Follow

Submissions from 2013

Link

Attribute-based fine-grained access control with efficient revocation in cloud storage systems, Kan Yang, Xiaohua Jia, and Kui Ren

Link

DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, and Bo Zhang

Link

DAC-MACS: Effective data access control for multiauthority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie

Link

A case for stateful forwarding plane, Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Multi-path routing and stream scheduling with spatial multiplexing and interference cancellation in MIMO networks, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey

Link

EAGRE: Towards scalable I/O efficient SPARQL query evaluation on the cloud, Xiaofei Zhang, Lei Chen, Yongxin Tong, and Min Wang

Submissions from 2012

Evaluating security and privacy in cloud computing services: A stakeholder's perspective, Abdullah Abuhussein, Harkeerat Bedi, and Sajjan Shiva

Link

Effects of time delays in the electric power grid, Hasan Ali and Dipankar Dasgupta

Link

Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms, Harkeerat Singh Bedi and Sajjan Shiva

Link

A domain independent framework to extract and aggregate analogous features in online reviews, Archana Bhattarai, Nobal Niraula, Vasile Rus, and King Ip Lin

Link

From barriers to learning in the idea garden: An empirical study, Jill Cao, Irwin Kwan, Rachel White, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi

Link

A genetic-based solution to the task-based sailor assignment problem, Dipankar Dasgupta, Deon Garrett, Fernando Nino, Alex Banceanu, and David Becerra

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

A framework for development of runtime monitors, Ramya Dharam and Sajjan G. Shiva

Link

Runtime monitors for tautology based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva

Link

An artificial immune system for phishing detection, Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, and Dasgupta Dipankar

Link

A cyber-security storm MAP, Denise Ferebee, Dipankar Dasgupta, and Qishi Wu

Link

Theory and applications of DNA codeword design, Max H. Garzon

Link

A geometric approach to gibbs energy landscapes and optimal DNA codeword design, Max H. Garzon and Kiran C. Bobba

Advances in lifted importance sampling, Vibhav Gogate, Abhay Jha, and Deepak Venugopal

On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments, Yi Gu, Shwu Ling Shenq, Qishi Wu, and Dipankar Dasgupta

Link

Down the rabbit hole: Robust proximity search and density estimation in sublinear space, Sariel Har-Peled and Nirman Kumar

Link

Epiphany: A location hiding architecture for protecting critical services from DDoS attacks, Vamsi Kambhampati, Christos Papadopolous, and Dan Massey

Link

A detection model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon

Link

A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Muhammad Khan, and Khandakar Islam

Measuring semantic similarity in short texts through greedy pairing and word semantics, Mihai Lintean and Vasile Rus

Link

Automatic detection of student mental models based on natural language student input during metacognitive skill training, Mihai Lintean, Vasile Rus, and Roger Azevedo

Hybrid question generation approach for critical review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

The virtual apprentice, Weizi Li and Jan M. Allbeck

Link

Virtual humans: Evolving with common sense, Weizi Li and Jan M. Allbeck

Link

Crowd distribution and location preference, Weizi Li, Zichao Di, and Jan M. Allbeck

Link

Behavior of DNS' top talkers, a .com/.net view, Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, and Dan Massey

Link

Facilitating co-adaptation of technology and education through the creation of an open-source repository of interoperable code, Philip I. Pavlik, Jaclyn Maass, Vasile Rus, and Andrew M. Olney

Link

Reactive Information Foraging: An empirical investigation of theory-based recommender systems for programmers, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Christopher Bogart, Margaret Burnett, and Bonnie E. John

A Comparison of Greedy and Optimal Assessment of Natural Language Student Input Using Word-to-Word Similarity Metrics, Vasile Rus and Mihai Lintean

Link

An optimal assessment of natural language student input using word-to-word similarity metrics, Vasile Rus and Mihai Lintean

Automated discovery of speech act categories in educational games, Vasile Rus, Cristian Moldovan, Nobal Niraula, and Arthur C. Graesser

Link

Automated detection of local coherence in short argumentative essays based on centering theory, Vasile Rus and Nobal Niraula

Link

A holistic game inspired defense architecture, Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, and Ramya Dharam

On lifting the Gibbs sampling algorithm, Deepak Venugopal and Vibhav Gogate

Link

Pattern analysis: A web-based tool for analyzing response patterns in low-replication, many-treatment gene expression data, Nam S. Vo and Vinhthuy Phan

Link

Predicting possible directed-graph patterns of gene expressions in studies involving multiple treatments, Nam S. Vo, Vinhthuy Phan, and Thomas R. Sutter

Link

Relativized Worlds without Worst-Case to Average-Case Reductions for NP, Thomas Watson

Link

Attributed-based access control for multi-authority systems in cloud storage, Kan Yang and Xiaohua Jia

Link

Data storage auditing service in cloud computing: Challenges, methods and opportunities, Kan Yang and Xiaohua Jia

Link

Argus: End-to-end service anomaly detection and localization from an ISP's point of view, He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Dan Massey, and Christos Papadopoulos

Link

Adaptive forwarding in named data networking, Cheng Yi, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Efficient multi-way Theta-join processing using MapReduce, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Towards efficient join processing over large RDF graph using mapreduce, Xiaofei Zhang, Lei Chen, and Min Wang

Submissions from 2011

Link

Effects of communication delays in electric grid, Mohd Hasan Ali and Dipankar Dasgupta

Link

Low-rate, flow-level periodicity detection, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, Harkeerat Singh Bedi, Sankardas Roy, and Sajjan Shiva

Link

A self-supervised approach to comment spam detection based on content analysis, A. Bhattarai and D. Dasgupta

Link

Gender pluralism in problem-solving software, Margaret M. Burnett, Laura Beckwith, Susan Wiedenbeck, Scott D. Fleming, Jill Cao, and Thomas H. Park

Link

An exploration of design opportunities for "gardening" end-user programmers' ideas, Jill Cao, Scott D. Fleming, and Margaret Burnett

Mission resilience in cloud computing: A biologically inspired approach, Marco Carvalho, Dipankar Dasgupta, Michael Grimaila, and Carlos Perez

Link

Secure VM for monitoring industrial process controllers, Dipankar Dasgupta, Mohd Hassan Ali, Robert Abercrombie, Bob Schlicher, Frederick Sheldon, and Marco Carvalho

Link

Estimating security coverage for cloud services, Dipankar Dasgupta and Md Moshiur Rahman

Link

A framework for estimating security coverage for cloud service insurance, Dipankar Dasgupta and Moshiur Rahman

Link

Recent advances in artificial immune systems: Models and applications, Dipankar Dasgupta, Senhua Yu, and Fernando Nino

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

Routing policies in named data networking, Steven DiBenedetto, Christos Papadopoulos, and Daniel Massey

Link

Security visualization: Cyber security storm map and event correlation, Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, and Qishi Wu

Link

Dynamics of prefix usage at an edge router, Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Search and validation of short genome-wide biomarkers for bacterial biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Question answering and generation, Arthur C. Graesser, Vasile Rus, Zhiqiang Cai, and Xiangen Hu

Link

Approximate nearest neighbor search for low dimensional queries, Sariel Har-Peled and Nirman Kumar

Link

Autonomous wireless radar sensor mote integrating a doppler radar into a sensor mote and its application in surveillance and target material classification, Khan Iftekharuddin, Muhammad M.R. Khan, Ernest McCracken, Lan Wang, and Robert Kozma

Link

A taxonomy of capabilities based DDoS defense architectures, Vamsi Kambhampati, Christos Papadopoulos, and Dan Massey

Dissimilarity kernels for paraphrase identification, Mihai Lintean and Vasile Rus

Link

Computational aspects of the intelligent tutoring system metaTutor, Mihai Lintean, Vasile Rus, Zhiqiang Cai, Amy Witherspoon-Johnson, Arthur C. Graesser, and Roger Azevedo

Link

Populations with purpose, Weizi Li and Jan M. Allbeck

Link

The writing-Pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai

Automated speech act classification for online chat, Cristian Moldovan, Vasile Rus, and Arthur C. Graesser

Link

Semantic methods for textual entailment, Andrew J. Neel and Max H. Garzon

Link

Modeling programmer navigation: A head-to-head empirical evaluation of predictive models, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Liza John, Christopher Bogart, and Bonnie E. John

Link

Green approaches to process control in thermal rooms, Danilo Rairan and Max H. Garzon

Link

Latent Semantic Indexing of PubMed abstracts for identification of transcription factor candidates from microarray derived gene sets, Sujoy Roy, Kevin Heinrich, Vinhthuy Phan, Michael W. Berry, and Ramin Homayouni

A linguistic analysis of student-generated paraphrases, Vasile Rus, Shi Feng, Russell Brandon, Scott Crossely, and Danielle S. McNamara

Link

Text-to-text similarity of sentences, Vasile Rus, Mihai Lintean, Arthur C. Graesser, and Danielle S. McNamara

Question Generation Shared Task and Evaluation Challenge - Status report, Vasile Rus, Brendan Wyse, Paul Piwek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Runtime monitors as sensors of security systems, Sajjan Shiva, Ramya Dharam, and Vivek Shandilya

A stochastic game model with imperfect information in cyber security, Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu

Link

A Dynamic Recursive Unified Internet Design (DRUID), Joe Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, and Scott Jordan

Link

Pseudorandom generators for combinatorial checkerboards, Thomas Watson

Link

Query complexity in errorless hardness amplification, Thomas Watson

Link

IP Reachability differences: Myths and realities, He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, Christos Papadopoulos, and Dan Pei

Link

An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation, Senhua Yu and Dipankar Dasgupta

Link

Fault tolerance study for durable storage on the cloud, Xiaofei Zhang and Lei Chen

Submissions from 2010

The role of prompting and feedback in facilitating students' learning about science with MetaTutor, Roger Azevedo, Amy Johnson, Candice Burkett, Amber Chauncey, Ashley Fike, and Mihai Lintean

Qualitative, quantitative, and data mining methods for analyzing log data to characterize students' learning strategies and behaviors, Ryan S.J.D. Baker, Janice D. Gobert, Wouter Van Joolingen, Roger Azevedo, Ido Roll, and Michael São Pedro

Link

Gender differences and programming environments: Across programming populations, Margaret Burnett, Scott D. Fleming, Shamsi Iqbal, Gina Venolia, Vidya Rajaram, and Umer Farooq

Link

A debugging perspective on end-user mashup programming, Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fleming, Margaret Burnett, and Susan Wiedenbeck

Link

Multi-objective evolutionary algorithms to solve coverage and lifetime optimization problem in wireless sensor networks, Koyel Chaudhuri and Dipankar Dasgupta

Link

A parallel framework for multi-objective evolutionary optimization, Dipankar Dasgupta, David Becerra, Alex Banceanu, Fernando Nino, and James Simien

Link

A conceptual model of self-monitoring multi-core systems, Dipankar Dasgupta, Harkeerat Bedi, and Deon Garrett

Link

Configurable and secure system architectures, Dipankar Dasgupta and Marco Carvalho