Submissions from 2015
To fix or to learn? How production bias affects developers' information foraging during debugging, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Margaret Burnett, Irwin Kwan, and Austin Z. Henley
Building Trust in Cloud: Service Certification Challenges and Approaches, Fahad Polash and Sajjan Shiva
Period estimation for adaptive reconstruction of (quasi-) periodic signals, Danilo Rairan and Max H. Garzon
Integrating learning progressions in unsupervised After-School online intelligent tutoring, Vasile Rus, Arthur Graesser, Nobal Niraula, and Rajendra Banjade
Deeptutor: An effective, online intelligent tutoring system that promotes Deep learning, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Automated labelling of dialogue modes in tutorial dialogues, Vasile Rus, Nobal B. Niraula, Nabin Maharjan, and Rajendra Banjade
Co-simulation platform for characterizing cyber attacks in cyber physical systems, Mohammad Ashraf Hossain Sadi, Mohd Hasan Ali, Dipankar Dasgupta, Robert K. Abercrombie, and Shubhalaxmi Kher
OPNET/simulink based testbed for disturbance detection in the smart grid, Mohammad Ashraf Hossain Sadi, Mohd Hassan Ali, Dipankar Dasgupta, and Robert K. Abercrombie
Human-cognition-based CAPTCHAs, Sanjib Kumar Saha, Abhijit Kumar Nag, and Dipankar Dasgupta
A network security game model, Vivek Shandilya and Sajjan Shiva
Named data networking in climate research and HEP applications, Susmit Shannigrahi, Christos Papadopoulos, Edmund Yeh, Harvey Newman, Artur Jerzy Barczyk, and Ran Liu
Dynamic bandwidth allocation in mobile social networks with multiple homing access, Zhou Su, Qichao Xu, Kuan Zhang, Kan Yang, and Xuemin Sherman Shen
A linear model for predicting performance of short-read aligners using genome complexity, Quang Tran, Shanshan Gao, Nam S. Vo, and Vinhthuy Phan
Scaling-up inference in markov logic, Deepak Venugopal
Just count the satisfied groundings: Scalable local-search and sampling based inference in MLNs, Deepak Venugopal, Somdeb Sarkhel, and Vibhav Gogate
Improving variant calling by incorporating known genetic variants into read alignment, Nam S. Vo and Vinhthuy Phan
Generalized pattern matching string search on encrypted data in cloud systems, Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, and Ming Xu
MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption, Jing Wang, Chuanhe Huang, Kan Yang, Jinhai Wang, Xiaomao Wang, and Xi Chen
Query Complexity in Errorless Hardness Amplification, Thomas Watson
The complexity of deciding statistical properties of samplable distributions, Thomas Watson
Virtualized traffic at metropolitan scales, David Wilkie, Jason Sewall, Weizi Li, and Ming C. Lin
Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, Kan Yang, Xiaohua Jia, and Kui Ren
Security and privacy in mobile crowdsourcing networks: Challenges and opportunities, Kan Yang, Kuan Zhang, Ju Ren, and Xuemin Sherman Shen
BotTalker: Generating encrypted, customizable C&C traces, Han Zhang and Christos Papadopoulos
Early detection of high entropy traffic, Han Zhang and Christos Papadopoulos
Exploiting mobile social behaviors for Sybil detection, Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, and Xuemin Sherman Shen
Security and privacy for mobile healthcare networks: From a quality of protection perspective, Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo
Using linguistic features to estimate suicide probability of Chinese microblog users, Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, and Tingshao Zhu
Bonding vertex sets over distributed graph: A betweenness aware approach, Xiaofei Zhang, Hong Cheng, and Lei Chen
Efficient parallel processing of distance join queries over distributed graphs, Xiaofei Zhang, Lei Chen, and Min Wang
Locality-aware allocation of multi-dimensional correlated files on the cloud platform, Xiaofei Zhang, Yongxin Tong, Lei Chen, Min Wang, and Shicong Feng
Submissions from 2014
A flexible Quagga-based virtual network with FIB aggregation, Jerald Abraham, Yaoqing Liu, Lan Wang, and Beichuan Zhang
Artificial immune systems, Uwe Aickelin, Dipankar Dasgupta, and Feng Gu
A game inspired defense mechanism against distributed denial of service attacks, Harkeerat Bedi, Sajjan Shiva, and Sankardas Roy
Latest progress and infrastructure innovations of big data technology, Shangyi Chen, Wei Li, Min Li, Xiaofei Zhang, and Yue Min
Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks, Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, and Manish Karir
Steps toward developing an artificial cell signaling model applied to distributed fault detection, Dipankar Dasgupta and Guilherme Costa Silva
G-NAS: A grid-based approach for negative authentication, Dipankar Dasgupta, Denise Ferebee, Sanjib Saha, Abhijit Kumar Nag, Kul Prasad Subedi, and Alvaro Madero
A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem
A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem
DNA codeword design: Theory and applications, Max H. Garzon
Incremental deployment strategies for effective detection and prevention of BGP origin Hijacks, Joseph Gersch, Dan Massey, and Christos Papadopoulos
Communication complexity of set-disjointness for all probabilities, Mika Göös and Thomas Watson
A distributed framework for aligning short reads to genomes, Shanshan Guo and Vinthuy Phan
Down the rabbit hole: Robust proximity search and density estimation in sublinear space?, Sariel Har-Peled and Nirman Kumar
Robust proximity search for balls using sublinear space, Sariel Har-Peled and Nirman Kumar
The patchworks code editor: Toward faster navigation with less code arranging and fewer navigation mistakes, Austin Z. Henley and Scott D. Fleming
Helping programmers navigate code faster with Patchworks: A simulation study, Austin Z. Henley, Alka Singh, Scott D. Fleming, and Maria V. Luong
Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons, Xiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, and Tingshao Zhu
Automatic generation and ranking of questions for critical review, Ming Liu, Rafael A. Calvo, and Vasile Rus
An adaptive approach for continuous multi-factor authentication in an identity eco-system, Abhijit Kumar Nag and Dipankar Dasgupta
A machine learning approach to pronominal anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula and Vasile Rus
The DARE corpus: A resource for anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, Rajendra Banjade, Dan Stefanescu, William Baggett, and Brent Morgan
Forms2Dialog: Automatic dialog generation for Web tasks, Nobal B. Niraula, Amanda Stent, Hyuckchul Jung, Giuseppe Di Fabbrizio, I. Dan Melamed, and Vasile Rus
Determining gene response patterns of time series gene expression data using R, Kevin L. O'kello and Vinhthuy Phan
Supporting climate research using named data networking, Catherine Olschanowsky, Susmit Shannigrahi, and Christos Papadopoulos
Are you driving? Non-intrusive driver detection using built-in smartphone sensors, Homin Park, Dae Han Ahn, Myounggyu Won, Sang H. Son, and Taejoon Park
How genome complexity can explain the hardness of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo
A survey of cloud computing taxonomies: Rationale and overview, Fahad Polash, Abdullah Abuhussein, and Sajjan Shiva
Opportunities and challenges in semantic similarity, Vasile Rus
On paraphrase identification corpora, Vasile Rus, Rajendra Banjade, and Mihai Lintean
Macro-adaptation in conversational intelligent tutoring matters, Vasile Rus, Dan Stefanescu, William Baggett, Nobal Niraula, Don Franceschetti, and Arthur C. Graesser
DeepTutor: Towards macro- and micro-adaptive conversational intelligent tutoring at scale, Vasile Rus, Dan Stefanescu, Nobal Niraula, and Arthur C. Graesser
Context-based speech act classification in intelligent tutoring systems, Borhan Samei, Haiying Li, Fazel Keshtkar, Vasile Rus, and Arthur C. Graesser
An integer polynomial programming based framework for lifted MAP inference, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate
Lifted MAP inference for Markov logic networks, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate
Political communities in Russian portion of Liveournal, Alexander Semenov, Jari Veijalainen, Mustafa Hajeer, and Dipankar Dasgupta
A bilingual analysis of cohesion in a corpus of leader speeches, Lubna Shala, Vasile Rus, and Arthur C. Graesser
Use of attack graphs in security systems, Vivek Shandilya, Chris B. Simmons, and Sajjan Shiva
A qualitative analysis of an ontology based issue resolution system for cyber attack management, Chris B. Simmons, Sajjan G. Shiva, and Lakisha L. Simmons
A Sentence similarity method based on chunking and information content, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus
Latent semantic analysis models on wikipedia and TASA, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus
Combining knowledge and corpus-based measures for word-to-word similarity, Dan Ştefənescu, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Efficient probabilistic supergraph search over large uncertain graphs, Yongxin Tong, Xiaofei Zhang, Caleb Chen Cao, and Lei Chen
Alignment of short reads to multiple genomes using hashing, Quang Tran and Vinhthuy Phan
Relieving the computational bottleneck: Joint inference for event extraction with high-dimensional features, Deepak Venugopal, Chen Chen, Vibhav Gogate, and Vincent Ng
Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate
Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate
Scaling-up importance sampling for Markov logic networks, Deepak Venugopal and Vibhav Gogate
Exploiting dependencies of pairwise comparison outcomes to predict patterns of gene response, Nam S. Vo and Vinhthuy Phan
Exploiting the bootstrap method to analyze patterns of gene expression, Nam S. Vo and Vinhthuy Phan
RandAL: A randomized approach to aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan
An integrated approach for SNP calling based on population of genomes, Nam S. Vo, Quang Tran, and Vinhthuy Phan
Advice lower bounds for the dense model theorem, Thomas Watson
The complexity of deciding statistical properties of samplable distributions, Thomas Watson
Time hierarchies for sampling distributions, Thomas Watson
Asym-MAC: A MAC protocol for low-power duty-cycled wireless sensor networks with asymmetric links, Myounggyu Won, Taejoon Park, and Sang H. Son
FuzzyJam: Reducing traffic jams using a fusion of fuzzy logic and vehicular networks, Myounggyu Won, Taejoon Park, and Sang H. Son
Lane-level traffic jam control using vehicle-to-vehicle communications, Myounggyu Won, Taejoon Park, and Sang H. Son
Modeling random deployment in wireless sensor networks for infrastructure-less cyber physical systems, Myounggyu Won, Hokyeong Ra, Taejoon Park, and Sang H. Son
ABAC: Attribute-based access control, Kan Yang and Xiaohua Jia
DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang and Xiaohua Jia
Expressive, efficient, and revocable data access control for multi-authority cloud storage, Kan Yang and Xiaohua Jia
Introduction, Kan Yang and Xiaohua Jia
Preface, Kan Yang and Xiaohua Jia
TSAS: Third-party storage auditing service, Kan Yang and Xiaohua Jia
Enabling efficient access control with dynamic policy updating for big data in the cloud, Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang
On the role of routing in named data networking, Cheng Yi, Jerald Abraham, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang
Named data networking, Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, K. C. Claffy, and Patrick Crowley
Efficient join query processing on the cloud, Xiaofei Zhang and Lei Chen