201. Turn-Taking and Affirmative Cue Words in Task-Oriented Dialogue Gravano, Agustin 2009 Reports Computer science
202. Using a Model Checker to Determine Worst-case Execution Time Kim, Sungjun; Patel, Hiren D.; Edwards, Stephen A. 2009 Reports Computer science
203. weHelp: A Reference Architecture for Social Recommender Systems Sheth, Swapneel Kalpesh; Arora, Nipun; Murphy, Christian; Kaiser, Gail E. 2009 Reports Computer science
204. A Better Approach than Carrier-Grade-NAT Maennel, Olaf; Bush, Randy; Cittadini, Luca; Bellovin, Steven Michael 2008 Reports Computer science
205. A Distance Learning Approach to Teaching eXtreme Programming Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2008 Reports Computer science
207. Analysis of Clocks in X10 Programs (Extended) Vasudevan, Nalini; Tardieu, Olivier; Dolby, Julian; Edwards, Stephen A. 2008 Reports Computer science
208. Application Layer Feedback-based SIP Server Overload Control Shen, Charles; Schulzrinne, Henning G.; Nahum, Erich 2008 Reports Computer science
209. Approximating a Global Passive Adversary Against Tor Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer scienceComputer networksComputer networks--Security measures
210. Automatic User Interaction Detection and Scheduling with RSIO Zheng, Haoqiang; Nieh, Jason 2008 Reports Computer science
211. Autotagging to Improve Text Search for 3D Models Goldfeder, Corey; Allen, Peter K. 2008 Reports Computer science
212. Behavior-Based Network Access Control: A Proof-of-Concept Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2008 Articles Computer scienceComputer networks--Access controlIntrusion detection systems (Computer security)
213. Classifying High-Dimensional Text and Web Data using Very Short Patterns Malik, Hassan H.; Kender, John R. 2008 Reports Computer science
214. CPU Torrent -- CPU Cycle Offloading to Reduce User Wait Time and Provider Resource Requirements Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2008 Reports Computer science
215. Deux: Autonomic Testing System for Operating System Upgrades Wu, Leon L.; Kaiser, Gail E.; Nieh, Jason; Murphy, Christian 2008 Reports Computer science
216. Distributed eXplode: A High-Performance Model Checking Engine to Scale Up State-Space Coverage Keetha, Nageswar; Wu, Leon Li; Kaiser, Gail E.; Yang, Junfeng 2008 Reports Computer science
217. Distributed Firewall For MANETs Alicherry, Mansoor; Keromytis, Angelos D.; Stavrou, Angelos 2008 Reports Computer science
218. Exploring a Few Good Tuples From a Text Database Jain, Alpa; Srivastava, Divesh 2008 Reports Computer science
219. Exploring Computation and Communication Trade-offs in the Design of Automatic Video Surveillance Networks Pinto, Alessandro; Carloni, Luca; Sangiovanni-Vincentelli, Alberto 2008 Reports Computer science
220. FairTorrent: Bringing Fairness to Peer-to-Peer Systems Sherman, Alex; Nieh, Jason; Stein, Clifford S. 2008 Reports Computer science
221. genSpace: Exploring Social Networking Metaphors for Knowledge Sharing and Scientific Collaborative Work Murphy, Christian; Sheth, Swapneel Kalpesh; Kaiser, Gail E.; Wilcox, Lauren 2008 Reports Computer science
222. IEEE 802.11 in the Large: Observations at an IETF Meeting Forte, Andre G.; Shin, Sangho; Schulzrinne, Henning G. 2008 Reports Computer science
223. Improving the Dependability of Machine Learning Applications Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
224. Leveraging Local Intra-Core Information to Increase Global Performance in Block-Based Design of Systems-on-Chip Li, Cheng-Hong; Carloni, Luca 2008 Reports Computer science
225. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2008 Reports Computer science
226. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems Salem, Malek Ben; Stolfo, Salvatore 2008 Reports Computer science
227. Measurements of Multicast Service Discovery in a Campus Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2008 Reports Computer science
229. Mitigating the Effect of Free-Riders in BitTorrent using Trusted Agents Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S. 2008 Reports Computer science
230. Newspeak: A Secure Approach for Designing Web Applications Dent, Kyle; Bellovin, Steven Michael 2008 Reports Computer science
231. One Server Per City: Using TCP for Very Large SIP Servers Ono, Kumiko; Schulzrinne, Henning G. 2008 Reports Computer science
232. Operating System Virtualization: Practice and Experience Laadan, Oren; Nieh, Jason 2008 Reports Computer science
233. Opportunistic Use of Client Repeaters to Improve Performance of WLANs Bahl, Victor; Chandra, Ranveer; Lee, Patrick Pak-Ching; Misra, Vishal; Padhye, Jitendra; Rubenstein, Daniel Stuart; Yu, Yan 2008 Reports Computer science
234. Optimal Splitters for Database Partitioning with Size Bounds Ross, Kenneth A.; Cieslewicz, John 2008 Reports Computer science
235. Path-based Access Control for Enterprise Networks Burnside, Matthew Spindel; Keromytis, Angelos D. 2008 Reports Computer science
236. Properties of Machine Learning Applications for Use in Metamorphic Testing Murphy, Christian; Kaiser, Gail E.; Hu, Lifeng 2008 Reports Computer science
237. Quality Assurance of Software Applications Using the In Vivo Testing Approach Murphy, Christian; Kaiser, Gail E.; Vo, Ian; Chu, Matt 2008 Reports Computer science
238. ReoptSMART: A Learning Query Plan Cache Stoyanovich, Julia; Ross, Kenneth A.; Rao, Jun; Fan, Wei; Markl, Volker; Lohman, Guy 2008 Reports Computer science
239. Retina: Helping Students and Instructors Based on Observed Programming Activities Murphy, Christian; Kaiser, Gail E.; Loveland, Kristin; Hasan, Sahar 2008 Reports Computer science
240. ROFL: Routing as the Firewall Layer Zhao, Hang; Chau, Chi-Kin; Bellovin, Steven Michael 2008 Reports Computer science
241. SHIM Optimization: Elimination Of Unstructured Loops Ganapathi, Ravindra Babu; Edwards, Stephen A. 2008 Reports Computer science
242. SPARSE: A Hybrid System to Detect Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore 2008 Reports Computer science
243. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic Song, Yingbo; Keromytis, Angelos D.; Stolfo, Salvatore 2008 Reports Computer science
244. Spreadable Connected Autonomic Networks (SCAN) Reich, Joshua; Misra, Vishal; Rubenstein, Daniel Stuart; Zussman, Gil 2008 Reports Computer science
245. Static Deadlock Detection in SHIM with an Automata Type Checking System Vasudevan, Nalini; Edwards, Stephen A.; Smith, Dave Aaron 2008 Reports Computer science
246. Stored Media Streaming in BitTorrent-like P2P Networks Hwang, Kyung-Wook; Misra, Vishal; Rubenstein, Daniel Stuart 2008 Reports Computer science
247. Summary-Based Pointer Analysis Framework for Modular Bug Finding Buss, Marcio 2008 Reports Computer science
248. The 7U Evaluation Method: Evaluating Software Systems via Runtime Fault-Injection and Reliability, Availability and Serviceability (RAS) Metrics and Models Griffith, Rean 2008 Reports Computer science
249. The Columbia Grasp Database Goldfeder, Corey; Ciocarlie, Matei; Dang, Hao; Allen, Peter K. 2008 Reports Computer scienceMathematics
250. The Delay-Friendliness of TCP Brosh, Eli; Baset, Salman Abdul; Misra, Vishal; Rubenstein, Daniel Stuart; Schulzrinne, Henning G. 2008 Reports Computer science
251. The Impact of SCTP on Server Scalability and Performance Ono, Kumiko; Schulzrinne, Henning G. 2008 Reports Computer science
252. The In Vivo Approach to Testing Software Applications Murphy, Christian; Kaiser, Gail E.; Chu, Matt 2008 Reports Computer science
253. Topology-Based Performance Analysis and Optimization of Latency-Insensitive Systems Collins, Rebecca L.; Carloni, Luca 2008 Reports Computer science
254. Towards the Quality of Service for VoIP traffic in IEEE 802.11 Wireless Networks Shin, Sangho; Schulzrinne, Henning G. 2008 Reports Computer science
255. Tractability of multivariate approximation over a weighted unanchored Sobolev space: Smoothness sometimes hurts Werschulz, Arthur G.; Wozniakowski, Henryk 2008 Reports Computer science
257. Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles Murphy, Christian; Shen, Kuang; Kaiser, Gail E. 2008 Reports Computer science
258. Using Metamorphic Testing at Runtime to Detect Defects in Applications without Test Oracles Murphy, Christian 2008 Reports Computer science
259. Using Runtime Testing to Detect Defects in Applications without Test Oracles Murphy, Christian; Kaiser, Gail E. 2008 Reports Computer science
260. VoIP-based Air Traffic Controller Training Subramanya, Supreeth; Wu, Xiaotao; Schulzrinne, Henning G. 2008 Reports Computer science
261. Whole Population, Genomewide Mapping of Hidden Relatedness Gusev, Alexander; Lowe, Jennifer K.; Stoffel, Markus; Daly, Mark; Altshuler, David; Friedman, Jeffrey M.; Breslow, Jan L.; Pe'er, Itshack G. 2008 Reports Computer scienceGenetics
262. Accelerating Service Discovery in Ad-Hoc Zero Configuration Networking Hong, Se Gi; Srinivasan, Suman Ramkumar; Schulzrinne, Henning G. 2007 Reports Computer science
263. Aequitas: A Trusted P2P System for Paid Content Delivery Sherman, Alex; Chawla, Japinder; Nieh, Jason; Stein, Clifford S.; Sarma, Justin 2007 Reports Computer science
264. A Model for Automatically Repairing Execution Integrity Locasto, Michael E.; Cretu, Gabriela F.; Stavrou, Angelos; Keromytis, Angelos D. 2007 Reports Computer science
265. An Approach to Software Testing of Machine Learning Applications Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science
266. A New Framework for Unsupervised Semantic Discovery Schiffman, Barry 2007 Reports Computer science
267. A Precomputed Polynomial Representation for Interactive BRDF Editing with Global Illumination Ben-Artzi, Aner; Egan, Kevin; Durand, Fredo; Ramamoorthi, Ravi 2007 Reports Computer science
268. A Recursive Data-Driven Approach to Programming Multicore Systems Collins, Rebecca L.; Carloni, Luca 2007 Reports Computer science
269. A Study of Malcode-Bearing Documents Li, Wei-Jen; Stolfo, Salvatore; Stavrou, Angelos; Androulaki, Elli; Keromytis, Angelos D. 2007 Articles Computer science
270. Automated Social Hierarchy Detection through Email Network Analysis Rowe, Ryan; Creamer, German; Hershkop, Shlomo; Stolfo, Salvatore 2007 Reports Computer science
271. Backstop: A Tool for Debugging Runtime Errors Murphy, Christian; Kim, Eunhee; Kaiser, Gail E.; Cannon, Adam 2007 Reports Computer science
272. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs Frias-Martinez, Vanessa; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
273. Can P2P Replace Direct Download for Content Distribution Sherman, Alex; Stavrou, Angelos; Nieh, Jason; Stein, Clifford S.; Keromytis, Angelos D. 2007 Reports Computer science
274. Combining Ontology Queries with Text Search in Service Discovery Arabshian, Knarig; Schulzrinne, Henning G. 2007 Reports Computer scienceInformation science
275. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Articles Computer science
276. Design, Implementation, and Validation of a New Class of Interface Circuits for Latency-Insensitive Design Li, Cheng-Hong; Collins, Rebecca L.; Sonalkar, Sampada; Carloni, Luca 2007 Reports Computer science
277. Distributed Algorithms for Secure Multipath Routing in Attack-Resistant Networks Lee, Patrick Pak-Ching; Misra, Vishal; Rubenstein, Daniel Stuart 2007 Computer science
278. Distributed In Vivo Testing of Software Applications Chu, Matt; Murphy, Christian; Kaiser, Gail E. 2007 Reports Computer science
279. Experiences in Teaching eXtreme Programming in a Distance Learning Program Murphy, Christian; Phung, Dan; Kaiser, Gail E. 2007 Reports Computer science
280. From STEM to SEAD: Speculative Execution for Automated Defense Locasto, Michael E.; Stavrou, Angelos; Cretu, Gabriela F.; Keromytis, Angelos D. 2007 Articles Computer science
281. Generalized Tractability for Multivariate Problems: Part II: Linear Tensor Product Problems, Linear Information, and Unrestricted Tractability Gnewuch, Michael; Wozniakowski, Henryk 2007 Reports Computer science
282. High Level Synthesis for Packet Processing Pipelines Soviani, Cristian 2007 Reports Computer science
283. Improving Virtual Appliances through Virtual Layered File Systems Potter, Shaya; Nieh, Jason 2007 Reports Computer science
284. MutaGeneSys: Making Diagnostic Predictions Based on Genome-Wide Genotype Data in Association Studies Stoyanovich, Julia; Pe'er, Itshack G. 2007 Reports Computer science
285. Oblivious Image Matching Avidan, Shai; Elbaz, Ariel; Malkin, Tal G.; Moriarty, Ryan 2007 Reports Computer science
286. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore 2007 Reports Computer science
287. OpenTor: Anonymity as a Commodity Service Androulaki, Elli; Raykova, Mariana Petrova; Stavrou, Angelos; Bellovin, Steven Michael 2007 Reports Computer science
288. Optimizing Frequency Queries for Data Mining Applications Malik, Hassan H.; Kender, John R. 2007 Reports Computer science
289. Parameterizing Random Test Data According to Equivalence Classes Murphy, Christian; Kaiser, Gail E.; Arias, Marta 2007 Reports Computer science
290. Partial Evaluation for Code Generation from Domain-Specific Languages Zeng, Jia 2007 Reports Computer science
291. Policy Algebras for Hybrid Firewalls Zhao, Hang; Bellovin, Steven Michael 2007 Reports Computer science
292. Post-Patch Retraining for Host-Based Anomaly Detection Locasto, Michael E.; Cretu, Gabriela F.; Hershkop, Shlomo; Stavrou, Angelos 2007 Reports Computer science
293. Privacy-Enhanced Searches Using Encrypted Bloom Filters Bellovin, Steven Michael; Cheswick, William R. 2007 Reports Computer science
294. RAS-Models: A Building Block for Self-Healing Benchmarks Griffith, Rean; Virmani, Ritika; Kaiser, Gail E. 2007 Reports Computer science
295. Reputation Systems for Anonymous Networks Androulaki, Elli; Choi, Seung Geol; Bellovin, Steven Michael; Malkin, Tal G. 2007 Reports Computer science
296. Schema Polynomials and Applications Ross, Kenneth A.; Stoyanovich, Julia 2007 Reports Computer science
297. Service Composition in a Global Service Discovery System Arabshian, Knarig; Dickmann, Christian; Schulzrinne, Henning G. 2007 Reports Computer science
298. Speech Enabled Avatar from a Single Photograph Bitouk, Dmitri; Nayar, Shree K. 2007 Reports Computer science
299. STAND: Sanitization Tool for ANomaly Detection Cretu, Gabriela F.; Stavrou, Angelos; Stolfo, Salvatore; Keromytis, Angelos D. 2007 Reports Computer science
300. The Delay-Friendliness of TCP Brosh, Eli; Baset, Salman Abdul; Misra, Vishal; Rubenstein, Daniel Stuart; Schulzrinne, Henning G. 2007 Reports Computer science