101. Computational Cameras: Approaches, Benefits and Limits Nayar, Shree K. 2011 Reports Computer science
102. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
103. Constructing Subtle Concurrency Bugs Using Synchronization-CentricSecond-Order Mutation Operators Wu, Leon Li; Kaiser, Gail E. 2011 Reports Computer science
104. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
105. Data Quality Assurance and Performance Measurement of Data Mining for Preventive Maintenance of Power Grid Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Anderson, Roger N. 2011 Reports Computer science
106. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
107. DYSWIS: Collaborative Network Fault Diagnosis - Of End-users, By End-users, For End-users Kim, Kyung Hwa; Singh, Vishal; Schulzrinne, Henning G. 2011 Reports Computer science
108. Efficient, Deterministic and Deadlock-free Concurrency Vasudevan, Nalini 2011 Reports Computer science
109. Entropy, Randomization, Derandomization, and Discrepancy Gnewuch, Michael 2011 Reports Computer science
110. Estimation of System Reliability Using a Semiparametric Model Wu, Leon Li; Teravainen, Timothy Kaleva; Kaiser, Gail E.; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia 2011 Reports Computer science
111. Evaluating Machine Learning for Improving Power Grid Reliability Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Waltz, David L.; Anderson, Roger N.; Boulanger, Albert G.; Salleb-Aouissi, Ansaf; Dutta, Haimonti; Pooleery, Manoj 2011 Reports Computer science
112. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
113. GRAND: Git Revisions As Named Data Janak, Jan; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
114. HALO (Highly Addictive, sociaLly Optimized) Software Engineering Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2011 Reports Computer science
115. Implementing Zeroconf in Linphone Srivastava, Abhishek Ajit; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
116. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2011 Reports Computer science
117. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2011 Reports Computer science
118. Markov Models for Network-Behavior Modeling and Anonymization Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Reports Computer science
119. Money for Nothing and Privacy for Free? Sheth, Swapneel Kalpesh; Malkin, Tal G.; Kaiser, Gail E. 2011 Reports Computer science
120. NetServ Framework Design and Implementation 1.0 Lee, Jae Woo; Francescangeli, Roberto; Song, Wonsang; Janak, Jan; Srinivasan, Suman Ramkumar; Kester, Michael S.; Baset, Salman Abdul; Liu, Eric; Schulzrinne, Henning G.; Hilt, Volker; Despotovic, Zoran; Kellerer, Wolfgang 2011 Reports Computer science
121. NetServ on OpenFlow 1.0 Maccherani, Emanuele; Lee, Jae Woo; Femminella, Mauro; Reali, Gianluca; Schulzrinne, Henning G. 2011 Reports Computer science
122. On Effective Testing of Health Care Simulation Software Murphy, Christian; Raunak, M. S.; King, Andrew; Chen, Sanjien; Imbriano, Christopher; Kaiser, Gail E.; Lee, Insup; Sokolsky, Oleg; Clarke, Lori; Osterweil, Leon 2011 Reports Computer science
123. POWER: Parallel Optimizations With Executable Rewriting Arora, Nipun; Bell, Jonathan Schaffer; Kim, Martha Allen; Singh, Vishal; Kaiser, Gail E. 2011 Reports Computer science
124. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
125. Protocols and System Design, Reliability, and Energy Efficiency in Peer-to-Peer Communication Systems Baset, Salman Abdul 2011 Reports Computer science
126. Secret Ninja Testing with HALO Software Engineering Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
127. Stable Flight and Object Tracking with a Quadricopter Using an Android Device Bardin, Benjamin Alexander; Brown, William Haldean; Blaer, Paul S. 2011 Reports Computer science
128. The Benefits of Using Clock Gating in the Design of Networks-on-Chip Petracca, Michele; Carloni, Luca 2011 Reports Computer science
129. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
130. Towards Diversity in Recommendations Using Social Networks Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Arora, Nipun; Kaiser, Gail E. 2011 Reports Computer science
131. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2010 Reports Computer science
132. A Real World Identity Management System with Master Secret Revocation Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer science
133. Automatic Detection of Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
134. Automatic Detection of Previously-Unseen Application States for Deployment Environment Testing and Analysis Murphy, Christian; Vaughan, Moses; Ilahi, Waseem; Kaiser, Gail E. 2010 Reports Computer science
135. Baseline: Metrics for setting a baseline for web vulnerability scanners Dai, Huning; Glass, Michael; Kaiser, Gail E. 2010 Reports Computer science
136. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Reports Computer science
137. Comparing Speed of Provider Data Entry: Electronic Versus Paper Methods Jackson, Kevin M.; Kaiser, Gail E.; Wong, Lyndon; Rabinowitz, Daniel; Chiang, Michael F. 2010 Reports Computer science
138. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning; Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
139. CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection Dai, Huning 2010 Reports Computer science
140. Empirical Evaluation of Approaches to Testing Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2010 Reports Computer science
141. Empirical Study of Concurrency Mutation Operators for Java Wu, Leon Li; Kaiser, Gail E. 2010 Reports Computer science
142. Infinite-Dimensional Integration on Weighted Hilbert Spaces Gnewuch, Michael 2010 Reports Computer science
143. Metamorphic Testing Techniques to Detect Defects in Applications without Test Oracles Murphy, Christian 2010 Reports Computer science
144. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2010 Reports Computer science
145. Modeling User Search-Behavior for Masquerade Detection Ben Salem, Malek; Hershkop, Shlomo; Stolfo, Salvatore 2010 Reports Computer science
146. NetServ: Early Prototype Experiences Kester, Michael S.; Liu, Eric; Lee, Jae Woo; Schulzrinne, Henning G. 2010 Reports Computer science
147. ONEChat: Enabling Group Chat and Messaging in Opportunistic Networks Cui, Heming; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2010 Reports Computer science
148. Privacy-Preserving, Taxable Bank Accounts Androulaki, Elli; Vo, Binh D.; Bellovin, Steven Michael 2010 Reports Computer scienceBanks and banking
149. Quasi-Polynomial Tractability Gnewuch, Michael; Wozniakowski, Henryk 2010 Reports Computer science