Follow

Submissions from 2014

Link

Aggregate nearest neighbors query based on influence zone in road networks, Xiaofei Zhang, Jian Xu, Ming Xu, Ning Zheng, and Shenzhu Feng

Submissions from 2013

Link

Mitigating congestion-based denial of service attacks with active queue management, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva

Towards a structured representation of generic concepts and relations in large text corpora, Archana Bhattarai and Vasile Rus

Link

End-user programmers in trouble: Can the Idea Garden help them to help themselves?, Jill Cao, Irwin Kwan, Faezeh Bahmani, Margaret Burnett, Scott D. Fleming, and Josh Jordahl

Consequences of diminishing trust in cyberspace, Dipankar Dasgupta and Denise Ferebee

Link

Applying Puzzle-based Learning to cyber-security education, Dipankar Dasgupta, Denise M. Ferebee, and Zbigniew Michalewicz

Link

Runtime monitors to detect and prevent union query based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva

Link

EHSTC: An enhanced method for semantic trajectory compression, Shenzhu Feng, Jian Xu, Ming Xu, Ning Zheng, and Xiaofei Zhang

Link

An information foraging theory perspective on tools for debugging, refactoring, and reuse tasks, Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, and Joseph Lawrance

Link

Knowledge re-use and dissemination for resource elicitation in software engineering, Max H. Garzon, Chris Simmons, and Jason Knisley

Link

Approximate nearest neighbor search for low-dimensional queries, Sariel Har-Peled and Nirman Kumar

Link

Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar

Decision support method based on process mining, Hai Yang Hu, Xiao Fei Zhang, Hua Hu, and Ji Dong Ge

Link

Not so cooperative caching in named data networking, Xiaoyan Hu, Christos Papadopoulos, Jian Gong, and Daniel Massey

Link

APT: A Practical Tunneling Architecture for Routing Scalability, Daniel Jen, Michael Meisel, Lan Wang, Beichuan Zhang, Daniel Massey, and Lixia Zhang

Link

What use is a backseat driver? A qualitative investigation of pair programming, Danielle L. Jones and Scott D. Fleming

Link

Autonomous wireless radar sensor mote for target material classification, Muhammad M.R. Khan, Khan M. Iftekharuddin, Ernest McCracken, Khandakar Islam, Sushil Bhurtel, and Lan Wang

Link

Resilient hybrid overlay model for smart grid: RHM for smart grid, Shubhalaxmi Kher, Victor Nutt, and Dipankar Dasgupta

Link

A prediction model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon

Fault tolerant clustering revisited, Nirman Kumar and Benjamin Raichel

Link

How programmers debug, revisited: An information foraging theory perspective, Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D. Fleming

Link

Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Syed Obaid Amin, and Lan Wang

Link

On the Aggregatability of Router Forwarding Tables, Yaoqing Liu, Lan Wang, Xin Zhao, and Beichuan Zhang

Link

FIFA: Fast incremental FIB aggregation, Yaoqing Liu, Beichuan Zhang, and Lan Wang

Link

Using a parameterized memory model to modulate NPC AI, Weizi Li, Tim Balint, and Jan M. Allbeck

Link

NLSR: Named-data link state routing protocol, A. K.M. Mahmudul Hoque, Syed Obaid Amin, Adam Alyyan, Beichuan Zhang, Lixia Zhang, and Lan Wang

Link

A combined discriminative and generative behavior model for cyber physical system defense, Owen McCusker, Scott Brunza, Marco Carvalho, Dipankar Dasgupta, and Setu Vora

Deriving behavior primitives from aggregate network features using support vector machines, Owen McCusker, Scott Brunza, and Dipankar Dasgupta

Link

The writing-pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai

The SCHOLAR legacy: A new look at the affordances of semantic networks for conversational agents in intelligent tutoring systems, Donald M. Morrison and Vasile Rus

Link

Experiments with semantic similarity measures based on LDA and LSA, Nobal Niraula, Rajendra Banjade, Dan Ştefǎnescu, and Vasile Rus

DARE: Deep Anaphora Resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, and Dan Stefanescu

Link

Delivering diverse BGP data in real-time and through multi-format archiving, Catherine Olschanowsky, M. Lawrence Weikum, Jason Smith, Christos Papadopoulos, and Dan Massey

Inferring directed-graph patterns of gene responses to treatments, Vinhthuy Phan, Nam S. Vo, and Thomas R. Sutter

Link

The whats and hows of programmers' foraging diets, David J. Piorkowski, Scott D. Fleming, Irwin Kwan, Margaret M. Burnett, Chris Scaffidi, and Rachel K.E. Bellamy

Semilar: A semantic similarity toolkit for assessing students’ natural language inputs, Vasile Rus, Rajendra Banjade, Mihai Lintean, Nobal Niraula, and Dan Stefanescu

Link

Recent advances in conversational intelligent tutoring systems, Vasile Rus, Sidney D'Mello, Xiangen Hu, and Arthur C. Graesser

Link

Similarity measures based on Latent Dirichlet Allocation, Vasile Rus, Nobal Niraula, and Rajendra Banjade

A study of probabilistic and algebraic methods for semantic similarity, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade

Recommendations for the generalized intelligent framework for tutoring based on the development of the deeptutor tutoring service, Vasile Rus, Nobal Niraula, Mihai Lintean, Rajendra Banjade, Dan Stefanescu, and William Baggett

A tool for speech act classification using interactive machine learning, Borhan Samei, Fazel Keshtkar, Arthur C. Graesser, and Vasile Rus

Link

Security in the cloud based systems: Structure and breaches, Vivek Shandilya and Sajjan Shiva

Computer organization, design, and architecture, fifth edition, Sajjan G. Shiva

Link

ADAPT: A game inspired attack-defense and performance metric taxonomy, Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya

Dynamic blocking and collapsing for gibbs sampling, Deepak Venugopal and Vibhav Gogate

GiSS: Combining Gibbs sampling and SampleSearch for inference in mixed probabilistic and deterministic graphical models, Deepak Venugopal and Vibhav Gogate

Link

Exploiting dependencies of patterns in gene expression analysis using pairwise comparisons, Nam S. Vo and Vinhthuy Phan

Link

A randomized algorithm for aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan

Link

Advice lower bounds for the dense model theorem, Thomas Watson

Link

Pseudorandom generators for combinatorial checkerboards, Thomas Watson

Link

Time hierarchies for sampling distributions, Thomas Watson

Link

Energy saving virtual machine allocation in cloud computing, Ruitao Xie, Xiaohua Jia, Kan Yang, and Bo Zhang

Link

An efficient and secure dynamic auditing protocol for data storage in cloud computing, Kan Yang and Xiaohua Jia

Link

Attribute-based fine-grained access control with efficient revocation in cloud storage systems, Kan Yang, Xiaohua Jia, and Kui Ren

Link

DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, and Bo Zhang

Link

DAC-MACS: Effective data access control for multiauthority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie

Link

A case for stateful forwarding plane, Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Multi-path routing and stream scheduling with spatial multiplexing and interference cancellation in MIMO networks, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

EAGRE: Towards scalable I/O efficient SPARQL query evaluation on the cloud, Xiaofei Zhang, Lei Chen, Yongxin Tong, and Min Wang

Submissions from 2012

Evaluating security and privacy in cloud computing services: A stakeholder's perspective, Abdullah Abuhussein, Harkeerat Bedi, and Sajjan Shiva

Link

Effects of time delays in the electric power grid, Hasan Ali and Dipankar Dasgupta

Link

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms, Harkeerat Singh Bedi and Sajjan Shiva

Link

A domain independent framework to extract and aggregate analogous features in online reviews, Archana Bhattarai, Nobal Niraula, Vasile Rus, and King Ip Lin

Link

From barriers to learning in the idea garden: An empirical study, Jill Cao, Irwin Kwan, Rachel White, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi

Link

A genetic-based solution to the task-based sailor assignment problem, Dipankar Dasgupta, Deon Garrett, Fernando Nino, Alex Banceanu, and David Becerra

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

A framework for development of runtime monitors, Ramya Dharam and Sajjan G. Shiva

Link

Runtime monitors for tautology based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva

Link

An artificial immune system for phishing detection, Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, and Dasgupta Dipankar

Link

A cyber-security storm MAP, Denise Ferebee, Dipankar Dasgupta, and Qishi Wu

Link

Theory and applications of DNA codeword design, Max H. Garzon

Link

A geometric approach to gibbs energy landscapes and optimal DNA codeword design, Max H. Garzon and Kiran C. Bobba

Advances in lifted importance sampling, Vibhav Gogate, Abhay Jha, and Deepak Venugopal

On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments, Yi Gu, Shwu Ling Shenq, Qishi Wu, and Dipankar Dasgupta

Link

Down the rabbit hole: Robust proximity search and density estimation in sublinear space, Sariel Har-Peled and Nirman Kumar

Link

Epiphany: A location hiding architecture for protecting critical services from DDoS attacks, Vamsi Kambhampati, Christos Papadopolous, and Dan Massey

Link

A detection model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon

Link

A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Muhammad Khan, and Khandakar Islam

Measuring semantic similarity in short texts through greedy pairing and word semantics, Mihai Lintean and Vasile Rus

Link

Automatic detection of student mental models based on natural language student input during metacognitive skill training, Mihai Lintean, Vasile Rus, and Roger Azevedo

Hybrid question generation approach for critical review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

The virtual apprentice, Weizi Li and Jan M. Allbeck

Link

Virtual humans: Evolving with common sense, Weizi Li and Jan M. Allbeck

Link

Crowd distribution and location preference, Weizi Li, Zichao Di, and Jan M. Allbeck

Link

Behavior of DNS' top talkers, a .com/.net view, Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, and Dan Massey

Link

Facilitating co-adaptation of technology and education through the creation of an open-source repository of interoperable code, Philip I. Pavlik, Jaclyn Maass, Vasile Rus, and Andrew M. Olney

Link

Reactive Information Foraging: An empirical investigation of theory-based recommender systems for programmers, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Christopher Bogart, Margaret Burnett, and Bonnie E. John

A Comparison of Greedy and Optimal Assessment of Natural Language Student Input Using Word-to-Word Similarity Metrics, Vasile Rus and Mihai Lintean

Link

An optimal assessment of natural language student input using word-to-word similarity metrics, Vasile Rus and Mihai Lintean

Automated discovery of speech act categories in educational games, Vasile Rus, Cristian Moldovan, Nobal Niraula, and Arthur C. Graesser

Link

Automated detection of local coherence in short argumentative essays based on centering theory, Vasile Rus and Nobal Niraula

Link

A holistic game inspired defense architecture, Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, and Ramya Dharam

On lifting the Gibbs sampling algorithm, Deepak Venugopal and Vibhav Gogate

Link

Pattern analysis: A web-based tool for analyzing response patterns in low-replication, many-treatment gene expression data, Nam S. Vo and Vinhthuy Phan

Link

Predicting possible directed-graph patterns of gene expressions in studies involving multiple treatments, Nam S. Vo, Vinhthuy Phan, and Thomas R. Sutter

Link

Relativized Worlds without Worst-Case to Average-Case Reductions for NP, Thomas Watson

Link

Attributed-based access control for multi-authority systems in cloud storage, Kan Yang and Xiaohua Jia

Link

Data storage auditing service in cloud computing: Challenges, methods and opportunities, Kan Yang and Xiaohua Jia