Publications

Export 1425 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
2008
Consolvo S, McDonald DW, Toscos T, Chen MY, Froehlich J, Harrison B, Klasnja P, LaMarca A, LeGrand L, Libby R et al..  2008.  Activity sensing in the wild: a field trial of ubifit garden. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1797-1806.
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Hochstein L, Basili VR.  2008.  The ASC-Alliance Projects: A Case Study of Large-Scale Parallel Scientific Code Development. Computer. 41(3):50-58.
Huq A, Whitehouse CA, Grim CJ, Alam M, Colwell RR.  2008.  Biofilms in water, its role and impact in human disease transmission. Current Opinion in Biotechnology. 19(3):244-247.
Hill JH, Schmidt DC, Porter A, Slaby JM.  2008.  CiCUTS: Combining System Execution Modeling Tools with Continuous Integration Environments. Engineering of Computer-Based Systems, IEEE International Conference on the. :66-75.
Berthier R, Korman D, Cukier M, Hiltunen M, Vesonder G, Sheleheda D.  2008.  On the Comparison of Network Attack Datasets: An Empirical Analysis. :39-48.
Essien K, Hannenhalli S, Stoeckert CJ.  2008.  Computational Analysis of Constraints on Noncoding Regions, Coding Regions and Gene Expression in Relation to Plasmodium Phenotypic Diversity. PLoS ONEPLoS ONE. 3(9):e3122-e3122.
Mohammad S, Dorr BJ, Hirst G.  2008.  Computing word-pair antonymy. Proceedings of the Conference on Empirical Methods in Natural Language Processing. :982-991.
Neamtiu I, Hicks MW, Foster JS, Pratikakis P.  2008.  Contextual effects for version-consistent dynamic software updating and safe concurrent programming. Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :37-49.
Zo Y-G, Chokesajjawatee N, Arakawa E, Watanabe H, Huq A, Colwell RR.  2008.  Covariability of Vibrio Cholerae Microdiversity and Environmental Parameters. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 74(9):2915-2920.
Elaine Shi, Waters B.  2008.  Delegating Capabilities in Predicate Encryption Systems. Automata, Languages and Programming. 5126:560-578.
Khoo YP, Hicks MW, Foster JS, Sazawal V.  2008.  Directing javascript with arrows (functional pearl). Technical Reports of the Computer Science Department.
Ming R, Hou S, Feng Y, Yu Q, Dionne-Laporte A, Saw JH, Senin P, Wang W, Ly BV, Lewis KLT et al..  2008.  The draft genome of the transgenic tropical fruit tree papaya (Carica papaya Linnaeus). Nature. 452(7190):991-996.
Sewell P, Stoyle G, Hicks MW, Bierman G, Wansbrough K.  2008.  Dynamic Rebinding for Marshalling and Update, Via Redex-Time and Destruct-Time Reduction. Journal of Functional Programming. 18(04):437-502.
Ramachandran A, Hao S, Khandelwal H, Feamster N, Vempala S.  2008.  A Dynamic Reputation Service for Spotting Spammers. GT-CS-08-09
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
Heitzmann A, Palazzi B, Papamanthou C, Tamassia R.  2008.  Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
Hochstein L, Nakamura T, Shull F, Zazworka N, Basili VR, Zelkowitz MV.  2008.  An Environment for Conducting Families of Software Engineering Experiments. Software Development. Volume 74:175-200.
Hannenhalli S.  2008.  Eukaryotic Transcription Factor Binding Sites—modeling and Integrative Search Methods. BioinformaticsBioinformatics. 24(11):1325-1331.
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
Chrun D, Cukier M, Sneeringer G.  2008.  Finding Corrupted Computers Using Imperfect Intrusion Prevention System Event Data. Computer Safety, Reliability, and Security. 5219:221-234.
Deshpande A, Hellerstein L.  2008.  Flow Algorithms for Parallel Query Optimization. IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008. :754-763.
Pratikakis P, Foster JS, Hicks MW, Neamtiu I.  2008.  Formalizing Soundness of Contextual Effects. Theorem Proving in Higher Order LogicsTheorem Proving in Higher Order Logics. 5170:262-277.
Mendonca MG, Maldonado JC, de Oliveira MCF, Carver J, Fabbri CPF, Shull F, Travassos GH, Hohn EN, Basili VR.  2008.  A Framework for Software Engineering Experimental Replications. Engineering of Complex Computer Systems, 2008. ICECCS 2008. 13th IEEE International Conference on. :203-212.
Singh LN, Hannenhalli S.  2008.  Functional Diversification of Paralogous Transcription Factors via Divergence in DNA Binding Site Motif and in Expression. PLoS ONEPLoS ONE. 3(6):e2345-e2345.

Pages