Using automated model analysis for reasoning about security of web protocolsApurva Kumar2012ACSAC 2012
Scalable and fully self-aligned n-type carbon nanotube transistors with gate-all-aroundAaron D. FranklinSiyuranga O. Koswattaet al.2012IEDM 2012
Designing a programmable wire-speed regular-expression matching acceleratorJan Van LunterenChristoph Hagleitneret al.2012MICRO 2012
Systematic energy characterization of CMP/SMT processor systems via automated micro-benchmarksRamon BertranAlper Buyuktosunogluet al.2012MICRO 2012
Statistical measurement of random telegraph noise and its impact in scaled-down high-κ/metal-gate MOSFETsH. MikiN. Tegaet al.2012IEDM 2012
Corpus-based interpretation of instructions in virtual environmentsLuciana BenottiMartín Villalbaet al.2012ACL 2012
Composition of flow-based applications with HTN planningShirin SohrabiOctavian Udreaet al.2012AAAI 2012
High mobility high-κ-all-around asymmetrically-strained Germanium nanowire trigate p-MOSFETsWinston ChernPouya Hashemiet al.2012IEDM 2012
Deanonymizing mobility traces: Using social networks as a side-channelMudhakar SrivatsaMike Hicks2012CCS 2012
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12)Mihai Christodorescu2012CCS 2012