201. Toward a Robust and Universal Crowd Labeling Framework Khattak, Faiza Khan 2017 Theses Computer scienceLabelsBayesian statistical decision theory
202. Using Machine Learning to improve Internet Privacy Zimmeck, Sebastian 2017 Theses Computer securityMachine learningInternet--Law and legislationComputer security--Law and legislationInternet--Security measuresComputer scienceLaw
203. A Nearest-Neighbor Approach to Indicative Web Summarization Petinot, Yves 2016 Theses Information retrievalWeb search enginesInternet searchingComputer science
204. Bias Characterization in Probabilistic Genotype Data and Improved Signal Detection with Multiple Imputation Palmer, Cameron Douglas; Pe’er, Itsik 2016 Articles Multiple imputation (Statistics)Missing observations (Statistics)Genetics--Statistical methodsGeneticsStatistics
205. Characterizing and Leveraging Social Phenomena in Online Networks Abbassi, Zeinab 2016 Theses Online social networksSocial influenceViral marketingAdvertising--Social aspectsInternet--Social aspectsSocial networksComputer scienceSociology
206. Cutting Edge: Using mobile sequencers in an academic classroom Zaaijer, Sophie; Erlich, Yaniv; Columbia University Ubiquitous Genomics 2015 class 2016 Articles Nucleotide sequenceScience--Study and teaching--Technological innovationsGenomicsEducational technologyEducation--Curricula
207. Data-Driven Solutions to Bottlenecks in Natural Language Generation Biran, Or 2016 Theses Computer scienceNatural language processing (Computer science)Artificial intelligence
208. Design and Optimization of Mobile Cloud Computing Systems with Networked Virtual Platforms Jung, Young Hoon 2016 Theses Application software--DevelopmentMobile appsMobile computingCloud computingComputer science
209. Deterministic, Mutable, and Distributed Record-Replay for Operating Systems and Database Systems Viennot, Nicolas 2016 Theses Operating systems (Computers)Web applicationsComputer scienceDatabases
210. Discourse Segment Annotation and Analysis: A Tagalog Telephone Corpus Passonneau, Rebecca; Huang, Ziheng; Zhong, Jialu; Lim-Kimberg, Samuel J. 2016 Data (Information) Dialogue analysisTagalog languageComputer science
211. Dynamic Algorithms for Shortest Paths and Matching Bernstein, Aaron 2016 Theses Graphic methodsComputer scienceMathematicsComputer algorithms
212. Finding, Measuring, and Reducing Inefficiencies in Contemporary Computer Systems Kambadur, Melanie Rae 2016 Theses Parallel programming (Computer science)Computer scienceComputersOperating systems (Computers)
213. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
214. GPU-Acceleration of In-Memory Data Analytics Sitaridi, Evangelia 2016 Theses Memory management (Computer science)Electronic data processingGraphics processing unitsComputer science
215. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
216. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
217. Improving Content Delivery and Service Discovery in Networks Srinivasan, Suman Ramkumar 2016 Theses Multimedia systems--StandardsComputer network protocolsInternetMultimedia systemsComputer science
218. Making Software More Reliable by Uncovering Hidden Dependencies Bell, Jonathan Schaffer 2016 Theses Computer software--DevelopmentComputer software--TestingComputer science
219. Multilingual Spatial Relation and Motion Treebank Ulinski, Morgan Elizabeth; Hirschberg, Julia Bell; Rambow, Owen C. 2016 Data (Information) Grammar, Comparative and general--SentencesEnglish language--SentencesSpanish language--SentencesGerman language--SentencesArabic language--SentencesGrammar, Comparative and general--ParsingNatural language processing (Computer science)Computer science
220. On SIP Server Clusters and the Migration to Cloud Computing Platforms Kim, Jong Yul 2016 Theses Real-time controlComputer networks--ScalabilityCloud computingSession Initiation Protocol (Computer network protocol)Computer science
221. On the isomorphism testing of graphs Sun, Xiaorui 2016 Theses Computational complexityCombinatorial analysisGroup theoryComputer science--MathematicsIsomorphisms (Mathematics)Computer science
222. Pattern Mining and Concept Discovery for Multimodal Content Analysis Li, Hongzhi 2016 Theses Data miningComputer scienceComputer visionSequential pattern mining
223. Pivot-based Statistical Machine Translation for Morphologically Rich Languages Kholy, Ahmed El 2016 Theses Grammar, Comparative and general--MorphologyArabic languageNatural language processing (Computer science)Machine translatingComputer science
224. Prior Design for Dependent Dirichlet Processes: An Application to Marathon Modeling Pradier, Melanie F.; Ruiz, Francisco Jesus Rodriguez; Perez-Cruz, Fernando 2016 Articles Marathon runningRunning races--Data processingNonparametric statisticsStochastic processesStatisticsInformation science
225. Recognition and Manipulation of Deformable Objects Using Predictive Thin Shell Modeling Li, Yinxiao 2016 Theses RoboticsRobots, IndustrialFabric folding (Textile crafts)Clothing trade--Technological innovationsComputer science
226. Secure Computation Towards Practical Applications Krell Loy, Fernando 2016 Theses Computer securityData encryption (Computer science)Computer scienceCryptographyInformation technology
227. Social Network Extraction from Text Agarwal, Apoorv 2016 Theses Natural language processing (Computer science)Machine learningSocial networksComputer science
228. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
229. Spectral Methods for Natural Language Processing Stratos, Karl 2016 Theses Computer algorithmsNatural language processing (Computer science)Computer science
230. Supporting Multi-User Interaction in Co-Located and Remote Augmented Reality by Improving Reference Performance and Decreasing Physical Interference Oda, Ohan 2016 Theses Shared virtual environmentsComputer scienceVirtual realityVirtual reality--Social aspectsAugmented reality
231. Synthesizing and restructuring the conversation around the use of robots in the education and therapy of individuals with Autism Spectrum Disorders Wood, Zoe 2016 Theses RoboticsEducationPsychologyRobotsAutistic children--EducationAutistic children--Education--Law and legislationEducational technology
232. The Fourth Amendment in the Digital World: How Should Computers Be Searched With Respect to the Fourth Amendment? Vikuntam, Shivani 2016 Theses Computers--Law and legislationSearches and seizuresConstitutional lawLaw
233. The Impact of Comprehensive Case Management on HIV Client Outcomes Brennan-Ing, Mark; Seidel, Liz; Rodgers, Leslie; Ernst, Jerome; Wirth, Doug; Tietz, Daniel; Moretti, Antonio; Karpiak, Stephen E. 2016 Articles Hospitals--Case management servicesHIV infections--EpidemiologyHIV-positive persons--Care--Government policyEpidemiologyHealth services administrationMedical carePublic health
234. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
235. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
236. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
237. Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data Stolfo, Salvatore; Hershkop, Shlomo 2015 Data (Information) Computer securityData protectionIntrusion detection systems (Computer security)Computer science
238. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
239. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
241. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
242. Computational integration of genome-wide observational and functional data in cancer Sanchez Garcia, Felix 2015 Theses Computer scienceBioinformaticsBiology
244. Detecting Influencers in Social Media Discussions Rosenthal, Sara 2015 Theses Computer scienceSociolinguistics
245. Dimension Reduction for Short Text Similarity and its Applications Guo, Weiwei 2015 Theses Computer science
246. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
247. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
248. Embedded System Security: A Software-based Approach Cui, Ang 2015 Theses Embedded computer systemsComputer software--Security measuresEmbedded computer systems--ProgrammingEmbedded computer systems--Design and constructionComputer securityComputer science
249. Empirical Measurement of Defense in Depth Boggs, Nathaniel 2015 Theses Firewalls (Computer security)Virus inhibitorsIntrusion detection systems (Computer security)Computer securityComputer science
250. Exact and Approximate Methods for Machine Translation Decoding Chang, Yin-Wen 2015 Theses Computer science