A new benchmark harness for systematic and robust evaluation of streaming state stores | 0 | 0.34 | 2022 |
Neuroflight: Next Generation Flight Control Firmware. | 0 | 0.34 | 2019 |
Conclave: secure multi-party computation on big data | 4 | 0.40 | 2019 |
Conclave: Secure Multi-Party Computation On Big Data | 5 | 0.41 | 2019 |
Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities. | 0 | 0.34 | 2018 |
S3B: Software-Defined Secure Server Bindings | 0 | 0.34 | 2018 |
Reinforcement Learning for UAV Attitude Control. | 8 | 0.63 | 2018 |
ppXen: A hypervisor CPU scheduler for mitigating performance variability in virtualized clouds. | 1 | 0.35 | 2018 |
A case study of a shared/buy-in computing ecosystem. | 0 | 0.34 | 2018 |
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications. | 0 | 0.34 | 2017 |
AngelCast: Cloud-based peer-assisted live streaming using optimized multi-tree construction. | 2 | 0.39 | 2017 |
Multi-Capacity Bin Packing with Dependent Items and its Application to the Packing of Brokered Workloads in Virtualized Environments. | 2 | 0.41 | 2017 |
User-centric distributed solutions for privacy-preserving analytics. | 5 | 0.41 | 2017 |
Guideme: Routes Coordination Of Participating Agents In Mobile Crowd Sensing Platforms | 0 | 0.34 | 2017 |
Team Formation for Scheduling Educational Material in Massive Online Classes. | 1 | 0.35 | 2017 |
Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization | 1 | 0.35 | 2017 |
Markov Modeling of Moving Target Defense Games. | 15 | 0.75 | 2016 |
Secure MPC for Analytics as a Web Application | 2 | 0.44 | 2016 |
DEMO: Integrating MPC in Big Data Workflows. | 2 | 0.37 | 2016 |
Using Alloy to Formally Model and Reason About an OpenFlow Network Switch. | 0 | 0.34 | 2016 |
PROVIDE: Hiding from Automated Network Scans with Proofs of Identity | 0 | 0.34 | 2016 |
End-To-End Informed Vm Selection In Compute Clouds | 0 | 0.34 | 2015 |
Policies for Assisted Virtual Machine Selection in Cloud Computing Environments | 0 | 0.34 | 2015 |
Rational coordination of crowdsourced resources for geo-temporal request satisfaction | 0 | 0.34 | 2015 |
Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure | 3 | 0.40 | 2015 |
A Verification Platform for SDN-Enabled Applications | 12 | 0.59 | 2014 |
A Divide-and-Conquer Algorithm for Betweenness Centrality. | 5 | 0.44 | 2014 |
Towards accessible integration and deployment of formal tools and techniques | 1 | 0.38 | 2013 |
Preface to special issue: lightweight and practical formal methods in the design and analysis of safety-critical systems. | 0 | 0.34 | 2013 |
Repetition-aware content placement in navigational networks | 0 | 0.34 | 2013 |
Verifiably-safe software-defined networks for CPS | 16 | 0.89 | 2013 |
The filter-placement problem and its application to minimizing information multiplicity | 5 | 0.56 | 2012 |
The Filter-Placement Problem and its Application to Minimizing Information Multiplicity. | 0 | 0.34 | 2012 |
AngelCast: cloud-based peer-assisted live streaming using optimized multi-tree construction | 9 | 0.56 | 2012 |
Message from the Program Chairs. | 0 | 0.34 | 2012 |
A Framework for the Evaluation and Management of Network Centrality. | 21 | 0.82 | 2012 |
Peer-assisted content distribution on a budget | 10 | 0.64 | 2012 |
A Domain-Specific Language for | 0 | 0.34 | 2011 |
Formal Verification of SLA Transformations | 1 | 0.36 | 2011 |
Dynamic cross domain information sharing: a concept paper on flexible adaptive policy management | 0 | 0.34 | 2010 |
Trade & Cap: A Customer-Managed, Market-Based System for Trading Bandwidth Allowances at a Shared Link. | 0 | 0.34 | 2010 |
Trade & Cap: a customer-managed, market-based system for trading bandwidth allowances at a shared link | 3 | 0.83 | 2010 |
Safe compositional network sketches: formal framework | 7 | 0.58 | 2010 |
Wireless Algorithms, Systems, and Applications, 4th International Conference, WASA 2009, Boston, MA, USA, August 16-18, 2009. Proceedings | 54 | 3.38 | 2009 |
CSR: Constrained Selfish Routing in Ad-Hoc Networks | 1 | 0.36 | 2009 |
A formal type-centric framework for verification and resource allocation in pervasive Sense-and-Respond systems | 0 | 0.34 | 2009 |
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks | 1 | 0.37 | 2009 |
Wireless and physical security via embedded sensor networks | 1 | 0.38 | 2008 |
EGOIST: overlay routing using selfish neighbor selection | 5 | 0.44 | 2008 |
Swarming on Optimized Graphs for n-Way Broadcast. | 6 | 0.51 | 2008 |