Microsoft at ASPLOS 2024: Advancing hardware and software for high-scale, secure, and efficient modern applications
Publication Rate-distortion optimized streaming from the edge of the network Jacob Chakareski, Philip A. Chou IEEE/ACM Transactions on Networking | December 2006, Vol 14(6)
Publication Merging Head and Tail Duplication for Convergent Hyperblock Formation Bertrand A. Maher, Aaron Smith, Doug Burger, Kathryn S McKinley International Symposium on Microarchitecture (MICRO) | December 2006
Publication BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML John Dunagan, Helen Wang MSR-TR-2006-41 | December 2006
Publication Reflections on Challenges and Promises of Mixed-Initiative Interaction Eric Horvitz MSR-TR-2006-187 | December 2006
Publication Strongly-Bounded Sparse Decompositions of Minor Free Graphs Ittai Abraham, Cyril Gavoille, Dahlia Malkhi, Udi Wieder MSR-TR-2006-192 | December 2006
Publication Devices That Tell On You: The Nike+iPod Sport Kit Scott Saponas, Jonathan Lester, Carl Hartung, Tadayoshi Kohno UW-CSE-06-12-06 | November 2006
Publication TeenyLIME: Transiently Shared Tuple Space Middleware for Wireless Sensor Networks Paolo Costa, Luca Mottola, Amy L. Murphy, Gian Pietro Picco The 1st International Workshop on Middleware for Wireless Sensor Networks (MidSens 2006), co-located with ACM Middleware’06, Melbourne, Australia. | November 2006
Publication Throughput Guaranteed Restorable Routing Without Traffic Prediction K. Kodialam, T. V. Lakshman, Sudipta Sengupta 14th IEEE International Conference on Network Protocols (ICNP 2006), Santa Barbara (USA) | November 2006 ISBN: 1-4244-0593-9
Publication Protocol Design Beyond Graph-Based Models Thomas Moscibroda, Roger Wattenhofer, Yves Weber HotNets 2006: 5th Workshop on Hot Topics in Networks, Irvine, California, USA | November 2006
Publication Attribute-based encryption for fine-grained access control of encrypted data Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters CCS ’06 Proceedings of the 13th ACM conference on Computer and communications security | November 2006