Filter
Chapter

Search results

  • 2024

    Evaluating gradient inversion attacks and defenses

    Huang, Y., Gupta, S., Song, Z., Arora, S. & Li, K., Jan 1 2024, Federated Learning: Theory and Practice. Elsevier, p. 105-122 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Transient Convolutional Imaging

    Heide, F., Jan 1 2024, Computational Imaging for Scene Understanding: Transient, Spectral, and Polarimetric Analysis. wiley, p. 29-44 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2022

    Ten simple rules for responsible big data research

    Zook, M., Barocas, S., Boyd, D., Crawford, K., Keller, E., Gangadharan, S. P., Goodman, A., Hollander, R., Koenig, B. A., Metcalf, J., Narayanan, A., Nelson, A. & Pasquale, F., May 27 2022, Machine Learning and the City: Applications in Architecture and Urban Design. Wiley-Blackwell, p. 523-534 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2021

    The Birth of Computer Science at Princeton in the 1930s

    Appel, A. W., Jan 1 2021, Alan Turing’s Systems of Logic: the Princeton Thesis. Princeton University Press, p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2018

    Model checking concurrent programs

    Gupta, A., Kahlon, V., Qadeer, S. & Touili, T., May 18 2018, Handbook of Model Checking. Springer International Publishing, p. 573-611 39 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Optimizing N-dimensional, winograd-based convolution for manycore CPUs

    Jia, Z., Zlateski, A., Durand, F. & Li, K., Feb 10 2018, ACM SIGPLAN Notices. 1 ed. Association for Computing Machinery, Vol. 53. p. 109-123 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    12 Scopus citations
  • 2017

    Computer graphics

    Dobkin, D. P. & Teller, S. J., Jan 1 2017, Handbook of Discrete and Computational Geometry, Third Edition. CRC Press, p. 1377-1399 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • The Princeton Web Transparency and Accountability Project

    Narayanan, A. & Reisman, D., 2017, Studies in Big Data. Springer Science and Business Media Deutschland GmbH, p. 45-67 23 p. (Studies in Big Data; vol. 32).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    12 Scopus citations
  • 2014

    Comparative gene expression between two yeast species

    Guan, Y., Dunham, M. J., Troyanskaya, O. G. & Caudy, A. A., Jan 1 2014, Investigations in Yeast Functional Genomics and Molecular Biology. Apple Academic Press, p. 311-338 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Power-efficient computer architectures: Recent advances

    Själander, M., Martonosi, M. R. & Kaxiras, S., Dec 1 2014, Power-Efficient Computer Architectures: Recent Advances. Martonosi, M. & Hill, M. D. (eds.). Morgan and Claypool Publishers, p. 1-96 96 p. (Synthesis Lectures on Computer Architecture; vol. 30).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    14 Scopus citations
  • 2013

    Efficient learning of sparse ranking functions

    Stevens, M., Bengio, S. & Singer, Y., Jan 1 2013, Empirical Inference: Festschrift in Honor of Vladimir N. Vapnik. Springer Berlin Heidelberg, p. 261-271 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2012

    Robust and Scientifically Reliable Rock Art Documentation from Digital Photographs

    Mudge, M., Schroer, C., Noble, T., Matthews, N., Rusinkiewicz, S. & Toler-Franklin, C., Jul 23 2012, A Companion to Rock Art. John Wiley and Sons, p. 644-659 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    33 Scopus citations
  • 2010

    Structural simulation for architecture exploration

    August, D. I., Desmet, V., Girbal, S., Pérez, D. G. & Temam, O., 2010, Processor and System-on-Chip Simulation. Springer US, p. 85-104 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2009

    A Large Margin Algorithm for Forced Alignment

    Keshet, J., Shalev-Shwartz, S., Singer, Y. & Chazan, D., Jan 14 2009, Automatic Speech and Speaker Recognition: Large Margin and Kernel Methods. John Wiley & Sons, Ltd, p. 51-68 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Birdsong Learning

    Fiete, I. R. & Seung, H. S., Jan 1 2009, Encyclopedia of Neuroscience. Elsevier Ltd, p. 227-239 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Scopus citations
  • Computational analysis of the yeast proteome: Understanding and exploiting functional specificity in genomic data

    Huttenhower, C., Myers, C. L., Hibbs, M. A. & Troyanskaya, O. G., 2009, Yeast Functional Genomics and Proteomics: Methods and Protocols. Stagljar, I. (ed.). p. 273-293 21 p. (Methods in Molecular Biology; vol. 548).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • 2008

    Boolean Satisfiability. Creating Solvers Optimized for Specific Problem Instances.

    Zhong, P., Martonosi, M. R. & Malik, S., 2008, Reconfigurable Computing. Elsevier Inc., p. 613-636 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Computer architecture techniques for power-efficiency

    Kaxiras, S. & Martonosi, M. R., Jan 1 2008, Synthesis Lectures on Computer Architecture. p. 1-218 218 p. (Synthesis Lectures on Computer Architecture; vol. 4).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    50 Scopus citations
  • Detecting Botnet membership with DNSBL counterintelligence

    Ramachandran, A., Feamster, N. & Dagon, D., 2008, Botnet Detection: Countering the Largest Security Threat. Springer New York LLC, p. 131-142 12 p. (Advances in Information Security; vol. 36).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations
  • 2005

    Predicting protein secondary and supersecondary structure

    Singh, M., Dec 21 2005, Handbook of Computational Molecular Biology. CRC Press, p. 29.1-29.29

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Scopus citations
  • Unsupervised Machine Learning to Support Functional Characterization of Genes: Emphasis on Cluster Description and Class Discovery

    Troyanskaya, O. G., Jun 15 2005, Data Analysis and Visualization in Genomics and Proteomics. John Wiley & Sons, Ltd, p. 175-192 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Verification languages

    Gupta, A., Bayazit, A. A. & Mahajan, Y., Jan 1 2005, Embedded Systems: Handbook. CRC Press, p. 10-1-10-20

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • 2004

    A comparison of text and shape matching for retrieval of online 3D models

    Min, P., Kazhdan, M. & Funkhouser, T., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Heery, R. & Lyon, L. (eds.). Springer Verlag, p. 209-220 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3232).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    56 Scopus citations
  • A concurrent logical framework: The propositional fragment

    Watkins, K., Cervesato, I., Pfenning, F. & Walker, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer Verlag, p. 355-377 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3085).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    54 Scopus citations
  • Efficient modeling of embedded memories in bounded model checking

    Ganai, M. K., Gupta, A. & Ashar, P., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Alur, R. & Peled, D. A. (eds.). Springer Verlag, p. 440-452 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3114).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    6 Scopus citations
  • Finding dominators in practice

    Georgiadis, L., Werneck, R. F., Tarjan, R. E., Triantafyllis, S. & August, D. I., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Albers, S. & Radzik, T. (eds.). Springer Verlag, p. 677-688 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3221).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    14 Scopus citations
  • Melding priority queues

    Mendelson, R., Tarjan, R. E., Thorup, M. & Zwick, U., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hagerup, T. & Katajainen, J. (eds.). Springer Verlag, p. 223-235 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3111).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Scopus citations
  • Modal proofs as distributed programs

    Jia, I. & Walker, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Schmidt, D. (ed.). Springer Verlag, p. 219-233 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2986).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    29 Scopus citations
  • 2003

    Abstraction and BDDs complement SAT-based BMC in DiVer

    Gupta, A., Ganai, M., Wang, C., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Hunt, W. A. & Somenzi, F. (eds.). Springer Verlag, p. 206-209 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2725).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    19 Scopus citations
  • Approximation schemes for degree-restricted MST and Red-Blue Separation Problem

    Arora, S. & Chang, K. L., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Baeten, J. C. M., Lenstra, J. K., Parrow, J. & Woeginger, G. J. (eds.). Springer Verlag, p. 176-188 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2719).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Scopus citations
  • Attacking an obfuscated cipher by injecting faults

    Jacob, M., Boneh, D. & Felten, E., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Feigenbaum, J. (ed.). Springer Verlag, p. 16-31 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2696).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    53 Scopus citations
  • Efficient distributed SAT and SAT-based distributed bounded model checking

    Ganai, M. K., Gupta, A., Yang, Z. & Ashar, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Geist, D. & Tronci, E. (eds.). Springer Verlag, p. 334-347 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2860).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    9 Scopus citations
  • On the complexity of approximating k-dimensional matching

    Hazan, E., Safra, S. & Schwartz, O., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Asora, S., Sahai, A., Jansen, K. & Rolim, J. D. P. (eds.). Springer Verlag, p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2764).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    40 Scopus citations
  • Proving integrality gaps without knowing the linear program

    Arora, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lingas, A. & Nilsson, B. J. (eds.). Springer Verlag, p. 1 1 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2751).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Scopus citations
  • Thwarting web censorship with untrusted messenger discovery

    Feamster, N., Balazinska, M., Wang, W., Balakrishnan, H. & Karger, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Dingledine, R. (ed.). Springer Verlag, p. 125-140 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2760).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    18 Scopus citations
  • Types and effects for non-interfering program monitors

    Bauer, L., Ligatti, J. & Walker, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H. & Yonezawa, A. (eds.). Springer Verlag, p. 154-171 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2609).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Scopus citations
  • 2000

    Efficient commerce protocols based on one-time pads

    Schneider, M. A. & Felten, E. W., 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 317-326 10 p. 898886

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    2 Scopus citations
  • 1985

    Optimal Convex Decompositions

    Chazelle, B. & Dobkin, D. P., Jan 1 1985, Machine Intelligence and Pattern Recognition. C ed. p. 63-133 71 p. (Machine Intelligence and Pattern Recognition; vol. 2, no. C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    91 Scopus citations
  • 1983

    APPLIED CRYPTOLOGY, CRYPTOGRAPHIC PROTOCOLS, AND COMPUTER SECURITY MODELS.

    DeMillo, R., Davida, G. I., Dobkin, D. P., Harrison, M. A. & Lipton, R. J., 1983, Proceedings of Symposia in Applied Mathematics. American Mathematical Soc, Vol. 29.

    Research output: Chapter in Book/Report/Conference proceedingChapter

    8 Scopus citations