Follow

Submissions from 2014

Link

Supporting climate research using named data networking, Catherine Olschanowsky, Susmit Shannigrahi, and Christos Papadopoulos

Link

Are you driving? Non-intrusive driver detection using built-in smartphone sensors, Homin Park, Dae Han Ahn, Myounggyu Won, Sang H. Son, and Taejoon Park

Link

How genome complexity can explain the hardness of aligning reads to genomes, Vinhthuy Phan, Shanshan Gao, Quang Tran, and Nam S. Vo

Link

A survey of cloud computing taxonomies: Rationale and overview, Fahad Polash, Abdullah Abuhussein, and Sajjan Shiva

Opportunities and challenges in semantic similarity, Vasile Rus

On paraphrase identification corpora, Vasile Rus, Rajendra Banjade, and Mihai Lintean

Link

Macro-adaptation in conversational intelligent tutoring matters, Vasile Rus, Dan Stefanescu, William Baggett, Nobal Niraula, Don Franceschetti, and Arthur C. Graesser

Link

DeepTutor: Towards macro- and micro-adaptive conversational intelligent tutoring at scale, Vasile Rus, Dan Stefanescu, Nobal Niraula, and Arthur C. Graesser

Link

Context-based speech act classification in intelligent tutoring systems, Borhan Samei, Haiying Li, Fazel Keshtkar, Vasile Rus, and Arthur C. Graesser

An integer polynomial programming based framework for lifted MAP inference, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate

Lifted MAP inference for Markov logic networks, Somdeb Sarkhel, Deepak Venugopal, Parag Singla, and Vibhav Gogate

Link

Political communities in Russian portion of Liveournal, Alexander Semenov, Jari Veijalainen, Mustafa Hajeer, and Dipankar Dasgupta

A bilingual analysis of cohesion in a corpus of leader speeches, Lubna Shala, Vasile Rus, and Arthur C. Graesser

Link

Use of attack graphs in security systems, Vivek Shandilya, Chris B. Simmons, and Sajjan Shiva

Link

A qualitative analysis of an ontology based issue resolution system for cyber attack management, Chris B. Simmons, Sajjan G. Shiva, and Lakisha L. Simmons

Link

A Sentence similarity method based on chunking and information content, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus

Latent semantic analysis models on wikipedia and TASA, Dan Ştefǎnescu, Rajendra Banjade, and Vasile Rus

Combining knowledge and corpus-based measures for word-to-word similarity, Dan Ştefənescu, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Link

Efficient probabilistic supergraph search over large uncertain graphs, Yongxin Tong, Xiaofei Zhang, Caleb Chen Cao, and Lei Chen

Link

Alignment of short reads to multiple genomes using hashing, Quang Tran and Vinhthuy Phan

Link

Relieving the computational bottleneck: Joint inference for event extraction with high-dimensional features, Deepak Venugopal, Chen Chen, Vibhav Gogate, and Vincent Ng

Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate

Link

Evidence-based clustering for scalable inference in Markov logic, Deepak Venugopal and Vibhav Gogate

Scaling-up importance sampling for Markov logic networks, Deepak Venugopal and Vibhav Gogate

Estimating Drivers' Stress from GPS Traces, Sudip Vhaduri, Amin Ali, Moushumi Sharmin, Karen Hovsepian, and Santosh Kumar

Link

Exploiting dependencies of pairwise comparison outcomes to predict patterns of gene response, Nam S. Vo and Vinhthuy Phan

Link

Exploiting the bootstrap method to analyze patterns of gene expression, Nam S. Vo and Vinhthuy Phan

Link

RandAL: A randomized approach to aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan

Link

An integrated approach for SNP calling based on population of genomes, Nam S. Vo, Quang Tran, and Vinhthuy Phan

Link

Advice lower bounds for the dense model theorem, Thomas Watson

Link

The complexity of deciding statistical properties of samplable distributions, Thomas Watson

Link

Time hierarchies for sampling distributions, Thomas Watson

Link

Asym-MAC: A MAC protocol for low-power duty-cycled wireless sensor networks with asymmetric links, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

FuzzyJam: Reducing traffic jams using a fusion of fuzzy logic and vehicular networks, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

Lane-level traffic jam control using vehicle-to-vehicle communications, Myounggyu Won, Taejoon Park, and Sang H. Son

Link

Modeling random deployment in wireless sensor networks for infrastructure-less cyber physical systems, Myounggyu Won, Hokyeong Ra, Taejoon Park, and Sang H. Son

Link

ABAC: Attribute-based access control, Kan Yang and Xiaohua Jia

Link

DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang and Xiaohua Jia

Link

Expressive, efficient, and revocable data access control for multi-authority cloud storage, Kan Yang and Xiaohua Jia

Link

Introduction, Kan Yang and Xiaohua Jia

Preface, Kan Yang and Xiaohua Jia

Link

TSAS: Third-party storage auditing service, Kan Yang and Xiaohua Jia

Link

Enabling efficient access control with dynamic policy updating for big data in the cloud, Kan Yang, Xiaohua Jia, Kui Ren, Ruitao Xie, and Liusheng Huang

Link

On the role of routing in named data networking, Cheng Yi, Jerald Abraham, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Named data networking, Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, K. C. Claffy, and Patrick Crowley

Link

Efficient join query processing on the cloud, Xiaofei Zhang and Lei Chen

Link

Aggregate nearest neighbors query based on influence zone in road networks, Xiaofei Zhang, Jian Xu, Ming Xu, Ning Zheng, and Shenzhu Feng

Submissions from 2013

Link

Mitigating congestion-based denial of service attacks with active queue management, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva

Towards a structured representation of generic concepts and relations in large text corpora, Archana Bhattarai and Vasile Rus

Link

End-user programmers in trouble: Can the Idea Garden help them to help themselves?, Jill Cao, Irwin Kwan, Faezeh Bahmani, Margaret Burnett, Scott D. Fleming, and Josh Jordahl

Consequences of diminishing trust in cyberspace, Dipankar Dasgupta and Denise Ferebee

Link

Applying Puzzle-based Learning to cyber-security education, Dipankar Dasgupta, Denise M. Ferebee, and Zbigniew Michalewicz

Link

Runtime monitors to detect and prevent union query based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva

Link

EHSTC: An enhanced method for semantic trajectory compression, Shenzhu Feng, Jian Xu, Ming Xu, Ning Zheng, and Xiaofei Zhang

Link

An information foraging theory perspective on tools for debugging, refactoring, and reuse tasks, Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, and Joseph Lawrance

Link

Knowledge re-use and dissemination for resource elicitation in software engineering, Max H. Garzon, Chris Simmons, and Jason Knisley

Link

Approximate nearest neighbor search for low-dimensional queries, Sariel Har-Peled and Nirman Kumar

Link

Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar

Decision support method based on process mining, Hai Yang Hu, Xiao Fei Zhang, Hua Hu, and Ji Dong Ge

Link

Not so cooperative caching in named data networking, Xiaoyan Hu, Christos Papadopoulos, Jian Gong, and Daniel Massey

Link

APT: A Practical Tunneling Architecture for Routing Scalability, Daniel Jen, Michael Meisel, Lan Wang, Beichuan Zhang, Daniel Massey, and Lixia Zhang

Link

What use is a backseat driver? A qualitative investigation of pair programming, Danielle L. Jones and Scott D. Fleming

Link

Autonomous wireless radar sensor mote for target material classification, Muhammad M.R. Khan, Khan M. Iftekharuddin, Ernest McCracken, Khandakar Islam, Sushil Bhurtel, and Lan Wang

Link

Resilient hybrid overlay model for smart grid: RHM for smart grid, Shubhalaxmi Kher, Victor Nutt, and Dipankar Dasgupta

Link

A prediction model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon

Fault tolerant clustering revisited, Nirman Kumar and Benjamin Raichel

Link

Mobile health technology evaluation: the mHealth evidence workshop, Santosh Kumar, Wendy J. Nilsen, Amy Abernethy, Audie Atienza, Kevin Patrick, Misha Pavel, William T. Riley, Albert Shar, Bonnie Spring, Donna Spruijt-Metz, Donald Hedeker, Vasant Honavar, Richard Kravitz, R Craig Lefebvre, David C. Mohr, Susan A. Murphy, Charlene Quinn, Vladimir Shusterman, and Dallas Swendeman

Link

How programmers debug, revisited: An information foraging theory perspective, Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D. Fleming

Link

Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Syed Obaid Amin, and Lan Wang

Link

On the Aggregatability of Router Forwarding Tables, Yaoqing Liu, Lan Wang, Xin Zhao, and Beichuan Zhang

Link

FIFA: Fast incremental FIB aggregation, Yaoqing Liu, Beichuan Zhang, and Lan Wang

Link

Using a parameterized memory model to modulate NPC AI, Weizi Li, Tim Balint, and Jan M. Allbeck

Link

NLSR: Named-data link state routing protocol, A. K.M. Mahmudul Hoque, Syed Obaid Amin, Adam Alyyan, Beichuan Zhang, Lixia Zhang, and Lan Wang

Link

A combined discriminative and generative behavior model for cyber physical system defense, Owen McCusker, Scott Brunza, Marco Carvalho, Dipankar Dasgupta, and Setu Vora

Deriving behavior primitives from aggregate network features using support vector machines, Owen McCusker, Scott Brunza, and Dipankar Dasgupta

Link

The writing-pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai

The SCHOLAR legacy: A new look at the affordances of semantic networks for conversational agents in intelligent tutoring systems, Donald M. Morrison and Vasile Rus

Link

Experiments with semantic similarity measures based on LDA and LSA, Nobal Niraula, Rajendra Banjade, Dan Ştefǎnescu, and Vasile Rus

DARE: Deep Anaphora Resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, and Dan Stefanescu

Link

Delivering diverse BGP data in real-time and through multi-format archiving, Catherine Olschanowsky, M. Lawrence Weikum, Jason Smith, Christos Papadopoulos, and Dan Massey

Inferring directed-graph patterns of gene responses to treatments, Vinhthuy Phan, Nam S. Vo, and Thomas R. Sutter

Link

The whats and hows of programmers' foraging diets, David J. Piorkowski, Scott D. Fleming, Irwin Kwan, Margaret M. Burnett, Chris Scaffidi, and Rachel K.E. Bellamy

Semilar: A semantic similarity toolkit for assessing students’ natural language inputs, Vasile Rus, Rajendra Banjade, Mihai Lintean, Nobal Niraula, and Dan Stefanescu

Link

Recent advances in conversational intelligent tutoring systems, Vasile Rus, Sidney D'Mello, Xiangen Hu, and Arthur C. Graesser

Link

Similarity measures based on Latent Dirichlet Allocation, Vasile Rus, Nobal Niraula, and Rajendra Banjade

A study of probabilistic and algebraic methods for semantic similarity, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Recommendations for the generalized intelligent framework for tutoring based on the development of the deeptutor tutoring service, Vasile Rus, Nobal Niraula, Mihai Lintean, Rajendra Banjade, Dan Stefanescu, and William Baggett

A tool for speech act classification using interactive machine learning, Borhan Samei, Fazel Keshtkar, Arthur C. Graesser, and Vasile Rus

Link

Security in the cloud based systems: Structure and breaches, Vivek Shandilya and Sajjan Shiva

Computer organization, design, and architecture, fifth edition, Sajjan G. Shiva

Link

ADAPT: A game inspired attack-defense and performance metric taxonomy, Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya

Dynamic blocking and collapsing for gibbs sampling, Deepak Venugopal and Vibhav Gogate

GiSS: Combining Gibbs sampling and SampleSearch for inference in mixed probabilistic and deterministic graphical models, Deepak Venugopal and Vibhav Gogate

Link

Exploiting dependencies of patterns in gene expression analysis using pairwise comparisons, Nam S. Vo and Vinhthuy Phan

Link

A randomized algorithm for aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan

Link

Advice lower bounds for the dense model theorem, Thomas Watson

Link

Pseudorandom generators for combinatorial checkerboards, Thomas Watson

Link

Time hierarchies for sampling distributions, Thomas Watson

Link

Energy saving virtual machine allocation in cloud computing, Ruitao Xie, Xiaohua Jia, Kan Yang, and Bo Zhang

Link

An efficient and secure dynamic auditing protocol for data storage in cloud computing, Kan Yang and Xiaohua Jia