Publications
Export 7148 results:
[ Author] Title Type Year Filters: Conversion-viable-nonculturable-vibrio-cholerae-culturable-state-co%E2%80%90culture-eukaryotic is [Clear All Filters]
2009. No Downtime for Data Conversions: Rethinking Hot Upgrades (CMU-PDL-09-106). Parallel Data Laboratory.
2009. Why Do Upgrades Fail and What Can We Do About It?: Toward Dependable, Online Upgrades in Enterprise System Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :18:1-18:20.
2006. Eye of the Beholder: Phone-Based Text-Recognition for the Visually-Impaired. 2006 10th IEEE International Symposium on Wearable Computers. :145-146.
2012. The Provenance of WINE. Dependable Computing Conference (EDCC), 2012 Ninth European. :126-131.
2003. Towards On-chip Fault-tolerant Communication. ASP-DAC '03 Proceedings of the 2003 Asia and South Pacific Design Automation Conference. :225-232.
2008. 1st ACM workshop on hot topics in software upgrades (HotSWUp 2008). OOPSLA Companion'08 Companion to the 23rd ACM SIGPLAN Conference on Object-Oriented Programming Systems Languages and Applications. :837-838.
2004. Enabling On-chip Diversity Through Architectural Communication Design. ASP-DAC '04 Proceedings of the 2004 Asia and South Pacific Design Automation Conference. :799-805.
2012. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
2009. Toward Upgrades-as-a-service in Distributed Systems. Middleware'09 Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. :29:1-29:2.
2007. Ecotopia: An Ecological Framework for Change Management in Distributed Systems. Architecting Dependable Systems IV. :262-286.
2005. Architecting and Implementing Versatile Dependability. Architecting Dependable Systems III. :212-231.
2007. Got Predictability?: Experiences with Fault-tolerant Middleware MC'07 Proceedings of the 2007 ACM/IFIP/USENIX International Conference on Middleware Companion. :20:1-20:22.
2011. Toward a Standard Benchmark for Computer Security Research: The Worldwide Intelligence Network Environment (WINE). BADGERS '11 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. :89-96.
2002. Web question answering: is more always better? Proceedings of the 25th annual international ACM SIGIR conference on Research and development in information retrieval. :291-298.
2011. Network Clustering Approximation Algorithm Using One Pass Black Box Sampling. arXiv:1110.3563.
2009. Improving recommendation accuracy by clustering social networks with trust. Recommender Systems & the Social Web. :1-8.
2009. Rigorous Probabilistic Trust-Inference with Applications to Clustering. IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. 1:655-658.
2011. Predicting Trust and Distrust in Social Networks. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :418-424.
1997. The vegetation canopy lidar mission. Proceedings of Land Satellite Information in the Next Decade, II: Sources and Applications. Bethesda (MD): American Society of Photogrammetry and Remote Sensing. :100-112.
2008. Validation of a DNS code for wall-bounded turbulence including finite-rate reactions and surface catalysis. AIAA Paper 2008. 645