31. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
32. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
33. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
34. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
35. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
36. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
37. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
38. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
39. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
40. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science