Follow

Submissions from 2015

Link

To fix or to learn? How production bias affects developers' information foraging during debugging, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Margaret Burnett, Irwin Kwan, and Austin Z. Henley

Link

Building Trust in Cloud: Service Certification Challenges and Approaches, Fahad Polash and Sajjan Shiva

Link

Period estimation for adaptive reconstruction of (quasi-) periodic signals, Danilo Rairan and Max H. Garzon

Link

Integrating learning progressions in unsupervised After-School online intelligent tutoring, Vasile Rus, Arthur Graesser, Nobal Niraula, and Rajendra Banjade

Deeptutor: An effective, online intelligent tutoring system that promotes Deep learning, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Automated labelling of dialogue modes in tutorial dialogues, Vasile Rus, Nobal B. Niraula, Nabin Maharjan, and Rajendra Banjade

Link

Co-simulation platform for characterizing cyber attacks in cyber physical systems, Mohammad Ashraf Hossain Sadi, Mohd Hasan Ali, Dipankar Dasgupta, Robert K. Abercrombie, and Shubhalaxmi Kher

Link

OPNET/simulink based testbed for disturbance detection in the smart grid, Mohammad Ashraf Hossain Sadi, Mohd Hassan Ali, Dipankar Dasgupta, and Robert K. Abercrombie

Link

Human-cognition-based CAPTCHAs, Sanjib Kumar Saha, Abhijit Kumar Nag, and Dipankar Dasgupta

Link

A network security game model, Vivek Shandilya and Sajjan Shiva

Link

Named data networking in climate research and HEP applications, Susmit Shannigrahi, Christos Papadopoulos, Edmund Yeh, Harvey Newman, Artur Jerzy Barczyk, and Ran Liu

Link

Dynamic bandwidth allocation in mobile social networks with multiple homing access, Zhou Su, Qichao Xu, Kuan Zhang, Kan Yang, and Xuemin Sherman Shen

Link

A linear model for predicting performance of short-read aligners using genome complexity, Quang Tran, Shanshan Gao, Nam S. Vo, and Vinhthuy Phan

Scaling-up inference in markov logic, Deepak Venugopal

Just count the satisfied groundings: Scalable local-search and sampling based inference in MLNs, Deepak Venugopal, Somdeb Sarkhel, and Vibhav Gogate

Link

Improving variant calling by incorporating known genetic variants into read alignment, Nam S. Vo and Vinhthuy Phan

Link

Generalized pattern matching string search on encrypted data in cloud systems, Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, and Ming Xu

Link

MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption, Jing Wang, Chuanhe Huang, Kan Yang, Jinhai Wang, Xiaomao Wang, and Xi Chen

Link

Query Complexity in Errorless Hardness Amplification, Thomas Watson

Link

The complexity of deciding statistical properties of samplable distributions, Thomas Watson

Link

Virtualized traffic at metropolitan scales, David Wilkie, Jason Sewall, Weizi Li, and Ming C. Lin

Link

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, Kan Yang, Xiaohua Jia, and Kui Ren

Link

Security and privacy in mobile crowdsourcing networks: Challenges and opportunities, Kan Yang, Kuan Zhang, Ju Ren, and Xuemin Sherman Shen

Link

BotTalker: Generating encrypted, customizable C&C traces, Han Zhang and Christos Papadopoulos

Link

Early detection of high entropy traffic, Han Zhang and Christos Papadopoulos

Link

Exploiting mobile social behaviors for Sybil detection, Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, and Xuemin Sherman Shen

Link

Security and privacy for mobile healthcare networks: From a quality of protection perspective, Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo

Link

Using linguistic features to estimate suicide probability of Chinese microblog users, Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, and Tingshao Zhu

Link

Bonding vertex sets over distributed graph: A betweenness aware approach, Xiaofei Zhang, Hong Cheng, and Lei Chen

Link

Efficient parallel processing of distance join queries over distributed graphs, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Locality-aware allocation of multi-dimensional correlated files on the cloud platform, Xiaofei Zhang, Yongxin Tong, Lei Chen, Min Wang, and Shicong Feng

Submissions from 2014

Link

A flexible Quagga-based virtual network with FIB aggregation, Jerald Abraham, Yaoqing Liu, Lan Wang, and Beichuan Zhang

Link

Artificial immune systems, Uwe Aickelin, Dipankar Dasgupta, and Feng Gu

Link

A game inspired defense mechanism against distributed denial of service attacks, Harkeerat Bedi, Sajjan Shiva, and Sankardas Roy

Link

Latest progress and infrastructure innovations of big data technology, Shangyi Chen, Wei Li, Min Li, Xiaofei Zhang, and Yue Min

Link

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks, Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, and Manish Karir

Link

Steps toward developing an artificial cell signaling model applied to distributed fault detection, Dipankar Dasgupta and Guilherme Costa Silva

Link

G-NAS: A grid-based approach for negative authentication, Dipankar Dasgupta, Denise Ferebee, Sanjib Saha, Abhijit Kumar Nag, Kul Prasad Subedi, and Alvaro Madero

Link

A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem

Link

A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem

Link

DNA codeword design: Theory and applications, Max H. Garzon

Link

Incremental deployment strategies for effective detection and prevention of BGP origin Hijacks, Joseph Gersch, Dan Massey, and Christos Papadopoulos

Link

Communication complexity of set-disjointness for all probabilities, Mika Göös and Thomas Watson

Link

A distributed framework for aligning short reads to genomes, Shanshan Guo and Vinthuy Phan

Link

Down the rabbit hole: Robust proximity search and density estimation in sublinear space?, Sariel Har-Peled and Nirman Kumar

Link

Robust proximity search for balls using sublinear space, Sariel Har-Peled and Nirman Kumar

Link

The patchworks code editor: Toward faster navigation with less code arranging and fewer navigation mistakes, Austin Z. Henley and Scott D. Fleming

Link

Helping programmers navigate code faster with Patchworks: A simulation study, Austin Z. Henley, Alka Singh, Scott D. Fleming, and Maria V. Luong

Link

Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons, Xiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, and Tingshao Zhu

Automatic generation and ranking of questions for critical review, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

An adaptive approach for continuous multi-factor authentication in an identity eco-system, Abhijit Kumar Nag and Dipankar Dasgupta

Link

A machine learning approach to pronominal anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula and Vasile Rus

The DARE corpus: A resource for anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, Rajendra Banjade, Dan Stefanescu, William Baggett, and Brent Morgan

Link

Forms2Dialog: Automatic dialog generation for Web tasks, Nobal B. Niraula, Amanda Stent, Hyuckchul Jung, Giuseppe Di Fabbrizio, I. Dan Melamed, and Vasile Rus

Link

Determining gene response patterns of time series gene expression data using R, Kevin L. O'kello and Vinhthuy Phan

Link

Supporting climate research using named data networking, Catherine Olschanowsky, Susmit Shannigrahi, and Christos Papadopoulos

Link

Are you driving? Non-intrusive driver detection using built-in smartphone sensors, Homin Park, Dae Han Ahn, Myounggyu Won, Sang H. Son, and Taejoon Park

Link

How genome complexity can explain the hardness of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo

Link

A survey of cloud computing taxonomies: Rationale and overview, Fahad Polash, Abdullah Abuhussein, and Sajjan Shiva

Opportunities and challenges in semantic similarity, Vasile Rus

On paraphrase identification corpora, Vasile Rus, Rajendra Banjade, and Mihai Lintean

Link

Macro-adaptation in conversational intelligent tutoring matters, Vasile Rus, Dan Stefanescu, William Baggett, Nobal Niraula, Don Franceschetti, and Arthur C. Graesser

Link

DeepTutor: Towards macro- and micro-adaptive conversational intelligent tutoring at scale, Vasile Rus, Dan Stefanescu, Nobal Niraula, and Arthur C. Graesser

Link

Context-based speech act classification in intelligent tutoring systems, Borhan Samei, Haiying Li, Fazel Keshtkar, Vasile Rus, and Arthur C. Graesser

An integer polynomial programming based framework for lifted MAP inference, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate

Lifted MAP inference for Markov logic networks, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate

Link

Political communities in Russian portion of Liveournal, Alexander Semenov, Jari Veijalainen, Mustafa Hajeer, and Dipankar Dasgupta

A bilingual analysis of cohesion in a corpus of leader speeches, Lubna Shala, Vasile Rus, and Arthur C. Graesser

Link

Use of attack graphs in security systems, Vivek Shandilya, Chris B. Simmons, and Sajjan Shiva

Link

A qualitative analysis of an ontology based issue resolution system for cyber attack management, Chris B. Simmons, Sajjan G. Shiva, and Lakisha L. Simmons

Link

A Sentence similarity method based on chunking and information content, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus

Latent semantic analysis models on wikipedia and TASA, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus

Combining knowledge and corpus-based measures for word-to-word similarity, Dan Ştefənescu, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Link

Efficient probabilistic supergraph search over large uncertain graphs, Yongxin Tong, Xiaofei Zhang, Caleb Chen Cao, and Lei Chen

Link

Alignment of short reads to multiple genomes using hashing, Quang Tran and Vinhthuy Phan

Link

Relieving the computational bottleneck: Joint inference for event extraction with high-dimensional features, Deepak Venugopal, Chen Chen, Vibhav Gogate, and Vincent Ng

Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate

Link

Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate

Scaling-up importance sampling for Markov logic networks, Deepak Venugopal and Vibhav Gogate

Link

Exploiting dependencies of pairwise comparison outcomes to predict patterns of gene response, Nam S. Vo and Vinhthuy Phan

Link

Exploiting the bootstrap method to analyze patterns of gene expression, Nam S. Vo and Vinhthuy Phan

Link

RandAL: A randomized approach to aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan

Link

An integrated approach for SNP calling based on population of genomes, Nam S. Vo, Quang Tran, and Vinhthuy Phan

Link

Advice lower bounds for the dense model theorem, Thomas Watson

Link

The complexity of deciding statistical properties of samplable distributions, Thomas Watson

Link

Time hierarchies for sampling distributions, Thomas Watson

Link

Asym-MAC: A MAC protocol for low-power duty-cycled wireless sensor networks with asymmetric links, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

FuzzyJam: Reducing traffic jams using a fusion of fuzzy logic and vehicular networks, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

Lane-level traffic jam control using vehicle-to-vehicle communications, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

Modeling random deployment in wireless sensor networks for infrastructure-less cyber physical systems, Myounggyu Won, Hokyeong Ra, Taejoon Park, and Sang H. Son

Link

ABAC: Attribute-based access control, Kan Yang and Xiaohua Jia

Link

DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang and Xiaohua Jia

Link

Expressive, efficient, and revocable data access control for multi-authority cloud storage, Kan Yang and Xiaohua Jia

Link

Introduction, Kan Yang and Xiaohua Jia

Preface, Kan Yang and Xiaohua Jia

Link

TSAS: Third-party storage auditing service, Kan Yang and Xiaohua Jia

Link

Enabling efficient access control with dynamic policy updating for big data in the cloud, Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang

Link

On the role of routing in named data networking, Cheng Yi, Jerald Abraham, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Named data networking, Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, K. C. Claffy, and Patrick Crowley

Link

Efficient join query processing on the cloud, Xiaofei Zhang and Lei Chen