Conference Paper (918)
1101.
Conference Paper
A graph model of data and workflow provenance. In: TAPP'10: Proceedings of the 2nd Conference on Theory and Practice of Provenance, p. 8 - 8. 2nd Conference on Theory and Practice of Provenance (TAPP 2010), San Jose, CA, February 22, 2010. USENIX, Berkeley, CA (2010)
1102.
Conference Paper
Dynamic well-spaced point sets. In: Proceedings of the Twenty-Sixth Annual Symposium on Computational Geometry (SCG'10), pp. 314 - 323. 26th Annual Symposium on Computational Gemoetry (SCG 2010), Snowbird, Utah, June 13, 2010 - June 16, 2010. ACM, New York, NY (2010)
1103.
Conference Paper
Kinetic mesh refinement in 2D. In: Proceedings, 20th Annual Fall Workshop on Computational Geometry, 35, pp. 1 - 4. 20th Annual Fall Workshop on Computational Geometry, Stony Brook, NY, October 29, 2010 - October 30, 2010. Stony Brook State University of New York, Stony Brook, NY (2010)
1104.
Conference Paper
Traceable data types for self-adjusting computation. In: PLDI’10: proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 483 - 496. 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2010), Toronto, Ontario, June 05, 2010 - June 10, 2010. ACM, New York, NY (2010)
1105.
Conference Paper
Automatic verification of control system implementations. In: ESWEEK 2010 compilation proceedings (CASES, CODES+ISSS, & EMSOFT), pp. 9 - 18. International Conference on Embedded Software (EMSOFT 2010), Scottsdale, Arizona, October 24, 2010 - October 29, 2010. ACM, New York, NY (2010)
1106.
Conference Paper
Speaker recognition in encrypted voice streams. In: Computer Security - ESORICS 2010: 15th European Symposium on Research in Computer Security, pp. 508 - 523 (Eds. Gritzalis, D.; Preneel, B.; Theoharidou, M.). 15th European Symposium on Research in Computer Security (ESORICS 2010), Athen, September 20, 2010 - September 22, 2010. Springer, Berlin (2010)
1107.
Conference Paper
Reliable data-center scale computations. In: Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2010), pp. 1 - 6. 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2010), Zürich, July 28, 2010 - July 29, 2010. ACM, New York, NY (2010)
1108.
Conference Paper
Measuring user influence in Twitter: the million follower fallacy. In: Proceedings of the Fourth International AAAI Conference on Weblogs and Social Media (ICWSM 2010), pp. 10 - 17. Fourth International AAAI Conference on Weblogs and Social Media (ICWSM 2010), Washington, DC, May 23, 2010 - May 26, 2010. AAAI Press, Menlo Park, CA (2010)
1109.
Conference Paper
Discounting in games across time scales. In: Proceedings First Symposium on Games, Automata, Logic, and Formal Verification, pp. 22 - 29 (Eds. Montanari, A.; Napoli, M.; Parente, M.). First International Symposium on Games, Automata, Logics and Formal Verification (GandALF), Minori, June 17, 2010 - June 18, 2010. EPTCS, s.l. (2010)
1110.
Conference Paper
Glasnost: Enabling End Users to Detect Traffic Differentiation. In: Proceedings of NSDI ’10: 7th USENIX Symposium on Networked Systems Design and Implementation, pp. 405 - 418. 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2010), San Jose, CA, April 28, 2010 - April 30, 2010. USENIX (2010)
1111.
Conference Paper
The impact of higher-order state and control effects on local relational reasoning. In: ICFP’10: proceedings of the 2010 ACM SIGPLAN International Conference on Functional Programming, pp. 143 - 156. 2010 ACM SIGPLAN International Conference on Functional Programming (ICFP 2010), Baltimore, MA, September 27, 2010 - September 29, 2010. ACM, New York, NY (2010)
1112.
Conference Paper
A relational modal logic for higher-order stateful ADTs. In: POPL’10: proceedings of the 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 185 - 198. 37th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2010), Madrid, January 17, 2010 - January 23, 2010. ACM, New York, NY (2010)
1113.
Conference Paper
A study of the internal and external effects of concurrency bugs. In: Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 221 - 230. 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Chicago, IL, June 28, 2010 - July 01, 2010. IEEE, Piscataway, NJ (2010)
1114.
Conference Paper
Challenges in measuring online advertising systems. In: IMC’10: proceedings of the 2010 ACM Internet Measurement Conference, pp. 81 - 87. 2010 ACM Internet Measurement Conference (IMC 2010), Melbourne, November 01, 2010 - November 03, 2010. ACM, New York, NY (2010)
1115.
Conference Paper
Addressing the privacy management crisis in online social networks. In: Internet Privacy Workshop: Accepted Position Papers, 1. IAB Workshop on Internet Privacy, Cambridge, MA, December 08, 2010 - December 09, 2010. IAB, s.l. (2010)
1116.
Conference Paper
Accountable virtual machines. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’10), pp. 1 - 16. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010), Vancouver, Canada, October 04, 2010 - October 06, 2010. USENIX Association, Berkeley, CA (2010)
1117.
Conference Paper
On power and fault-tolerance optimization in FPGA physical synthesis. In: 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 224 - 229. 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, November 07, 2010 - November 11, 2010. IEEE, Piscataway, NJ (2010)
1118.
Conference Paper
Constant-size commitments to polynomials and their applications. In: Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, pp. 177 - 194 (Ed. Abe, M.). 16th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010), Singapore, December 05, 2010 - December 09, 2010. Springer, Berlin (2010)
1119.
Conference Paper
Approximation and randomization for quantitative information-flow analysis. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 3 - 14. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)
1120.
Conference Paper
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 44 - 56. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)