Conference Paper (46)

41.
Conference Paper
Lentz, M.; Erdélyi, V.; Aditya, P.; Shi, E.; Druschel, P.; Bhattacharjee, B.: SDDR: Light-weight, Secure Mobile Encounters. In: Proceedings of the 23rd USENIX Security Symposium, pp. 925 - 940. 23rd USENIX Security Symposium, San Diego, CA, USA, August 20, 2014 - August 22, 2014. USENIX Association, Berkely, CA (2014)
42.
Conference Paper
Li, C.; Leitão, J.; Clement, A.; Preguiça, N.; Rodrigues, R.; Vafeiadis, V.: Automating the Choice of Consistency Levels in Replicated Systems. In: Proceedings of USENIX ATC ’14, pp. 281 - 292. 2014 USENIX Annual Technical Conference, Philadelphia, PA, June 19, 2014 - June 20, 2014. USENIX (2014)
43.
Conference Paper
Maiya, P.; Kanade, A.; Majumdar, R.: Race Detection for Android Applications. In: PLDI '14, pp. 316 - 325. 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK, June 09, 2014 - June 11, 2014. ACM, New York, NY (2014)
44.
Conference Paper
Majumdar, R.; Tetali, S. D.; Wang, Z.: Kuai: A Model Checker for Software-defined Networks. In: Formal Methods in Computer-Aided Design, FMCAD 2014, Lausanne, Switzerland, October 21-24, 2014, pp. 163 - 170. 2014 Formal Methods in Computer-Aided Desig, Lausanne, Switzerland, October 21, 2014 - October 24, 2014. IEEE, Piscataway, NJ (2014)
45.
Conference Paper
Manuel, G.; Gummadi, K.; Schoelkopf, B.: Quantifying Information Overload in Social Media and its Impact on Social Contagions. In: ICSWM '14, pp. 170 - 179. 8th International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, June 01, 2014 - June 04, 2014. AAAI Press, Palo Alto, CA (2014)
46.
Conference Paper
Mondal, M.; Druschel, P.; Gummadi, K.; Mislove, A.: Beyond Access Control: Managing Online Privacy via Exposure. In: Workshop on Usable Security, pp. 1 - 6. Workshop on Usable Security, San Diego, CA, USA, February 23, 2014. Internet Society, Reston, VA (2014)
47.
Conference Paper
Mondal, M.; Liu, Y.; Viswanath, B.; Gummadi, K.; Mislove, A.: Understanding and Specifying Social Access Control Lists. In: Tenth Symposium on Usable Privacy and Security, pp. 271 - 283. Tenth Symposium on Usable Privacy and Security, Menlo Park, CA, USA, July 09, 2014 - July 11, 2014. USENIX, Berkeley, CA (2014)
48.
Conference Paper
Oh, S. E.; Chun, Y. Y.; Jia, L.; Garg, D.; Gunter, C. A.; Datta, A.: Privacy-preserving Audit for Broker-based Health Information Exchange. In: CODASPY'14, pp. 313 - 320. 4th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, March 03, 2014 - March 05, 2014. ACM, New York, NY (2014)
49.
Conference Paper
Reznichenko, A.; Francis, P.: Private-by-design Advertising Meets the Real World. In: CCS'14, pp. 116 - 128. 21st ACM Conference on Computer and Communications Security, Scottsdale, AR, USA, November 03, 2014 - November 07, 2014. ACM, New York, NY (2014)
50.
Conference Paper
Spliet, R.; Vanga, M.; Brandenburg, B.; Dziadek, S.: Fast on Average, Predictable in the Worst Case: Exploring Real-time Futexes in LITMUS RT. In: IEEE 35th Real-Time Systems Symposium, pp. 96 - 105. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
51.
Conference Paper
Turon, A.; Vafeiadis, V.; Dreyer, D.: GPS: Navigating Weak Memory with Ghosts, Protocols, and Separation. In: OOPSLA'14, pp. 691 - 707. ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, Portland, OR, USA, October 20, 2014 - October 24, 2014. ACM, New York, NY (2014)
52.
Conference Paper
Valera, I.; Gomez-Rodriguez, M.; Gummadi, K.: Modeling Diffusion of Competing Products and Conventions in Social Media. In: NIPS Workshop in Networks: From Graphics to Rich Data. 2014 NIPS Workshop in Networks, Montreal, Canada, December 13, 2014. (accepted)
53.
Conference Paper
Viswanath, B.; Bashir, M. A.; Crovella, M.; Guha, S.; Gummadi, K.; Krishnamurthy, B.; Mislove, A.: Towards Detecting Anomalous User Behavior in Online Social Networks. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pp. 223 - 238. 23rd USENIX Security Symposium, San Diego, CA, USA, August 20, 2014 - August 22, 2014. USENEX, Berkeley, CA (2014)
54.
Conference Paper
Wieder, A.; Brandenburg, B.: On the Complexity of Worst-case Blocking Analysis of Nested Critical Section. In: IEEE 35th Real-Time Systems Symposium, pp. 106 - 117. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
55.
Conference Paper
Ziliani, B.; Sozeau, M.: Towards a Better-behaved Unification Algorithm for Coq. In: The 28th International Workshop on Unification, pp. 74 - 87 (Eds. Kutsia, T.; Ringeissen, C.). 28th International Workshop on Unification, Vienna, Austria, July 13, 2014. Johannes Kepler University, Linz (2014)
56.
Conference Paper
Ziliani, B.; Sozeau, M.: Towards a Better-behaved Unification Algorithm for Coq. In: The 6th Coq Workshop, pp. 1 - 2. The 6th Coq Workshop, Vienna, Austria, July 18, 2014. (2014)

Conference Report (1)

57.
Conference Report
Chen, Y.; Acar, U. A.; Tangwongsan, K.: Functional Programming for Dynamic and Large Data with Self-Adjusting Computation. In: ICFP'14, pp. 227 - 240. ACM SIGPLAN International Conference on Functional Programming, Gothenburg, Sweden, September 01, 2014 - September 03, 2014. ACM, New York, NY (2014)

Thesis - PhD (1)

58.
Thesis - PhD
Reznichenko, A.: Private-by-design Advertising and Analytics: From Theory to Practice. Dissertation, VIII, 124 pp., Technische Universität Kaiserslautern, Kaiserslautern (2014)

Report (1)

59.
Report
Hur, C.-K.; Neis, G.; Dreyer, D.; Vafeiadis, V.: A Logical Step Forward in Parametric Bisimulations. Max Planck Institute for Software Systems, Saarbrücken (2014), 30 pp.
Go to Editor View