801. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
802. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
803. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
804. Agnostically Learning Halfspaces Kalai, Adam; Klivans, Adam; Mansour, Yishay; Servedio, Rocco Anthony 2005 Reports Computer science
805. A Hybrid Approach to Topological Mobile Robot Localization Blaer, Paul S.; Allen, Peter K. 2005 Reports Computer science
806. A Hybrid Hierarchical and Peer-to-Peer Ontology-based Global Service Discovery System Arabshian, Knarig; Schulzrinne, Henning G. 2005 Reports Computer science
808. A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer Bessen, Arvid J. 2005 Reports Computer science
809. An Event System Architecture for Scaling Scale-Resistant Services Gross, Philip N. 2005 Reports Computer science
810. A New Routing Metric for High Throughput in Dense Ad Hoc Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Reports Computer science
811. Approximating the Reflection Integral as a Summation: Where Did the dωi Go? Ben-Artzi, Aner 2005 Reports Computer science
812. A Uniform Programming Abstraction for Effecting Autonomic Adaptations onto Software Systems Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
813. A Uniform Programming Abstraction for Effecting Autonomic Adaptations onto Software Systems Valetto, Giuseppe; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
814. Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem Papageorgiou, Anargyros; Wozniakowski, Henryk 2005 Reports Computer science
815. DotSlash: Providing Dynamic Scalability to Web Applications with On-demand Distributed Query Result Caching Zhao, Weibin; Schulzrinne, Henning G. 2005 Reports Computer science
816. Dynamic Adaptation of Rules for Temporal Event Correlation in Distributed Systems Griffith, Rean; Hellerstein, Joseph L.; Diao, Yixin; Kaiser, Gail E. 2005 Reports Computer science
817. Dynamic Adaptation of Temporal Event Correlation Rules Griffith, Rean; Kaiser, Gail E.; Hellerstein, Joseph; Diao, Yixin 2005 Reports Computer science
818. Effecting Runtime Reconfiguration in Managed Execution Environments Griffith, Rean; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
819. Generic Models for Mobility Management in Next Generation Networks Cristofano, Maria Luisa; Forte, Andrea G.; Schulzrinne, Henning G. 2005 Reports Computer science
820. Genre Classification of Websites Using Search Engine Snippets Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore; Becker, Hila 2005 Reports Computer science
821. Improving Database Performance on Simultaneous Multithreading Processors Zhou, Jingren; Cieslewicz, John; Ross, Kenneth A.; Shah, Mihir 2005 Reports Computer science
822. Incremental Algorithms for Inter-procedural Analysis of Safety Properties Conway, Christopher L.; Namjoshi, Kedar S.; Dams, Dennis; Edwards, Stephen A. 2005 Reports Computer science
823. Learning mixtures of product distributions over discrete domains Feldman, Jon; O'Donnell, Ryan; Servedio, Rocco Anthony 2005 Reports Computer science
824. Lexicalized Well-Founded Grammars: Learnability and Merging Muresan, Smaranda; Muresan, Tudor; Klavans, Judith L. 2005 Reports Computer science
825. Manipulating Managed Execution Runtimes to Support Self-Healing Systems Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
826. Merging Globally Rigid Formations of Mobile Autonomous Agents Eren, Tolga; Anderson, Brian D. O.; Whiteley, Walter; Morse, A. Stephen; Belhumeur, Peter N. 2005 Reports Computer science
827. Micro-speculation, Micro-sandboxing, and Self-Correcting Assertions: Support for Self-Healing Software and Application Communities Locasto, Michael E. 2005 Reports Computer science
828. Multi Facet Learning in Hilbert Spaces Kondor, Risi; Csányi, Gábor; Ahnert, Sebastian E.; Jebara, Tony 2005 Reports Computer science
829. Multi-Language Edit-and-Continue for the Masses Eaddy, Marc; Feiner, Steven K. 2005 Reports Computer science
830. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
831. Optimal State-Free, Size-aware Dispatching for Heterogeneous M/G/-type systems Feng, Hanhua; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Reports Computer science
832. P2P Video Synchronization in a Collaborative Virtual Environment Gupta, Suhit; Kaiser, Gail E. 2005 Reports Computer science
833. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver Locasto, Michael E.; Keromytis, Angelos D. 2005 Reports Computer science
834. Parsing Preserving Techniques in Grammar Induction Muresan, Smaranda 2005 Reports Computer science
835. Performance and Usability Analysis of Varying Web Service Architectures Lenner, Michael; Schulzrinne, Henning 2005 Reports Computer science
836. Pointer Analysis for C Programs Through AST Traversal Buss, Marcio; Edwards, Stephen A.; Yao, Bin; Waddington, Daniel 2005 Reports Computer science
838. Quantum Algorithms and Complexity for Certain Continuous and Related Discrete Problems Kwas, Marek 2005 Reports Computer science
839. Qubit Complexity of Continuous Problems Papageorgiou, Anargyros; Traub, Joseph F. 2005 Reports Computer science
840. Rigid Formations with Leader-Follower Architecture Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2005 Reports Computer science
841. Similarity-based Multilingual Multi-Document Summarization Evans, David Kirk; McKeown, Kathleen; Klavans, Judith L. 2005 Reports Computer science
843. TCP-Friendly Rate Control with Token Bucket for VoIP Congestion Control Maldonado, Miguel; Baset, Salman Abdul; Schulzrinne, Henning G. 2005 Reports Computer science
844. The Appearance of Human Skin Igarashi, Takanori; Nishino, Ko; Nayar, Shree K. 2005 Reports Computer science
846. The Pseudorandomness of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
847. The Virtual Device: Expanding Wireless Communication Services Through Service Discovery and Session Mobility Shacham, Ron; Schulzrinne, Henning G.; Thakolsri, Srisakul; Kellerer, Wolfgang 2005 Reports Computer science
848. Time-Varying Textures Enrique, Sebastian; Koudelka, Melissa; Belhumeur, Peter N.; Dorsey, Julie; Nayar, Shree K.; Ramamoorthi, Ravi 2005 Reports Computer science
849. Tractability of Quasilinear Problems. I: General Results Werschulz, Arthur G.; Wozniakowski, Henryk 2005 Reports Computer science
850. Tractability of quasilinear problems. II: Second-order elliptic problems Werschulz, Arthur G.; Wozniakowski, Henryk 2005 Reports Computer science
851. Tree Dependent Identically Distributed Learning Jebara, Tony; Long, Philip M. 2005 Reports Computer science
852. A Case for P2P Delivery of Paid Content Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2006 Reports Computer science
853. A Common Protocol for Implementing Various DHT Algorithms Baset, Salman Abdul; Schulzrinne, Henning G.; Shim, Eunsoo 2006 Reports Computer science
854. A First Order Analysis of Lighting, Shading, and Shadows Ramamoorthi, Ravi; Mahajan, Dhruv; Belhumeur, Peter N. 2006 Reports Computer science
855. A Framework for Quality Assurance of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2006 Reports Computer science
857. Anagram: A Content Anomaly Detector Resistant to Mimicry Attack Wang, Ke; Parekh, Janak J.; Stolfo, Salvatore 2006 Reports Computer science
858. An Implementation of a Renesas H8/300 Microprocessor with a Cycle-Level Timing Extension Huang, Chen-Chun; Coca, Javier; Gupta, Yashket; Edwards, Stephen A. 2006 Reports Computer science
859. Arrays in SHIM: A Proposal Thapar, Smridh; Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
860. A Runtime Adaptation Framework for Native C and Bytecode Applications Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
861. A Survey of Security Issues and Solutions in Presence Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
862. A Survey on Service Creation by End Users Wu, Xiaotao; Schulzrinne, Henning G. 2006 Reports Computer science
863. A Theory of Spherical Harmonic Identities for BRDF/Lighting Transfer and Image Consistency Mahajan, Dhruv 2006 Reports Computer science
864. A VoIP Privacy Mechanism and its Application in VoIP Peering for Voice Service Provider Topology and Identity Hiding Shen, Charles; Schulzrinne, Henning G. 2006 Reports Computer science
865. Binary-level Function Profiling for Intrusion Detection and Smart Error Virtualization Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
866. Bloodhound: Searching Out Malicious Input in Network Flows for Automatic Repair Validation Locasto, Michael E.; Burnside, Matthew Spindel; Keromytis, Angelos D. 2006 Reports Computer science
867. Complexity and tractability of the heat equation Werschulz, Arthur G. 2006 Reports Computer science
868. Converting from Spherical to Parabolic Coordinates Ben-Artzi, Aner 2006 Reports Computer science
869. Cooperation Between Stations in Wireless Networks Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
870. Debugging Woven Code Eaddy, Marc; Aho, Alfred V.; Hu, Weiping; McDonald, Paddy; Burger, Julian 2006 Reports Computer science
871. Deriving Utility from a Self-Healing Benchmark Report Virmani, Ritika; Griffith, Rean; Kaiser, Gail E. 2006 Reports Computer science
872. Embedded uClinux, the Altera DE2, and the SHIM Compiler Hsu, Wei-Chung; Edwards, Stephen A.; Lariviere, David 2006 Reports Computer science
873. Evaluating an Evaluation Method: The Pyramid Method Applied to 2003 Document Understanding Conference (DUC) Data Passonneau, Rebecca 2006 Reports Computer science
874. Feasibility of Voice over IP on the Internet Sherman, Alex; Nieh, Jason; Freund, Yoav 2006 Reports Computer science
875. Grouped Distributed Queues: Distributed Queue, Proportional Share Multiprocessor Scheduling Caprita, Bogdan; Nieh, Jason; Stein, Clifford S. 2006 Reports Computer science
876. High Quality, Efficient Hierarchical Document Clustering Using Closed Interesting Itemsets Malik, Hassan H.; Kender, John R. 2006 Reports Computer science
877. Linear Approximation of Optimal Attempt Rate in Random Access Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
878. LinkWidth: A Method to measure Link Capacity and Available Bandwidth Using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2006 Reports Computer science
879. MacShim: Compiling MATLAB to a Scheduling-Independent Concurrent Language Subramaniam, Neesha; Edwards, Stephen A.; Ohan, Oda 2006 Reports Computer science
880. Measurement and Evaluation of ENUM Server Performance Shen, Charles; Schulzrinne, Henning G. 2006 Reports Computer science
881. Measurements of DNS Stability Boyaci, Omer; Schulzrinne, Henning G. 2006 Reports Computer science
882. PalProtect: A Collaborative Security Approach to Comment Spam Wong, Benny; Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
883. Passive Duplicate Address Detection for Dynamic Host Configuration Protocol (DHCP) Forte, Andrea G.; Shin, Sangho; Schulzrinne, Henning G. 2006 Reports Computer science
884. PBS: A Unified Priority-Based CPU Scheduler Feng, Hanhua; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
885. Practical Preference Relations for Large Data Sets Ross, Kenneth A.; Stuckey, Peter; Marian, Amelie 2006 Reports Computer science
886. Presence Traffic Optimization Techniques Singh, Vishal; Schulzrinne, Henning G.; Isomaki, Markus; Boni, Piotr 2006 Reports Computer science
887. Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection Parekh, Janak J.; Wang, Ke; Stolfo, Salvatore 2006 Reports Computer science
888. Projection Volumetric Display using Passive Optical Scatterers Nayar, Shree K.; Anand, Vijay N. 2006 Reports Computer science
889. Quantifying Application Behavior Space for Detection and Self-Healing Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D.; Stolfo, Salvatore 2006 Reports Computer science
890. Rigid Formations with Leader-Follower Architecture Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2006 Reports Computer science
891. Seamless Layer-2 Handoff using Two Radios in IEEE 802.11 Wireless Networks Shin, Sangho; Forte, Andrea G.; Schulzrinne, Henning G. 2006 Reports Computer science
892. SHIM: A Deterministic Approach to Programming with Threads Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
893. SIMPLEstone: Benchmarking Presence Server Performance Singh, Vishal; Schulzrinne, Henning G. 2006 Reports Computer science
894. Specifying Confluent Processes Tardieu, Olivier; Edwards, Stephen A. 2006 Reports Computer science
895. Speculative Execution as an Operating System Service Locasto, Michael E.; Keromytis, Angelos D. 2006 Reports Computer science
896. Streak Seeding Automation Using Silicon Tools Georgiev, Atanas; Vorobiev, Sergeui M.; Edstrom, William; Song, Ting; Laine, Andrew F.; Hunt, John F.; Allen, Peter K. 2006 Reports Computer science
897. Synthesis of On-Chip Interconnection Structures:From Point-to-Point Links to Networks-on-Chip Pinto, Alessandro; Carloni, Luca; Sangiovanni-Vincentelli, Alberto L. 2006 Reports Computer science
898. Theoretical Bounds on Control-Plane Self-Monitoring in Routing Protocols Rajendran, Raj Kumar; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
899. Throughput and Fairness in CSMA/CA Wireless Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science
900. Throughput and Fairness in Random Access Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2006 Reports Computer science