Liu |
Chang |
2016 |
Trace Oblivious Program Execution |
Michael HicksElaine Shi |
Long |
Teng |
2016 |
Collaborative Testing of Shared Software Components |
Alan Sussman |
Malik |
Sana |
2016 |
A Visual Analytics Approach to Comparing Cohorts of Event Sequences |
Ben Shneiderman |
Milton |
Leslie |
2016 |
User Behavioral Modeling of Web-based
Systems for Continuous User Authentication |
|
Malozemoff |
Alexis |
2016 |
Efficient Secure Computation for Real-world Settings and
Security Models |
Jonathan Katz |
Mondal |
Jayanta |
2016 |
Real-Time Querying and Analytics on Large Dynamic
Graphs |
Amol Deshpande |
Miller |
Andrew |
2016 |
Provable Security for Cryptocurrencies |
Jonathan Katz |
Park |
Young Sam |
2016 |
Active Data Collection Techniques to Understand Online Scammers and Cybercriminals |
Elaine Shi |
Nagaraja |
Varun |
2016 |
Context Models for Understanding Images and Videos |
Larry Davis |
Pujara |
Jay |
2016 |
Probabilistic Models for Scalable Knowledge Graph
Construction |
Lise Getoor |
Ozdemir |
Bahadir |
2016 |
Learning Binary Code Representations for Effective and Efficient Image Retrieval |
Larry Davis |
Purohit |
Manish |
2016 |
Data-Aware Scheduling in Datacenters |
Samir Khuller |
Rastogi |
Aseem |
2016 |
Language-Based Techniques for Practical and
Trustworthy Secure Multi-
Party Computations |
Michael Hicks |
Quamar |
Abdul |
2016 |
Building Efficient and Cost-Effective Cloud-Based Big Data Management Systems |
Amol Deshpande |
Rastegari |
Mohammad |
2016 |
Rich and Efficient Visual Data Representation |
Larry Davis |
Abolhassani |
Melika |
2016 |
Assignment Problems with Economic Applications |
Mohammad Hajiaghayi |
Robbins |
Bryan |
2016 |
A Binary Classifier for Test Case
Feasibility Applied to Automatically Generated Tests |
|
Adelman |
Ross |
2016 |
Fast and Accurate Boundary Element Methods in Three
Dimensions |
Ramani Duraiswami |
Sahu |
Avinash |
2016 |
Data Driven Approaches to
Identify Determinants of Heart Diseases and
Cancer Resistance |
|
Buntain |
Cody |
2016 |
Discovering Credible Events in Near Real Time from Social Media Streams |
Jennifer Golbeck |
Sawant |
Anshul |
2016 |
Computational Analysis of Intelligent Agents: Social and Strategic Settings |
V.S. Subrahmanian |
Chen |
Jun-Cheng |
2016 |
Robust Representations for Unconstrained Face Verification and Its Applications |
|
Banerjee |
Ishan |
2016 |
Event-Code Interaction Directed Test Cases |
|
Yang |
Fan |
2016 |
Leveraging Multiple Features for Image Retrieval
and Matching |
Larry Davis |
Hara |
Kotaro |
2016 |
Scalable Methods to Collect and Visualize Sidewalk Accessibility Data for People with Mobility Impairments |
|
Bhargava |
Preeti |
2016 |
Towards Proactive Context-Aware
Computing and Systems |
Ashok Agrawala |
Bondugula |
Sravanthi |
2016 |
Efficient Image and Video Representations for Retrieval |
Larry Davis |
Oh |
Uran |
2016 |
Accessible On-Body Interaction for People With Visual Impairments |
|
Chaturvedi |
Snigdha |
2016 |
Structured Approaches to Exploring Inter-Personal Relationships in Natural Language Test |
Hal Daumé III |
He |
He |
2016 |
Sequential Decisions and Predictions in Natural Language Processing |
Hal Daumé III |
Ramesh |
Arti |
2016 |
A Probabilistic Approach to Modeling Socio-Behavioral Interactions |
Lise Getoor |
Adelfio |
Marco |
2015 |
Automated Structural and Spatial
Comprehension of Data Tables |
Hanan Samet |
Hill |
Christopher |
2015 |
Novel Methods for Comparing and
Evaluating Single and Metagenomic Assemblies |
Mihai Pop |
Ahmed |
Ejaz |
2015 |
Understanding Objects in the
Visual World |
Larry Davis |
Khani |
Mohammadreza |
2015 |
Revenue Efficient Mechanisms for
Online Advertising |
Mohammad Hajiaghayi |
Jackson |
Gary |
2015 |
Parallel Computing With P2P Desktop Grids |
Alan Sussman |
Khurana |
Udayan |
2015 |
Historical Graph Data Management |
Amol Deshpande |
Jain |
Rajiv |
2015 |
Searching Heterogeneous Document Image
Collections |
David Jacobs |
London |
Benjamin |
2015 |
On the Stability of Structured Prediction |
Lise Getoor |
Khamis |
Sameh |
2015 |
Leveraging Structure in Activity
Recognition: Context and Spatiotemporal Dynamics |
Larry Davis |
Rekatsinas |
Theodoros |
2015 |
Quality-Aware Data Source Management |
Amol Deshpande |
Lampton |
James |
2015 |
Pig Squeal: Bridging Batch and Streaming
Processing Using
Incremental Updates |
Ashok Agrawala |
Stuckman |
Jeffrey |
2015 |
Continuous, Effort-Aware Prediction of
Software Security Defects |
James Purtilo |
Liaghat |
Vahid |
2015 |
Primal-Dual Techniques for Online
Algorithms and Mechanisms |
Mohammad Hajiaghayi |
Bach |
Stephen |
2015 |
Hinge-Loss Markov Random Fields and
Probabilistic Soft Logic:
A Scalable Approach to Structured
Prediction |
Lise Getoor |
Mardziel |
Piotr |
2015 |
Modeling, Quantifying, and Limiting Adversary
Knowledge |
Michael Hicks |
Chen |
Xi |
2015 |
Context Driven Scene
Understanding |
Larry Davis |
Nandy |
Kaustav |
2015 |
Segmentation and Informatics in
Multi-Dimensional Fluorescence
Optical Microscopy Images |
|
Kang |
Chanhyun |
2015 |
Diffusion, Infection and Social (Information)
Network Database |
V.S. Subrahmanian |
Nguyen |
Viet An |
2015 |
Guided Probabilistic Topic Models for Agenda-Setting
and Framing |
Philip Resnik |