1. 802.11b Throughput with Link Interference Chang, Hoon; Misra, Vishal 2005 Reports Computer science
2. A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Stolfo, Salvatore; Apap, Frank; Eskin, Eleazar; Heller, Katherine; Hershkop, Shlomo; Honig, Andrew; Svore, Krysta 2005 Articles Computer science
3. A Control Theory Foundation for Self-Managing Computing Systems Diao, Yixin; Hellerstein, Joseph; Parekh, Sujay; Griffith, Rean; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
4. Acoustic/Prosodic and Lexical Correlates of Charismatic Speech Hirschberg, Julia Bell; Rosenberg, Andrew 2005 Presentations (Communicative Events) Information technologyComputer science
5. Action Amplification: A New Approach To Scalable Administration Anagnostakis, Kostas G.; Keromytis, Angelos D. 2005 Articles Computer science
6. Adaptive Interactive Internet Team Video Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
7. Adaptive Synchronization of Semantically Compressed Instructional Videos for Collaborative Distance Learning Phung, Dan; Valetto, Giuseppe; Kaiser, Gail E.; Liu, Tiecheng; Kender, John R. 2005 Reports Computer science
8. Adding a Flow-Oriented Paradigm to Commodity Operating Systems Soviani, Cristian; Edwards, Stephen A.; Keromytis, Angelos D. 2005 Articles Computer science
9. Adding Self-healing capabilities to the Common Language Runtime Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
10. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks Sidiroglou, Stelios; Giovanidis, Giannis; Keromytis, Angelos D. 2005 Articles Computer science
11. A General Analysis of the Security of Elastic Block Ciphers Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
12. A Genre-based Clustering Approach to Content Extraction Gupta, Suhit; Becker, Hila; Kaiser, Gail E.; Stolfo, Salvatore 2005 Reports Computer science
13. Agnostically Learning Halfspaces Kalai, Adam; Klivans, Adam; Mansour, Yishay; Servedio, Rocco Anthony 2005 Reports Computer science
14. A Hybrid Approach to Topological Mobile Robot Localization Blaer, Paul S.; Allen, Peter K. 2005 Reports Computer science
15. A Hybrid Hierarchical and Peer-to-Peer Ontology-based Global Service Discovery System Arabshian, Knarig; Schulzrinne, Henning G. 2005 Reports Computer science
16. Algorithms for Minimum Risk Chunking Jansche, Martin 2005 Presentations (Communicative Events) Information technologyComputer science
18. A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer Bessen, Arvid J. 2005 Reports Computer science
19. An Email Worm Vaccine Architecture Sidiroglou, Stelios; Ioannidis, John; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer science
20. An Event System Architecture for Scaling Scale-Resistant Services Gross, Philip N. 2005 Reports Computer science
21. A New Routing Metric for High Throughput in Dense Ad Hoc Networks Chang, Hoon; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Reports Computer science
22. Anomalous Payload-Based Worm Detection and Signature Generation Wang, Ke; Cretu, Gabriela F.; Stolfo, Salvatore 2005 Articles Computer science
23. Application Communities: Using Monoculture for Dependability Locasto, Michael E.; Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
24. Applying the Pyramid Method in DUC 2005 McKeown, Kathleen; Passonneau, Rebecca; Nenkova, Ani; Sigelman, Sergey 2005 Presentations (Communicative Events) Information technologyComputer science
25. Approximate Reachability for Dead Code Elimination in Esterel* Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
26. Approximating the Reflection Integral as a Summation: Where Did the dωi Go? Ben-Artzi, Aner 2005 Reports Computer science
27. A Repeater Encryption Unit for IPv4 and IPv6 Nagashima, Norimitsu; Keromytis, Angelos D. 2005 Articles Computer science
28. A Uniform Programming Abstraction for Effecting Autonomic Adaptations onto Software Systems Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
29. A Uniform Programming Abstraction for Effecting Autonomic Adaptations onto Software Systems Valetto, Giuseppe; Kaiser, Gail E.; Phung, Dan 2005 Reports Computer science
30. Automatically Learning Cognitive Status for Multi-Document Summarization of Newswire McKeown, Kathleen; Nenkova, Ani; Siddharthan, Advaith 2005 Presentations (Communicative Events) Information technologyComputer science
31. Automatic Text Summarization of Newswire: Lessons Learned from the Document Understanding Conference Nenkova, Ani 2005 Presentations (Communicative Events) Information technologyComputer science
32. Automation of Summary Evaluation by the Pyramid Method Nenkova, Ani; Passonneau, Rebecca; Harnly, Aaron; Rambow, Owen C. 2005 Presentations (Communicative Events) Information technologyComputer science
33. Building a Reactive Immune System for Software Services Sidiroglou, Stelios; Locasto, Michael E.; Boyd, Stephen W.; Keromytis, Angelos D. 2005 Articles Computer science
34. Building on Redundancy: Factoid Question Answering, Robust Retrieval and the “Other” Roussinov, Dmitri; Chau, Micheal; Filatova, Elena; Robles-Flores, Jose Antonio 2005 Presentations (Communicative Events) Information technologyComputer science
35. Challenges in Synthesizing Fast Control-Dominated Circuits Soviani, Cristian; Edwards, Stephen A. 2005 Articles Computer science
36. Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem Papageorgiou, Anargyros; Wozniakowski, Henryk 2005 Reports Computer science
37. Columbia University at MSE 2005 Siddharthan, Advaith; Evans, Dave 2005 Presentations (Communicative Events) Computer scienceInformation technology
38. Comparing Lexical, Acoustic/Prosodic, Structural and Discourse Features for Speech Summarization Hirschberg, Julia Bell; Maskey, Sameer R. 2005 Presentations (Communicative Events) Information technologyComputer science
39. Context and Learning in Novelty Detection McKeown, Kathleen; Schiffman, Barry 2005 Presentations (Communicative Events) Computer scienceInformation technology
40. Conversion and Proxy Functions for Symmetric Key Ciphers Cook, Debra L.; Keromytis, Angelos D. 2005 Articles Computer science
41. Countering DoS Attacks With Stateless Multipath Overlays Stavrou, Angelos; Keromytis, Angelos D. 2005 Articles Computer science
42. Countering Network Worms Through Automatic Patch Generation Sidiroglou, Stelios; Keromytis, Angelos D. 2005 Articles Computer science
43. CryptoGraphics: Secret Key Cryptography Using Graphics Cards Cook, Debra L.; Ioannidis, John; Keromytis, Angelos D.; Luck, Jake 2005 Articles Computer science
44. Customization in a Unified Framework for Summarizing Medical Literature Elhadad, Noemie; Kan, M. Y.; Klavans, Judith L.; McKeown, Kathleen 2005 Articles Computer scienceMedicine
45. Detecting Certainness in Spoken Tutorial Dialogues Liscombe, Jackson; Hirschberg, Julia Bell; Venditti, Jennifer J. 2005 Presentations (Communicative Events) Information technologyComputer science
46. Detecting Targeted Attacks Using Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Xinidis, Konstantinos; Markatos, Evangelos; Keromytis, Angelos D. 2005 Articles Computer science
47. Deterministic Receptive Processes are Kahn Processes Edwards, Stephen A.; Tardieu, Olivier 2005 Articles Computer science
48. Distinguishing Deceptive from Non-Deceptive Speech Hirschberg, Julia Bell; Benus, Stefan; Brenier, Jason M.; Enos, Frank; Friedman, Sarah; Gilman, Sarah; Girand, Cynthia; Graciarena, Martin; Kathol, Andreas; Michaelis, Laura; Pellom, Bryan; Stolcke, Andreas; Shriberg, Elizabeth 2005 Presentations (Communicative Events) Information technologyComputer science
49. Do Summaries Help? A Task-Based Evaluation of Multi-Document Summarization Hirschberg, Julia Bell; McKeown, Kathleen; Passonneau, Rebecca; Elson, David K.; Nenkova, Ani 2005 Presentations (Communicative Events) Information technologyComputer science
50. DotSlash: Providing Dynamic Scalability to Web Applications with On-demand Distributed Query Result Caching Zhao, Weibin; Schulzrinne, Henning G. 2005 Reports Computer science
51. Downstepped Contours in the Given/New Distinction: Presentation Powerpoint Slides Gravano, Agustin 2005 Presentations (Communicative Events) Computer scienceInformation technologyLinguistics
52. Dynamic Adaptation of Rules for Temporal Event Correlation in Distributed Systems Griffith, Rean; Hellerstein, Joseph L.; Diao, Yixin; Kaiser, Gail E. 2005 Reports Computer science
53. Dynamic Adaptation of Temporal Event Correlation Rules Griffith, Rean; Kaiser, Gail E.; Hellerstein, Joseph; Diao, Yixin 2005 Reports Computer science
54. Effecting Runtime Reconfiguration in Managed Execution Environments Griffith, Rean; Valetto, Giuseppe; Kaiser, Gail E. 2005 Reports Computer science
55. e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing Kc, Gaurav S.; Keromytis, Angelos D. 2005 Articles Computer science
56. Experiences Teaching an FPGA-based Embedded Systems Class Edwards, Stephen A. 2005 Articles Science--Study and teachingComputer science
57. Facilitating Physicians’ Access to Information via Tailored Text Summarization McKeown, Kathleen; Elhadad, Noemie; Kaufman, David; Jordan, Desmond 2005 Presentations (Communicative Events) Information technologyComputer science
58. Fileprints: Identifying File Types by n-gram Analysis Li, Wei-Jen; Wang, Ke; Stolfo, Salvatore; Herzog, Benjamin 2005 Articles Computer science
59. FLIPS: Hybrid Adaptive Intrusion Prevention Locasto, Michael E.; Wang, Ke; Keromytis, Angelos D.; Stolfo, Salvatore 2005 Articles Computer scienceIntrusion detection systems (Computer security)
60. FlowPuter: A Cluster Architecture Unifying Switch, Server and Storage Processing Aho, Alfred V.; Keromytis, Angelos D.; Misra, Vishal; Nieh, Jason; Ross, Kenneth A.; Yemini, Yechiam 2005 Articles Computer science
61. From Definitions to Complex Topics: Columbia University at DUC 2005 Blair-Goldensohn, Sasha 2005 Presentations (Communicative Events) Information technologyComputer science
62. From Text to Speech Summarization Hirschberg, Julia Bell; Maskey, Sameer R.; McKeown, Kathleen; Galley, Michel 2005 Presentations (Communicative Events) Information technologyComputer science
63. Generic Models for Mobility Management in Next Generation Networks Cristofano, Maria Luisa; Forte, Andrea G.; Schulzrinne, Henning G. 2005 Reports Computer science
64. Genre Classification of Websites Using Search Engine Snippets Gupta, Suhit; Kaiser, Gail E.; Stolfo, Salvatore; Becker, Hila 2005 Reports Computer science
65. gore: Routing-Assisted Defense Against DDoS Attacks Chou, Stephen T.; Stavrou, Angelos; Ioannidis, John; Keromytis, Angelos D. 2005 Articles Computer science
66. Guidelines for Cryptographic Key Management Bellovin, Steven Michael; Housley, Russell 2005 Reports Computer science
67. High-Level Optimization by Combining Retiming and Shannon Decomposition Soviani, Cristian; Tardieu, Olivier; Edwards, Stephen A. 2005 Articles Computer science
68. Identifying similarities and differences across English and Arabic news McKeown, Kathleen; Evans, David Kirk 2005 Presentations (Communicative Events) Information technologyComputer science
69. Improving Database Performance on Simultaneous Multithreading Processors Zhou, Jingren; Cieslewicz, John; Ross, Kenneth A.; Shah, Mihir 2005 Reports Computer science
70. Improving Multilingual Summarization: Using Redundancy in the Input to Correct MT errors McKeown, Kathleen; Siddharthan, Advaith 2005 Presentations (Communicative Events) Computer scienceInformation technology
71. Incremental Algorithms for Inter-procedural Analysis of Safety Properties Conway, Christopher L.; Namjoshi, Kedar S.; Dams, Dennis; Edwards, Stephen A. 2005 Articles Computer science
72. Incremental Algorithms for Inter-procedural Analysis of Safety Properties Conway, Christopher L.; Namjoshi, Kedar S.; Dams, Dennis; Edwards, Stephen A. 2005 Reports Computer science
73. Internet Routing Dynamics and NSIS Related Considerations Shen, Charles; Schulzrinne, Henning G.; Lee, Sung-Hyuck; Bang, Jong Ho 2005 Computer science
74. Learning mixtures of product distributions over discrete domains Feldman, Jon; O'Donnell, Ryan; Servedio, Rocco Anthony 2005 Reports Computer science
75. Lexicalized Well-Founded Grammars: Learnability and Merging Muresan, Smaranda; Muresan, Tudor; Klavans, Judith L. 2005 Reports Computer science
76. Manipulating Managed Execution Runtimes to Support Self-Healing Systems Griffith, Rean; Kaiser, Gail E. 2005 Reports Computer science
77. Maximum Expected F-Measure Training of Logistic Regression Models Jansche, Martin 2005 Presentations (Communicative Events) Information technologyComputer science
78. Merging Globally Rigid Formations of Mobile Autonomous Agents Eren, Tolga; Anderson, Brian D. O.; Whiteley, Walter; Morse, A. Stephen; Belhumeur, Peter N. 2005 Reports Computer science
79. Micro-speculation, Micro-sandboxing, and Self-Correcting Assertions: Support for Self-Healing Software and Application Communities Locasto, Michael E. 2005 Reports Computer science
80. Modeling of Traffic Excitation for System Identification of Bridge Structures Feng, Maria Q.; Tan, Chin-An 2005 Articles Civil engineeringComputer science
81. MOVE: An End-to-End Solution To Network Denial of Service Stavrou, Angelos; Keromytis, Angelos D.; Nieh, Jason; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Articles Computer science
82. Multi Facet Learning in Hilbert Spaces Kondor, Risi; Csányi, Gábor; Ahnert, Sebastian E.; Jebara, Tony 2005 Reports Computer science
83. Multi-Language Edit-and-Continue for the Masses Eaddy, Marc; Feiner, Steven K. 2005 Reports Computer science
84. Newsinessence: Summarizing Online News Topics Radev, Dragomir R.; Otterbacher, Jahna; Winkel, Adam; Blair-Goldensohn, Sasha 2005 Articles Information technologyComputer science
85. On Elastic Block Ciphers and Their Differential and Linear Cryptanalyses Cook, Debra L.; Yung, Moti; Keromytis, Angelos D. 2005 Reports Computer science
86. Optimal State-Free, Size-aware Dispatching for Heterogeneous M/G/-type systems Feng, Hanhua; Misra, Vishal; Rubenstein, Daniel Stuart 2005 Reports Computer science
87. P2P Video Synchronization in a Collaborative Virtual Environment Gupta, Suhit; Kaiser, Gail E. 2005 Reports Computer science
88. PachyRand: SQL Randomization for the PostgreSQL JDBC Driver Locasto, Michael E.; Keromytis, Angelos D. 2005 Reports Computer science
89. Parsing Preserving Techniques in Grammar Induction Muresan, Smaranda 2005 Reports Computer science
90. Performance and Usability Analysis of Varying Web Service Architectures Lenner, Michael; Schulzrinne, Henning 2005 Reports Computer science
91. Pointer Analysis for C Programs Through AST Traversal Buss, Marcio; Edwards, Stephen A.; Yao, Bin; Waddington, Daniel 2005 Reports Computer science
92. Pointer Analysis for Source-to-Source Transformations Buss, Marcio; Edwards, Stephen A.; Yao, Bin; Waddington, Daniel 2005 Articles Computer science
94. Quantum Algorithms and Complexity for Certain Continuous and Related Discrete Problems Kwas, Marek 2005 Reports Computer science
95. Qubit Complexity of Continuous Problems Papageorgiou, Anargyros; Traub, Joseph F. 2005 Reports Computer science
96. Rapid Language Model Development Using External Resources for New Spoken Dialog Domains Sarikaya, Ruhi; Gravano, Agustin; Gao, Yuqing 2005 Presentations (Communicative Events) Information technologyComputer science
97. Ray Casting Approach for Boundary Extraction and Fourier Shape Descriptor Characterization Rosiene, Joel; Liu, Xin; Imielinska, Celina Z. 2005 Conference Objects Computer scienceBioinformaticsDiagnostic imaging
98. Remotely Keyed Cryptographics: Secure Remote Display Access Using (Mostly) Untrusted Hardware Cook, Debra L.; Baratto, Ricardo A.; Keromytis, Angelos D. 2005 Articles Computer science
99. Rigid Formations with Leader-Follower Architecture Eren, Tolga; Whiteley, Walter; Belhumeur, Peter N. 2005 Reports Computer science
100. Security and Privacy: Enemies or Allies? Bellovin, Steven Michael 2005 Articles Computer science