Submissions from 2014
Supporting climate research using named data networking, Catherine Olschanowsky, Susmit Shannigrahi, and Christos Papadopoulos
Are you driving? Non-intrusive driver detection using built-in smartphone sensors, Homin Park, Dae Han Ahn, Myounggyu Won, Sang H. Son, and Taejoon Park
How genome complexity can explain the hardness of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo
A survey of cloud computing taxonomies: Rationale and overview, Fahad Polash, Abdullah Abuhussein, and Sajjan Shiva
Opportunities and challenges in semantic similarity, Vasile Rus
On paraphrase identification corpora, Vasile Rus, Rajendra Banjade, and Mihai Lintean
Macro-adaptation in conversational intelligent tutoring matters, Vasile Rus, Dan Stefanescu, William Baggett, Nobal Niraula, Don Franceschetti, and Arthur C. Graesser
DeepTutor: Towards macro- and micro-adaptive conversational intelligent tutoring at scale, Vasile Rus, Dan Stefanescu, Nobal Niraula, and Arthur C. Graesser
Context-based speech act classification in intelligent tutoring systems, Borhan Samei, Haiying Li, Fazel Keshtkar, Vasile Rus, and Arthur C. Graesser
An integer polynomial programming based framework for lifted MAP inference, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate
Lifted MAP inference for Markov logic networks, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate
Political communities in Russian portion of Liveournal, Alexander Semenov, Jari Veijalainen, Mustafa Hajeer, and Dipankar Dasgupta
A bilingual analysis of cohesion in a corpus of leader speeches, Lubna Shala, Vasile Rus, and Arthur C. Graesser
Use of attack graphs in security systems, Vivek Shandilya, Chris B. Simmons, and Sajjan Shiva
A qualitative analysis of an ontology based issue resolution system for cyber attack management, Chris B. Simmons, Sajjan G. Shiva, and Lakisha L. Simmons
A Sentence similarity method based on chunking and information content, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus
Latent semantic analysis models on wikipedia and TASA, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus
Combining knowledge and corpus-based measures for word-to-word similarity, Dan Ştefənescu, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Efficient probabilistic supergraph search over large uncertain graphs, Yongxin Tong, Xiaofei Zhang, Caleb Chen Cao, and Lei Chen
Alignment of short reads to multiple genomes using hashing, Quang Tran and Vinhthuy Phan
Relieving the computational bottleneck: Joint inference for event extraction with high-dimensional features, Deepak Venugopal, Chen Chen, Vibhav Gogate, and Vincent Ng
Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate
Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate
Scaling-up importance sampling for Markov logic networks, Deepak Venugopal and Vibhav Gogate
Estimating Drivers' Stress from GPS Traces, Sudip Vhaduri, Amin Ali, Moushumi Sharmin, Karen Hovsepian, and Santosh Kumar
Exploiting dependencies of pairwise comparison outcomes to predict patterns of gene response, Nam S. Vo and Vinhthuy Phan
Exploiting the bootstrap method to analyze patterns of gene expression, Nam S. Vo and Vinhthuy Phan
RandAL: A randomized approach to aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan
An integrated approach for SNP calling based on population of genomes, Nam S. Vo, Quang Tran, and Vinhthuy Phan
Advice lower bounds for the dense model theorem, Thomas Watson
The complexity of deciding statistical properties of samplable distributions, Thomas Watson
Time hierarchies for sampling distributions, Thomas Watson
Asym-MAC: A MAC protocol for low-power duty-cycled wireless sensor networks with asymmetric links, Myounggyu Won, Taejoon Park, and Sang H. Son
FuzzyJam: Reducing traffic jams using a fusion of fuzzy logic and vehicular networks, Myounggyu Won, Taejoon Park, and Sang H. Son
Lane-level traffic jam control using vehicle-to-vehicle communications, Myounggyu Won, Taejoon Park, and Sang H. Son
Modeling random deployment in wireless sensor networks for infrastructure-less cyber physical systems, Myounggyu Won, Hokyeong Ra, Taejoon Park, and Sang H. Son
ABAC: Attribute-based access control, Kan Yang and Xiaohua Jia
DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang and Xiaohua Jia
Expressive, efficient, and revocable data access control for multi-authority cloud storage, Kan Yang and Xiaohua Jia
Introduction, Kan Yang and Xiaohua Jia
Preface, Kan Yang and Xiaohua Jia
TSAS: Third-party storage auditing service, Kan Yang and Xiaohua Jia
Enabling efficient access control with dynamic policy updating for big data in the cloud, Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang
On the role of routing in named data networking, Cheng Yi, Jerald Abraham, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang
Named data networking, Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, K. C. Claffy, and Patrick Crowley
Efficient join query processing on the cloud, Xiaofei Zhang and Lei Chen
Aggregate nearest neighbors query based on influence zone in road networks, Xiaofei Zhang, Jian Xu, Ming Xu, Ning Zheng, and Shenzhu Feng
Submissions from 2013
Mitigating congestion-based denial of service attacks with active queue management, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva
Towards a structured representation of generic concepts and relations in large text corpora, Archana Bhattarai and Vasile Rus
End-user programmers in trouble: Can the Idea Garden help them to help themselves?, Jill Cao, Irwin Kwan, Faezeh Bahmani, Margaret Burnett, Scott D. Fleming, and Josh Jordahl
Consequences of diminishing trust in cyberspace, Dipankar Dasgupta and Denise Ferebee
Applying Puzzle-based Learning to cyber-security education, Dipankar Dasgupta, Denise M. Ferebee, and Zbigniew Michalewicz
Runtime monitors to detect and prevent union query based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva
EHSTC: An enhanced method for semantic trajectory compression, Shenzhu Feng, Jian Xu, Ming Xu, Ning Zheng, and Xiaofei Zhang
An information foraging theory perspective on tools for debugging, refactoring, and reuse tasks, Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, and Joseph Lawrance
Knowledge re-use and dissemination for resource elicitation in software engineering, Max H. Garzon, Chris Simmons, and Jason Knisley
Approximate nearest neighbor search for low-dimensional queries, Sariel Har-Peled and Nirman Kumar
Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar
Decision support method based on process mining, Hai Yang Hu, Xiao Fei Zhang, Hua Hu, and Ji Dong Ge
Not so cooperative caching in named data networking, Xiaoyan Hu, Christos Papadopoulos, Jian Gong, and Daniel Massey
APT: A Practical Tunneling Architecture for Routing Scalability, Daniel Jen, Michael Meisel, Lan Wang, Beichuan Zhang, Daniel Massey, and Lixia Zhang
What use is a backseat driver? A qualitative investigation of pair programming, Danielle L. Jones and Scott D. Fleming
Autonomous wireless radar sensor mote for target material classification, Muhammad M.R. Khan, Khan M. Iftekharuddin, Ernest McCracken, Khandakar Islam, Sushil Bhurtel, and Lan Wang
Resilient hybrid overlay model for smart grid: RHM for smart grid, Shubhalaxmi Kher, Victor Nutt, and Dipankar Dasgupta
A prediction model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon
Fault tolerant clustering revisited, Nirman Kumar and Benjamin Raichel
Mobile health technology evaluation: the mHealth evidence workshop, Santosh Kumar, Wendy J. Nilsen, Amy Abernethy, Audie Atienza, Kevin Patrick, Misha Pavel, William T. Riley, Albert Shar, Bonnie Spring, Donna Spruijt-Metz, Donald Hedeker, Vasant Honavar, Richard Kravitz, R Craig Lefebvre, David C. Mohr, Susan A. Murphy, Charlene Quinn, Vladimir Shusterman, and Dallas Swendeman
How programmers debug, revisited: An information foraging theory perspective, Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D. Fleming
Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Syed Obaid Amin, and Lan Wang
On the Aggregatability of Router Forwarding Tables, Yaoqing Liu, Lan Wang, Xin Zhao, and Beichuan Zhang
FIFA: Fast incremental FIB aggregation, Yaoqing Liu, Beichuan Zhang, and Lan Wang
Using a parameterized memory model to modulate NPC AI, Weizi Li, Tim Balint, and Jan M. Allbeck
NLSR: Named-data link state routing protocol, A. K.M. Mahmudul Hoque, Syed Obaid Amin, Adam Alyyan, Beichuan Zhang, Lixia Zhang, and Lan Wang
A combined discriminative and generative behavior model for cyber physical system defense, Owen McCusker, Scott Brunza, Marco Carvalho, Dipankar Dasgupta, and Setu Vora
Deriving behavior primitives from aggregate network features using support vector machines, Owen McCusker, Scott Brunza, and Dipankar Dasgupta
The writing-pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai
The SCHOLAR legacy: A new look at the affordances of semantic networks for conversational agents in intelligent tutoring systems, Donald M. Morrison and Vasile Rus
Experiments with semantic similarity measures based on LDA and LSA, Nobal Niraula, Rajendra Banjade, Dan Ştefǎnescu, and Vasile Rus
DARE: Deep Anaphora Resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, and Dan Stefanescu
Delivering diverse BGP data in real-time and through multi-format archiving, Catherine Olschanowsky, M. Lawrence Weikum, Jason Smith, Christos Papadopoulos, and Dan Massey
Inferring directed-graph patterns of gene responses to treatments, Vinhthuy Phan, Nam S. Vo, and Thomas R. Sutter
The whats and hows of programmers' foraging diets, David J. Piorkowski, Scott D. Fleming, Irwin Kwan, Margaret M. Burnett, Chris Scaffidi, and Rachel K.E. Bellamy
Semilar: A semantic similarity toolkit for assessing students’ natural language inputs, Vasile Rus, Rajendra Banjade, Mihai Lintean, Nobal Niraula, and Dan Stefanescu
Recent advances in conversational intelligent tutoring systems, Vasile Rus, Sidney D'Mello, Xiangen Hu, and Arthur C. Graesser
Similarity measures based on Latent Dirichlet Allocation, Vasile Rus, Nobal Niraula, and Rajendra Banjade
A study of probabilistic and algebraic methods for semantic similarity, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Recommendations for the generalized intelligent framework for tutoring based on the development of the deeptutor tutoring service, Vasile Rus, Nobal Niraula, Mihai Lintean, Rajendra Banjade, Dan Stefanescu, and William Baggett
A tool for speech act classification using interactive machine learning, Borhan Samei, Fazel Keshtkar, Arthur C. Graesser, and Vasile Rus
Security in the cloud based systems: Structure and breaches, Vivek Shandilya and Sajjan Shiva
Computer organization, design, and architecture, fifth edition, Sajjan G. Shiva
ADAPT: A game inspired attack-defense and performance metric taxonomy, Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya
Dynamic blocking and collapsing for gibbs sampling, Deepak Venugopal and Vibhav Gogate
GiSS: Combining Gibbs sampling and SampleSearch for inference in mixed probabilistic and deterministic graphical models, Deepak Venugopal and Vibhav Gogate
Exploiting dependencies of patterns in gene expression analysis using pairwise comparisons, Nam S. Vo and Vinhthuy Phan
A randomized algorithm for aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan
Advice lower bounds for the dense model theorem, Thomas Watson
Pseudorandom generators for combinatorial checkerboards, Thomas Watson
Time hierarchies for sampling distributions, Thomas Watson
Energy saving virtual machine allocation in cloud computing, Ruitao Xie, Xiaohua Jia, Kan Yang, and Bo Zhang
An efficient and secure dynamic auditing protocol for data storage in cloud computing, Kan Yang and Xiaohua Jia