1. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
2. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
3. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
4. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
5. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
6. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
7. Higher-order Properties of Approximate Estimators Kristensen, Dennis; Salanie, Bernard 2016 Reports EconometricsEstimation theoryStatisticsEconomicsMathematicsComputer science
8. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
9. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
10. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
11. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
12. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
13. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
14. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
15. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
16. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
17. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
18. Hardware in Haskell: Implementing Memories in a Stream-Based World Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports ComputersMemory--Computer programsHaskell (Computer program language)Computer science
19. Hardware Synthesis from a Recursive Functional Language Zhai, Kuangya; Townsend, Richard Morse; Lairmore, Lianne Elizabeth; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports Computer science
20. Higher-order Properties of Approximate Estimators Kristensen, Dennis; Salanie, Bernard 2015 Reports StatisticsEconomicsMathematicsComputer science
21. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2015 Reports Cooperating objects (Computer systems)Reliability (Engineering)--EvaluationComputer science
22. Parikshan: Live Debugging of Production Systems in Isolation Arora, Nipun; Ivancic, Franjo; Kaiser, Gail E. 2015 Reports Service-oriented architecture (Computer science)Computer softwareDebugging in computer science--Computer programsComputer science
23. Setting budgets for live debugging Arora, Nipun; Sharma, Abhishek; Kaiser, Gail E. 2015 Reports Queuing theory--Computer programsBudgetDebugging in computer scienceComputer science
24. Use of Fast Multipole to Accelerate Discrete Circulation-Preserving Vortex Sheets for Soap Films and Foams Da, Fang; Batty, Christopher; Wotjan, Chris; Grinspun, Eitan 2015 Reports Computer science
25. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
26. A Fractional Programming Framework for Support Vector Machine-type Formulations Vovsha, Ilia 2014 Reports Computer science
27. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
28. Conventional Orthography for Dialectal Arabic (CODA): Principles and Guidelines -- Egyptian Arabic - Version 0.7 - March 2012 Habash, Nizar Y.; Diab, Mona T.; Rambow, Owen C. 2014 Reports Computer science
29. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
30. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
31. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
32. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
33. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
34. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
35. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
36. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
37. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
38. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
39. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
40. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
41. Prosodic Entrainment in Mandarin and English: A Cross-Linguistic Comparison Xia, Zhihua; Levitan, Rivka; Hirschberg, Julia Bell 2014 Reports Computer scienceLinguistics
42. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
43. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
44. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
47. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
48. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
49. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
51. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
52. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
53. Annotation Guidelines for Arabic Nominal Gender, Number, and Rationality Habash, Nizar Y.; Alkuhlani, Sarah M. 2013 Reports Computer scienceInformation scienceLinguistics
54. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
55. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
56. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
57. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
58. Diversity Maximization Under Matroid Constraints Abbassi, Zeinab; Mirrokni, Vahab S.; Thakur, Mayur 2013 Reports Computer science
59. Effective Dynamic Detection of Alias Analysis Errors Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng 2013 Reports Computer science
60. Effectiveness of Teaching Metamorphic Testing, Part II Mishra, Kunal S.; Kaiser, Gail E.; Sheth, Swapneel Kalpesh 2013 Reports Computer science
61. Enabling the Virtual Phones to remotely sense the Real Phones in real-time: A Sensor Emulation initiative for virtualized Android-x86 Santhanam, Raghavan 2013 Reports Computer science
63. FARE: A Framework for Benchmarking Reliability of Cyber-Physical Systems Wu, Leon; Kaiser, Gail E. 2013 Reports Computer science
64. Finding 9-1-1 Callers in Tall Buildings Song, Wonsang; Lee, Jae; Lee, Byung; Schulzrinne, Henning G. 2013 Reports Computer science
66. Heterogeneous Access: Survey and Design Considerations Singh, Amandeep; Ormazabal, Gaston; Addepalli, Sateesh; Schulzrinne, Henning G. 2013 Reports Computer science
67. Hybrid Continuous-Discrete Computer: from ISA to Microarchitecture Huang, Yipeng; Sethumadhavan, Simha 2013 Reports Computer science
68. KVM/ARM: Experiences Building the Linux ARM Hypervisor Dall, Christoffer; Nieh, Jason 2013 Reports Computer science
69. LDC Arabic Treebanks and Associated Corpora: Data Divisions Manual Diab, Mona T.; Habash, Nizar Y.; Rambow, Owen C.; Roth, Ryan M. 2013 Reports Computer scienceInformation science
70. Make Parallel Programs Reliable with Stable Multithreading Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng; Cui, Heming; Gallagher, John; Tsai, Chia-Che 2013 Reports Computer science
71. Metamorphic Runtime Checking of Applications without Test Oracles Murphy, Christian; Kaiser, Gail E.; Bell, Jonathan Schaffer; Su, Fang-Hsiang 2013 Reports Computer science
72. Mobile Video Is Inefficient: A Traffic Analysis Nam, Hyunwoo; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
73. N Heads Are Better Than None Hopkins, Morris; Casteneda, Mauricio; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
74. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
75. Principles and Techniques of Schlieren Imaging Systems Mazumdar, Amrita 2013 Reports Computer science
76. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
77. Towards A Dynamic QoS-aware Over-The-Top Video Streaming in LTE Nam, Hyunwoo; Kim, Kyung Hwa; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
78. Towards Dynamic Network Condition-Aware Video Server Selection Algorithms over Wireless Networks Nam, Hyunwoo; Kim, Kyung Hwa; Schulzrinne, Henning G.; Calin, Doru 2013 Reports Computer science
79. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
80. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
81. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
82. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
83. A Modern Standard Arabic Closed-Class Word List Salloum, Wael Sameer; Habash, Nizar Y. 2012 Reports Computer scienceArtificial intelligence
84. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
85. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
86. Automatic Detection of Metamorphic Properties of Software Hasan, Sahar 2012 Reports Computer science
87. Bethe Bounds and Approximating the Global Optimum Weller, Adrian; Jebara, Tony 2012 Reports Computer science
88. Chronicler: Lightweight Recording to Reproduce Field Failures Bell, Jonathan Schaffer; Sarda, Nikhil; Kaiser, Gail E. 2012 Reports Computer science
89. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
90. Effectiveness of Teaching Metamorphic Testing Mishra, Kunal Swaroop; Kaiser, Gail E. 2012 Reports Computer science
91. End-User Regression Testing for Privacy Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2012 Reports Computer science
92. Experiments of Image Retrieval Using Weak Attributes Yu, Xinnan; Ji, Rongrong; Tsai, Ming-Hen; Ye, Guangnan; Chang, Shih-Fu 2012 Reports Computer scienceInformation science
93. Focal Sweep Camera for Space-Time Refocusing Zhou, Changyin; Miau, Daniel; Nayar, Shree K. 2012 Reports Computer science
95. Hardware-Accelerated Range Partitioning Wu, Lisa K.; Barker, Raymond John; Kim, Martha Allen; Ross, Kenneth A. 2012 Reports Computer science
96. High Availability for Carrier-Grade SIP Infrastructure on Cloud Platforms Kim, Jong Yul; Schulzrinne, Henning G. 2012 Reports Computer science
97. High Throughput Heavy Hitter Aggregation Polychroniou, Orestis; Ross, Kenneth A. 2012 Reports Computer science
98. Improving Efficiency and Reliability of Building Systems Using Machine Learning and Automated Online Evaluation Wu, Leon Li; Kaiser, Gail E.; Solomon, David M.; Winter, Rebecca Lynn; Boulanger, Albert G.; Anderson, Roger N. 2012 Reports Computer science
99. Improving the Vertical Accuracy of Indoor Positioning for Emergency Communication Song, Wonsang; Lee, Jae Woo; Lee, Byung Suk; Schulzrinne, Henning G. 2012 Reports Computer science
100. Increasing Student Engagement in Software Engineering with Gamification Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science