1. Analysis of Super Fine-Grained Program Phases Bui, Van; Kim, Martha Allen 2017 Reports Computer sciencePhase detectorsParallel programming (Computer science)
2. Reliable Synchronization in Multithreaded Servers Gu, Rui 2017 Theses Simultaneous multithreading processorsWeb servers--Computer programsSynchronization--Computer programs
3. Searching for Meaning in RNNs using Deep Neural Inspection Lin, Kevin; Wu, Eugene 2017 Reports Neural networks (Computer science)Computer scienceNeurons
4. Further Information on Miller's 1882 One-Time Pad Bellovin, Steven Michael 2016 Reports CryptographersData encryption (Computer science)CryptographyComputer science
5. Grandet: A Unified, Economical Object Store for Web Applications Tang, Yang; Hu, Gang; Yuan, Xinhao; Weng, Lingmei; Yang, Junfeng 2016 Reports Computer scienceCloud computingComputers--Economic aspectsWeb applications
6. Identifying Functionally Similar Code in Complex Codebases Su, Fang-Hsiang; Bell, Jonathan; Kaiser, Gail E.; Sethumadhavan, Simha 2016 Reports Software engineeringComputer softwareComputer software--DevelopmentComputer programmingComputer science
7. Software Engineering Methodologies and Life Lennon, Scott 2016 Reports Open source softwareAgile software developmentSoftware engineeringComputer scienceLinux
8. Understanding and Detecting Concurrency Attacks Gu, Rui; Gan, Bo; Ning, Yi; Cui, Heming; Yang, Junfeng 2016 Reports Computer scienceCyberterrorismSoftware engineering
9. User Study: Programming Understanding from Similar Code Sivasankar, Anush Ramsurat Ganapathi Agraharam 2016 Reports Computer programmingProgramming languages (Electronic computers)Programming languages (Electronic computers)--SemanticsComputer science--Study and teachingComputer science
10. Why Are We Permanently Stuck in an Elevator? A Software Engineering Perspective on Game Bugs Zhang, Iris 2016 Reports Video games--DesignSoftware engineeringComputer programs--DefectsVideo gamesComputer science
11. A Measurement Study of ARM Virtualization Performance Dall, Christoffer; Li, Shih-Wei; Lim, Jin Tack; Nieh, Jason 2015 Reports Computer architectureComputersComputer science
12. Code Relatives: Detecting Similar Software Behavior Su, Fang-Hsiang; Harvey, Kenneth; Sethumadhavan, Simha; Kaiser, Gail E.; Jebara, Tony 2015 Reports Programming languages (Electronic computers)Software engineeringComputer science
13. Dynamic Inference of Likely Metamorphic Properties to Support Differential Testing Su, Fang-Hsiang; Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2015 Reports Computer programs--TestingDebugging in computer scienceComputer science
14. Dynamic Taint Tracking for Java with Phosphor (Demo) Bell, Jonathan Schaffer; Kaiser, Gail E. 2015 Reports Computer scienceComputer software--TestingJava (Computer program language)
15. Hardware in Haskell: Implementing Memories in a Stream-Based World Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports ComputersMemory--Computer programsHaskell (Computer program language)Computer science
16. Hardware Synthesis from a Recursive Functional Language Zhai, Kuangya; Townsend, Richard Morse; Lairmore, Lianne Elizabeth; Kim, Martha Allen; Edwards, Stephen A. 2015 Reports Computer science
17. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2015 Reports Cooperating objects (Computer systems)Reliability (Engineering)--EvaluationComputer science
18. Parikshan: Live Debugging of Production Systems in Isolation Arora, Nipun; Ivancic, Franjo; Kaiser, Gail E. 2015 Reports Service-oriented architecture (Computer science)Computer softwareDebugging in computer science--Computer programsComputer science
19. Setting budgets for live debugging Arora, Nipun; Sharma, Abhishek; Kaiser, Gail E. 2015 Reports Queuing theory--Computer programsBudgetDebugging in computer scienceComputer science
20. A Convergence Study of Multimaterial Mesh-based Surface Tracking Da, Fang; Batty, Christopher; Grinspun, Eitan 2014 Reports Computer science
21. A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification Waksman, Adam; Rajendran, Jeyavijayan; Suozzo, Matthew Robert; Sethumadhavan, Simha 2014 Reports Computer science
22. Detecting, Isolating and Enforcing Dependencies Between and Within Test Cases Bell, Jonathan Schaffer 2014 Reports Computer science
23. DisCo: Displays that Communicate Jo, Kensei; Gupta, Mohit; Nayar, Shree K. 2014 Reports Computer science
24. Energy Exchanges: Internal Power Oversight for Applications Kambadur, Melanie Rae; Kim, Martha Allen 2014 Reports Computer science
25. Enhancing Security by Diversifying Instruction Sets Kemerlis, Vasileios; Sinha, Kanad; Pappas, Vasileios; Sethumadhavan, Simha; Keromytis, Angelos D. 2014 Reports Computer science
26. Failure Analysis of the New York City Power Grid Wu, Leon; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia; Kaiser, Gail E. 2014 Reports Smart power gridsComputer science
27. Kamino: Dynamic Approach to Semantic Code Clone Detection Neubauer, Lindsay Anne 2014 Reports Computer science
28. Making Lock-free Data Structures Verifiable with Artificial Transactions Yuan, Xinhao; Williams-King, David Christopher; Yang, Junfeng; Sethumadhavan, Simha 2014 Reports Computer science
29. Metamorphic Runtime Checking of Applications Without Test Oracles Bell, Jonathan Schaffer; Murphy, Christian; Kaiser, Gail E. 2014 Reports Computer science
30. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Reports Computer science
31. Mysterious Checks from Mauborgne to Fabyan Bellovin, Steven Michael 2014 Reports Computer science
32. Phasor Imaging: A Generalization of Correlation-Based Time-of-Flight Imaging Gupta, Mohit; Nayar, Shree K.; Hullin, Matthias B.; Martin, Jaime 2014 Reports Computer science
33. Phosphor: Illuminating Dynamic Data Flow in the JVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2014 Reports Computer science
34. Repeatable Reverse Engineering for the Greater Good with PANDA Dolan-Gavitt, Brendan F.; Hodosh, Josh; Hulin, Patrick; Leek, Tim; Whelan, Ryan 2014 Reports Computer science
35. Schur Complement Trick for Positive Semi-definite Energies Jacobson, Alec S. 2014 Reports Computer science
36. Teaching Microarchitecture through Metaphors Eum, Julianna; Sethumadhavan, Simha 2014 Reports Computer science
39. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Reports Computer science
40. Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence Bellovin, Steven Michael 2014 Reports Computer science
41. Additional Remarks on Designing Category-Level Attributes for Discriminative Visual Recognition Yu, Xinnan; Cao, Liangliang; Feris, Rogerio S.; Smith, John R.; Chang, Shih-Fu 2013 Reports Computer science
43. A Gameful Approach to Teaching Software Design and Software Testing - Assignments and Quests Sheth, Swapneel; Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
44. Altocumulus: Harvesting Computational Resources from Devices at the Edge of the Cloud Jung, YoungHoon; Szczodrak, Marcin K.; Neill, Richard W.; Carloni, Luca 2013 Reports Computer science
45. Approximating the Bethe partition function Weller, Adrian; Jebara, Tony 2013 Reports Computer science
46. Connecting the Physical World with Arduino in SECE Janak, Jan; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
47. Cost and Scalability of Hardware Encryption Techniques Waksman, Adam Scott; Sethumadhavan, Lakshminarasimhan 2013 Reports Computer science
48. Diversity Maximization Under Matroid Constraints Abbassi, Zeinab; Mirrokni, Vahab S.; Thakur, Mayur 2013 Reports Computer science
49. Effective Dynamic Detection of Alias Analysis Errors Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng 2013 Reports Computer science
50. Effectiveness of Teaching Metamorphic Testing, Part II Mishra, Kunal S.; Kaiser, Gail E.; Sheth, Swapneel Kalpesh 2013 Reports Computer science
51. Enabling the Virtual Phones to remotely sense the Real Phones in real-time: A Sensor Emulation initiative for virtualized Android-x86 Santhanam, Raghavan 2013 Reports Computer science
53. FARE: A Framework for Benchmarking Reliability of Cyber-Physical Systems Wu, Leon; Kaiser, Gail E. 2013 Reports Computer science
54. Finding 9-1-1 Callers in Tall Buildings Song, Wonsang; Lee, Jae; Lee, Byung; Schulzrinne, Henning G. 2013 Reports Computer science
56. Heterogeneous Access: Survey and Design Considerations Singh, Amandeep; Ormazabal, Gaston; Addepalli, Sateesh; Schulzrinne, Henning G. 2013 Reports Computer science
57. Hybrid Continuous-Discrete Computer: from ISA to Microarchitecture Huang, Yipeng; Sethumadhavan, Simha 2013 Reports Computer science
58. KVM/ARM: Experiences Building the Linux ARM Hypervisor Dall, Christoffer; Nieh, Jason 2013 Reports Computer science
59. Make Parallel Programs Reliable with Stable Multithreading Wu, Jingyue; Hu, Gang; Tang, Yang; Yang, Junfeng; Cui, Heming; Gallagher, John; Tsai, Chia-Che 2013 Reports Computer science
60. Metamorphic Runtime Checking of Applications without Test Oracles Murphy, Christian; Kaiser, Gail E.; Bell, Jonathan Schaffer; Su, Fang-Hsiang 2013 Reports Computer science
61. Mobile Video Is Inefficient: A Traffic Analysis Nam, Hyunwoo; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
62. N Heads Are Better Than None Hopkins, Morris; Casteneda, Mauricio; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
63. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow Chakravarty, Sambuddho; Polychronakis, Michalis; Portokalidis, Georgios; Barbera, Marco V.; Keromytis, Angelos D. 2013 Reports Computer science
64. Principles and Techniques of Schlieren Imaging Systems Mazumdar, Amrita 2013 Reports Computer science
65. Societal Computing Sheth, Swapneel 2013 Reports Computer scienceOnline social networks--Social aspectsPrivacy--ResearchPrivacy, Right ofComputer security
66. Towards A Dynamic QoS-aware Over-The-Top Video Streaming in LTE Nam, Hyunwoo; Kim, Kyung Hwa; Kim, Bong Ho; Calin, Doru; Schulzrinne, Henning G. 2013 Reports Computer science
67. Towards Dynamic Network Condition-Aware Video Server Selection Algorithms over Wireless Networks Nam, Hyunwoo; Kim, Kyung Hwa; Schulzrinne, Henning G.; Calin, Doru 2013 Reports Computer science
68. Unit Test Virtualization with VMVM Bell, Jonathan Schaffer; Kaiser, Gail E. 2013 Reports Computer science
69. Us and Them - A Study of Privacy Requirements Across North America, Asia, and Europe Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2013 Reports Computer science
70. WiSlow: A WiFi Network Performance Troubleshooting Tool for End Users Kim, Kyung Hwa; Nam, Hyunwoo; Schulzrinne, Henning G. 2013 Reports Computer science
71. A Competitive-Collaborative Approach for Introducing Software Engineering in a CS2 Class Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
72. An Autonomic Reliability Improvement System for Cyber-Physical Systems Wu, Leon Li; Kaiser, Gail E. 2012 Reports Computer science
73. Aperture Evaluation for Defocus Deblurring and Extended Depth of Field Zhou, Changyin; Nayar, Shree K. 2012 Reports Computer science
74. Automatic Detection of Metamorphic Properties of Software Hasan, Sahar 2012 Reports Computer science
75. Bethe Bounds and Approximating the Global Optimum Weller, Adrian; Jebara, Tony 2012 Reports Computer science
76. Chronicler: Lightweight Recording to Reproduce Field Failures Bell, Jonathan Schaffer; Sarda, Nikhil; Kaiser, Gail E. 2012 Reports Computer science
77. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data Pappas, Vasilis; Kemerlis, Vasileios; Zavou, Angeliki; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Reports Computer science
78. Effectiveness of Teaching Metamorphic Testing Mishra, Kunal Swaroop; Kaiser, Gail E. 2012 Reports Computer science
79. End-User Regression Testing for Privacy Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2012 Reports Computer science
80. Experiments of Image Retrieval Using Weak Attributes Yu, Xinnan; Ji, Rongrong; Tsai, Ming-Hen; Ye, Guangnan; Chang, Shih-Fu 2012 Reports Computer scienceInformation science
81. Focal Sweep Camera for Space-Time Refocusing Zhou, Changyin; Miau, Daniel; Nayar, Shree K. 2012 Reports Computer science
83. Hardware-Accelerated Range Partitioning Wu, Lisa K.; Barker, Raymond John; Kim, Martha Allen; Ross, Kenneth A. 2012 Reports Computer science
84. High Availability for Carrier-Grade SIP Infrastructure on Cloud Platforms Kim, Jong Yul; Schulzrinne, Henning G. 2012 Reports Computer science
85. High Throughput Heavy Hitter Aggregation Polychroniou, Orestis; Ross, Kenneth A. 2012 Reports Computer science
86. Improving Efficiency and Reliability of Building Systems Using Machine Learning and Automated Online Evaluation Wu, Leon Li; Kaiser, Gail E.; Solomon, David M.; Winter, Rebecca Lynn; Boulanger, Albert G.; Anderson, Roger N. 2012 Reports Computer science
87. Improving the Vertical Accuracy of Indoor Positioning for Emergency Communication Song, Wonsang; Lee, Jae Woo; Lee, Byung Suk; Schulzrinne, Henning G. 2012 Reports Computer science
88. Increasing Student Engagement in Software Engineering with Gamification Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2012 Reports Computer science
89. NetServ: Reviving Active Networks Lee, Jae Woo; Francescangeli, Roberto; Song, Wonsang; Janak, Jan; Maccherani, Emanuele; Srinivasan, Suman Ramkumar; Kester, Michael S.; Baset, Salman A.; Schulzrinne, Henning G. 2012 Reports Computer science
90. Partitioned Blockmap Indexes for Multidimensional Data Access Ross, Kenneth A.; Sitaridi, Evangelia 2012 Reports Computer science
92. Statically Unrolling Recursion to Improve Opportunities for Parallelism Deshpande, Neil Ashish; Edwards, Stephen A. 2012 Reports Computer science
93. When Does Computational Imaging Improve Performance? Cossairt, Oliver S.; Nayar, Shree K.; Gupta, Mohit 2012 Reports Computer science
94. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
95. A Large-Scale, Longitudinal Study of Player Achievements in World of Warcraft Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
96. A New Randomized Algorithm to Approximate the Star Discrepancy Based on Threshold Accepting Gnewuch, Michael; Wahlstrom, Magnus; Winzen, Carola 2011 Reports Computer science
97. Beyond Trending Topics: Real-World Event Identification on Twitter Becker, Hila; Naaman, Mor; Gravano, Luis 2011 Reports Computer science
98. BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports Wu, Leon Li; Xie, Boyi; Kaiser, Gail E.; Passonneau, Rebecca 2011 Reports Computer science
99. Cells: A Virtual Mobile Smartphone Architecture Andrus, Jeremy Christian; Dall, Christoffer; Van't Hof, Alexander Edward; Laadan, Oren; Nieh, Jason 2011 Reports Computer science
100. Columbia University WiMAX Campus Deployment and Installation Seo, SungHoon; Janak, Jan; Schulzrinne, Henning G. 2011 Reports Computer science