Conference Paper (937)
1141.
Conference Paper
Accountable virtual machines. In: Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’10), pp. 1 - 16. 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2010), Vancouver, Canada, October 04, 2010 - October 06, 2010. USENIX Association, Berkeley, CA (2010)
1142.
Conference Paper
On power and fault-tolerance optimization in FPGA physical synthesis. In: 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), pp. 224 - 229. 2010 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Jose, CA, November 07, 2010 - November 11, 2010. IEEE, Piscataway, NJ (2010)
1143.
Conference Paper
Constant-size commitments to polynomials and their applications. In: Advances in Cryptology - ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, pp. 177 - 194 (Ed. Abe, M.). 16th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2010), Singapore, December 05, 2010 - December 09, 2010. Springer, Berlin (2010)
1144.
Conference Paper
Approximation and randomization for quantitative information-flow analysis. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 3 - 14. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)
1145.
Conference Paper
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: 23rd IEEE Computer Security Foundations Symposium: CSF 2010, pp. 44 - 56. 23rd IEEE Computer Security Foundations Symposium (CSF 2010), Edinburgh, July 17, 2010 - July 19, 2010. IEEE, Piscataway, NJ (2010)
1146.
Conference Paper
Systematic testing for control applications. In: 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), pp. 1 - 10. 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE), Grenoble, July 26, 2010 - July 28, 2010. IEEE, Piscataway, NJ (2010)
1147.
Conference Paper
You are who you know: inferring user profiles in online social networks. In: Proceedings of the Third ACM International Conference on Web Search & Data Mining (WSDM), pp. 251 - 260. Third ACM International Conference on Web Search & Data Mining (WSDM 2010), New York, NY, February 03, 2010 - February 06, 2010. ACM, New York, NY (2010)
1148.
Conference Paper
F-ing modules. In: TLDI’10: proceedings of the 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation, pp. 89 - 102. 2010 ACM SIGPLAN Workshop on Types in Language Design and Implementation (TLDI 2010), Madrid, January 23, 2010. ACM, New York, NY (2010)
1149.
Conference Paper
An analysis of social network-based Sybil defenses. In: SIGCOMM’10: proceedings of the SIGCOMM 2010 Conference, pp. 363 - 374. SIGCOMM 2010 Conference, New Delhi, August 30, 2010 - September 03, 2010. ACM, New York, NY (2010)
1150.
Conference Paper
Conductor: orchestrating the clouds. In: Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS 2010), pp. 44 - 48. 4th International Workshop on Large Scale Distributed Systems and Middleware (LADIS 2010), Zürich, July 28, 2010 - July 29, 2010. ACM, New York, NY (2010)
1151.
Conference Paper
Brief announcement: Modelling MapReduce for optimal execution in the cloud. In: PODC’10: proceedings of the 2010 ACM Symposium on Principles of Distributed Computing, pp. 408 - 409. 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC 2010), Zürich, July 25, 2010 - July 28, 2010. ACM, New York, NY (2010)
1152.
Conference Paper
State-dependent representation independence. In: POPL’09 Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 340 - 353. 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Savannah, Georgia, January 21, 2009 - January 23, 2009. ACM, New York, NY (2009)
1153.
Conference Paper
Preserving digital data in heterogeneous environments. In: JCDL’09: proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries, pp. 345 - 348. 2009 ACM/IEEE Joint Conference on Digital Libraries (JCDL'09), Austin, Texas, June 15, 2009 - June 19, 2009. ACM, New York, NY (2009)
1154.
Conference Paper
Tempest in a teapot: compromising reflections revisited. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 315 - 327. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1155.
Conference Paper
CSAR: A Practical and Probable Technique to Make Randomized Systems Accountable. In: 2009 Network and Distributed System Security Symposium, pp. 341 - 353. 16th Annual Network and Distributed System Security Symposium, San Diego, CA, USA, February 08, 2009 - February 11, 2009. Internet Society, Reston, VA (2009)
1156.
Conference Paper
Achieving security despite compromise using zero-knowledge. In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium: CSF 2009, pp. 308 - 323. 22nd IEEE Computer Security Foundations Symposium, Port Jefferson, NY, July 08, 2009 - July 10, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1157.
Conference Paper
Anonymity and censorship resistance in unstructured overlay networks. In: On the Move to Meaningful Internet Systems: OTM 2009: proceedings. - Part I, pp. 147 - 164 (Eds. Meersman, R.; Dillon, T.; Herrero, P.). Confederated International Conferences CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, November 01, 2009 - November 06, 2009. Springer, Berlin (2009)
1158.
Conference Paper
CoSP: a general framework for computational soundness proofs. In: CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 66 - 78. 16th ACM Conference on Computer and Communications Security, Chicago, Ill., November 09, 2009 - November 13, 2009. ACM, New York, NY (2009)
1159.
Conference Paper
Automatic discovery and quantification of information leaks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 141 - 153. 30th IEEE Symposium on Security and Privacy, Berkeley, CA, May 17, 2009 - May 20, 2009. IEEE Computer Society, Los Alamitos, CA (2009)
1160.
Conference Paper
Characterizing user behavior in online social networks. In: IMC’09 Proceedings of the 2009 ACM SIGCOMM Internet Measurement Conference, pp. 49 - 62. 2009 ACM SIGCOMM Internet Measurement Conference, Chicago, Ill., November 04, 2009 - November 06, 2009. ACM, New York, NY (2009)