Conference Paper (918)

921.
Conference Paper
Yang, M.; Wieder, A.; Brandenburg, B.: Global Real-time Semaphore Protocols: A Survey, Unified Analysis, and Comparison. In: IEEE 36th Real-Time Systems Symposium, pp. 1 - 12. IEEE 36th Real-Time Systems Symposium, San Antonio, TX, USA, December 01, 2015 - December 04, 2015. IEEE Computer Society, Los Alamitos, CA (2015)
922.
Conference Paper
Zafar, M. B.; Valera, I.; Gomez Rodriguez, M.; Gummadi, K.: Fairness Constraints: A Mechanism for Fair Classification. In: 2nd Workshop on Fairness, Accountability, and Transparency in Machine Learning. 2nd Workshop on Fairness, Accountability, and Transparency in Machine Learning, Lille, France, July 11, 2015. (2015)
923.
Conference Paper
Ҫiҫek, E.; Garg, D.; Acar, U.: Refinement Types for Incremental Computational Complexity. In: Programming Languages and Systems, pp. 406 - 431 (Ed. Vitek, J.). 24th European Symposium on Programming, London, UK, April 11, 2015 - April 18, 2015. Springer, Berlin (2015)
924.
Conference Paper
Chistikov, D.: Notes on Counting with Finite Machines. In: 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, pp. 339 - 350 (Eds. Raman, V.; Suresh, S. P.). 34th International Conference on Foundation of Software Technology and Theoretical Computer Science, New Delhi, India, December 15, 2014 - December 17, 2014. Schloß Dagstuhl, Wadern (2014)
925.
Conference Paper
Aditya, P.; Bhattacharjee, B.; Druschel, P.; Erdélyi, V.; Lentz, M.: Brave New World: Privacy Risks for Mobile Users. In: SPME'14, pp. 7 - 11. ACM MobiCom Workshop on Security and Privacy in Mobile Environments, Maui, HI, USA, September 11, 2014. ACM, New York, NY (2014)
926.
Conference Paper
Aditya, P.; Erdélyi, V.; Lentz, M.; Shi, E.; Bhattacharjee, B.; Druschel, P.: EnCore: Private, Context-based Communication for Mobile Social Apps. In: MobiSys'14, pp. 135 - 148. 12th Annual International Conference on Mobile Systems, Applications, and Services, Bretton Woods, NH, USA, June 16, 2014 - June 19, 2014. ACM, New York, NY (2014)
927.
Conference Paper
Alvin, C.; Gulwani, S.; Majumdar, R.; Mukhopadhyay, S.: Synthesis of Geometry Proof Problems. In: AAAI'14, pp. 245 - 252. Twenty-Eighth AAAI Conference on Artificial Intelligence, Québec City, Québec, Canada, July 27, 2014 - July 31, 2014. ACM, New York, NY (2014)
928.
Conference Paper
Backes, M.; Clark, J.; Kate, A.; Simeonovski, M.; Druschel, P.: BackRef: Accountability in Anonymous Communication Networks. In: Applied Cryptography and Network Security, pp. 380 - 400 (Eds. Boureanu, I.; Owesarski, P.). 12th International Conference on Applied Cryptography and Network Security, Lausanne, Switzerland, June 10, 2014 - June 13, 2014. Springer, Berlin (2014)
929.
Conference Paper
Bhattacharya, P.; Ghosh, S.; Kulshrestha, J.; Mondal, M.; Zafar, M. B.; Ganguly, N.; Gummadi, K.: Deep Twitter diving: Exploring Topical Groups in Microblogs at Scale. In: Computer Supported Cooperative Work, pp. 197 - 210. 17th ACM conference on Computer Supported Cooperative Work, Baltimore, MD, USA, February 15, 2014 - February 19, 2014. ACM, New York, NY (2014)
930.
Conference Paper
Bhattacharya, P.; Zafar, M. B.; Ganguly, N.; Ghosh, S.; Gummadi, K.: Inferring User interests in the Twitter Social Network. In: RecSys '14, pp. 357 - 360. Eighth ACM Conference on Recommender Systems, Foster City, Silicon Valley, CA, USA , October 06, 2014 - October 10, 2014. ACM, New York, NY (2014)
931.
Conference Paper
Bichhawat, A.; Rajani, V.; Garg, D.; Hammer, C.: Generalizing Permissive-upgrade in Dynamic Information Flow Analysis. In: PLAS'14, 15, pp. 15 - 24. ACM Ninth Workshop on Programming Languages and Analysis for Security, Uppsala, Sweden, July 28, 2014 - August 01, 2014. ACM, New York, NY (2014)
932.
Conference Paper
Bichhawat, A.; Rajani, V.; Garg, D.; Hammer, C.: Information Flow Control in WebKit’s JavaScript Bytecode. In: Principles of Security and Trust, pp. 159 - 178 (Eds. Abadi, M.; Kremer, S.). 3rd Conference on Principles of Security and Trust, Grenoble, France, April 05, 2014 - April 13, 2014. Springer, Berlin (2014)
933.
Conference Paper
Brandenburg, B.: A Synchronous IPC Protocol for Predictable Access to Shared Resources in Mixed-criticality Systems. In: IEEE 35th Real-Time Systems Symposium, pp. 196 - 206. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
934.
Conference Paper
Brandenburg, B.: The FMLP+: An Asymptotically Optimal Real-time Locking Protocol for Suspension-aware Analysis. In: ECRTS 2014, pp. 61 - 71. 26th Euromicro Conference on Real-Time Systems, Madrid, Spain, July 08, 2014 - July 11, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
935.
Conference Paper
Cerqueira, F.; Gujarati, A.; Brandenburg, B.: Linux’s Processor Affinity API, Refined: Shifting Real-Time Tasks towards Higher Schedulability. In: IEEE 35th Real-Time Systems Symposium, pp. 249 - 259. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
936.
Conference Paper
Cerqueira, F.; Vanga, M.; Brandenburg, B.: Scaling Global Scheduling with Message Passing. In: IEEE 20th Real-Time and Embedded Technology and Applications Symposium, pp. 263 - 274. 20th Real Time and Embedded Technology and Applications Symposium, Berlin, Germany, April 15, 2014 - April 17, 2014. IEEE, Piscataway, NJ (2014)
937.
Conference Paper
Chatterjee, K.; Ibsen-Jensen, R.; Majumdar, R.: Edit Distance for Timed Automata. In: HSCC'14, pp. 302 - 312. 17th International Conference on Hybrid Systems, Berlin, Germany, April 15, 2014 - April 17, 2014. ACM, New York, NY (2014)
938.
Conference Paper
Chistikov, D.; Majumdar, R.: Unary Pushdown Automata and Straight-line Programs. In: Automata, Languages, and Programming, pp. 146 - 157. 41st International Colloquium on Automata, Languages, and Programming, Copenhagen, Denmark, July 08, 2014 - July 11, 2014. Springer, Berlin (2014)
939.
Conference Paper
Chowdhury, O.; Jia, L.; Garg, D.; Datta, A.: Temporal Mode-checking for Runtime Monitoring of Privacy Policies. In: Computer Aided Verification, pp. 131 - 149 (Eds. Biere, A.; Bloem, R.). 26th International Conference on Computer Aided Verification, Vienna, Austria, July 18, 2014 - July 22, 2014. Springer, Berlin (2014)
940.
Conference Paper
Cui, P.; Wang, F.; Tong, H.; Gomez Rodriguez, M.: 1st Workshop on Diffusion Networks and Cascade Analytics. In: Proceedings of the 7th ACM International Conference on Web Search and Data Mining,, pp. 689 - 690. 7th ACM International Conference on Web Search and Data Mining, New York, NY, USA, February 24, 2014 - February 28, 2014. ACM, New York, NY (2014)
Go to Editor View