Submissions from 2009
Securing wireless implantable devices for healthcare: Ideas and challenges [Accepted from Open Call], Kriangsiri Malasri and Lan Wang
On codeword design in metric DNA spaces, Vinhthuy Phan and Max H. Garzon
Analyzing microarray data with transitive directed acyclic graphs, Vinhthuy Phan, E. Olusegun George, Quynth T. Tran, Shirlaean Goodwin, Sridevi Bodreddigari, and Thomas R. Sutter
Automatic detection of student mental models during prior knowledge activation in metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo
Assessing student paraphrases using lexical semantics and word weighting, Vasile Rus, Mihai Lintean, Art Graesser, and Danielle McNamara
Identification of Sentence-to-Sentence Relations Using a Textual Entailer, Vasile Rus, Philip M. McCarthy, Arthur C. Graesser, and Danielle S. McNamara
Clustering of defect reports using graph partitioning algorithms, Vasile Rus, Xiaofei Nan, Sajjan Shiva, and Yixin Chen
Chemical genomics of cancer chemopreventive dithiolethiones, Quynh T. Tran, Lijing Xu, Vinhthuy Phan, Shirlean B. Goodwin, Mostafizur Rahman, and Victor X. Jin
Design and validation of patricia for the mitigation of network flooding attacks, Lan Wang, Qishi Wu, and Yaoqing Liu
Level control maintenance of temporal consistency in wireless sensor networks, Yang Wang, Kan Yang, Liusheng Huang, and Xiong Fu
An integrated cyber security monitoring system using correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Monitoring security events using integrated Correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Visualization of security events using an efficient correlation technique, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Design and evaluation of extensions to UML sequence diagrams for modeling multithreaded interactions, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming
Quantum teleportation via GHZ-like state, Kan Yang, Liusheng Huang, Wei Yang, and Fang Song
An empirical study of conserved self pattern recognition algorithm: Comparing to other one-class classifiers and evaluating with random number generators, Senhua Yu and Dipankar Dasgupta
Submissions from 2008
Analysis and optimization of DNA self-assembly in simulation, Derrel R. Blain and Max H. Garzon
Special issue on computational intelligence in cyber security, Dipankar Dasgupta
An investigation of negative authentication systems, Dipankar Dasgupta and Rukhsana Azeem
A Comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem, Dipankar Dasgupta, German Hernandez, Deon Garrett, Pavan Kalyan Vejandla, Aishwarya Kaushal, and Ramjee Yerneni
Immunological computation: Theory and applications, Dipankar Dasgupta and Luis Fernando Niño
Using formal models to objectively judge quality of multi-threaded programs in empirical studies, Laura K. Dillon, R. E.K. Stirewalt, Eileen Kraemer, Shaohua Xie, and Scott D. Fleming
Refining existing theories of program comprehension during maintenance for concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Shaohua Xie
A study of student strategies for the corrective maintenance of concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Shaohua Xie, and Laura K. Dillon
Multiobjective landscape analysis and the generalized assignment problem, Deon Garrett and Dipankar Dasgupta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, Max H. Garzon and Hao Yan
Preface, Max H. Garzon and Hao Yan
NAM: A network adaptable middleware to enhance response time of web services, Shahram Ghandeharizadeh, Christos Papadopoulos, Min Cai, Runfang Zhou, and P. Pol
Census and survey of the visible Internet, John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister
Large scale experiments with naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus
Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang
Assessing forward-, reverse-, and average-entailer indices on natural language input from the Intelligent Tutoring System, iSTART, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Arthur C. Graesser, and Danielle S. McNamara
Testing a collaborative DDoS defense in a red team/blue team exercise, Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, and Michael Berg
A semantic method for textual entailment, Andrew Neel, Max Garzon, and Vasile Rus
DNA-based memories: A survey, Andrew J. Neel and Max H. Garzon
Motif tool manager: A web-based framework for motif discovery, Vinhthuy Phan and Nicholas A. Furlotte
Toward a combinatorial approach to the sample size problem in multiple-treatment microarray studies, Vinhthuy Phan, E. Olusegun George, Quynh Tran, and Thomas R. Sutter
BioTDMS: a general-purpose system for integrative management of bioinformatics tools and data, Vinhthuy Phan and Kriangsiri Malasri
Synthetic gene design with a large number of hidden stop codons, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong
Paraphrase identification with lexico-syntactic graph subsumption, Vasile Rus, Philip M. McCarthy, Mihai C. Lintean, Danielle S. McNamara, and Arthur C. Graesser
A study of textual entailment, Vasile Rus, Philip M. McCarthy, Danielle S. McNamara, and Arthur C. Graesser
Automatic clustering of defect reports, Vasile Rus, Sameer Mohammed, and Sajjan Shiva
Knowledge management in global software development, Sajjan G. Shiva, Sarah B. Lee, Lubna A. Shala, and Chris B. Simmons
Using semantic Wikis to support software reuse, Sajjan G. Shiva and Lubna A. Shala
Building QKD networks based on a novel QKD scheme, Fang Song, Liusheng Huang, Wei Yang, and Kan Yang
Assessing the benefits of synchronization-adorned sequence diagrams: Two controlled experiments, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming
Conserved self pattern recognition algorithm, Senhua Yu and Dipankar Dasgupta
Submissions from 2007
A framework for evolving multi-shaped detectors in negative selection, Sankalp Balachandran, Dipankar Dasgupta, Fernando Nino, and Deon Garrett
Inherent behaviors for on-line detection of peer-to-peer file sharing, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos
Understanding passive and active service discovery, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos
WormShield: Fast worm signature generation with distributed fingerprint aggregation, Min Cai, Kai Hwang, Jianping Pan, and Christos Papadopoulos
Immuno-inspired autonomic system for cyber defense, Dipankar Dasgupta
Toward a task model of concurrent software maintenance, Scott D. Fleming, R. E.K. Stirewalt, and Eileen Kraemer
Using program families for maintenance experiments, Scott D. Fleming, R. E.Kurt Stirewalt, and Laura K. Dillon
Applying hybrid multiobjective evolutionary algorithms to the sailor assignment problem, Deon Garrett, Dipankar Dasgupta, Joseph Vannucci, and James Simien
Revisiting negative selection algorithms, Zhou Ji and Dipankar Dasgupta
Naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus
Addressing security in medical sensor networks, Kriangsiri Malasri and Lan Wang
Textual signatures: Identifying text-types using latent semantic analysis to measure the cohesion of text structures, Philip M. McCarthy, Stephen W. Briner, Vasile Rus, and Danielle S. McNamara
Assessing Entailer with a corpus of natural language from an intelligent tutoring system, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Sarah C. Bigham, Arthur C. Graesser, and Danielle S. McNamara
How to build a system that manages bioinformatics content, Vinhthuy Phan and Allen Thomas
Neural-based agents cooperate to survive in the defend and gather computer game, Joseph Qualls, Max Garzon, and David J. Russomanno
Experiments on generating questions about facts, Vasile Rus, Zhiqiang Cai, and Arthur C. Graesser
Unsupervised method for parsing coordinated base noun phrases, Vasile Rus, Sireesha Ravi, Mihai C. Lintean, and Philip M. McCarthy
Software reuse: Research and practice, Sajjan G. Shiva and Lubna Abou Shala
Persistent detection and recovery of state inconsistencies, Lan Wang, Daniel Massey, and Lixia Zhang
Understanding BGP session failures in a large ISP, Lan Wang, Malleswari Saranu, Joel M. Gottlieb, and Dan Pei
Engaging edge networks in preventing and mitigating undesirable network traffic, Lan Wang, Qishi Wu, and Dung Dinh Luong
Real-time virtual videophone for low-bandwidth wireless networks, Yang Xiao, Max Garzon, and Mike Nolen
Quantum user authentication with nonentanglement-based QKD protocol, Kan Yang, Liusheng Huang, and Wei Yang
Submissions from 2006
Reasoning and "talking" DNA: Can DNA understand English?, Kiran C. Bobba, Andrew J. Neel, Vinhthuy Phan, and Max H. Garzon
Characterization of non-crosshybridizing DNA oligonucleotides manufactured in vitro, J. Chen, R. Deaton, M. Garzon, J. W. Kim, D. H. Wood, and H. Bi
Advances in artificial immune systems, Dipankar Dasgupta
Computational intelligence in cyber security, Dipankar Dasgupta
Mining security events in a distributed agent society, D. Dasgupta, J. Rodríguez, and S. Balachandran
Recognition of handwritten indic script using clonal selection algorithm, Utpal Garain, Mangal P. Chakraborty, and Dipankar Dasgupta
Analyzing the performance of hybrid evolutionary algorithms for the multiobjective quadratic assignment problem, Deon Garrett and Dipankar Dasgupta
Sensitivity and capacity of microarray encodings, Max H. Garzon, Vinhthuy Phan, Kiran C. Bobba, and Raghuver Kontham
In search of optimal codes for DNA computing, Max H. Garzon, Vinhthuy Phan, Sujoy Roy, and Andrew J. Neel
Evaluating state-of-the-art Treebank-style parsers for Coh-Metrix and other learning technology environments, Christian F. Hempelmann, Vasile Rus, Arthur C. Graesser, and Danielle S. McNamara
Incremental deployment strategies for router-assisted reliable multicast, Xinming He, Christos Papadopoulos, and Pavlin Radoslavov
Identification of repeated denial of service attacks, Alefiya Hussain, John Heidemann, and Christos Papadopoulos
Applicability issues of the real-valued negative selection algorithms, Zhou Ji and Dipankar Dasgupta
Analysis of dental images using artificial immune systems, Zhou Ji, Dipankar Dasgupta, Zhiling Yang, and Hongmei Teng
SNAP: An architecture for secure medical sensor networks, Kriangsiri Malasri and Lan Wang
Detecting and identifying malware: A new signal processing goal, Urbashi Mitra, Antonio Ortega, John Heidemann, and Christos Papadopoulos
Semantic retrieval in DNA-based memories with Gibbs energy models, Andrew Neel and Max Garzon
Dependency-based textual entailment, Vasile Rus
The look and feel of a confident entailer, Vasile Rus and Art Graesser
Deeper natural language processing for evaluating student answers in intelligent tutoring systems, Vasile Rus and Arthur C. Graesser
Analysis of a textual entailer, Vasile Rus, Philip M. McCarthy, and Arthur C. Graesser
Comparative analysis of the sailor assignment problem, Joseph Vannucci, Deon Garrett, and Dipankar Dasgupta
A survey of energy-efficient scheduling mechanisms in sensor networks, Lan Wang and Yang Xiao
Using talking heads for real-time virtual videophone in wireless networks, Xiao Yang, Max H. Garzon, and Michael Nolan
Submissions from 2005
Artificial immune systems, Uwe Aickelin and Dipankar Dasgupta
Characterization of non-crosshybridizing DNA oligonucleotides manufactured in Vitro, Junghuei Chen, Russell Deaton, Max H. Garzon, Jin Woo Kim, David Wood, and Hong Bi
CIDS: An agent-based intrusion detection system, D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii
Efficient visualization of security events in a large agent society, D. Dasgupta, J. Rodríguez, and S. Balachandran
MILA - Multilevel immune learning algorithm and its application to anomaly detection, D. Dasgupta, S. Yu, and N. S. Majumdar
An approach to implementing dynamic adaptation in C++, Scott D. Fleming, Betty H.C. Cheng, R. E. Kurt Stirewalt, and Philip K. McKinley