Submissions from 2016
Big data-driven optimization for mobile networks toward 5G, Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios, Kan Yang, and Wei Xiang
Submissions from 2015
SNAMP: Secure namespace mapping to scale NDN forwarding, Alexander Afanasyev, Cheng Yi, Lan Wang, Beichuan Zhang, and Lixia Zhang
Leveraging crowdsourcing in clould application development, Eman Aldhahri, Abdullah Abuhussein, and Sajjan Shiva
Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art, Eman Aldhahri, Vivek Shandilya, and Sajjan Shiva
Effect of mild-to-moderate smoking on viral load, cytokines, oxidative stress, and cytochrome P450 enzymes in HIV-infected individuals, Anusha Ande, Carole McArthur, Leo Ayuk, Charles Awasom, Paul Ngang Achu, Annette Njinda, Namita Sinha, P S. Rao, Marisela Agudelo, Anantha Ram Nookala, Stephen Simon, Anil Kumar, and Santosh Kumar
Enhanced oxidative stress by alcohol use in HIV+ patients: possible involvement of cytochrome P450 2E1 and antioxidant enzymes, Anusha Ande, Namita Sinha, P S. Rao, Carole P. McArthur, Leo Ayuk, Paul N. Achu, Annette Njinda, Anil Kumar, and Santosh Kumar
Lemon and tea are not similar: Measuring word-to-word similarity by combining different methods, Rajendra Banjade, Nabin Maharjan, Nobal B. Niraula, Vasile Rus, and Dipesh Gautam
NeRoSim: A System for Measuring and Interpreting Semantic Textual Similarity, Rajendra Banjade, Nobal B. Niraula, Nabin Maharjan, Vasile Rus, Dan Stefanescu, and Mihai Lintean
Using an implicit method for coreference resolution and ellipsis handling in automatic student answer assessment, Rajendra Banjade, Vasile Rus, and Nobal B. Niraula
Mitigating congestion based DoS attacks with an enhanced AQM technique, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva
Idea garden: Situated support for problem solving by end-user programmers, Jill Cao, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi
On modeling and analysis of MIMO wireless mesh networks with triangular overlay topology, Zhanmao Cao, Chase Q. Wu, Yuanping Zhang, Sajjan G. Shiva, and Yi Gu
Investigational reverse transcriptase inhibitors for the treatment of HIV, Theodore J. Cory, Narasimha M. Midde, Pss Rao, and Santosh Kumar
Managing scientific data with named data networking, Chengyu Fan, Susmit Shannigrahi, Steve Dibenedetto, Catherine Olschanowsky, Christos Papadopoulos, and Harvey Newman
Privacy principles for sharing cyber security data, Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, and Christos Papadopoulos
Pragmatic router FIB caching, Kaustubh Gadkari, M. Lawrence Weikum, Dan Massey, and Christos Papadopoulos
Alignment-free methods for metagenomic profiling, Shanshan Gao, Diem Trang Pham, and Vinhthuy Phan
Fast Compaction Algorithms for NoSQL Databases, Mainak Ghosh, Indranil Gupta, Shalmoli Gupta, and Nirman Kumar
Rectangles are nonnegative juntas, Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman
Deterministic Communication vs. Partition Number, Mika Goos, Toniann Pitassi, and Thomas Watson
Zero-information protocols and unambiguity in Arthur-Merlin communication [extended abstract], Mika Göös, Toniann Pitassi, and Thomas Watson
Distributed evolutionary approach to data clustering and modeling, Mustafa Hajeer, Dipankar Dasgupta, Alexander Semenov, and Jari Veijalainen
Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar
Space Exploration via Proximity Search, Sariel Har-Peled, Nirman Kumar, David M. Mount, and Benjamin Raichel
cStress: Towards a Gold Standard for Continuous Stress Assessment in the Mobile Environment, Karen Hovsepian, Mustafa al'Absi, Emre Ertin, Thomas Kamarck, Motohiro Nakajima, and Santosh Kumar
Topic model for identifying suicidal ideation in Chinese microblog, Xiaolei Huang, Xin Li, Lei Zhang, Tianli Liu, David Chiu, and Tingshao Zhu
Continuous in-the-field measurement of heart rate: Correlates of drug use, craving, stress, and mood in polydrug users, Ashley P. Kennedy, David H. Epstein, Michelle L. Jobes, Daniel Agage, Matthew Tyburski, Karran A. Phillips, Amin Ahsan Ali, Rummana Bari, Syed Monowar Hossain, Karen Hovsepian, Md Mahbubur Rahman, Emre Ertin, Santosh Kumar, and Kenzie L. Preston
Foreword VL/HCC 2015, Eileen Kraemer, Claudia Ermel, and Scott Fleming
Drug-drug interactions between anti-retroviral therapies and drugs of abuse in HIV systems, Santosh Kumar, P S. Rao, Ravindra Earla, and Anil Kumar
An optimal quadratic approach to monolingual paraphrase alignment, Mihai Lintean and Vasile Rus
Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Vince Lehman, and Lan Wang
Biologically-Inspired Visual Simulation of Insect Swarms, Weizi Li, David Wolinski, Julien Pettré, and Ming C. Lin
Development of NanoART for HIV Treatment: Minding the Cytochrome P450 (CYP) Enzymes, Narasimha M. Midde and Santosh Kumar
Probabilistic analysis of pattern formation in monotonic self-assembly, Tyler G. Moore, Max H. Garzon, and Russell J. Deaton
Tutorial dialogue modes in a large corpus of online tutoring transcripts, Donald M. Morrison, Benjamin Nye, Vasile Rus, Sarah Snyder, Jennifer Boller, and Kenneth Miller
An adaptive approach towards the selection of multi-factor authentication, Abhijit Kumar Nag, Arunava Roy, and Dipankar Dasgupta
Combining word representations for measuring word relatedness and similarity, Nobal B. Niraula, Dipesh Gautam, Rajendra Banjade, Nabin Maharjan, and Vasile Rus
Judging the quality of automatically generated gap-fill question using active learning, Nobal B. Niraula and Vasile Rus
How genome complexity can explain the difficulty of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo
To fix or to learn? How production bias affects developers' information foraging during debugging, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Margaret Burnett, Irwin Kwan, and Austin Z. Henley
Building Trust in Cloud: Service Certification Challenges and Approaches, Fahad Polash and Sajjan Shiva
Period estimation for adaptive reconstruction of (quasi-) periodic signals, Danilo Rairan and Max H. Garzon
Polycyclic aromatic hydrocarbons and cytochrome P450 in HIV pathogenesis, P S. Rao and Santosh Kumar
Diallyl Sulfide: Potential Use in Novel Therapeutic Interventions in Alcohol, Drugs, and Disease Mediated Cellular Toxicity by Targeting Cytochrome P450 2E1, P S. Rao, Narasimha M. Midde, Duane D. Miller, Subhash Chauhan, Anil Kumar, and Santosh Kumar
Designing Novel Nanoformulations Targeting Glutamate Transporter Excitatory Amino Acid Transporter 2: Implications in Treating Drug Addiction, Pss Rao, Murali M. Yallapu, Youssef Sari, Paul B. Fisher, and Santosh Kumar
Integrating learning progressions in unsupervised After-School online intelligent tutoring, Vasile Rus, Arthur Graesser, Nobal Niraula, and Rajendra Banjade
Deeptutor: An effective, online intelligent tutoring system that promotes Deep learning, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Automated labelling of dialogue modes in tutorial dialogues, Vasile Rus, Nobal B. Niraula, Nabin Maharjan, and Rajendra Banjade
Co-simulation platform for characterizing cyber attacks in cyber physical systems, Mohammad Ashraf Hossain Sadi, Mohd Hasan Ali, Dipankar Dasgupta, Robert K. Abercrombie, and Shubhalaxmi Kher
OPNET/simulink based testbed for disturbance detection in the smart grid, Mohammad Ashraf Hossain Sadi, Mohd Hassan Ali, Dipankar Dasgupta, and Robert K. Abercrombie
Human-cognition-based CAPTCHAs, Sanjib Kumar Saha, Abhijit Kumar Nag, and Dipankar Dasgupta
puffMarker: A Multi-Sensor Approach for Pinpointing the Timing of First Lapse in Smoking Cessation, Nazir Saleheen, Amin Ahsan Ali, Syed Monowar Hossain, Hillol Sarker, Soujanya Chatterjee, Benjamin Marlin, Emre Ertin, Mustafa al'Absi, and Santosh Kumar
A network security game model, Vivek Shandilya and Sajjan Shiva
Named data networking in climate research and HEP applications, Susmit Shannigrahi, Christos Papadopoulos, Edmund Yeh, Harvey Newman, Artur Jerzy Barczyk, and Ran Liu
Dynamic bandwidth allocation in mobile social networks with multiple homing access, Zhou Su, Qichao Xu, Kuan Zhang, Kan Yang, and Xuemin Sherman Shen
A linear model for predicting performance of short-read aligners using genome complexity, Quang Tran, Shanshan Gao, Nam S. Vo, and Vinhthuy Phan
Scaling-up inference in markov logic, Deepak Venugopal
Just count the satisfied groundings: Scalable local-search and sampling based inference in MLNs, Deepak Venugopal, Somdeb Sarkhel, and Vibhav Gogate
Improving variant calling by incorporating known genetic variants into read alignment, Nam S. Vo and Vinhthuy Phan
Generalized pattern matching string search on encrypted data in cloud systems, Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, and Ming Xu
MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption, Jing Wang, Chuanhe Huang, Kan Yang, Jinhai Wang, Xiaomao Wang, and Xi Chen
Query Complexity in Errorless Hardness Amplification, Thomas Watson
The complexity of deciding statistical properties of samplable distributions, Thomas Watson
Virtualized traffic at metropolitan scales, David Wilkie, Jason Sewall, Weizi Li, and Ming C. Lin
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, Kan Yang, Xiaohua Jia, and Kui Ren
Security and privacy in mobile crowdsourcing networks: Challenges and opportunities, Kan Yang, Kuan Zhang, Ju Ren, and Xuemin Sherman Shen
BotTalker: Generating encrypted, customizable C&C traces, Han Zhang and Christos Papadopoulos
Early detection of high entropy traffic, Han Zhang and Christos Papadopoulos
Exploiting mobile social behaviors for Sybil detection, Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, and Xuemin Sherman Shen
Security and privacy for mobile healthcare networks: From a quality of protection perspective, Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo
Using linguistic features to estimate suicide probability of Chinese microblog users, Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, and Tingshao Zhu
Bonding vertex sets over distributed graph: A betweenness aware approach, Xiaofei Zhang, Hong Cheng, and Lei Chen
Efficient parallel processing of distance join queries over distributed graphs, Xiaofei Zhang, Lei Chen, and Min Wang
Locality-aware allocation of multi-dimensional correlated files on the cloud platform, Xiaofei Zhang, Yongxin Tong, Lei Chen, Min Wang, and Shicong Feng
Submissions from 2014
A flexible Quagga-based virtual network with FIB aggregation, Jerald Abraham, Yaoqing Liu, Lan Wang, and Beichuan Zhang
Artificial immune systems, Uwe Aickelin, Dipankar Dasgupta, and Feng Gu
A game inspired defense mechanism against distributed denial of service attacks, Harkeerat Bedi, Sajjan Shiva, and Sankardas Roy
Latest progress and infrastructure innovations of big data technology, Shangyi Chen, Wei Li, Min Li, Xiaofei Zhang, and Yue Min
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks, Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, and Manish Karir
Steps toward developing an artificial cell signaling model applied to distributed fault detection, Dipankar Dasgupta and Guilherme Costa Silva
G-NAS: A grid-based approach for negative authentication, Dipankar Dasgupta, Denise Ferebee, Sanjib Saha, Abhijit Kumar Nag, Kul Prasad Subedi, and Alvaro Madero
A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem
A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem
Enhanced methamphetamine metabolism in rhesus macaque as compared with human: an analysis using a novel method of liquid chromatography with tandem mass spectrometry, kinetic study, and substrate docking, Ravinder Earla, Santosh Kumar, Lei Wang, Steven Bosinger, Junhao Li, Ankit Shah, Mohitkumar Gangwani, Anantha Nookala, Xun Liu, Lu Cao, Austin Jackson, Peter S. Silverstein, Howard S. Fox, Weihua Li, and Anil Kumar
DNA codeword design: Theory and applications, Max H. Garzon
Incremental deployment strategies for effective detection and prevention of BGP origin Hijacks, Joseph Gersch, Dan Massey, and Christos Papadopoulos
Communication complexity of set-disjointness for all probabilities, Mika Göös and Thomas Watson
A distributed framework for aligning short reads to genomes, Shanshan Guo and Vinthuy Phan
Down the rabbit hole: Robust proximity search and density estimation in sublinear space?, Sariel Har-Peled and Nirman Kumar
Robust proximity search for balls using sublinear space, Sariel Har-Peled and Nirman Kumar
The patchworks code editor: Toward faster navigation with less code arranging and fewer navigation mistakes, Austin Z. Henley and Scott D. Fleming
Helping programmers navigate code faster with Patchworks: A simulation study, Austin Z. Henley, Alka Singh, Scott D. Fleming, and Maria V. Luong
Identifying Drug (Cocaine) Intake Events from Acute Physiological Response in the Presence of Free-living Physical Activity, Syed Monowar Hossain, Amin Ahsan Ali, Mahbubur Rahman, Emre Ertin, David Epstein, Ashley Kennedy, Kenzie Preston, Annie Umbricht, Yixin Chen, and Santosh Kumar
Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons, Xiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, and Tingshao Zhu
Automatic generation and ranking of questions for critical review, Ming Liu, Rafael A. Calvo, and Vasile Rus
An adaptive approach for continuous multi-factor authentication in an identity eco-system, Abhijit Kumar Nag and Dipankar Dasgupta
A machine learning approach to pronominal anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula and Vasile Rus
The DARE corpus: A resource for anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, Rajendra Banjade, Dan Stefanescu, William Baggett, and Brent Morgan
Forms2Dialog: Automatic dialog generation for Web tasks, Nobal B. Niraula, Amanda Stent, Hyuckchul Jung, Giuseppe Di Fabbrizio, I. Dan Melamed, and Vasile Rus
Determining gene response patterns of time series gene expression data using R, Kevin L. O'kello and Vinhthuy Phan