1. Enhanced Instruction Set Randomization Design Space Exploration Tarek, Mohammed Ibn Zaid; Sethumadhavan, Simha 2019 Reports Computer scienceComputer securityHeterogeneous computing
2. Introduction to Security for Computer Architecture Students Sethumadhavan, Simha; Hastings, Adam K.; Tarek, Mohammed Ibn Zaid 2019 Reports Computer scienceComputer architectureComputer security
3. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
4. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
5. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
6. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
7. Higher-order Properties of Approximate Estimators Kristensen, Dennis; Salanie, Bernard 2016 Reports EconometricsEstimation theoryStatisticsEconomicsMathematicsComputer science
8. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
9. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
10. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
11. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
12. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
13. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
14. Anti-Virus in Silicon Tang, Beng Chiew; Demme, John David; Sethumadhavan, Simha; Stolfo, Salvatore 2015 Reports Virus inhibitorsComputer securityMalware (Computer software)Computer softwareCoupled problems (Complex systems)Computer science
15. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
16. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
17. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
18. Hardware in Haskell: Implementing Memories in a Stream-Based World Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports ComputersMemory--Computer programsHaskell (Computer program language)Computer science
19. Hardware Synthesis from a Recursive Functional Language Zhai, Kuangya; Townsend, Richard Morse; Lairmore, Lianne Elizabeth; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports Computer science
20. Higher-order Properties of Approximate Estimators Kristensen, Dennis; Salanie, Bernard 2015 Reports StatisticsEconomicsMathematicsComputer science
21. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2015 Reports Cooperating objects (Computer systems)Reliability (Engineering)--EvaluationComputer science
22. Parikshan: Live Debugging of Production Systems in Isolation Arora, Nipun; Ivancic, Franjo; Kaiser, Gail E. 2015 Reports Service-oriented architecture (Computer science)Computer softwareDebugging in computer science--Computer programsComputer science
23. Setting budgets for live debugging Arora, Nipun; Sharma, Abhishek; Kaiser, Gail E. 2015 Reports Queuing theory--Computer programsBudgetDebugging in computer scienceComputer science
24. Use of Fast Multipole to Accelerate Discrete Circulation-Preserving Vortex Sheets for Soap Films and Foams Da, Fang; Batty, Christopher; Wotjan, Chris; Grinspun, Eitan 2015 Reports Computer science
25. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
26. A Fractional Programming Framework for Support Vector Machine-type Formulations Vovsha, Ilia 2014 Reports Computer science
27. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
28. Conventional Orthography for Dialectal Arabic (CODA): Principles and Guidelines -- Egyptian Arabic - Version 0.7 - March 2012 Habash, Nizar Y.; Diab, Mona T.; Rambow, Owen C. 2014 Reports Computer science
29. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
30. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
31. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
32. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
33. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
34. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
35. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
36. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
37. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
38. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
39. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
40. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
41. Prosodic Entrainment in Mandarin and English: A Cross-Linguistic Comparison Xia, Zhihua; Levitan, Rivka; Hirschberg, Julia Bell 2014 Reports Computer scienceLinguistics
42. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
43. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
44. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
47. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
48. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
49. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
51. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
52. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
53. Annotation Guidelines for Arabic Nominal Gender, Number, and Rationality Habash, Nizar Y.; Alkuhlani, Sarah M. 2013 Reports Computer scienceInformation scienceLinguistics
54. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
55. Bait and Snitch: Defending Computer Systems with Decoys Voris, Jonathan A.; Jermyn, Jill; Keromytis, Angelos D.; Stolfo, Salvatore 2013 Reports Computer science
56. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
57. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
58. Diversity Maximization Under Matroid Constraints Abbassi, Zeinab; Mirrokni, Vahab S.; Thakur, Mayur 2013 Reports Computer science
59. Effective Dynamic Detection of Alias Analysis Errors Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng 2013 Reports Computer science
60. Effectiveness of Teaching Metamorphic Testing, Part II Mishra, Kunal S.; Kaiser, Gail E.; Sheth, Swapneel Kalpesh 2013 Reports Computer science
61. Enabling the Virtual Phones to remotely sense the Real Phones in real-time: A Sensor Emulation initiative for virtualized Android-x86 Santhanam, Raghavan 2013 Reports Computer science
63. FARE: A Framework for Benchmarking Reliability of Cyber-Physical Systems Wu, Leon; Kaiser, Gail E. 2013 Reports Computer science
64. Finding 9-1-1 Callers in Tall Buildings Song, Wonsang; Lee, Jae; Lee, Byung; Schulzrinne, Henning G. 2013 Reports Computer science
66. Heterogeneous Access: Survey and Design Considerations Singh, Amandeep; Ormazabal, Gaston; Addepalli, Sateesh; Schulzrinne, Henning G. 2013 Reports Computer science
67. Hybrid Continuous-Discrete Computer: from ISA to Microarchitecture Huang, Yipeng; Sethumadhavan, Simha 2013 Reports Computer science
68. KVM/ARM: Experiences Building the Linux ARM Hypervisor Dall, Christoffer; Nieh, Jason 2013 Reports Computer science
69. LDC Arabic Treebanks and Associated Corpora: Data Divisions Manual Diab, Mona T.; Habash, Nizar Y.; Rambow, Owen C.; Roth, Ryan M. 2013 Reports Computer scienceInformation science
70. Make Parallel Programs Reliable with Stable Multithreading Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng; Cui, Heming; Gallagher, John; Tsai, Chia-Che 2013 Reports Computer science
71. Metamorphic Runtime Checking of Applications without Test Oracles Murphy, Christian; Kaiser, Gail E.; Bell, Jonathan Schaffer; Su, Fang-Hsiang 2013 Reports Computer science
72. Mobile Video Is Inefficient: A Traffic Analysis Nam, Hyunwoo; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
73. N Heads Are Better Than None Hopkins, Morris; Casteneda, Mauricio; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
74. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
75. Principles and Techniques of Schlieren Imaging Systems Mazumdar, Amrita 2013 Reports Computer science
76. Societal Computing Sheth, Swapneel 2013 Reports Computer sciencePrivacy--ResearchPrivacy, Right ofComputer security
77. Towards A Dynamic QoS-aware Over-The-Top Video Streaming in LTE Nam, Hyunwoo; Kim, Kyung Hwa; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
78. Towards Dynamic Network Condition-Aware Video Server Selection Algorithms over Wireless Networks Nam, Hyunwoo; Kim, Kyung Hwa; Schulzrinne, Henning G.; Calin, Doru 2013 Reports Computer science
79. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
80. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
81. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
82. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
83. A Modern Standard Arabic Closed-Class Word List Salloum, Wael Sameer; Habash, Nizar Y. 2012 Reports Computer scienceArtificial intelligence
84. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
85. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
86. Automatic Detection of Metamorphic Properties of Software Hasan, Sahar 2012 Reports Computer science
87. Bethe Bounds and Approximating the Global Optimum Weller, Adrian; Jebara, Tony 2012 Reports Computer science
88. Chronicler: Lightweight Recording to Reproduce Field Failures Bell, Jonathan Schaffer; Sarda, Nikhil; Kaiser, Gail E. 2012 Reports Computer science
89. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
90. Effectiveness of Teaching Metamorphic Testing Mishra, Kunal Swaroop; Kaiser, Gail E. 2012 Reports Computer science
91. End-User Regression Testing for Privacy Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2012 Reports Computer science
92. Experiments of Image Retrieval Using Weak Attributes Yu, Xinnan; Ji, Rongrong; Tsai, Ming-Hen; Ye, Guangnan; Chang, Shih-Fu 2012 Reports Computer scienceInformation science
93. Focal Sweep Camera for Space-Time Refocusing Zhou, Changyin; Miau, Daniel; Nayar, Shree K. 2012 Reports Computer science
95. Hardware-Accelerated Range Partitioning Wu, Lisa K.; Barker, Raymond John; Kim, Martha Allen; Ross, Kenneth A. 2012 Reports Computer science
96. High Availability for Carrier-Grade SIP Infrastructure on Cloud Platforms Kim, Jong Yul; Schulzrinne, Henning G. 2012 Reports Computer science
97. High Throughput Heavy Hitter Aggregation Polychroniou, Orestis; Ross, Kenneth A. 2012 Reports Computer science
98. Improving Efficiency and Reliability of Building Systems Using Machine Learning and Automated Online Evaluation Wu, Leon Li; Kaiser, Gail E.; Solomon, David M.; Winter, Rebecca Lynn; Boulanger, Albert G.; Anderson, Roger N. 2012 Reports Computer science
99. Improving the Vertical Accuracy of Indoor Positioning for Emergency Communication Song, Wonsang; Lee, Jae Woo; Lee, Byung Suk; Schulzrinne, Henning G. 2012 Reports Computer science
100. Increasing Student Engagement in Software Engineering with Gamification Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science