in ROFL Zhao, Hang; Johnson, Maritza Lupe; Chau, Chi-Kin; Bellovin, Steven Michael 2009 Reports Computer science
37. The Impact of TLS on SIP Server Performance Shen, Charles; Nahum, Erich; Schulzrinne, Henning G.; Wright, Charles P. 2009 Reports Computer science
38. The Zodiac Policy Subsystem: A Policy-Based Management System for a High-Security MANET Cheng, Yuu-Heng; Alexander, D. Scott; Poylisher, Alex; Raykova, Mariana Petrova; Bellovin, Steven Michael 2009 Reports Computer science
39. Thwarting Attacks in Malcode-Bearing Documents by Altering Data Sector Values Li, Wei-Jen; Stolfo, Salvatore 2009 Reports Computer science
40. Turn-Taking and Affirmative Cue Words in Task-Oriented Dialogue Gravano, Agustin 2009 Reports Computer science
41. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science
42. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science