421. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
422. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
423. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
424. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
425. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
427. Efficient Point-to-Subspace Query in ℓ1 with Application to Robust Face Recognition Sun, Ju; Zhang, Yuqian; Wright, John N. 2012 Articles Computer scienceArtificial intelligence
428. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
429. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
430. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science