1. ActiveCDN: Cloud Computing Meets Content Delivery Networks Srinivasan, Suman Ramkumar; Lee, Jae Woo; Batni, Dhruva L.; Schulzrinne, Henning G. 2011 Reports Computer scienceInformation science
2. A Large-Scale, Longitudinal Study of Player Achievements in World of Warcraft Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
3. A New Randomized Algorithm to Approximate the Star Discrepancy Based on Threshold Accepting Gnewuch, Michael; Wahlstrom, Magnus; Winzen, Carola 2011 Reports Computer science
4. Beyond Trending Topics: Real-World Event Identification on Twitter Becker, Hila; Naaman, Mor; Gravano, Luis 2011 Reports Computer science
5. BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports Wu, Leon Li; Xie, Boyi; Kaiser, Gail E.; Passonneau, Rebecca 2011 Reports Computer science
6. Cells: A Virtual Mobile Smartphone Architecture Andrus, Jeremy Christian; Dall, Christoffer; Van't Hof, Alexander Edward; Laadan, Oren; Nieh, Jason 2011 Reports Computer science
7. Columbia University WiMAX Campus Deployment and Installation Seo, SungHoon; Janak, Jan; Schulzrinne, Henning G. 2011 Reports Computer science
8. Combining a Baiting and a User Search Profiling Techniques for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
9. Computational Cameras: Approaches, Benefits and Limits Nayar, Shree K. 2011 Reports Computer science
10. Concurrency Attacks Yang, Junfeng; Cui, Ang; Gallagher, John Martin; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2011 Reports Computer science
11. Constructing Subtle Concurrency Bugs Using Synchronization-CentricSecond-Order Mutation Operators Wu, Leon Li; Kaiser, Gail E. 2011 Reports Computer science
12. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Reports Computer science
13. Data Quality Assurance and Performance Measurement of Data Mining for Preventive Maintenance of Power Grid Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Anderson, Roger N. 2011 Reports Computer science
14. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
15. Detecting Traffic Snooping in Anonymity Networks Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Reports Computer science
16. DYSWIS: Collaborative Network Fault Diagnosis - Of End-users, By End-users, For End-users Kim, Kyung Hwa; Singh, Vishal; Schulzrinne, Henning G. 2011 Reports Computer science
17. Efficient, Deterministic and Deadlock-free Concurrency Vasudevan, Nalini 2011 Reports Computer science
18. Entropy, Randomization, Derandomization, and Discrepancy Gnewuch, Michael 2011 Reports Computer science
19. Estimation of System Reliability Using a Semiparametric Model Wu, Leon Li; Teravainen, Timothy Kaleva; Kaiser, Gail E.; Anderson, Roger N.; Boulanger, Albert G.; Rudin, Cynthia 2011 Reports Computer science
20. Evaluating Machine Learning for Improving Power Grid Reliability Wu, Leon Li; Kaiser, Gail E.; Rudin, Cynthia; Waltz, David L.; Anderson, Roger N.; Boulanger, Albert G.; Salleb-Aouissi, Ansaf; Dutta, Haimonti; Pooleery, Manoj 2011 Reports Computer science
21. Forecasting Energy Demand in Large Commercial Buildings Using Support Vector Machine Regression Solomon, David M.; Winter, Rebecca Lynn; Boulanger, Albert G.; Anderson, Roger N.; Wu, Leon Li 2011 Reports Environmental sciencesMathematics
22. Frank Miller: Inventor of the One-Time Pad Bellovin, Steven Michael 2011 Reports Computer science
23. GRAND: Git Revisions As Named Data Janak, Jan; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
24. HALO (Highly Addictive, sociaLly Optimized) Software Engineering Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Kaiser, Gail E. 2011 Reports Computer science
25. Implementing Zeroconf in Linphone Srivastava, Abhishek Ajit; Lee, Jae Woo; Schulzrinne, Henning G. 2011 Reports Computer science
26. Improving System Reliability for Cyber-Physical Systems Wu, Leon Li 2011 Reports Computer science
27. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2011 Reports Computer science
28. Markov Models for Network-Behavior Modeling and Anonymization Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Reports Computer science
29. Money for Nothing and Privacy for Free? Sheth, Swapneel Kalpesh; Malkin, Tal G.; Kaiser, Gail E. 2011 Reports Computer science
30. NetServ Framework Design and Implementation 1.0 Lee, Jae Woo; Francescangeli, Roberto; Song, Wonsang; Janak, Jan; Srinivasan, Suman Ramkumar; Kester, Michael S.; Baset, Salman Abdul; Liu, Eric; Schulzrinne, Henning G.; Hilt, Volker; Despotovic, Zoran; Kellerer, Wolfgang 2011 Reports Computer science
31. NetServ on OpenFlow 1.0 Maccherani, Emanuele; Lee, Jae Woo; Femminella, Mauro; Reali, Gianluca; Schulzrinne, Henning G. 2011 Reports Computer science
32. On Effective Testing of Health Care Simulation Software Murphy, Christian; Raunak, M. S.; King, Andrew; Chen, Sanjien; Imbriano, Christopher; Kaiser, Gail E.; Lee, Insup; Sokolsky, Oleg; Clarke, Lori; Osterweil, Leon 2011 Reports Computer science
33. POWER: Parallel Optimizations With Executable Rewriting Arora, Nipun; Bell, Jonathan Schaffer; Kim, Martha Allen; Singh, Vishal; Kaiser, Gail E. 2011 Reports Computer science
34. Privacy Enhanced Access Control for Outsourced Data Sharing Raykova, Mariana Petrova; Bellovin, Steven Michael; Zhao, Hang 2011 Reports Computer scienceComputers--Access controlComputer securityElectronic data processing--Security measuresCloud computing
35. Protocols and System Design, Reliability, and Energy Efficiency in Peer-to-Peer Communication Systems Baset, Salman Abdul 2011 Reports Computer science
36. Secret Ninja Testing with HALO Software Engineering Bell, Jonathan Schaffer; Sheth, Swapneel Kalpesh; Kaiser, Gail E. 2011 Reports Computer science
37. Stable Flight and Object Tracking with a Quadricopter Using an Android Device Bardin, Benjamin Alexander; Brown, William Haldean; Blaer, Paul S. 2011 Reports Computer science
38. The Benefits of Using Clock Gating in the Design of Networks-on-Chip Petracca, Michele; Carloni, Luca 2011 Reports Computer science
39. The Failure of Online Social Network Privacy Settings Madejski, Michelle; Johnson, Maritza Lupe; Bellovin, Steven Michael 2011 Reports Computer science
40. Towards Diversity in Recommendations Using Social Networks Sheth, Swapneel Kalpesh; Bell, Jonathan Schaffer; Arora, Nipun; Kaiser, Gail E. 2011 Reports Computer science