Scientific Publications

Journal Article (3)

1.
Journal Article
Druschel, P.: Narrowing the semantic gap in distributed programming. Communications of the ACM 52 (11), p. 86 - 86 (2009)
2.
Journal Article
Cha, M.; Kwak, H.; Rodriguez, P.; Ahn, Y.-Y.; Moon, S.: Analyzing the video popularity characteristics of large-scale user generated content systems. IEEE ACM Transactions on Networking 17 (5), pp. 1357 - 1370 (2009)
3.
Journal Article
Fonseca, P.; Rodrigues, R.; Gupta, A.; Liskov, B.: Full-information lookups for peer-to-peer overlays. IEEE Transactions on Parallel and Distributed Systems 20 (9), pp. 1339 - 1351 (2009)

Proceedings (2)

4.
Proceedings
Backes, M.; Ning, P. (Eds.): Computer Security – ESORICS 2009 (Lecture notes in computer science, 5789). 14th European Symposium on Research in Computer Security, Saint-Malo, September 21, 2009 - September 23, 2009. Springer, Berlin (2009), XVI, 706 pp.
5.
Proceedings
Frid, A.; Morozov, A.; Rybalchenko, A.; Wagner, K. W. (Eds.): Computer science - theory and applications (Lecture notes in computer science, 5675). 4th International Computer Science Symposium in Russia, Novosibirsk, August 18, 2009 - August 23, 2009. Springer, Berlin (2009), XIII, 367 pp.

Conference Paper (30)

6.
Conference Paper
Ahmed, A.; Dreyer, D.; Rossberg, A.: State-dependent representation independence. In: POPL’09 Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 340 - 353. 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Savannah, Georgia, January 21, 2009 - January 23, 2009. ACM, New York, NY (2009)
7.
Conference Paper
Antunas, G.; Barateiro, J.; Cabral, M.; Borbinha, J.; Rodrigues, R.: Preserving digital data in heterogeneous environments. In: JCDL’09: proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries, pp. 345 - 348. 2009 ACM/IEEE Joint Conference on Digital Libraries (JCDL'09), Austin, Texas, June 15, 2009 - June 19, 2009. ACM, New York, NY (2009)
8.
Conference Paper
Backes, M.; Chen, T.; Dürmuth, M.; Lensch, H. P. A.; Welk, M.: Tempest in a teapot: compromising reflections revisited. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 315 - 327. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
9.
Conference Paper
Backes, M.; Druschel, P.; Haeberlen, A.; Unruh, D.: CSAR: A Practical and Probable Technique to Make Randomized Systems Accountable. In: 2009 Network and Distributed System Security Symposium, pp. 341 - 353. 16th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 08, 2009 - February 11, 2009. Internet Society, Reston, VA (2009)
10.
Conference Paper
Backes, M.; Grochulla, M. P.; Hritcu, C.; Maffei, M.: Achieving security despite compromise using zero-knowledge. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, pp. 308 - 323. 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, NY, July 08, 2009 - July 10, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
11.
Conference Paper
Backes, M.; Hamerlik, M.; Linari, A.; Maffei, M.; Tryfonopoulos, C.; Weikum, G.: Anonymity and censorship resistance in unstructured overlay networks. In: On the Move to Meaningful Internet Systems: OTM 2009: proceedings. - Part I, pp. 147 - 164 (Eds. Meersman, R.; Dillon, T.; Herrero, P.). Confederated International Conferences CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, November 01, 2009 - November 06, 2009. Springer, Berlin (2009)
12.
Conference Paper
Backes, M.; Hofheinz, D.; Unruh, D.: CoSP: a general framework for computational soundness proofs. In: CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 66 - 78. 16th ACM Conference on Computer and Communications Security, Chicago, Ill., November 09, 2009 - November 13, 2009. ACM, New York, NY (2009)
13.
Conference Paper
Backes, M.; Köpf, B.; Rybalchenko, A.: Automatic discovery and quantification of information leaks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 141 - 153. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
14.
Conference Paper
Benevenuto, F.; Rodrigues, T.; Cha, M.; Almeida, V.: Characterizing user behavior in online social networks. In: IMC’09 Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference, pp. 49 - 62. 2009 ACM SIGCOMM Internet Measurement Conference, Chicago, Ill., November 04, 2009 - November 06, 2009. ACM, New York, NY (2009)
15.
Conference Paper
Cha, M.; Mislove, A.; Gummadi, K. P.: A measurement-driven analysis of information propagation in the flickr social network. In: WWW’09: proceedings of the 18th International World Wide Web Conference, pp. 721 - 730. 18th International World Wide Web Conference (WWW 2009), Madrid, April 20, 2009 - April 24, 2009. ACM, New York, NY (2009)
16.
Conference Paper
Cha, M.; Navarro Perez, J. A.; Haddadi, H.: Flash floods and ripples: The spread of media content through the blogosphere. In: ICWSM 2009 Data Challenge Workshop, pp. 1 - 8. 3rd International AAAI Conference on Weblogs and Social Media, San Jose, CA, May 17, 2009 - May 20, 2009. AAAI, Menlo Park, CA (2009)
17.
Conference Paper
Cook, B.; Gupta, A.; Magill, S.; Rybalchenko, A.; Simsa, J.; Singh, S.; Vafeiadis, V.: Finding heap-bounds for hardware synthesis. In: Proceedings of 9th International Conference 2009 Formal Methods in Computer-Aided Design FMCAD 2009, pp. 205 - 212 (Ed. Hung, W. N. N.). FMCAD 2009, Austin, Texas, November 15, 2009 - November 18, 2009. IEEE, Piscataway, NJ (2009)
18.
Conference Paper
Dreyer, D.; Ahmed, A.; Birkedal, L.: Logical step-indexed logical relations. In: 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009) proceedings, pp. 71 - 80. 24th Annual IEEE Symposium on Logic in Computer Science (LICS 2009), Los Angelos, CA, August 11, 2009 - August 14, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
19.
Conference Paper
Ford, B.; Iyengar, J.: Efficient cross-layer negotiation. In: Eighth ACM Workshop on SIGCOMM logo Hot Topics in Networks (HotNets-VIII), 123, pp. 1 - 6. Eighth ACM Workshop on SIGCOMM logo Hot Topics in Networks (HotNets-VIII), New York, NY, October 22, 2009 - October 23, 2009. ACM, New York, NY (2009)
20.
Conference Paper
Freitas, F.; Marques, E.; Rodrigues, R.; Ribeiro, C.; Ferreira, P.; Rodrigues, L.: Verme: Worm containment in overlay networks. In: Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 155 - 164 (Eds. Carvalho, P.; Craveiro, J.; Kaaniche, M.; Reiser, H. P.). 2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), Estoril, Lisboa, June 29, 2009 - July 02, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
Go to Editor View