Follow

Submissions from 2013

Link

DAC-MACS: Effective data access control for multiauthority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie

Link

A case for stateful forwarding plane, Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Multi-path routing and stream scheduling with spatial multiplexing and interference cancellation in MIMO networks, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

EAGRE: Towards scalable I/O efficient SPARQL query evaluation on the cloud, Xiaofei Zhang, Lei Chen, Yongxin Tong, and Min Wang

Submissions from 2012

Evaluating security and privacy in cloud computing services: A stakeholder's perspective, Abdullah Abuhussein, Harkeerat Bedi, and Sajjan Shiva

Link

mPuff: Automated detection of cigarette smoking puffs from respiration measurements, Amin Ahsan Ali, Syed Monowar Hossain, Karen Hovsepian, Md Mahbubur Rahman, Kurt Plarre, and Santosh Kumar

Link

mPuff: Automated detection of cigarette smoking puffs from respiration measurements, Amin Ahsan Ali, Syed Monowar Hossain, Karen Hovsepian, Md Mahbubur Rahman, Kurt Plarre, and Santosh Kumar

Link

Effects of time delays in the electric power grid, Hasan Ali and Dipankar Dasgupta

Link

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms, Harkeerat Singh Bedi and Sajjan Shiva

Link

A domain independent framework to extract and aggregate analogous features in online reviews, Archana Bhattarai, Nobal Niraula, Vasile Rus, and King Ip Lin

Link

From barriers to learning in the idea garden: An empirical study, Jill Cao, Irwin Kwan, Rachel White, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi

Link

A genetic-based solution to the task-based sailor assignment problem, Dipankar Dasgupta, Deon Garrett, Fernando Nino, Alex Banceanu, and David Becerra

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

A framework for development of runtime monitors, Ramya Dharam and Sajjan G. Shiva

Link

Runtime monitors for tautology based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva

Link

An artificial immune system for phishing detection, Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, and Dasgupta Dipankar

Link

A cyber-security storm MAP, Denise Ferebee, Dipankar Dasgupta, and Qishi Wu

Message from the steering committee, Raghu Ganti, Ashutosh Sabharwal, John Burruss, Santosh Kumar, Mani Srivastava, Kenneth Watkin, and Liangzhao Zeng

Message from the steering committee, Raghu Ganti, Ashutosh Sabharwal, John Burruss, Santosh Kumar, Mani Srivastava, Kenneth Watkin, and Liangzhao Zeng

Link

Theory and applications of DNA codeword design, Max H. Garzon

Link

A geometric approach to gibbs energy landscapes and optimal DNA codeword design, Max H. Garzon and Kiran C. Bobba

Advances in lifted importance sampling, Vibhav Gogate, Abhay Jha, and Deepak Venugopal

Link

AutoWitness: Locating and tracking stolen property while tolerating GPS and radio outages, Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath Mitra, Bhagavathy Krishna, Prabal Dutta, and Santosh Kumar

Link

AutoWitness: Locating and tracking stolen property while tolerating GPS and radio outages, Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath Mitra, Bhagavathy Krishna, Prabal Dutta, and Santosh Kumar

On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments, Yi Gu, Shwu Ling Shenq, Qishi Wu, and Dipankar Dasgupta

Link

Down the rabbit hole: Robust proximity search and density estimation in sublinear space, Sariel Har-Peled and Nirman Kumar

Link

Epiphany: A location hiding architecture for protecting critical services from DDoS attacks, Vamsi Kambhampati, Christos Papadopolous, and Dan Massey

Link

A detection model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon

Link

A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Muhammad Khan, and Khandakar Islam

Link

Message from NetHealth 2012 workshop chairs, Santosh Kumar and Bill Thies

Link

Message from NetHealth 2012 workshop chairs, Santosh Kumar and Bill Thies

Measuring semantic similarity in short texts through greedy pairing and word semantics, Mihai Lintean and Vasile Rus

Link

Automatic detection of student mental models based on natural language student input during metacognitive skill training, Mihai Lintean, Vasile Rus, and Roger Azevedo

Hybrid question generation approach for critical review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

The virtual apprentice, Weizi Li and Jan M. Allbeck

Link

Virtual humans: Evolving with common sense, Weizi Li and Jan M. Allbeck

Link

Crowd distribution and location preference, Weizi Li, Zichao Di, and Jan M. Allbeck

Link

Advancing the science of mHealth, Wendy Nilsen, Santosh Kumar, Albert Shar, Carrie Varoquiers, Tisha Wiley, William T. Riley, Misha Pavel, and Audie A. Atienza

Link

Advancing the science of mHealth, Wendy Nilsen, Santosh Kumar, Albert Shar, Carrie Varoquiers, Tisha Wiley, William T. Riley, Misha Pavel, and Audie A. Atienza

Link

Behavior of DNS' top talkers, a .com/.net view, Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, and Dan Massey

Link

Facilitating co-adaptation of technology and education through the creation of an open-source repository of interoperable code, Philip I. Pavlik, Jaclyn Maass, Vasile Rus, and Andrew M. Olney

Link

Reactive Information Foraging: An empirical investigation of theory-based recommender systems for programmers, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Christopher Bogart, Margaret Burnett, and Bonnie E. John

A Comparison of Greedy and Optimal Assessment of Natural Language Student Input Using Word-to-Word Similarity Metrics, Vasile Rus and Mihai Lintean

Link

An optimal assessment of natural language student input using word-to-word similarity metrics, Vasile Rus and Mihai Lintean

Automated discovery of speech act categories in educational games, Vasile Rus, Cristian Moldovan, Nobal Niraula, and Arthur C. Graesser

Link

Automated detection of local coherence in short argumentative essays based on centering theory, Vasile Rus and Nobal Niraula

Link

Identifying focal patterns in social networks, Fatih Sen, Rolf T. Wigand, Nitin Agarwal, Debanjan Mahata, and Halil Bisgin

Link

Identifying focal patterns in social networks, Fatih Sen, Rolf T. Wigand, Nitin Agarwal, Debanjan Mahata, and Halil Bisgin

Link

A holistic game inspired defense architecture, Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, and Ramya Dharam

Link

Parametric optimization of a box-type solar cooker with an inbuilt paraboloid reflector using Cramer's rule, D. Venugopal, J. Chandrasekaran, B. Janarthanan, S. Shanmugan, and S. Kumar

Link

Parametric optimization of a box-type solar cooker with an inbuilt paraboloid reflector using Cramer's rule, D. Venugopal, J. Chandrasekaran, B. Janarthanan, S. Shanmugan, and S. Kumar

On lifting the Gibbs sampling algorithm, Deepak Venugopal and Vibhav Gogate

Link

Pattern analysis: A web-based tool for analyzing response patterns in low-replication, many-treatment gene expression data, Nam S. Vo and Vinhthuy Phan

Link

Predicting possible directed-graph patterns of gene expressions in studies involving multiple treatments, Nam S. Vo, Vinhthuy Phan, and Thomas R. Sutter

Link

Relativized Worlds without Worst-Case to Average-Case Reductions for NP, Thomas Watson

Link

Attributed-based access control for multi-authority systems in cloud storage, Kan Yang and Xiaohua Jia

Link

Data storage auditing service in cloud computing: Challenges, methods and opportunities, Kan Yang and Xiaohua Jia

Link

Argus: End-to-end service anomaly detection and localization from an ISP's point of view, He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Dan Massey, and Christos Papadopoulos

Link

Adaptive forwarding in named data networking, Cheng Yi, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Efficient multi-way Theta-join processing using MapReduce, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Towards efficient join processing over large RDF graph using mapreduce, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Sparse WiFi deployment for vehicular internet access with bounded interconnection gap, Zizhan Zheng, Prasun Sinha, and Santosh Kumar

Link

Sparse WiFi deployment for vehicular internet access with bounded interconnection gap, Zizhan Zheng, Prasun Sinha, and Santosh Kumar

Submissions from 2011

Link

Effects of communication delays in electric grid, Mohd Hasan Ali and Dipankar Dasgupta

Link

Low-rate, flow-level periodicity detection, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, Harkeerat Singh Bedi, Sankardas Roy, and Sajjan Shiva

Link

A self-supervised approach to comment spam detection based on content analysis, A. Bhattarai and D. Dasgupta

Link

Gender pluralism in problem-solving software, Margaret M. Burnett, Laura Beckwith, Susan Wiedenbeck, Scott D. Fleming, Jill Cao, and Thomas H. Park

Link

An exploration of design opportunities for "gardening" end-user programmers' ideas, Jill Cao, Scott D. Fleming, and Margaret Burnett

Mission resilience in cloud computing: A biologically inspired approach, Marco Carvalho, Dipankar Dasgupta, Michael Grimaila, and Carlos Perez

Link

Secure VM for monitoring industrial process controllers, Dipankar Dasgupta, Mohd Hassan Ali, Robert Abercrombie, Bob Schlicher, Frederick Sheldon, and Marco Carvalho

Link

Estimating security coverage for cloud services, Dipankar Dasgupta and Md Moshiur Rahman

Link

A framework for estimating security coverage for cloud service insurance, Dipankar Dasgupta and Moshiur Rahman

Link

Recent advances in artificial immune systems: Models and applications, Dipankar Dasgupta, Senhua Yu, and Fernando Nino

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

Routing policies in named data networking, Steven DiBenedetto, Christos Papadopoulos, and Daniel Massey

Link

Demo: An unobtrusively wearable sensor suite for inferring the onset, causality, and consequences of stress in the field, Emre Ertin, Andrew Raij, Nathan Stohs, Mustafa Al'Absi, Santosh Kumar, and Somnath Mitra

Link

Demo: An unobtrusively wearable sensor suite for inferring the onset, causality, and consequences of stress in the field, Emre Ertin, Andrew Raij, Nathan Stohs, Mustafa Al'Absi, Santosh Kumar, and Somnath Mitra

Link

AutoSense: Unobtrusively wearable sensor suite for inferring the onset, causality, and consequences of stress in the field, Emre Ertin, Nathan Stohs, Santosh Kumar, Andrew Raij, Mustafa Al'Absi, Siddharth Shah, Somnath Mitra, Taewoo Kwon, and Jae Woong Jeong

Link

AutoSense: Unobtrusively wearable sensor suite for inferring the onset, causality, and consequences of stress in the field, Emre Ertin, Nathan Stohs, Santosh Kumar, Andrew Raij, Mustafa Al'Absi, Siddharth Shah, Somnath Mitra, Taewoo Kwon, and Jae Woong Jeong

Link

Security visualization: Cyber security storm map and event correlation, Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, and Qishi Wu

Link

Dynamics of prefix usage at an edge router, Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Search and validation of short genome-wide biomarkers for bacterial biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Question answering and generation, Arthur C. Graesser, Vasile Rus, Zhiqiang Cai, and Xiangen Hu

Link

Approximate nearest neighbor search for low dimensional queries, Sariel Har-Peled and Nirman Kumar

Link

Autonomous wireless radar sensor mote integrating a doppler radar into a sensor mote and its application in surveillance and target material classification, Khan Iftekharuddin, Muhammad M.R. Khan, Ernest McCracken, Lan Wang, and Robert Kozma

Link

A taxonomy of capabilities based DDoS defense architectures, Vamsi Kambhampati, Christos Papadopoulos, and Dan Massey

Link

Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011: Preface, Santosh Kumar, Xiang Yang Li, Hua Dong Ma, Min Song, and Ivan Stojmenovic

Link

Proceedings - 2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011: Preface, Santosh Kumar, Xiang Yang Li, Hua Dong Ma, Min Song, and Ivan Stojmenovic

Dissimilarity kernels for paraphrase identification, Mihai Lintean and Vasile Rus

Link

Computational aspects of the intelligent tutoring system metaTutor, Mihai Lintean, Vasile Rus, Zhiqiang Cai, Amy Witherspoon-Johnson, Arthur C. Graesser, and Roger Azevedo

Link

Populations with purpose, Weizi Li and Jan M. Allbeck

Link

The writing-Pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai

Automated speech act classification for online chat, Cristian Moldovan, Vasile Rus, and Arthur C. Graesser

Link

Exploring micro-incentive strategies for participant compensation in high-burden studies, Mohamed Musthag, Andrew Raij, Deepak Ganesan, Santosh Kumar, and Saul Shiffman

Link

Exploring micro-incentive strategies for participant compensation in high-burden studies, Mohamed Musthag, Andrew Raij, Deepak Ganesan, Santosh Kumar, and Saul Shiffman

Link

Semantic methods for textual entailment, Andrew J. Neel and Max H. Garzon