Follow

Submissions from 2012

Link

Argus: End-to-end service anomaly detection and localization from an ISP's point of view, He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Dan Massey, and Christos Papadopoulos

Link

Adaptive forwarding in named data networking, Cheng Yi, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Efficient multi-way Theta-join processing using MapReduce, Xiaofei Zhang, Lei Chen, and Min Wang

Link

Towards efficient join processing over large RDF graph using mapreduce, Xiaofei Zhang, Lei Chen, and Min Wang

Submissions from 2011

Link

Effects of communication delays in electric grid, Mohd Hasan Ali and Dipankar Dasgupta

Link

Low-rate, flow-level periodicity detection, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, Harkeerat Singh Bedi, Sankardas Roy, and Sajjan Shiva

Link

A self-supervised approach to comment spam detection based on content analysis, A. Bhattarai and D. Dasgupta

Link

Gender pluralism in problem-solving software, Margaret M. Burnett, Laura Beckwith, Susan Wiedenbeck, Scott D. Fleming, Jill Cao, and Thomas H. Park

Link

An exploration of design opportunities for "gardening" end-user programmers' ideas, Jill Cao, Scott D. Fleming, and Margaret Burnett

Mission resilience in cloud computing: A biologically inspired approach, Marco Carvalho, Dipankar Dasgupta, Michael Grimaila, and Carlos Perez

Link

Secure VM for monitoring industrial process controllers, Dipankar Dasgupta, Mohd Hassan Ali, Robert Abercrombie, Bob Schlicher, Frederick Sheldon, and Marco Carvalho

Link

Estimating security coverage for cloud services, Dipankar Dasgupta and Md Moshiur Rahman

Link

A framework for estimating security coverage for cloud service insurance, Dipankar Dasgupta and Moshiur Rahman

Link

Recent advances in artificial immune systems: Models and applications, Dipankar Dasgupta, Senhua Yu, and Fernando Nino

Link

Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson

Link

Routing policies in named data networking, Steven DiBenedetto, Christos Papadopoulos, and Daniel Massey

Link

Security visualization: Cyber security storm map and event correlation, Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, and Qishi Wu

Link

Dynamics of prefix usage at an edge router, Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Search and validation of short genome-wide biomarkers for bacterial biological phylogenies, Max H. Garzon and Tit Yee Wong

Link

Question answering and generation, Arthur C. Graesser, Vasile Rus, Zhiqiang Cai, and Xiangen Hu

Link

Approximate nearest neighbor search for low dimensional queries, Sariel Har-Peled and Nirman Kumar

Link

Autonomous wireless radar sensor mote integrating a doppler radar into a sensor mote and its application in surveillance and target material classification, Khan Iftekharuddin, Muhammad M.R. Khan, Ernest McCracken, Lan Wang, and Robert Kozma

Link

A taxonomy of capabilities based DDoS defense architectures, Vamsi Kambhampati, Christos Papadopoulos, and Dan Massey

Dissimilarity kernels for paraphrase identification, Mihai Lintean and Vasile Rus

Link

Computational aspects of the intelligent tutoring system metaTutor, Mihai Lintean, Vasile Rus, Zhiqiang Cai, Amy Witherspoon-Johnson, Arthur C. Graesser, and Roger Azevedo

Link

Populations with purpose, Weizi Li and Jan M. Allbeck

Link

The writing-Pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai

Automated speech act classification for online chat, Cristian Moldovan, Vasile Rus, and Arthur C. Graesser

Link

Semantic methods for textual entailment, Andrew J. Neel and Max H. Garzon

Link

Modeling programmer navigation: A head-to-head empirical evaluation of predictive models, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Liza John, Christopher Bogart, and Bonnie E. John

Link

Green approaches to process control in thermal rooms, Danilo Rairan and Max H. Garzon

Link

Latent Semantic Indexing of PubMed abstracts for identification of transcription factor candidates from microarray derived gene sets, Sujoy Roy, Kevin Heinrich, Vinhthuy Phan, Michael W. Berry, and Ramin Homayouni

A linguistic analysis of student-generated paraphrases, Vasile Rus, Shi Feng, Russell Brandon, Scott Crossely, and Danielle S. McNamara

Link

Text-to-text similarity of sentences, Vasile Rus, Mihai Lintean, Arthur C. Graesser, and Danielle S. McNamara

Question Generation Shared Task and Evaluation Challenge - Status report, Vasile Rus, Brendan Wyse, Paul Piwek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Runtime monitors as sensors of security systems, Sajjan Shiva, Ramya Dharam, and Vivek Shandilya

A stochastic game model with imperfect information in cyber security, Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu

Link

A Dynamic Recursive Unified Internet Design (DRUID), Joe Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, and Scott Jordan

Link

Pseudorandom generators for combinatorial checkerboards, Thomas Watson

Link

Query complexity in errorless hardness amplification, Thomas Watson

Link

IP Reachability differences: Myths and realities, He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, Christos Papadopoulos, and Dan Pei

Link

An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation, Senhua Yu and Dipankar Dasgupta

Link

Fault tolerance study for durable storage on the cloud, Xiaofei Zhang and Lei Chen

Submissions from 2010

The role of prompting and feedback in facilitating students' learning about science with MetaTutor, Roger Azevedo, Amy Johnson, Candice Burkett, Amber Chauncey, Ashley Fike, and Mihai Lintean

Qualitative, quantitative, and data mining methods for analyzing log data to characterize students' learning strategies and behaviors, Ryan S.J.D. Baker, Janice D. Gobert, Wouter Van Joolingen, Roger Azevedo, Ido Roll, and Michael São Pedro

Link

Gender differences and programming environments: Across programming populations, Margaret Burnett, Scott D. Fleming, Shamsi Iqbal, Gina Venolia, Vidya Rajaram, and Umer Farooq

Link

A debugging perspective on end-user mashup programming, Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fleming, Margaret Burnett, and Susan Wiedenbeck

Link

Multi-objective evolutionary algorithms to solve coverage and lifetime optimization problem in wireless sensor networks, Koyel Chaudhuri and Dipankar Dasgupta

Link

A parallel framework for multi-objective evolutionary optimization, Dipankar Dasgupta, David Becerra, Alex Banceanu, Fernando Nino, and James Simien

Link

A conceptual model of self-monitoring multi-core systems, Dipankar Dasgupta, Harkeerat Bedi, and Deon Garrett

Link

Configurable and secure system architectures, Dipankar Dasgupta and Marco Carvalho

Link

Password security through Negative Filtering, Dipankar Dasgupta and Sudip Saha

Techniques for validation and controlled execution of processes, codes and data - A survey, Dipankar Dasgupta, Sudip Saha, and Aregahegn Negatu

Link

Fingerprinting custom botnet protocol stacks, Steve DiBenedetto, Kaustubh Gadkari, Nicholas Diel, Andrea Steiner, Dan Massey, and Christos Papadopoulos

Link

Debugging concurrent software: A study using multithreaded sequence diagrams, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, and Laura K. Dillon

Link

Molecule-inspired methods for coarse-grain multi-system optimization, Max H. Garzon and Andrew J. Neel

Link

A neurocontrol for automatic reconstruction of facial displays, Max H. Garzon and Buvaneshwari Sivakumar

Link

Evolution towards global routing scalability, Varun Khare, Dan Jen, Xin Zhao, Yaoqing Liu, Dan Massey, and Lan Wang

Link

Multi-modal sensor system integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Mohammed Khan, and Khandekar Islam

Link

An approach to overcoming knowledge sharing challenges in a corporate IT environment, Sarah B. Lee and Sajjan G. Shiva

Knowledge engineering to visualize complexity for legacy modernization planning, Sarah B. Lee, Sajjan G. Shiva, and K. S. Braunsdorf

Paraphrase identification using weighted dependencies and word semantics, Mihai C. Lintean and Vasile Rus

The role of local and global weighting in assessing the semantic similarity of texts using latent semantic analysis, Mihai Lintean, Cristian Moldovan, Vasile Rus, and Danielle McNamara

Link

Automatic question generation for literature review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

Incremental forwarding table aggregation, Yaoqing Liu, Xin Zhao, Kyuhan Nam, Lan Wang, and Beichuan Zhang

Semantic methods for textual entailment: How much world knowledge is enough?, Andrew Neel and Max Garzon

Link

Synthetic gene design with a large number of hidden stops, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

A survey of game theory as applied to network security, Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu

Computational aspects of the intelligent tutoring system metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo

The first question generation shared task evaluation challenge, Vasile Rus, Brendan Wyse, Paul Pivek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Game theory for cyber security, Sajjan Shiva, Sankardas Roy, and Dipankar Dasgupta

Link

Evolving gaming strategies for attacker-defender in a simulated network environment, Pavan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, and Fernando Nino

Link

Relativized worlds without worst-case to average-case reductions for NP, Thomas Watson

Link

Correlating spam activity with IP address characteristics, Chris Wilcox, Christos Papadopoulos, and John Heidemann

Link

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks, Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla

Link

Threshold key redistribution for dynamic change of authentication group in wireless mesh networks, Kan Yang, Xiaohua Jia, Bo Zhang, and Zhongming Zheng

Link

A distributed collaborative relay protocol for multi-hop WLAN accesses, Bo Zhang, Zhongming Zheng, Xiaohua Jia, and Kan Yang

Link

On the aggregatability of router forwarding tables, Xin Zhao, Yaoqing Liu, Lan Wang, and Beichuan Zhang

Link

Minimum AP placement for WLAN with rate adaptation using physical interference model, Zhongming Zheng, Bo Zhang, Xiaohua Jia, Jun Zhang, and Kan Yang

Submissions from 2009

Application of enhanced decision tree algorithm to churn analysis, Matthew Anyanwu and Sajjan Shiva

Comparison of cluster measures, Matthew Anyanwu, Sajjan Shiva, and David Lin

Link

MetaTutor: Analyzing self-regulated learning in a tutoring system for biology, Roger Azevedo, Amy Witherspoon, Arthur Graesser, Danielle McNamara, Amber Chauncey, and Emily Siler

Link

Characterizing comment spam in the blogosphere through content analysis, Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta

Link

On the use of informed initialization and extreme solutions sub-population in multiobjective evolutionary algorithms, Dipankar Dasgupta, German Hernandezy, Andres Romeroy, Deon Garrett, Aishwarya Kaushal, and James Simienz

Link

A multiobjective evolutionary algorithm for the task based sailor assignment problem, Dipankar Dasgupta, Fernando Nino, Deon Garrett, Koyel Chaudhuri, Soujanya Medapati, and Aishwarya Kaushal

Link

A biologically inspired password authentication system, Dipankar Dasgupta and Sudip Saha

Link

2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings: Welcome Message, Dipankar Dasgupta and Justin Zhan

Link

Analyzing the aftermath of the McColo shutdown, Steve DiBenedetto, Dan Massey, Christos Papadopoulos, and Patrick J. Walsh

Link

An empirical comparison of memetic algorithm strategies on the multiobjective quadratic Assignment Problem, Deon Garrett and Dipankar Dasgupta

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon, Tit Yee Wong, and Vinhthuy Phan

Link

Uses and challenges for network datasets, John Heidemann and Christos Papadopoulos

Link

Remote detection of bottleneck links using spectral and statistical methods, Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz

Link

V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage, Zhou Ji and Dipankar Dasgupta

Link

A novel approach to knowledge sharing in software systems engineering, Sarah B. Lee and Sajjan G. Shiva

Paraphrase identification using weighted dependencies and word semantics, Mihal Lintean and Vasile Rus

Link

Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang