Follow

Submissions from 2016

Link

Big data-driven optimization for mobile networks toward 5G, Kan Zheng, Zhe Yang, Kuan Zhang, Periklis Chatzimisios, Kan Yang, and Wei Xiang

Submissions from 2015

Link

SNAMP: Secure namespace mapping to scale NDN forwarding, Alexander Afanasyev, Cheng Yi, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Leveraging crowdsourcing in clould application development, Eman Aldhahri, Abdullah Abuhussein, and Sajjan Shiva

Link

Towards an effective crowdsourcing recommendation system: A survey of the state-of-the-art, Eman Aldhahri, Vivek Shandilya, and Sajjan Shiva

Link

Effect of mild-to-moderate smoking on viral load, cytokines, oxidative stress, and cytochrome P450 enzymes in HIV-infected individuals, Anusha Ande, Carole McArthur, Leo Ayuk, Charles Awasom, Paul Ngang Achu, Annette Njinda, Namita Sinha, P S. Rao, Marisela Agudelo, Anantha Ram Nookala, Stephen Simon, Anil Kumar, and Santosh Kumar

Link

Enhanced oxidative stress by alcohol use in HIV+ patients: possible involvement of cytochrome P450 2E1 and antioxidant enzymes, Anusha Ande, Namita Sinha, P S. Rao, Carole P. McArthur, Leo Ayuk, Paul N. Achu, Annette Njinda, Anil Kumar, and Santosh Kumar

Link

Lemon and tea are not similar: Measuring word-to-word similarity by combining different methods, Rajendra Banjade, Nabin Maharjan, Nobal B. Niraula, Vasile Rus, and Dipesh Gautam

NeRoSim: A System for Measuring and Interpreting Semantic Textual Similarity, Rajendra Banjade, Nobal B. Niraula, Nabin Maharjan, Vasile Rus, Dan Stefanescu, and Mihai Lintean

Using an implicit method for coreference resolution and ellipsis handling in automatic student answer assessment, Rajendra Banjade, Vasile Rus, and Nobal B. Niraula

Link

Mitigating congestion based DoS attacks with an enhanced AQM technique, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva

Link

Idea garden: Situated support for problem solving by end-user programmers, Jill Cao, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi

Link

On modeling and analysis of MIMO wireless mesh networks with triangular overlay topology, Zhanmao Cao, Chase Q. Wu, Yuanping Zhang, Sajjan G. Shiva, and Yi Gu

Link

Investigational reverse transcriptase inhibitors for the treatment of HIV, Theodore J. Cory, Narasimha M. Midde, Pss Rao, and Santosh Kumar

Link

Managing scientific data with named data networking, Chengyu Fan, Susmit Shannigrahi, Steve Dibenedetto, Catherine Olschanowsky, Christos Papadopoulos, and Harvey Newman

Link

Privacy principles for sharing cyber security data, Gina Fisk, Calvin Ardi, Neale Pickett, John Heidemann, Mike Fisk, and Christos Papadopoulos

Link

Pragmatic router FIB caching, Kaustubh Gadkari, M. Lawrence Weikum, Dan Massey, and Christos Papadopoulos

Link

Alignment-free methods for metagenomic profiling, Shanshan Gao, Diem Trang Pham, and Vinhthuy Phan

Link

Fast Compaction Algorithms for NoSQL Databases, Mainak Ghosh, Indranil Gupta, Shalmoli Gupta, and Nirman Kumar

Link

Rectangles are nonnegative juntas, Mika Göös, Shachar Lovett, Raghu Meka, Thomas Watson, and David Zuckerman

Link

Deterministic Communication vs. Partition Number, Mika Goos, Toniann Pitassi, and Thomas Watson

Link

Zero-information protocols and unambiguity in Arthur-Merlin communication [extended abstract], Mika Göös, Toniann Pitassi, and Thomas Watson

Link

Distributed evolutionary approach to data clustering and modeling, Mustafa Hajeer, Dipankar Dasgupta, Alexander Semenov, and Jari Veijalainen

Link

Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar

Link

Space Exploration via Proximity Search, Sariel Har-Peled, Nirman Kumar, David M. Mount, and Benjamin Raichel

Link

cStress: Towards a Gold Standard for Continuous Stress Assessment in the Mobile Environment, Karen Hovsepian, Mustafa al'Absi, Emre Ertin, Thomas Kamarck, Motohiro Nakajima, and Santosh Kumar

Topic model for identifying suicidal ideation in Chinese microblog, Xiaolei Huang, Xin Li, Lei Zhang, Tianli Liu, David Chiu, and Tingshao Zhu

Link

Continuous in-the-field measurement of heart rate: Correlates of drug use, craving, stress, and mood in polydrug users, Ashley P. Kennedy, David H. Epstein, Michelle L. Jobes, Daniel Agage, Matthew Tyburski, Karran A. Phillips, Amin Ahsan Ali, Rummana Bari, Syed Monowar Hossain, Karen Hovsepian, Md Mahbubur Rahman, Emre Ertin, Santosh Kumar, and Kenzie L. Preston

Link

Foreword VL/HCC 2015, Eileen Kraemer, Claudia Ermel, and Scott Fleming

Link

Drug-drug interactions between anti-retroviral therapies and drugs of abuse in HIV systems, Santosh Kumar, P S. Rao, Ravindra Earla, and Anil Kumar

An optimal quadratic approach to monolingual paraphrase alignment, Mihai Lintean and Vasile Rus

Link

Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Vince Lehman, and Lan Wang

Link

Biologically-Inspired Visual Simulation of Insect Swarms, Weizi Li, David Wolinski, Julien Pettré, and Ming C. Lin

Development of NanoART for HIV Treatment: Minding the Cytochrome P450 (CYP) Enzymes, Narasimha M. Midde and Santosh Kumar

Link

Probabilistic analysis of pattern formation in monotonic self-assembly, Tyler G. Moore, Max H. Garzon, and Russell J. Deaton

Link

Tutorial dialogue modes in a large corpus of online tutoring transcripts, Donald M. Morrison, Benjamin Nye, Vasile Rus, Sarah Snyder, Jennifer Boller, and Kenneth Miller

Link

An adaptive approach towards the selection of multi-factor authentication, Abhijit Kumar Nag, Arunava Roy, and Dipankar Dasgupta

Combining word representations for measuring word relatedness and similarity, Nobal B. Niraula, Dipesh Gautam, Rajendra Banjade, Nabin Maharjan, and Vasile Rus

Judging the quality of automatically generated gap-fill question using active learning, Nobal B. Niraula and Vasile Rus

Link

How genome complexity can explain the difficulty of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo

Link

To fix or to learn? How production bias affects developers' information foraging during debugging, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Margaret Burnett, Irwin Kwan, and Austin Z. Henley

Link

Building Trust in Cloud: Service Certification Challenges and Approaches, Fahad Polash and Sajjan Shiva

Link

Period estimation for adaptive reconstruction of (quasi-) periodic signals, Danilo Rairan and Max H. Garzon

Link

Polycyclic aromatic hydrocarbons and cytochrome P450 in HIV pathogenesis, P S. Rao and Santosh Kumar

Link

Diallyl Sulfide: Potential Use in Novel Therapeutic Interventions in Alcohol, Drugs, and Disease Mediated Cellular Toxicity by Targeting Cytochrome P450 2E1, P S. Rao, Narasimha M. Midde, Duane D. Miller, Subhash Chauhan, Anil Kumar, and Santosh Kumar

Designing Novel Nanoformulations Targeting Glutamate Transporter Excitatory Amino Acid Transporter 2: Implications in Treating Drug Addiction, Pss Rao, Murali M. Yallapu, Youssef Sari, Paul B. Fisher, and Santosh Kumar

Link

Integrating learning progressions in unsupervised After-School online intelligent tutoring, Vasile Rus, Arthur Graesser, Nobal Niraula, and Rajendra Banjade

Deeptutor: An effective, online intelligent tutoring system that promotes Deep learning, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Automated labelling of dialogue modes in tutorial dialogues, Vasile Rus, Nobal B. Niraula, Nabin Maharjan, and Rajendra Banjade

Link

Co-simulation platform for characterizing cyber attacks in cyber physical systems, Mohammad Ashraf Hossain Sadi, Mohd Hasan Ali, Dipankar Dasgupta, Robert K. Abercrombie, and Shubhalaxmi Kher

Link

OPNET/simulink based testbed for disturbance detection in the smart grid, Mohammad Ashraf Hossain Sadi, Mohd Hassan Ali, Dipankar Dasgupta, and Robert K. Abercrombie

Link

Human-cognition-based CAPTCHAs, Sanjib Kumar Saha, Abhijit Kumar Nag, and Dipankar Dasgupta

puffMarker: A Multi-Sensor Approach for Pinpointing the Timing of First Lapse in Smoking Cessation, Nazir Saleheen, Amin Ahsan Ali, Syed Monowar Hossain, Hillol Sarker, Soujanya Chatterjee, Benjamin Marlin, Emre Ertin, Mustafa al'Absi, and Santosh Kumar

Link

A network security game model, Vivek Shandilya and Sajjan Shiva

Link

Named data networking in climate research and HEP applications, Susmit Shannigrahi, Christos Papadopoulos, Edmund Yeh, Harvey Newman, Artur Jerzy Barczyk, and Ran Liu

Link

Dynamic bandwidth allocation in mobile social networks with multiple homing access, Zhou Su, Qichao Xu, Kuan Zhang, Kan Yang, and Xuemin Sherman Shen

Link

A linear model for predicting performance of short-read aligners using genome complexity, Quang Tran, Shanshan Gao, Nam S. Vo, and Vinhthuy Phan

Scaling-up inference in markov logic, Deepak Venugopal

Just count the satisfied groundings: Scalable local-search and sampling based inference in MLNs, Deepak Venugopal, Somdeb Sarkhel, and Vibhav Gogate

Link

Improving variant calling by incorporating known genetic variants into read alignment, Nam S. Vo and Vinhthuy Phan

Link

Generalized pattern matching string search on encrypted data in cloud systems, Dongsheng Wang, Xiaohua Jia, Cong Wang, Kan Yang, Shaojing Fu, and Ming Xu

Link

MAVP-FE: Multi-authority vector policy functional encryption with efficient encryption and decryption, Jing Wang, Chuanhe Huang, Kan Yang, Jinhai Wang, Xiaomao Wang, and Xi Chen

Link

Query Complexity in Errorless Hardness Amplification, Thomas Watson

Link

The complexity of deciding statistical properties of samplable distributions, Thomas Watson

Link

Virtualized traffic at metropolitan scales, David Wilkie, Jason Sewall, Weizi Li, and Ming C. Lin

Link

Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud, Kan Yang, Xiaohua Jia, and Kui Ren

Link

Security and privacy in mobile crowdsourcing networks: Challenges and opportunities, Kan Yang, Kuan Zhang, Ju Ren, and Xuemin Sherman Shen

Link

BotTalker: Generating encrypted, customizable C&C traces, Han Zhang and Christos Papadopoulos

Link

Early detection of high entropy traffic, Han Zhang and Christos Papadopoulos

Link

Exploiting mobile social behaviors for Sybil detection, Kuan Zhang, Xiaohui Liang, Rongxing Lu, Kan Yang, and Xuemin Sherman Shen

Link

Security and privacy for mobile healthcare networks: From a quality of protection perspective, Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo

Link

Using linguistic features to estimate suicide probability of Chinese microblog users, Lei Zhang, Xiaolei Huang, Tianli Liu, Ang Li, Zhenxiang Chen, and Tingshao Zhu

Link

Bonding vertex sets over distributed graph: A betweenness aware approach, Xiaofei Zhang, Hong Cheng, and Lei Chen

Link

Efficient parallel processing of distance join queries over distributed graphs, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Locality-aware allocation of multi-dimensional correlated files on the cloud platform, Xiaofei Zhang, Yongxin Tong, Lei Chen, Min Wang, and Shicong Feng

Submissions from 2014

Link

A flexible Quagga-based virtual network with FIB aggregation, Jerald Abraham, Yaoqing Liu, Lan Wang, and Beichuan Zhang

Link

Artificial immune systems, Uwe Aickelin, Dipankar Dasgupta, and Feng Gu

Link

A game inspired defense mechanism against distributed denial of service attacks, Harkeerat Bedi, Sajjan Shiva, and Sankardas Roy

Link

Latest progress and infrastructure innovations of big data technology, Shangyi Chen, Wei Li, Min Li, Xiaofei Zhang, and Yue Min

Link

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks, Jakub Czyz, Michael Kallitsis, Manaf Gharaibeh, Christos Papadopoulos, Michael Bailey, and Manish Karir

Link

Steps toward developing an artificial cell signaling model applied to distributed fault detection, Dipankar Dasgupta and Guilherme Costa Silva

Link

G-NAS: A grid-based approach for negative authentication, Dipankar Dasgupta, Denise Ferebee, Sanjib Saha, Abhijit Kumar Nag, Kul Prasad Subedi, and Alvaro Madero

Link

A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem

Link

A framework for compliance and security coverage estimation for cloud services: A cloud insurance model, Dipankar Dasgupta and Durdana Naseem

Link

Enhanced methamphetamine metabolism in rhesus macaque as compared with human: an analysis using a novel method of liquid chromatography with tandem mass spectrometry, kinetic study, and substrate docking, Ravinder Earla, Santosh Kumar, Lei Wang, Steven Bosinger, Junhao Li, Ankit Shah, Mohitkumar Gangwani, Anantha Nookala, Xun Liu, Lu Cao, Austin Jackson, Peter S. Silverstein, Howard S. Fox, Weihua Li, and Anil Kumar

Link

DNA codeword design: Theory and applications, Max H. Garzon

Link

Incremental deployment strategies for effective detection and prevention of BGP origin Hijacks, Joseph Gersch, Dan Massey, and Christos Papadopoulos

Link

Communication complexity of set-disjointness for all probabilities, Mika Göös and Thomas Watson

Link

A distributed framework for aligning short reads to genomes, Shanshan Guo and Vinthuy Phan

Link

Down the rabbit hole: Robust proximity search and density estimation in sublinear space?, Sariel Har-Peled and Nirman Kumar

Link

Robust proximity search for balls using sublinear space, Sariel Har-Peled and Nirman Kumar

Link

The patchworks code editor: Toward faster navigation with less code arranging and fewer navigation mistakes, Austin Z. Henley and Scott D. Fleming

Link

Helping programmers navigate code faster with Patchworks: A simulation study, Austin Z. Henley, Alka Singh, Scott D. Fleming, and Maria V. Luong

Identifying Drug (Cocaine) Intake Events from Acute Physiological Response in the Presence of Free-living Physical Activity, Syed Monowar Hossain, Amin Ahsan Ali, Mahbubur Rahman, Emre Ertin, David Epstein, Ashley Kennedy, Kenzie Preston, Annie Umbricht, Yixin Chen, and Santosh Kumar

Link

Detecting Suicidal Ideation in Chinese Microblogs with Psychological Lexicons, Xiaolei Huang, Lei Zhang, David Chiu, Tianli Liu, Xin Li, and Tingshao Zhu

Automatic generation and ranking of questions for critical review, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

An adaptive approach for continuous multi-factor authentication in an identity eco-system, Abhijit Kumar Nag and Dipankar Dasgupta

Link

A machine learning approach to pronominal anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula and Vasile Rus

The DARE corpus: A resource for anaphora resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, Rajendra Banjade, Dan Stefanescu, William Baggett, and Brent Morgan

Link

Forms2Dialog: Automatic dialog generation for Web tasks, Nobal B. Niraula, Amanda Stent, Hyuckchul Jung, Giuseppe Di Fabbrizio, I. Dan Melamed, and Vasile Rus

Link

Determining gene response patterns of time series gene expression data using R, Kevin L. O'kello and Vinhthuy Phan