Please use this identifier to cite or link to this community:


The technical reports collections in this community are deposited by the Library of the Computer Science department. If you have questions about these collections, please contact library staff at

Sub-communities within this community

Recent Submissions

  • Cybersecurity - What's Language got to do with it? 

    Klavans, Judith L. (2015-09-18)
    A new opportunity to explore and leverage the power of computational linguistic methods and analysis in ensuring effective Cybersecurity is presented. This White Paper discusses some of the specific emerging research ...
  • Democratizing Facial Recognition with Google Glass 

    Krach, Jeremy (2015-09-14)
    Lightweight and camera-equipped wearable devices such as Android-backed Google Glass— with their potential for wide-spread and mobile data capture—have piqued the imagination of technologists and privacy advocates alike. ...
  • Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution 

    Micinski, Kristopher; Fetter-Degges, Jonathan; Jeon, Jinseong; Foster, Jeffrey S.; Clarkson, Michael R. (2015-07-01)
    Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce ...
  • Accurate computation of Galerkin double surface integrals in the 3-D boundary element method 

    Adelman, Ross; Gumerov, Nail A.; Duraiswami, Ramani (2015-05-29)
    Many boundary element integral equation kernels are based on the Green’s functions of the Laplace and Helmholtz equations in three dimensions. These include, for example, the Laplace, Helmholtz, elasticity, Stokes, and ...
  • Automating Efficient RAM-Model Secure Computation 

    Liu, Chang; Huang, Yan; Shi, Elaine; Katz, Jonathan; Hicks, Michael (2014-03-13)
    RAM-model secure computation addresses the inherent limitations of circuit-model secure computation considered in almost all previous work. Here, we describe the first automated approach for RAM-model secure computation ...

View more