Submissions from 2013
Attribute-based fine-grained access control with efficient revocation in cloud storage systems, Kan Yang, Xiaohua Jia, and Kui Ren
DAC-MACS: Effective data access control for multi-authority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, and Bo Zhang
DAC-MACS: Effective data access control for multiauthority cloud storage systems, Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang, and Ruitao Xie
A case for stateful forwarding plane, Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang
Multi-path routing and stream scheduling with spatial multiplexing and interference cancellation in MIMO networks, Bo Zhang, Xiaohua Jia, Kan Yang, and Ruitao Xie
Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey
Detecting encrypted botnet traffic, Han Zhang, Christos Papadopoulos, and Dan Massey
EAGRE: Towards scalable I/O efficient SPARQL query evaluation on the cloud, Xiaofei Zhang, Lei Chen, Yongxin Tong, and Min Wang
Submissions from 2012
Evaluating security and privacy in cloud computing services: A stakeholder's perspective, Abdullah Abuhussein, Harkeerat Bedi, and Sajjan Shiva
Effects of time delays in the electric power grid, Hasan Ali and Dipankar Dasgupta
Securing cloud infrastructure against co-resident DoS attacks using game theoretic defense mechanisms, Harkeerat Singh Bedi and Sajjan Shiva
A domain independent framework to extract and aggregate analogous features in online reviews, Archana Bhattarai, Nobal Niraula, Vasile Rus, and King Ip Lin
From barriers to learning in the idea garden: An empirical study, Jill Cao, Irwin Kwan, Rachel White, Scott D. Fleming, Margaret Burnett, and Christopher Scaffidi
A genetic-based solution to the task-based sailor assignment problem, Dipankar Dasgupta, Deon Garrett, Fernando Nino, Alex Banceanu, and David Becerra
Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson
A framework for development of runtime monitors, Ramya Dharam and Sajjan G. Shiva
Runtime monitors for tautology based SQL injection attacks, Ramya Dharam and Sajjan G. Shiva
An artificial immune system for phishing detection, Xing Fang, Nicholas Koceja, Justin Zhan, Gerry Dozier, and Dasgupta Dipankar
A cyber-security storm MAP, Denise Ferebee, Dipankar Dasgupta, and Qishi Wu
Theory and applications of DNA codeword design, Max H. Garzon
A geometric approach to gibbs energy landscapes and optimal DNA codeword design, Max H. Garzon and Kiran C. Bobba
Advances in lifted importance sampling, Vibhav Gogate, Abhay Jha, and Deepak Venugopal
On a multi-objective evolutionary algorithm for optimizing end-to-end performance of scientific workflows in distributed environments, Yi Gu, Shwu Ling Shenq, Qishi Wu, and Dipankar Dasgupta
Down the rabbit hole: Robust proximity search and density estimation in sublinear space, Sariel Har-Peled and Nirman Kumar
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks, Vamsi Kambhampati, Christos Papadopolous, and Dan Massey
A detection model for anomalies in smart grid with sensor network, Shubhalaxmi Kher, Victor Nutt, Dipankar Dasgupta, Hasan Ali, and Paul Mixon
A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Muhammad Khan, and Khandakar Islam
Measuring semantic similarity in short texts through greedy pairing and word semantics, Mihai Lintean and Vasile Rus
Automatic detection of student mental models based on natural language student input during metacognitive skill training, Mihai Lintean, Vasile Rus, and Roger Azevedo
Hybrid question generation approach for critical review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus
The virtual apprentice, Weizi Li and Jan M. Allbeck
Virtual humans: Evolving with common sense, Weizi Li and Jan M. Allbeck
Crowd distribution and location preference, Weizi Li, Zichao Di, and Jan M. Allbeck
Behavior of DNS' top talkers, a .com/.net view, Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, and Dan Massey
Facilitating co-adaptation of technology and education through the creation of an open-source repository of interoperable code, Philip I. Pavlik, Jaclyn Maass, Vasile Rus, and Andrew M. Olney
Reactive Information Foraging: An empirical investigation of theory-based recommender systems for programmers, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Christopher Bogart, Margaret Burnett, and Bonnie E. John
A Comparison of Greedy and Optimal Assessment of Natural Language Student Input Using Word-to-Word Similarity Metrics, Vasile Rus and Mihai Lintean
An optimal assessment of natural language student input using word-to-word similarity metrics, Vasile Rus and Mihai Lintean
Automated discovery of speech act categories in educational games, Vasile Rus, Cristian Moldovan, Nobal Niraula, and Arthur C. Graesser
Automated detection of local coherence in short argumentative essays based on centering theory, Vasile Rus and Nobal Niraula
A holistic game inspired defense architecture, Sajjan Shiva, Harkeerat Singh Bedi, Chris B. Simmons, Marc Fisher, and Ramya Dharam
On lifting the Gibbs sampling algorithm, Deepak Venugopal and Vibhav Gogate
Pattern analysis: A web-based tool for analyzing response patterns in low-replication, many-treatment gene expression data, Nam S. Vo and Vinhthuy Phan
Predicting possible directed-graph patterns of gene expressions in studies involving multiple treatments, Nam S. Vo, Vinhthuy Phan, and Thomas R. Sutter
Relativized Worlds without Worst-Case to Average-Case Reductions for NP, Thomas Watson
Attributed-based access control for multi-authority systems in cloud storage, Kan Yang and Xiaohua Jia
Data storage auditing service in cloud computing: Challenges, methods and opportunities, Kan Yang and Xiaohua Jia
Argus: End-to-end service anomaly detection and localization from an ISP's point of view, He Yan, Ashley Flavel, Zihui Ge, Alexandre Gerber, Dan Massey, and Christos Papadopoulos
Adaptive forwarding in named data networking, Cheng Yi, Alexander Afanasyev, Lan Wang, Beichuan Zhang, and Lixia Zhang
Efficient multi-way Theta-join processing using MapReduce, Xiaofei Zhang, Lei Chen, and Min Wang
Towards efficient join processing over large RDF graph using mapreduce, Xiaofei Zhang, Lei Chen, and Min Wang
Submissions from 2011
Effects of communication delays in electric grid, Mohd Hasan Ali and Dipankar Dasgupta
Low-rate, flow-level periodicity detection, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows, Harkeerat Singh Bedi, Sankardas Roy, and Sajjan Shiva
A self-supervised approach to comment spam detection based on content analysis, A. Bhattarai and D. Dasgupta
Gender pluralism in problem-solving software, Margaret M. Burnett, Laura Beckwith, Susan Wiedenbeck, Scott D. Fleming, Jill Cao, and Thomas H. Park
An exploration of design opportunities for "gardening" end-user programmers' ideas, Jill Cao, Scott D. Fleming, and Margaret Burnett
Mission resilience in cloud computing: A biologically inspired approach, Marco Carvalho, Dipankar Dasgupta, Michael Grimaila, and Carlos Perez
Secure VM for monitoring industrial process controllers, Dipankar Dasgupta, Mohd Hassan Ali, Robert Abercrombie, Bob Schlicher, Frederick Sheldon, and Marco Carvalho
Estimating security coverage for cloud services, Dipankar Dasgupta and Md Moshiur Rahman
A framework for estimating security coverage for cloud service insurance, Dipankar Dasgupta and Moshiur Rahman
Recent advances in artificial immune systems: Models and applications, Dipankar Dasgupta, Senhua Yu, and Fernando Nino
Extractors and lower bounds for locally samplable sources, Anindya De and Thomas Watson
Routing policies in named data networking, Steven DiBenedetto, Christos Papadopoulos, and Daniel Massey
Security visualization: Cyber security storm map and event correlation, Denise Ferebee, Dipankar Dasgupta, Michael Schmidt, and Qishi Wu
Dynamics of prefix usage at an edge router, Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos
DNA chips for species identification and biological phylogenies, Max H. Garzon and Tit Yee Wong
Search and validation of short genome-wide biomarkers for bacterial biological phylogenies, Max H. Garzon and Tit Yee Wong
Question answering and generation, Arthur C. Graesser, Vasile Rus, Zhiqiang Cai, and Xiangen Hu
Approximate nearest neighbor search for low dimensional queries, Sariel Har-Peled and Nirman Kumar
Autonomous wireless radar sensor mote integrating a doppler radar into a sensor mote and its application in surveillance and target material classification, Khan Iftekharuddin, Muhammad M.R. Khan, Ernest McCracken, Lan Wang, and Robert Kozma
A taxonomy of capabilities based DDoS defense architectures, Vamsi Kambhampati, Christos Papadopoulos, and Dan Massey
Dissimilarity kernels for paraphrase identification, Mihai Lintean and Vasile Rus
Computational aspects of the intelligent tutoring system metaTutor, Mihai Lintean, Vasile Rus, Zhiqiang Cai, Amy Witherspoon-Johnson, Arthur C. Graesser, and Roger Azevedo
Populations with purpose, Weizi Li and Jan M. Allbeck
The writing-Pal: Natural language algorithms to support intelligent tutoring on writing strategies, Danielle S. McNamara, Roxanne Raine, Rod Roscoe, Scott A. Crossley, G. Tanner Jackson, and Jianmin Dai
Automated speech act classification for online chat, Cristian Moldovan, Vasile Rus, and Arthur C. Graesser
Semantic methods for textual entailment, Andrew J. Neel and Max H. Garzon
Modeling programmer navigation: A head-to-head empirical evaluation of predictive models, David Piorkowski, Scott D. Fleming, Christopher Scaffidi, Liza John, Christopher Bogart, and Bonnie E. John
Green approaches to process control in thermal rooms, Danilo Rairan and Max H. Garzon
Latent Semantic Indexing of PubMed abstracts for identification of transcription factor candidates from microarray derived gene sets, Sujoy Roy, Kevin Heinrich, Vinhthuy Phan, Michael W. Berry, and Ramin Homayouni
A linguistic analysis of student-generated paraphrases, Vasile Rus, Shi Feng, Russell Brandon, Scott Crossely, and Danielle S. McNamara
Text-to-text similarity of sentences, Vasile Rus, Mihai Lintean, Arthur C. Graesser, and Danielle S. McNamara
Question Generation Shared Task and Evaluation Challenge - Status report, Vasile Rus, Brendan Wyse, Paul Piwek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan
Runtime monitors as sensors of security systems, Sajjan Shiva, Ramya Dharam, and Vivek Shandilya
A stochastic game model with imperfect information in cyber security, Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu
A Dynamic Recursive Unified Internet Design (DRUID), Joe Touch, Ilia Baldine, Rudra Dutta, Gregory G. Finn, Bryan Ford, and Scott Jordan
Pseudorandom generators for combinatorial checkerboards, Thomas Watson
Query complexity in errorless hardness amplification, Thomas Watson
IP Reachability differences: Myths and realities, He Yan, Benjamin Say, Brendan Sheridan, Dave Oko, Christos Papadopoulos, and Dan Pei
An effective network-based Intrusion Detection using Conserved Self Pattern Recognition Algorithm augmented with near-deterministic detector generation, Senhua Yu and Dipankar Dasgupta
Fault tolerance study for durable storage on the cloud, Xiaofei Zhang and Lei Chen
Submissions from 2010
The role of prompting and feedback in facilitating students' learning about science with MetaTutor, Roger Azevedo, Amy Johnson, Candice Burkett, Amber Chauncey, Ashley Fike, and Mihai Lintean
Qualitative, quantitative, and data mining methods for analyzing log data to characterize students' learning strategies and behaviors, Ryan S.J.D. Baker, Janice D. Gobert, Wouter Van Joolingen, Roger Azevedo, Ido Roll, and Michael São Pedro
Gender differences and programming environments: Across programming populations, Margaret Burnett, Scott D. Fleming, Shamsi Iqbal, Gina Venolia, Vidya Rajaram, and Umer Farooq
A debugging perspective on end-user mashup programming, Jill Cao, Kyle Rector, Thomas H. Park, Scott D. Fleming, Margaret Burnett, and Susan Wiedenbeck
Multi-objective evolutionary algorithms to solve coverage and lifetime optimization problem in wireless sensor networks, Koyel Chaudhuri and Dipankar Dasgupta
A parallel framework for multi-objective evolutionary optimization, Dipankar Dasgupta, David Becerra, Alex Banceanu, Fernando Nino, and James Simien
A conceptual model of self-monitoring multi-core systems, Dipankar Dasgupta, Harkeerat Bedi, and Deon Garrett
Configurable and secure system architectures, Dipankar Dasgupta and Marco Carvalho