Export 4367 results:
Sort by:
Wang, Y., I. R. Chen, and J. H. Cho, "Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks", IEEE 12th International Symposium on Autonomous Decentralized Systems, Taichung, Taiwan, 3/2015.
Wei, S., and B. G. Ryder, "Adaptive Context-sensitive Analysis for JavaScript", European Conference on Object-oriented Programming (ECOOP), Prague, Czech Republic, 2015.
Tran, H., X. Wu, and L. Zhang, "A Bayesian Method for Assigning Ambiguous Bisulfite Short Reads", The 7th International Conference on Bioinformatics and Computational Biology (BICoB-2015), Hawaii, 2015.
Luther, K., N. Hahn, S. P. Dow, and A. Kittur, "Crowdlines: Supporting Synthesis of Diverse Information Sources through Crowdsourced Outlines", AAAI Conference on Human Computation and Crowdsourcing (HCOMP 2015), San Diego, CA, USA, 2015.
Sudalagunta, P. R., C. Sultan, R. K. Kapania, L. T. Watson, and P. Raj, "A novel scheme to accurately compute higher vibration modes using the Ritz method and a two-point BVP solver", 56th AIAA/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conf., SciTech 2015, Kissimmee, FL, AIAA, 2015.
Luther, K., A. Kavanaugh, and M. Horning, "Supporting Local News Sharing with Mobile Crowdsourcing and Large Display Technologies", CSCW 2015 Workshop on Information Technology in City Life, Vancouver, Canada, 2015.
Boedihardjo, A. P., C. - T. Lu, and F. Chen, "Fast Adaptive Kernel Density Estimator for Data Streams", Knowledge and Information Systems, vol. 42, issue 2, no. 2, pp. 285 - 317, 2/2015.
Shu, X., D. D. Yao, and B. Ryder, "A Formal Framework for Program Anomaly Detection", 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, 11/2015.
Chen, I. R., R. Mitchell, and J. H. Cho, "On Modeling of Adversary Behavior and Defense for Survivability of Military MANET Applications", 34th IEEE International Conference for Military Communications (MILCOM 2015), Tampa, USA, 10/2015.
Shu, X., D. D. Yao, and N. Ramakrishnan, "Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths", 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, Colorado, ACM, 10/2015.
Xu, K., K. Tian, D. D. Yao, and B. Ryder, "Probabilistic Program Modeling for High-Precision Anomaly Classification", 2015 IEEE Computer Security Foundations Symposium (CSF), Verona, Italy, IEEE, 07/2015.
Guo, J., and I. R. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems", 12th IEEE International Conference on Services Computing, New York, 06/2015.
Hanrahan, B., and M. A. Pérez-Quiñones, "Lost in Email: Pulling Users Down a Path of Interaction", Proceedings of the SIGCHI conference on Human factors in computing systems, 05/2015.
Dou, Y., C. Zeng, Y. Yang, and D. D. Yao, "MadeCR: Correlation-based Malware Detection for Cognitive Radio", IEEE Conference on Computer Communications (INFOCOM), Hong Kong, IEEE, 04/2015.
Liu, F., X. Shu, D. D. Yao, and A. Butt, "Privacy-Preserving Scanning of Big Content for Sensitive Data Exposure with MapReduce", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2015.
Xie, Z., and E. A. Fox, "Archiving Transactions Toward Uninterruptible Web Service", International Internet Preservation Consortium (IIPC) 2015 General Assembly (GA2015), Stanford, CA, 2015.