Submissions from 2017
Toward Mitigating Phantom Jam Using Vehicle-to-Vehicle Communication, Myounggyu Won, Taejoon Park, and Sang H. Son
WiTraffic: Low-cost and non-intrusive traffic monitoring system using WiFi, Myounggyu Won, Shaohu Zhang, and Sang H. Son
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems, Guowen Xu, Hongwei Li, Chen Tan, Dongxiao Liu, Yuanshun Dai, and Kan Yang
CryptMDB: A practical encrypted MongoDB over big data, Guowen Xu, Yan Ren, Hongwei Li, Dongxiao Liu, Yuanshun Dai, and Kan Yang
Optimal control theory-based epidemic information spreading scheme for mobile social users with energy constraint, Qichao Xu, Zhou Su, and Kan Yang
QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks, Qichao Xu, Zhou Su, Qiyong Zhao, Jiantao Song, Wenxue Shen, and Ying Wang
An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy, Kan Yang, Qi Han, Hui Li, Kan Zheng, Zhou Su, and Xuemin Shen
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Kan Yang, Kuan Zhang, Xiaohua Jia, M. Anwar Hasan, and Xuemin (Sherman) Shen
Identifying the Most Valuable Workers in Fog-Assisted Spatial Crowdsourcing, Peng Yang, Ning Zhang, Shan Zhang, Kan Yang, Li Yu, and Xuemin Shen
Security and Privacy in Smart City Applications: Challenges and Solutions, Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin Sherman Shen
Scalable name-based data synchronization for named data networking, Minsheng Zhang, Vince Lehman, and Lan Wang
Distance-Aware Selective Online Query Processing Over Large Distributed Graphs, Xiaofei Zhang and Lei Chen
Similar yet different: Protocol design choices in IS-IS and OSPF, Yu Zhang, Lan Wang, Alexander Afanasyev, and Lixia Zhang
Facilitating ICN deployment with an extended open flow protocol, Piotr Zuraniewski, Niels Van Adrichem, Daan Ravesteijn, Wieger IJntema, Christos Papadopoulos, and Chengyu Fan
Submissions from 2016
Evaluating Security and Privacy in Cloud Services, Abdullah Abuhussein, Faisal Alsubaei, Sajjan Shiva, and Frederick T. Sheldon
CSSR: Cloud Services Security Recommender, Abdullah Abuhussein, Sajjan Shiva, and Frederick T. Sheldon
Range-max queries on uncertain data, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri
DTSim at SemEval-2016 Task 1: Semantic similarity model including multi-level alignment and vector-based compositional semantics, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, and Vasile Rus
Handling missing words by mapping across word vector representations, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, and Vasile Rus
Evaluation dataset (dt-grade) andwordweighting approach towards constructed short answers assessment in tutorial dialogue context, Rajendra Banjade, Nabin Maharjan, Nobal B. Niraula, Dipesh Gautam, Borhan Samei, and Vasile Rus
DTSim at SemEval-2016 task 2: Interpreting similarity of texts based on automated chunking, chunk alignment and Semantic relation prediction, Rajendra Banjade, Nabin Maharjan, Nobal B. Niraula, and Vasile Rus
Towards detecting intra- and inter-sentential negation scope and focus in dialogue, Rajendra Banjade, Nobal B. Niraula, and Vasile Rus
DT-Neg: Tutorial dialogues annotated for negation scope and focus in context, Rajendra Banjade and Vasile Rus
Improving the freshness of NDN forwarding states, Jianxun Cao, Dan Pei, Zhelun Wu, Xiaoping Zhang, Beichuan Zhang, and Lan Wang
Toward the design of adaptive selection strategies for multi-factor authentication, Dipankar Dasgupta, Arunava Roy, and Abhijit Nag
Mitigating poisoned content with forwarding strategy, Stephanie Dibenedetto and Christos Papadopoulos
Toward integrating Cognitive Tutor interaction data with human tutoring text dialogue data in LearnSphere, Stephen E. Fancsali, Steven Ritter, Susan R. Berman, Michael Yudelson, Vasile Rus, and Donald M. Morrison
Hyperplane separability and convexity of probabilistic point sets, Martin Fink, John Hershberger, Nirman Kumar, and Subhash Suri
Pragmatic router FIB caching, Kaustubh Gadkari, M. Lawrence Weikum, Dan Massey, and Christos Papadopoulos
Assessing co-locality of IP blocks, Manaf Gharaibeh, Han Zhang, Christos Papadopoulos, and John Heidemann
Extension Complexity of Independent Set Polytopes, Mika Goos, Rahul Jain, and Thomas Watson
Rectangles are nonnegative juntas, Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman
The landscape of communication complexity classes, Mika Göös, Toniann Pitassi, and Thomas Watson
Zero-Information Protocols and Unambiguity in Arthur–Merlin Communication, Mika Göös, Toniann Pitassi, and Thomas Watson
Communication complexity of set-disjointness for all probabilities, Mika Göös and Thomas Watson
Space Exploration via Proximity Search, Sariel Har-Peled, Nirman Kumar, David M. Mount, and Benjamin Raichel
Identity-preserving public auditing for shared cloud data, Kai He, Chuanhe Huang, Kan Yang, and Jiaoli Shi
Yestercode: Improving code-change support in visual dataflow programming environments, Austin Z. Henley and Scott D. Fleming
Most likely Voronoi diagrams in higher dimensions, Nirman Kumar, Benjamin Raichel, Subhash Suri, and Kevin Verbeek
Containment and evasion in stochastic point data, Nirman Kumar and Subhash Suri
An experimental investigation of hyperbolic routing with a smart forwarding plane in NDN, Vince Lehman, Ashlesh Gawande, Beichuan Zhang, Lixia Zhang, Rodrigo Aldecoa, and Dmitri Krioukov
Optimal reliability in energy harvesting industrial wireless sensor networks, Lei Lei, Yiru Kuang, Xuemin Sherman Shen, Kan Yang, Jian Qiao, and Zhangdui Zhong
Joint inference for event coreference resolution, Jing Lu, Deepak Venugopal, Vibhav Gogate, and Vincent Ng
SemAligner: A method and tool for aligning chunks with semantic relation types and semantic similarity scores, Nabin Maharjan, Rajendra Banjade, Nobal B. Niraula, and Vasile Rus
Putting information foraging theory to work: Community-based design patterns for programming tools, Tahmid Nabi, Kyle M.D. Sweeney, Sam Lichlyter, David Piorkowski, Chris Scaffidi, and Margaret Burnett
An alignment-free method for profiling microbial community, Diem Trang Pham, Shanshan Gao, and Vinhthuy Phan
Foraging and navigations, fundamentally: Developers' predictions of value and cost, David Piorkowski, Austin Z. Henley, Tahmid Nabi, Scott D. Fleming, Christopher Scaffidi, and Margaret Burnett
Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks, Ju Ren, Yaoxue Zhang, Qiang Ye, Kan Yang, Kuan Zhang, and Xuemin Shen
Preliminary results on dialogue act classification in chat-based online tutorial dialogues, Vasile Rus, Rajendra Banjade, Nabin Maharjan, Donald Morrison, Steve Ritter, and Michael Yudelson
Assessing student-generated design justifications in engineering virtual internships, Vasile Rus, Dipesh Gautam, Zachari Swiecki, David W. Shaffer, and Arthur C. Graesser
Toward non-intrusive assessment in dialogue-based intelligent tutoring systems, Vasile Rus and Dan Stefanescu
Non-intrusive assessment of learners’ prior knowledge in dialogue-based intelligent tutoring systems, Vasile Rus and Dan Ştefănescu
Classification of insider threat detection techniques, Ameya Sanzgiri and Dipankar Dasgupta
Scalable training of markov logic networks using approximate counting, Somdeb Sarkhel, Deepak Venugopal, Tuan Anh Pham, Parag Singla, and Vibhav Gogate
Towards characterizing international routing detours, Anant Shah, Romain Fontugne, and Christos Papadopoulos
Apache Hama: An emerging bulk synchronous parallel computing framework for big data applications, Kamran Siddique, Zahid Akhtar, Edward J. Yoon, Young Sik Jeong, Dipankar Dasgupta, and Yangwoo Kim
Tracking frequent items over distributed probabilistic data, Yongxin Tong, Xiaofei Zhang, and Lei Chen
Analysis of optimal alignments unfolds aligners' bias in existing variant profiles, Quang Tran, Shanshan Gao, and Vinhthuy Phan
Repeat complexity of genomes as a means to predict the performance of short-read aligners, Quang Tran, Shanshan Gao, Nam S. Vo, and Vinhthuy Phan
Joint inference for mode identification in tutorial dialogues, Deepak Venugopal and Vasile Rus
Non-parametric domain approximation for scalable Gibbs sampling in MLNs, Deepak Venugopal, Somdeb Sarkhel, and Kyle Cherry
The complexity of estimating min-entropy, Thomas Watson
Enabling energy-efficient driving route detection using built-in smartphone barometer sensor, Myounggyu Won, Shaohu Zhang, Appala Chekuri, and Sang H. Son
Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach, Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Sherman Shen
Design of analytical model and algorithm for optimal roadside AP placement in VANETs, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie
BotDigger: Detecting DGA bots in a single network, Han Zhang, Manaf Gharaibeh, Spiros Thanasoulas, and Christos Papadopoulos
Low-cost realtime horizontal curve detection using inertial sensors of a smartphone, Shaohu Zhang, Myounggyu Won, and Sang H. Son
Poster Abstract: WiTraffic-non-intrusive vehicle classification using WiFi, Shaohu Zhang, Myounggyu Won, and Sang H. Son
Big data-driven optimization for mobile networks toward 5G, Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios, Kan Yang, and Wei Xiang
Submissions from 2015
SNAMP: Secure namespace mapping to scale NDN forwarding, Alexander Afanasyev, Cheng Yi, Lan Wang, Beichuan Zhang, and Lixia Zhang
Leveraging crowdsourcing in clould application development, Eman Aldhahri, Abdullah Abuhussein, and Sajjan Shiva
Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art, Eman Aldhahri, Vivek Shandilya, and Sajjan Shiva
Lemon and tea are not similar: Measuring word-to-word similarity by combining different methods, Rajendra Banjade, Nabin Maharjan, Nobal B. Niraula, Vasile Rus, and Dipesh Gautam
NeRoSim: A System for Measuring and Interpreting Semantic Textual Similarity, Rajendra Banjade, Nobal B. Niraula, Nabin Maharjan, Vasile Rus, Dan Stefanescu, and Mihai Lintean
Using an implicit method for coreference resolution and ellipsis handling in automatic student answer assessment, Rajendra Banjade, Vasile Rus, and Nobal B. Niraula
Mitigating congestion based DoS attacks with an enhanced AQM technique, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva
Idea garden: Situated support for problem solving by end-user programmers, Jill Cao, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi
On modeling and analysis of MIMO wireless mesh networks with triangular overlay topology, Zhanmao Cao, Chase Q. Wu, Yuanping Zhang, Sajjan G. Shiva, and Yi Gu
Managing scientific data with named data networking, Chengyu Fan, Susmit Shannigrahi, Steve Dibenedetto, Catherine Olschanowsky, Christos Papadopoulos, and Harvey Newman
Privacy principles for sharing cyber security data, Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, and Christos Papadopoulos
Pragmatic router FIB caching, Kaustubh Gadkari, M. Lawrence Weikum, Dan Massey, and Christos Papadopoulos
Alignment-free methods for metagenomic profiling, Shanshan Gao, Diem Trang Pham, and Vinhthuy Phan
Fast Compaction Algorithms for NoSQL Databases, Mainak Ghosh, Indranil Gupta, Shalmoli Gupta, and Nirman Kumar
Rectangles are nonnegative juntas, Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman
Deterministic Communication vs. Partition Number, Mika Goos, Toniann Pitassi, and Thomas Watson
Zero-information protocols and unambiguity in Arthur-Merlin communication [extended abstract], Mika Göös, Toniann Pitassi, and Thomas Watson
Distributed evolutionary approach to data clustering and modeling, Mustafa Hajeer, Dipankar Dasgupta, Alexander Semenov, and Jari Veijalainen
Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar
Space Exploration via Proximity Search, Sariel Har-Peled, Nirman Kumar, David M. Mount, and Benjamin Raichel
Topic model for identifying suicidal ideation in Chinese microblog, Xiaolei Huang, Xin Li, Lei Zhang, Tianli Liu, David Chiu, and Tingshao Zhu
Foreword VL/HCC 2015, Eileen Kraemer, Claudia Ermel, and Scott Fleming
An optimal quadratic approach to monolingual paraphrase alignment, Mihai Lintean and Vasile Rus
Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Vince Lehman, and Lan Wang
Biologically-Inspired Visual Simulation of Insect Swarms, Weizi Li, David Wolinski, Julien Pettré, and Ming C. Lin
Probabilistic analysis of pattern formation in monotonic self-assembly, Tyler G. Moore, Max H. Garzon, and Russell J. Deaton
Tutorial dialogue modes in a large corpus of online tutoring transcripts, Donald M. Morrison, Benjamin Nye, Vasile Rus, Sarah Snyder, Jennifer Boller, and Kenneth Miller
An adaptive approach towards the selection of multi-factor authentication, Abhijit Kumar Nag, Arunava Roy, and Dipankar Dasgupta
Combining word representations for measuring word relatedness and similarity, Nobal B. Niraula, Dipesh Gautam, Rajendra Banjade, Nabin Maharjan, and Vasile Rus
Judging the quality of automatically generated gap-fill question using active learning, Nobal B. Niraula and Vasile Rus
How genome complexity can explain the difficulty of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo