17 papers:
- PLDI-2015-MarrSD #metaprogramming #performance #protocol
- Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
- SIGIR-2015-Hoenkamp #interactive #interface #quality
- About the “Compromised Information Need” and Optimal Interaction as Quality Measure for Search Interfaces (ECH), pp. 835–838.
- SOSP-2015-DragojevicNNRSB #consistency #distributed #performance #transaction
- No compromises: distributed transactions with consistency, availability, and performance (AD, DN, EBN, MR, AS, AB, MC), pp. 54–70.
- DAC-2014-AncajasCR #named
- Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
- SAC-2014-ZangerleS #classification #quote #twitter
- “Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
- SAC-2013-NunesP #scheduling #throughput #transaction
- Improving transaction abort rates without compromising throughput through judicious scheduling (AN, JP), pp. 493–494.
- SIGMOD-2012-HuXCY #authentication #privacy
- Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
- SAC-2012-WangYLQG
- Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
- CSL-2010-BasinC #protocol #security
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
- CSCW-2008-IgnatPON #collaboration #multi #privacy
- Providing awareness in multi-synchronous collaboration without compromising privacy (CLI, SP, GO, MCN), pp. 659–668.
- DAC-2006-HuaMSSMJD #3d
- Exploring compromises among timing, power and temperature in three-dimensional integrated circuits (HH, CM, KS, AMS, SM, RJ, WRD), pp. 997–1002.
- VLDB-2006-MokbelCA #privacy #query
- The New Casper: Query Processing for Location Services without Compromising Privacy (MFM, CYC, WGA), pp. 763–774.
- ICML-2005-CrandallG #game studies #learning
- Learning to compete, compromise, and cooperate in repeated general-sum games (JWC, MAG), pp. 161–168.
- SPLC-2005-ZhangJ #experience #industrial #mobile #performance #product line #reuse
- Reuse without Compromising Performance: Industrial Experience from RPG Software Product Line for Mobile Devices (WZ, SJ), pp. 57–69.
- OOPSLA-2001-CzajkowskiD #evolution #multi #virtual machine
- Multitasking without Compromise: A Virtual Machine Evolution (GC, LD), pp. 125–138.
- OSDI-2000-StrunkGSSG #self
- Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
- VLDB-1982-Leiss #database #statistics
- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.