Conference Paper (938)
981.
Conference Paper
Automating the Choice of Consistency Levels in Replicated Systems. In: Proceedings of USENIX ATC ’14, pp. 281 - 292. 2014 USENIX Annual Technical Conference, Philadelphia, PA, June 19, 2014 - June 20, 2014. USENIX (2014)
982.
Conference Paper
Race Detection for Android Applications. In: PLDI '14, pp. 316 - 325. 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, Edinburgh, UK, June 09, 2014 - June 11, 2014. ACM, New York, NY (2014)
983.
Conference Paper
Kuai: A Model Checker for Software-defined Networks. In: Formal Methods in Computer-Aided Design, FMCAD 2014, Lausanne, Switzerland, October 21-24, 2014, pp. 163 - 170. 2014 Formal Methods in Computer-Aided Desig, Lausanne, Switzerland, October 21, 2014 - October 24, 2014. IEEE, Piscataway, NJ (2014)
984.
Conference Paper
Quantifying Information Overload in Social Media and its Impact on Social Contagions. In: ICSWM '14, pp. 170 - 179. 8th International AAAI Conference on Weblogs and Social Media, Ann Arbor, MI, USA, June 01, 2014 - June 04, 2014. AAAI Press, Palo Alto, CA (2014)
985.
Conference Paper
Beyond Access Control: Managing Online Privacy via Exposure. In: Workshop on Usable Security, pp. 1 - 6. Workshop on Usable Security, San Diego, CA, USA, February 23, 2014. Internet Society, Reston, VA (2014)
986.
Conference Paper
Understanding and Specifying Social Access Control Lists. In: Tenth Symposium on Usable Privacy and Security, pp. 271 - 283. Tenth Symposium on Usable Privacy and Security, Menlo Park, CA, USA, July 09, 2014 - July 11, 2014. USENIX, Berkeley, CA (2014)
987.
Conference Paper
Privacy-preserving Audit for Broker-based Health Information Exchange. In: CODASPY'14, pp. 313 - 320. 4th ACM Conference on Data and Application Security and Privacy, San Antonio, TX, USA, March 03, 2014 - March 05, 2014. ACM, New York, NY (2014)
988.
Conference Paper
Private-by-design Advertising Meets the Real World. In: CCS'14, pp. 116 - 128. 21st ACM Conference on Computer and Communications Security, Scottsdale, AR, USA, November 03, 2014 - November 07, 2014. ACM, New York, NY (2014)
989.
Conference Paper
Fast on Average, Predictable in the Worst Case: Exploring Real-time Futexes in LITMUS RT. In: IEEE 35th Real-Time Systems Symposium, pp. 96 - 105. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
990.
Conference Paper
GPS: Navigating Weak Memory with Ghosts, Protocols, and Separation. In: OOPSLA'14, pp. 691 - 707. ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, Portland, OR, USA, October 20, 2014 - October 24, 2014. ACM, New York, NY (2014)
991.
Conference Paper
Modeling Diffusion of Competing Products and Conventions in Social Media. In: NIPS Workshop in Networks: From Graphics to Rich Data. 2014 NIPS Workshop in Networks, Montreal, Canada, December 13, 2014. (accepted)
992.
Conference Paper
Towards Detecting Anomalous User Behavior in Online Social Networks. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., pp. 223 - 238. 23rd USENIX Security Symposium, San Diego, CA, USA, August 20, 2014 - August 22, 2014. USENEX, Berkeley, CA (2014)
993.
Conference Paper
On the Complexity of Worst-case Blocking Analysis of Nested Critical Section. In: IEEE 35th Real-Time Systems Symposium, pp. 106 - 117. IEEE 35th Real-Time Systems Symposium, Rome, Italy, December 02, 2014 - December 05, 2014. IEEE Computer Society, Los Alamitos, CA (2014)
994.
Conference Paper
Towards a Better-behaved Unification Algorithm for Coq. In: The 28th International Workshop on Unification, pp. 74 - 87 (Eds. Kutsia, T.; Ringeissen, C.). 28th International Workshop on Unification, Vienna, Austria, July 13, 2014. Johannes Kepler University, Linz (2014)
995.
Conference Paper
Towards a Better-behaved Unification Algorithm for Coq. In: The 6th Coq Workshop, pp. 1 - 2. The 6th Coq Workshop, Vienna, Austria, July 18, 2014. (2014)
996.
Conference Paper
Scheduling Parallel Programs by Work Stealing with Private Deques. In: PPoPP'13, pp. 219 - 228. ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, Shenzhen, China, February 23, 2013 - February 27, 2013. ACM, New York, NY (2013)
997.
Conference Paper
SoK: The Evolution of Sybil Defense via Social Networks. In: 2013 IEEE Symposium on Security and Privacy, pp. 382 - 396. IEEE Symposium on Security and Privacy, Berkeley, CA, USA, May 19, 2013 - May 22, 2013. IEEE, Los Alamitos, CA (2013)
998.
Conference Paper
Traditional Media Seen from Social Media. In: WebSci '13, pp. 11 - 14. 5th Annual ACM Web Science Conference, Paris, France, May 02, 2013 - May 04, 2013. ACM, New York, NY (2013)
999.
Conference Paper
Characterizing and Curating Conversation Threads: Expansion, Focus, Volume, Re-entry. In: Proceedings of the 6th ACM International Conference on Web Search and Data Mining, pp. 13 - 22. 6th ACM International Conference on Web Search and Data Mining, Rome, Italy, February 04, 2013 - February 08, 2013. ACM, New York, NY (2013)
1000.
Conference Paper
Multiprocessor Feasibility Analysis of Recurrent Task Systems with Specified Processor Affinities. In: Proceedings IEEE 34th Real-Time Systems Symposium, pp. 160 - 169. 34th Real-Time Systems Symposium, Vancouver, Canada, December 03, 2013 - December 06, 2013. IEEE, Piscataway, NJ (2013)