Konferenzbeitrag (46)

41.
Konferenzbeitrag
Lentz, M.; Erdélyi, V.; Aditya, P.; Shi, E.; Druschel, P.; Bhattacharjee, B.: SDDR: Light-weight, Secure Mobile Encounters. In: Proceedings of the 23rd USENIX Security Symposium, S. 925 - 940. 23rd USENIX Security Symposium, San Diego, CA, USA, 20. August 2014 - 22. August 2014. USENIX Association, Berkely, CA (2014)
42.
Konferenzbeitrag
Li, C.; Leitão, J.; Clement, A.; Preguiça, N.; Rodrigues, R.; Vafeiadis, V.: Automating the Choice of Consistency Levels in Replicated Systems. In: Proceedings of USENIX ATC ’14, S. 281 - 292. 2014 USENIX Annual Technical Conference, Philadelphia, PA, 19. Juni 2014 - 20. Juni 2014. USENIX (2014)
43.
Konferenzbeitrag
Maiya, P.; Kanade, A.; Majumdar, R.: Race Detection for Android Applications. In: PLDI '14, S. 316 - 325. 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK, 09. Juni 2014 - 11. Juni 2014. ACM, New York, NY (2014)
44.
Konferenzbeitrag
Majumdar, R.; Tetali, S. D.; Wang, Z.: Kuai: A Model Checker for Software-defined Networks. In: Formal Methods in Computer-Aided Design, FMCAD 2014, Lausanne, Switzerland, October 21-24, 2014, S. 163 - 170. 2014 Formal Methods in Computer-Aided Desig, Lausanne, Switzerland, 21. Oktober 2014 - 24. Oktober 2014. IEEE, Piscataway, NJ (2014)
45.
Konferenzbeitrag
Manuel, G.; Gummadi, K.; Schoelkopf, B.: Quantifying Information Overload in Social Media and its Impact on Social Contagions. In: ICSWM '14, S. 170 - 179. 8th International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, 01. Juni 2014 - 04. Juni 2014. AAAI Press, Palo Alto, CA (2014)
46.
Konferenzbeitrag
Mondal, M.; Druschel, P.; Gummadi, K.; Mislove, A.: Beyond Access Control: Managing Online Privacy via Exposure. In: Workshop on Usable Security, S. 1 - 6. Workshop on Usable Security, San Diego, CA, USA, 23. Februar 2014. Internet Society, Reston, VA (2014)
47.
Konferenzbeitrag
Mondal, M.; Liu, Y.; Viswanath, B.; Gummadi, K.; Mislove, A.: Understanding and Specifying Social Access Control Lists. In: Tenth Symposium on Usable Privacy and Security, S. 271 - 283. Tenth Symposium on Usable Privacy and Security, Menlo Park, CA, USA, 09. Juli 2014 - 11. Juli 2014. USENIX, Berkeley, CA (2014)
48.
Konferenzbeitrag
Oh, S. E.; Chun, Y. Y.; Jia, L.; Garg, D.; Gunter, C. A.; Datta, A.: Privacy-preserving Audit for Broker-based Health Information Exchange. In: CODASPY'14, S. 313 - 320. 4th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, 03. März 2014 - 05. März 2014. ACM, New York, NY (2014)
49.
Konferenzbeitrag
Reznichenko, A.; Francis, P.: Private-by-design Advertising Meets the Real World. In: CCS'14, S. 116 - 128. 21st ACM Conference on Computer and Communications Security, Scottsdale, AR, USA, 03. November 2014 - 07. November 2014. ACM, New York, NY (2014)
50.
Konferenzbeitrag
Spliet, R.; Vanga, M.; Brandenburg, B.; Dziadek, S.: Fast on Average, Predictable in the Worst Case: Exploring Real-time Futexes in LITMUS RT. In: IEEE 35th Real-Time Systems Symposium, S. 96 - 105. IEEE 35th Real-Time Systems Symposium, Rome, Italy, 02. Dezember 2014 - 05. Dezember 2014. IEEE Computer Society, Los Alamitos, CA (2014)
51.
Konferenzbeitrag
Turon, A.; Vafeiadis, V.; Dreyer, D.: GPS: Navigating Weak Memory with Ghosts, Protocols, and Separation. In: OOPSLA'14, S. 691 - 707. ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, Portland, OR, USA, 20. Oktober 2014 - 24. Oktober 2014. ACM, New York, NY (2014)
52.
Konferenzbeitrag
Valera, I.; Gomez-Rodriguez, M.; Gummadi, K.: Modeling Diffusion of Competing Products and Conventions in Social Media. In: NIPS Workshop in Networks: From Graphics to Rich Data. 2014 NIPS Workshop in Networks, Montreal, Canada, 13. Dezember 2014. (angenommen)
53.
Konferenzbeitrag
Viswanath, B.; Bashir, M. A.; Crovella, M.; Guha, S.; Gummadi, K.; Krishnamurthy, B.; Mislove, A.: Towards Detecting Anomalous User Behavior in Online Social Networks. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., S. 223 - 238. 23rd USENIX Security Symposium, San Diego, CA, USA, 20. August 2014 - 22. August 2014. USENEX, Berkeley, CA (2014)
54.
Konferenzbeitrag
Wieder, A.; Brandenburg, B.: On the Complexity of Worst-case Blocking Analysis of Nested Critical Section. In: IEEE 35th Real-Time Systems Symposium, S. 106 - 117. IEEE 35th Real-Time Systems Symposium, Rome, Italy, 02. Dezember 2014 - 05. Dezember 2014. IEEE Computer Society, Los Alamitos, CA (2014)
55.
Konferenzbeitrag
Ziliani, B.; Sozeau, M.: Towards a Better-behaved Unification Algorithm for Coq. In: The 28th International Workshop on Unification, S. 74 - 87 (Hg. Kutsia, T.; Ringeissen, C.). 28th International Workshop on Unification, Vienna, Austria, 13. Juli 2014. Johannes Kepler University, Linz (2014)
56.
Konferenzbeitrag
Ziliani, B.; Sozeau, M.: Towards a Better-behaved Unification Algorithm for Coq. In: The 6th Coq Workshop, S. 1 - 2. The 6th Coq Workshop, Vienna, Austria, 18. Juli 2014. (2014)

Konferenzbericht (1)

57.
Konferenzbericht
Chen, Y.; Acar, U. A.; Tangwongsan, K.: Functional Programming for Dynamic and Large Data with Self-Adjusting Computation. In: ICFP'14, S. 227 - 240. ACM SIGPLAN International Conference on Functional Programming, Gothenburg, Sweden, 01. September 2014 - 03. September 2014. ACM, New York, NY (2014)

Hochschulschrift - Doktorarbeit (1)

58.
Hochschulschrift - Doktorarbeit
Reznichenko, A.: Private-by-design Advertising and Analytics: From Theory to Practice. Dissertation, VIII, 124 S., Technische Universität Kaiserslautern, Kaiserslautern (2014)

Bericht (1)

59.
Bericht
Hur, C.-K.; Neis, G.; Dreyer, D.; Vafeiadis, V.: A Logical Step Forward in Parametric Bisimulations. Max Planck Institute for Software Systems, Saarbrücken (2014), 30 S.
Zur Redakteursansicht