Follow

Submissions from 2011

Virtual metering system application in the Ceiba Field, offshore equatorial Guinea, Anton Petukov, Luigi Saputelli, Jeffrey Hermann, Alex Traxler, Kim Boles, Obiageli Nnaji, Bruno Vrielynck, and Deepak Venugopal

Virtual metering system application in the Ceiba Field, offshore equatorial Guinea, Anton Petukov, Luigi Saputelli, Jeffrey Hermann, Alex Traxler, Kim Boles, Obiageli Nnaji, Bruno Vrielynck, and Deepak Venugopal

Link

Modeling programmer navigation: A head-to-head empirical evaluation of predictive models, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Liza John, Christopher Bogart, and Bonnie E. John

Continuous inference of psychological stress from sensory measurements collected in the natural environment, Kurt Plarre, Andrew Raij, Syed Monowar Hossain, Amin Ahsan Ali, Motohiro Nakajima, Mustafa Al'Absi, Emre Ertin, Thomas Kamarck, Santosh Kumar, Marcia Scott, Daniel Siewiorek, Asim Smailagic, and Lorentz E. Wittmers

Continuous inference of psychological stress from sensory measurements collected in the natural environment, Kurt Plarre, Andrew Raij, Syed Monowar Hossain, Amin Ahsan Ali, Motohiro Nakajima, Mustafa Al'Absi, Emre Ertin, Thomas Kamarck, Santosh Kumar, Marcia Scott, Daniel Siewiorek, Asim Smailagic, and Lorentz E. Wittmers

Link

MConverse: Inferring conversation episodes from respiratory measurements collected in the field, Md Mahbubur Rahman, Amin Ahsan Ali, Kurt Plarre, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Link

MConverse: Inferring conversation episodes from respiratory measurements collected in the field, Md Mahbubur Rahman, Amin Ahsan Ali, Kurt Plarre, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Demo abstract: Online detection of speaking from respiratory measurements collected in the natural environment, Md Mahbubur Rahman, Amin Ahsan Ali, Andrew Raij, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Demo abstract: Online detection of speaking from respiratory measurements collected in the natural environment, Md Mahbubur Rahman, Amin Ahsan Ali, Andrew Raij, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Link

Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment, Andrew Raij, Animikh Ghosh, Santosh Kumar, and Mani Srivastava

Link

Privacy risks emerging from the adoption of innocuous wearable sensors in the mobile environment, Andrew Raij, Animikh Ghosh, Santosh Kumar, and Mani Srivastava

Link

Green approaches to process control in thermal rooms, Danilo Rairan and Max H. Garzon

Link

Latent Semantic Indexing of PubMed abstracts for identification of transcription factor candidates from microarray derived gene sets, Sujoy Roy, Kevin Heinrich, Vinhthuy Phan, Michael W. Berry, and Ramin Homayouni

A linguistic analysis of student-generated paraphrases, Vasile Rus, Shi Feng, Russell Brandon, Scott Crossely, and Danielle S. McNamara

Link

Text-to-text similarity of sentences, Vasile Rus, Mihai Lintean, Arthur C. Graesser, and Danielle S. McNamara

Question Generation Shared Task and Evaluation Challenge - Status report, Vasile Rus, Brendan Wyse, Paul Piwek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Runtime monitors as sensors of security systems, Sajjan Shiva, Ramya Dharam, and Vivek Shandilya

A stochastic game model with imperfect information in cyber security, Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu

Link

A Dynamic Recursive Unified Internet Design (DRUID), Joe Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, and Scott Jordan

Link

Pseudorandom generators for combinatorial checkerboards, Thomas Watson

Link

Query complexity in errorless hardness amplification, Thomas Watson

Link

IP Reachability differences: Myths and realities, He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, Christos Papadopoulos, and Dan Pei

Link

An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation, Senhua Yu and Dipankar Dasgupta

Link

Fault tolerance study for durable storage on the cloud, Xiaofei Zhang and Lei Chen

Submissions from 2010

The role of prompting and feedback in facilitating students' learning about science with MetaTutor, Roger Azevedo, Amy Johnson, Candice Burkett, Amber Chauncey, Ashley Fike, and Mihai Lintean

Qualitative, quantitative, and data mining methods for analyzing log data to characterize students' learning strategies and behaviors, Ryan S.J.D. Baker, Janice D. Gobert, Wouter Van Joolingen, Roger Azevedo, Ido Roll, and Michael São Pedro

Link

Gender differences and programming environments: Across programming populations, Margaret Burnett, Scott D. Fleming, Shamsi Iqbal, Gina Venolia, Vidya Rajaram, and Umer Farooq

Link

A debugging perspective on end-user mashup programming, Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fleming, Margaret Burnett, and Susan Wiedenbeck

Link

Multi-objective evolutionary algorithms to solve coverage and lifetime optimization problem in wireless sensor networks, Koyel Chaudhuri and Dipankar Dasgupta

Link

Local barrier coverage in wireless sensor networks, Ai Chen, Santosh Kumar, and Ten H. Lai

Link

Local barrier coverage in wireless sensor networks, Ai Chen, Santosh Kumar, and Ten H. Lai

Link

A parallel framework for multi-objective evolutionary optimization, Dipankar Dasgupta, David Becerra, Alex Banceanu, Fernando Nino, and James Simien

Link

A conceptual model of self-monitoring multi-core systems, Dipankar Dasgupta, Harkeerat Bedi, and Deon Garrett

Link

Configurable and secure system architectures, Dipankar Dasgupta and Marco Carvalho

Link

Password security through Negative Filtering, Dipankar Dasgupta and Sudip Saha

Techniques for validation and controlled execution of processes, codes and data - A survey, Dipankar Dasgupta, Sudip Saha, and Aregahegn Negatu

Link

Fingerprinting custom botnet protocol stacks, Steve DiBenedetto, Kaustubh Gadkari, Nicholas Diel, Andrea Steiner, Dan Massey, and Christos Papadopoulos

Link

Debugging concurrent software: A study using multithreaded sequence diagrams, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, and Laura K. Dillon

Link

Molecule-inspired methods for coarse-grain multi-system optimization, Max H. Garzon and Andrew J. Neel

Link

A neurocontrol for automatic reconstruction of facial displays, Max H. Garzon and Buvaneshwari Sivakumar

Link

AutoWitness: Locating and tracking stolen property while tolerating GPS and radio outages, Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath Mitra, Bhagavathy Krishna, Prabal Dutta, and Santosh Kumar

Link

AutoWitness: Locating and tracking stolen property while tolerating GPS and radio outages, Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath Mitra, Bhagavathy Krishna, Prabal Dutta, and Santosh Kumar

Link

Just-in-time sampling and pre-filtering for wearable physiological sensors: Going from days to weeks of operation on a single charge, Nan Hua, Ashwin Lall, Justin Romberg, Jun Xu, Mustafa Al'Absi, Emre Ertin, Santosh Kumar, and Shikhar Suri

Link

Just-in-time sampling and pre-filtering for wearable physiological sensors: Going from days to weeks of operation on a single charge, Nan Hua, Ashwin Lall, Justin Romberg, Jun Xu, Mustafa Al'Absi, Emre Ertin, Santosh Kumar, and Shikhar Suri

Link

Evolution towards global routing scalability, Varun Khare, Dan Jen, Xin Zhao, Yaoqing Liu, Dan Massey, and Lan Wang

Link

Multi-modal sensor system integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Mohammed Khan, and Khandekar Islam

Link

Maximizing the lifetime of a barrier of wireless sensors, Santosh Kumar, Ten H. Lai, Marc E. Posner, and Prasun Sinha

Link

Maximizing the lifetime of a barrier of wireless sensors, Santosh Kumar, Ten H. Lai, Marc E. Posner, and Prasun Sinha

Link

An approach to overcoming knowledge sharing challenges in a corporate IT environment, Sarah B. Lee and Sajjan G. Shiva

Knowledge engineering to visualize complexity for legacy modernization planning, Sarah B. Lee, Sajjan G. Shiva, and K. S. Braunsdorf

Paraphrase identification using weighted dependencies and word semantics, Mihai C. Lintean and Vasile Rus

The role of local and global weighting in assessing the semantic similarity of texts using latent semantic analysis, Mihai Lintean, Cristian Moldovan, Vasile Rus, and Danielle McNamara

Link

Automatic question generation for literature review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

Incremental forwarding table aggregation, Yaoqing Liu, Xin Zhao, Kyuhan Nam, Lan Wang, and Beichuan Zhang

Semantic methods for textual entailment: How much world knowledge is enough?, Andrew Neel and Max Garzon

Link

Synthetic gene design with a large number of hidden stops, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

Automated detection of sensor detachments for physiological sensing in the wild, Kurt Plarre, Andrew Raij, Santanu Guha, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Link

Automated detection of sensor detachments for physiological sensing in the wild, Kurt Plarre, Andrew Raij, Santanu Guha, Mustafa Al'Absi, Emre Ertin, and Santosh Kumar

Link

A survey of game theory as applied to network security, Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu

Computational aspects of the intelligent tutoring system metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo

The first question generation shared task evaluation challenge, Vasile Rus, Brendan Wyse, Paul Pivek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Game theory for cyber security, Sajjan Shiva, Sankardas Roy, and Dipankar Dasgupta

Link

Evolving gaming strategies for attacker-defender in a simulated network environment, Pavan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, and Fernando Nino

Link

Relativized worlds without worst-case to average-case reductions for NP, Thomas Watson

Link

Correlating spam activity with IP address characteristics, Chris Wilcox, Christos Papadopoulos, and John Heidemann

Link

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks, Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla

Link

Threshold key redistribution for dynamic change of authentication group in wireless mesh networks, Kan Yang, Xiaohua Jia, Bo Zhang, and Zhongming Zheng

Link

A distributed collaborative relay protocol for multi-hop WLAN accesses, Bo Zhang, Zhongming Zheng, Xiaohua Jia, and Kan Yang

Link

On the aggregatability of router forwarding tables, Xin Zhao, Yaoqing Liu, Lan Wang, and Beichuan Zhang

Link

Minimum AP placement for WLAN with rate adaptation using physical interference model, Zhongming Zheng, Bo Zhang, Xiaohua Jia, Jun Zhang, and Kan Yang

Link

Maximizing the contact opportunity for vehicular internet access, Zizhan Zheng, Zhixue Lu, Prasun Sinha, and Santosh Kumar

Link

Maximizing the contact opportunity for vehicular internet access, Zizhan Zheng, Zhixue Lu, Prasun Sinha, and Santosh Kumar

Submissions from 2009

Application of enhanced decision tree algorithm to churn analysis, Matthew Anyanwu and Sajjan Shiva

Comparison of cluster measures, Matthew Anyanwu, Sajjan Shiva, and David Lin

Link

MetaTutor: Analyzing self-regulated learning in a tutoring system for biology, Roger Azevedo, Amy Witherspoon, Arthur Graesser, Danielle McNamara, Amber Chauncey, and Emily Siler

Link

Random vs. deterministic deployment of sensors in the presence of failures and placement errors, Paul Balister and Santosh Kumar

Link

Random vs. deterministic deployment of sensors in the presence of failures and placement errors, Paul Balister and Santosh Kumar

Link

Trap coverage: Allowing coverage holes of bounded diameter in wireless sensor networks, Paul Balister, Zizhan Zheng, Santosh Kumar, and Prasun Sinha

Link

Trap coverage: Allowing coverage holes of bounded diameter in wireless sensor networks, Paul Balister, Zizhan Zheng, Santosh Kumar, and Prasun Sinha

Link

Characterizing comment spam in the blogosphere through content analysis, Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta

Link

On the use of informed initialization and extreme solutions sub-population in multiobjective evolutionary algorithms, Dipankar Dasgupta, German Hernandezy, Andres Romeroy, Deon Garrett, Aishwarya Kaushal, and James Simienz

Link

A multiobjective evolutionary algorithm for the task based sailor assignment problem, Dipankar Dasgupta, Fernando Nino, Deon Garrett, Koyel Chaudhuri, Soujanya Medapati, and Aishwarya Kaushal

Link

A biologically inspired password authentication system, Dipankar Dasgupta and Sudip Saha

Link

2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings: Welcome Message, Dipankar Dasgupta and Justin Zhan

Link

Analyzing the aftermath of the McColo shutdown, Steve DiBenedetto, Dan Massey, Christos Papadopoulos, and Patrick J. Walsh

Link

Scooping simulation framework for artificial cervical disc replacement surgery, E. Ermisoglu, F. Sen, S. Kockara, T. Halic, C. Bayrak, and R. Rowe

Link

Scooping simulation framework for artificial cervical disc replacement surgery, E. Ermisoglu, F. Sen, S. Kockara, T. Halic, C. Bayrak, and R. Rowe

Link

An empirical comparison of memetic algorithm strategies on the multiobjective quadratic Assignment Problem, Deon Garrett and Dipankar Dasgupta

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon, Tit Yee Wong, and Vinhthuy Phan

Link

Uses and challenges for network datasets, John Heidemann and Christos Papadopoulos

Link

Remote detection of bottleneck links using spectral and statistical methods, Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz

Link

V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage, Zhou Ji and Dipankar Dasgupta

Link

Challenges for ubiquitous computing, Santosh Kumar

Link

Challenges for ubiquitous computing, Santosh Kumar

Link

A novel approach to knowledge sharing in software systems engineering, Sarah B. Lee and Sajjan G. Shiva

Paraphrase identification using weighted dependencies and word semantics, Mihal Lintean and Vasile Rus

Link

Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang

Link

Securing wireless implantable devices for healthcare: Ideas and challenges [Accepted from Open Call], Kriangsiri Malasri and Lan Wang