17 papers:
PLDI-2015-MarrSD #metaprogramming #performance #protocol- Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
SIGIR-2015-Hoenkamp #interactive #interface #quality- About the “Compromised Information Need” and Optimal Interaction as Quality Measure for Search Interfaces (ECH), pp. 835–838.
SOSP-2015-DragojevicNNRSB #consistency #distributed #performance #transaction- No compromises: distributed transactions with consistency, availability, and performance (AD, DN, EBN, MR, AS, AB, MC), pp. 54–70.
DAC-2014-AncajasCR #named- Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
SAC-2014-ZangerleS #classification #quote #twitter- “Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
SAC-2013-NunesP #scheduling #throughput #transaction- Improving transaction abort rates without compromising throughput through judicious scheduling (AN, JP), pp. 493–494.
SIGMOD-2012-HuXCY #authentication #privacy- Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
SAC-2012-WangYLQG- Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
CSL-2010-BasinC #protocol #security- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
CSCW-2008-IgnatPON #collaboration #multi #privacy- Providing awareness in multi-synchronous collaboration without compromising privacy (CLI, SP, GO, MCN), pp. 659–668.
DAC-2006-HuaMSSMJD #3d- Exploring compromises among timing, power and temperature in three-dimensional integrated circuits (HH, CM, KS, AMS, SM, RJ, WRD), pp. 997–1002.
VLDB-2006-MokbelCA #privacy #query- The New Casper: Query Processing for Location Services without Compromising Privacy (MFM, CYC, WGA), pp. 763–774.
ICML-2005-CrandallG #game studies #learning- Learning to compete, compromise, and cooperate in repeated general-sum games (JWC, MAG), pp. 161–168.
SPLC-2005-ZhangJ #experience #industrial #mobile #performance #product line #reuse- Reuse without Compromising Performance: Industrial Experience from RPG Software Product Line for Mobile Devices (WZ, SJ), pp. 57–69.
OOPSLA-2001-CzajkowskiD #evolution #multi #virtual machine- Multitasking without Compromise: A Virtual Machine Evolution (GC, LD), pp. 125–138.
OSDI-2000-StrunkGSSG #self- Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
VLDB-1982-Leiss #database #statistics- Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.