Scientific Publications
Journal Article (3)
1.
Journal Article
52 (11), p. 86 - 86 (2009)
Narrowing the semantic gap in distributed programming. Communications of the ACM 2.
Journal Article
17 (5), pp. 1357 - 1370 (2009)
Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE ACM Transactions on Networking 3.
Journal Article
20 (9), pp. 1339 - 1351 (2009)
Full-information lookups for peer-to-peer overlays. IEEE Transactions on Parallel and Distributed Systems Proceedings (2)
4.
Proceedings
5789). 14th European Symposium on Research in Computer Security, Saint-Malo, September 21, 2009 - September 23, 2009. Springer, Berlin (2009), XVI, 706 pp.
Computer Security – ESORICS 2009 (Lecture notes in computer science, 5.
Proceedings
5675). 4th International Computer Science Symposium in Russia, Novosibirsk, August 18, 2009 - August 23, 2009. Springer, Berlin (2009), XIII, 367 pp.
Computer science - theory and applications (Lecture notes in computer science, Conference Paper (30)
6.
Conference Paper
State-dependent representation independence. In: POPL’09 Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 340 - 353. 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Savannah, Georgia, January 21, 2009 - January 23, 2009. ACM, New York, NY (2009)
7.
Conference Paper
Preserving digital data in heterogeneous environments. In: JCDL’09: proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries, pp. 345 - 348. 2009 ACM/IEEE Joint Conference on Digital Libraries (JCDL'09), Austin, Texas, June 15, 2009 - June 19, 2009. ACM, New York, NY (2009)
8.
Conference Paper
Tempest in a teapot: compromising reflections revisited. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 315 - 327. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
9.
Conference Paper
CSAR: A Practical and Probable Technique to Make Randomized Systems Accountable. In: 2009 Network and Distributed System Security Symposium, pp. 341 - 353. 16th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 08, 2009 - February 11, 2009. Internet Society, Reston, VA (2009)
10.
Conference Paper
Achieving security despite compromise using zero-knowledge. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, pp. 308 - 323. 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, NY, July 08, 2009 - July 10, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
11.
Conference Paper
Anonymity and censorship resistance in unstructured overlay networks. In: On the Move to Meaningful Internet Systems: OTM 2009: proceedings. - Part I, pp. 147 - 164 (Eds. Meersman, R.; Dillon, T.; Herrero, P.). Confederated International Conferences CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, November 01, 2009 - November 06, 2009. Springer, Berlin (2009)
12.
Conference Paper
CoSP: a general framework for computational soundness proofs. In: CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 66 - 78. 16th ACM Conference on Computer and Communications Security, Chicago, Ill., November 09, 2009 - November 13, 2009. ACM, New York, NY (2009)
13.
Conference Paper
Automatic discovery and quantification of information leaks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 141 - 153. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
14.
Conference Paper
Characterizing user behavior in online social networks. In: IMC’09 Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference, pp. 49 - 62. 2009 ACM SIGCOMM Internet Measurement Conference, Chicago, Ill., November 04, 2009 - November 06, 2009. ACM, New York, NY (2009)
15.
Conference Paper
A measurement-driven analysis of information propagation in the flickr social network. In: WWW’09: proceedings of the 18th International World Wide Web Conference, pp. 721 - 730. 18th International World Wide Web Conference (WWW 2009), Madrid, April 20, 2009 - April 24, 2009. ACM, New York, NY (2009)
16.
Conference Paper
Flash floods and ripples: The spread of media content through the blogosphere. In: ICWSM 2009 Data Challenge Workshop, pp. 1 - 8. 3rd International AAAI Conference on Weblogs and Social Media, San Jose, CA, May 17, 2009 - May 20, 2009. AAAI, Menlo Park, CA (2009)
17.
Conference Paper
Finding heap-bounds for hardware synthesis. In: Proceedings of 9th International Conference 2009 Formal Methods in Computer-Aided Design FMCAD 2009, pp. 205 - 212 (Ed. Hung, W. N. N.). FMCAD 2009, Austin, Texas, November 15, 2009 - November 18, 2009. IEEE, Piscataway, NJ (2009)
18.
Conference Paper
Logical step-indexed logical relations. In: 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) proceedings, pp. 71 - 80. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009), Los Angelos, CA, August 11, 2009 - August 14, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
19.
Conference Paper
Efficient cross-layer negotiation. In: Eighth ACM Workshop on SIGCOMM logo Hot Topics in Networks (HotNets-VIII), 123, pp. 1 - 6. Eighth ACM Workshop on SIGCOMM logo Hot Topics in Networks (HotNets-VIII), New York, NY, October 22, 2009 - October 23, 2009. ACM, New York, NY (2009)
20.
Conference Paper
Verme: Worm containment in overlay networks. In: Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 155 - 164 (Eds. Carvalho, P.; Craveiro, J.; Kaaniche, M.; Reiser, H. P.). 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), Estoril, Lisboa, June 29, 2009 - July 02, 2009. IEEE Computer Society, Los Alamitos, CA (2009)