Submissions from 2014
Aggregate nearest neighbors query based on influence zone in road networks, Xiaofei Zhang, Jian Xu, Ming Xu, Ning Zheng, and Shenzhu Feng
Submissions from 2013
Mitigating congestion-based denial of service attacks with active queue management, Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva
Towards a structured representation of generic concepts and relations in large text corpora, Archana Bhattarai and Vasile Rus
End-user programmers in trouble: Can the Idea Garden help them to help themselves?, Jill Cao, Irwin Kwan, Faezeh Bahmani, Margaret Burnett, Scott D. Fleming, and Josh Jordahl
Consequences of diminishing trust in cyberspace, Dipankar Dasgupta and Denise Ferebee
Applying Puzzle-based Learning to cyber-security education, Dipankar Dasgupta, Denise M. Ferebee, and Zbigniew Michalewicz
Runtime monitors to detect and prevent union query based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva
EHSTC: An enhanced method for semantic trajectory compression, Shenzhu Feng, Jian Xu, Ming Xu, Ning Zheng, and Xiaofei Zhang
An information foraging theory perspective on tools for debugging, refactoring, and reuse tasks, Scott D. Fleming, Chris Scaffidi, David Piorkowski, Margaret Burnett, Rachel Bellamy, and Joseph Lawrance
Knowledge re-use and dissemination for resource elicitation in software engineering, Max H. Garzon, Chris Simmons, and Jason Knisley
Approximate nearest neighbor search for low-dimensional queries, Sariel Har-Peled and Nirman Kumar
Approximating minimization diagrams and generalized proximity search, Sariel Har-Peled and Nirman Kumar
Decision support method based on process mining, Hai Yang Hu, Xiao Fei Zhang, Hua Hu, and Ji Dong Ge
Not so cooperative caching in named data networking, Xiaoyan Hu, Christos Papadopoulos, Jian Gong, and Daniel Massey
APT: A Practical Tunneling Architecture for Routing Scalability, Daniel Jen, Michael Meisel, Lan Wang, Beichuan Zhang, Daniel Massey, and Lixia Zhang
What use is a backseat driver? A qualitative investigation of pair programming, Danielle L. Jones and Scott D. Fleming
Autonomous wireless radar sensor mote for target material classification, Muhammad M.R. Khan, Khan M. Iftekharuddin, Ernest McCracken, Khandakar Islam, Sushil Bhurtel, and Lan Wang
Resilient hybrid overlay model for smart grid: RHM for smart grid, Shubhalaxmi Kher, Victor Nutt, and Dipankar Dasgupta
A prediction model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon
Fault tolerant clustering revisited, Nirman Kumar and Benjamin Raichel
How programmers debug, revisited: An information foraging theory perspective, Joseph Lawrance, Christopher Bogart, Margaret Burnett, Rachel Bellamy, Kyle Rector, and Scott D. Fleming
Efficient FIB caching using minimal non-overlapping prefixes, Yaoqing Liu, Syed Obaid Amin, and Lan Wang
On the Aggregatability of Router Forwarding Tables, Yaoqing Liu, Lan Wang, Xin Zhao, and Beichuan Zhang
FIFA: Fast incremental FIB aggregation, Yaoqing Liu, Beichuan Zhang, and Lan Wang
Using a parameterized memory model to modulate NPC AI, Weizi Li, Tim Balint, and Jan M. Allbeck
NLSR: Named-data link state routing protocol, A. K.M. Mahmudul Hoque, Syed Obaid Amin, Adam Alyyan, Beichuan Zhang, Lixia Zhang, and Lan Wang
A combined discriminative and generative behavior model for cyber physical system defense, Owen McCusker, Scott Brunza, Marco Carvalho, Dipankar Dasgupta, and Setu Vora
Deriving behavior primitives from aggregate network features using support vector machines, Owen McCusker, Scott Brunza, and Dipankar Dasgupta
The writing-pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai
The SCHOLAR legacy: A new look at the affordances of semantic networks for conversational agents in intelligent tutoring systems, Donald M. Morrison and Vasile Rus
Experiments with semantic similarity measures based on LDA and LSA, Nobal Niraula, Rajendra Banjade, Dan Ştefǎnescu, and Vasile Rus
DARE: Deep Anaphora Resolution in dialogue based intelligent tutoring systems, Nobal B. Niraula, Vasile Rus, and Dan Stefanescu
Delivering diverse BGP data in real-time and through multi-format archiving, Catherine Olschanowsky, M. Lawrence Weikum, Jason Smith, Christos Papadopoulos, and Dan Massey
Inferring directed-graph patterns of gene responses to treatments, Vinhthuy Phan, Nam S. Vo, and Thomas R. Sutter
The whats and hows of programmers' foraging diets, David J. Piorkowski, Scott D. Fleming, Irwin Kwan, Margaret M. Burnett, Chris Scaffidi, and Rachel K.E. Bellamy
Semilar: A semantic similarity toolkit for assessing students’ natural language inputs, Vasile Rus, Rajendra Banjade, Mihai Lintean, Nobal Niraula, and Dan Stefanescu
Recent advances in conversational intelligent tutoring systems, Vasile Rus, Sidney D'Mello, Xiangen Hu, and Arthur C. Graesser
Similarity measures based on Latent Dirichlet Allocation, Vasile Rus, Nobal Niraula, and Rajendra Banjade
A study of probabilistic and algebraic methods for semantic similarity, Vasile Rus, Nobal B. Niraula, and Rajendra Banjade
Recommendations for the generalized intelligent framework for tutoring based on the development of the deeptutor tutoring service, Vasile Rus, Nobal Niraula, Mihai Lintean, Rajendra Banjade, Dan Stefanescu, and William Baggett
A tool for speech act classification using interactive machine learning, Borhan Samei, Fazel Keshtkar, Arthur C. Graesser, and Vasile Rus
Security in the cloud based systems: Structure and breaches, Vivek Shandilya and Sajjan Shiva
Computer organization, design, and architecture, fifth edition, Sajjan G. Shiva
ADAPT: A game inspired attack-defense and performance metric taxonomy, Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, and Vivek Shandilya
Dynamic blocking and collapsing for gibbs sampling, Deepak Venugopal and Vibhav Gogate
GiSS: Combining Gibbs sampling and SampleSearch for inference in mixed probabilistic and deterministic graphical models, Deepak Venugopal and Vibhav Gogate
Exploiting dependencies of patterns in gene expression analysis using pairwise comparisons, Nam S. Vo and Vinhthuy Phan
A randomized algorithm for aligning DNA sequences to reference genomes, Nam S. Vo, Quang Tran, Nobal Niraula, and Vinhthuy Phan
Advice lower bounds for the dense model theorem, Thomas Watson
Pseudorandom generators for combinatorial checkerboards, Thomas Watson
Time hierarchies for sampling distributions, Thomas Watson
Energy saving virtual machine allocation in cloud computing, Ruitao Xie, Xiaohua Jia, Kan Yang, and Bo Zhang
An efficient and secure dynamic auditing protocol for data storage in cloud computing, Kan Yang and Xiaohua Jia
Attribute-based fine-grained access control with efficient revocation in cloud storage systems, Kan Yang, Xiaohua Jia, and Kui Ren
DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, and Bo Zhang
DAC-MACS: Effective data access control for multiauthority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie
A case for stateful forwarding plane, Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang
Multi-path routing and stream scheduling with spatial multiplexing and interference cancellation in MIMO networks, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie
Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey
Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey
EAGRE: Towards scalable I/O efficient SPARQL query evaluation on the cloud, Xiaofei Zhang, Lei Chen, Yongxin Tong, and Min Wang
Submissions from 2012
Evaluating security and privacy in cloud computing services: A stakeholder's perspective, Abdullah Abuhussein, Harkeerat Bedi, and Sajjan Shiva
Effects of time delays in the electric power grid, Hasan Ali and Dipankar Dasgupta
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms, Harkeerat Singh Bedi and Sajjan Shiva
A domain independent framework to extract and aggregate analogous features in online reviews, Archana Bhattarai, Nobal Niraula, Vasile Rus, and King Ip Lin
From barriers to learning in the idea garden: An empirical study, Jill Cao, Irwin Kwan, Rachel White, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi
A genetic-based solution to the task-based sailor assignment problem, Dipankar Dasgupta, Deon Garrett, Fernando Nino, Alex Banceanu, and David Becerra
Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson
A framework for development of runtime monitors, Ramya Dharam and Sajjan G. Shiva
Runtime monitors for tautology based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva
An artificial immune system for phishing detection, Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, and Dasgupta Dipankar
A cyber-security storm MAP, Denise Ferebee, Dipankar Dasgupta, and Qishi Wu
Theory and applications of DNA codeword design, Max H. Garzon
A geometric approach to gibbs energy landscapes and optimal DNA codeword design, Max H. Garzon and Kiran C. Bobba
Advances in lifted importance sampling, Vibhav Gogate, Abhay Jha, and Deepak Venugopal
On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments, Yi Gu, Shwu Ling Shenq, Qishi Wu, and Dipankar Dasgupta
Down the rabbit hole: Robust proximity search and density estimation in sublinear space, Sariel Har-Peled and Nirman Kumar
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks, Vamsi Kambhampati, Christos Papadopolous, and Dan Massey
A detection model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon
A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Muhammad Khan, and Khandakar Islam
Measuring semantic similarity in short texts through greedy pairing and word semantics, Mihai Lintean and Vasile Rus
Automatic detection of student mental models based on natural language student input during metacognitive skill training, Mihai Lintean, Vasile Rus, and Roger Azevedo
Hybrid question generation approach for critical review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus
The virtual apprentice, Weizi Li and Jan M. Allbeck
Virtual humans: Evolving with common sense, Weizi Li and Jan M. Allbeck
Crowd distribution and location preference, Weizi Li, Zichao Di, and Jan M. Allbeck
Behavior of DNS' top talkers, a .com/.net view, Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, and Dan Massey
Facilitating co-adaptation of technology and education through the creation of an open-source repository of interoperable code, Philip I. Pavlik, Jaclyn Maass, Vasile Rus, and Andrew M. Olney
Reactive Information Foraging: An empirical investigation of theory-based recommender systems for programmers, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Christopher Bogart, Margaret Burnett, and Bonnie E. John
A Comparison of Greedy and Optimal Assessment of Natural Language Student Input Using Word-to-Word Similarity Metrics, Vasile Rus and Mihai Lintean
An optimal assessment of natural language student input using word-to-word similarity metrics, Vasile Rus and Mihai Lintean
Automated discovery of speech act categories in educational games, Vasile Rus, Cristian Moldovan, Nobal Niraula, and Arthur C. Graesser
Automated detection of local coherence in short argumentative essays based on centering theory, Vasile Rus and Nobal Niraula
A holistic game inspired defense architecture, Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, and Ramya Dharam
On lifting the Gibbs sampling algorithm, Deepak Venugopal and Vibhav Gogate
Pattern analysis: A web-based tool for analyzing response patterns in low-replication, many-treatment gene expression data, Nam S. Vo and Vinhthuy Phan
Predicting possible directed-graph patterns of gene expressions in studies involving multiple treatments, Nam S. Vo, Vinhthuy Phan, and Thomas R. Sutter
Relativized Worlds without Worst-Case to Average-Case Reductions for NP, Thomas Watson
Attributed-based access control for multi-authority systems in cloud storage, Kan Yang and Xiaohua Jia
Data storage auditing service in cloud computing: Challenges, methods and opportunities, Kan Yang and Xiaohua Jia