Follow

Submissions from 2010

Link

Password security through Negative Filtering, Dipankar Dasgupta and Sudip Saha

Techniques for validation and controlled execution of processes, codes and data - A survey, Dipankar Dasgupta, Sudip Saha, and Aregahegn Negatu

Link

Fingerprinting custom botnet protocol stacks, Steve DiBenedetto, Kaustubh Gadkari, Nicholas Diel, Andrea Steiner, Dan Massey, and Christos Papadopoulos

Link

Debugging concurrent software: A study using multithreaded sequence diagrams, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, and Laura K. Dillon

Link

Molecule-inspired methods for coarse-grain multi-system optimization, Max H. Garzon and Andrew J. Neel

Link

A neurocontrol for automatic reconstruction of facial displays, Max H. Garzon and Buvaneshwari Sivakumar

Link

Evolution towards global routing scalability, Varun Khare, Dan Jen, Xin Zhao, Yaoqing Liu, Dan Massey, and Lan Wang

Link

Multi-modal sensor system integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Mohammed Khan, and Khandekar Islam

Link

An approach to overcoming knowledge sharing challenges in a corporate IT environment, Sarah B. Lee and Sajjan G. Shiva

Knowledge engineering to visualize complexity for legacy modernization planning, Sarah B. Lee, Sajjan G. Shiva, and K. S. Braunsdorf

Paraphrase identification using weighted dependencies and word semantics, Mihai C. Lintean and Vasile Rus

The role of local and global weighting in assessing the semantic similarity of texts using latent semantic analysis, Mihai Lintean, Cristian Moldovan, Vasile Rus, and Danielle McNamara

Link

Automatic question generation for literature review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus

Link

Incremental forwarding table aggregation, Yaoqing Liu, Xin Zhao, Kyuhan Nam, Lan Wang, and Beichuan Zhang

Semantic methods for textual entailment: How much world knowledge is enough?, Andrew Neel and Max Garzon

Link

Synthetic gene design with a large number of hidden stops, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter

Link

A survey of game theory as applied to network security, Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu

Computational aspects of the intelligent tutoring system metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo

The first question generation shared task evaluation challenge, Vasile Rus, Brendan Wyse, Paul Pivek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan

Link

Game theory for cyber security, Sajjan Shiva, Sankardas Roy, and Dipankar Dasgupta

Link

Evolving gaming strategies for attacker-defender in a simulated network environment, Pavan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, and Fernando Nino

Link

Relativized worlds without worst-case to average-case reductions for NP, Thomas Watson

Link

Correlating spam activity with IP address characteristics, Chris Wilcox, Christos Papadopoulos, and John Heidemann

Link

On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks, Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla

Link

Threshold key redistribution for dynamic change of authentication group in wireless mesh networks, Kan Yang, Xiaohua Jia, Bo Zhang, and Zhongming Zheng

Link

A distributed collaborative relay protocol for multi-hop WLAN accesses, Bo Zhang, Zhongming Zheng, Xiaohua Jia, and Kan Yang

Link

On the aggregatability of router forwarding tables, Xin Zhao, Yaoqing Liu, Lan Wang, and Beichuan Zhang

Link

Minimum AP placement for WLAN with rate adaptation using physical interference model, Zhongming Zheng, Bo Zhang, Xiaohua Jia, Jun Zhang, and Kan Yang

Submissions from 2009

Application of enhanced decision tree algorithm to churn analysis, Matthew Anyanwu and Sajjan Shiva

Comparison of cluster measures, Matthew Anyanwu, Sajjan Shiva, and David Lin

Link

MetaTutor: Analyzing self-regulated learning in a tutoring system for biology, Roger Azevedo, Amy Witherspoon, Arthur Graesser, Danielle McNamara, Amber Chauncey, and Emily Siler

Link

Characterizing comment spam in the blogosphere through content analysis, Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta

Link

On the use of informed initialization and extreme solutions sub-population in multiobjective evolutionary algorithms, Dipankar Dasgupta, German Hernandezy, Andres Romeroy, Deon Garrett, Aishwarya Kaushal, and James Simienz

Link

A multiobjective evolutionary algorithm for the task based sailor assignment problem, Dipankar Dasgupta, Fernando Nino, Deon Garrett, Koyel Chaudhuri, Soujanya Medapati, and Aishwarya Kaushal

Link

A biologically inspired password authentication system, Dipankar Dasgupta and Sudip Saha

Link

2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings: Welcome Message, Dipankar Dasgupta and Justin Zhan

Link

Analyzing the aftermath of the McColo shutdown, Steve DiBenedetto, Dan Massey, Christos Papadopoulos, and Patrick J. Walsh

Link

An empirical comparison of memetic algorithm strategies on the multiobjective quadratic Assignment Problem, Deon Garrett and Dipankar Dasgupta

Link

DNA chips for species identification and biological phylogenies, Max H. Garzon, Tit Yee Wong, and Vinhthuy Phan

Link

Uses and challenges for network datasets, John Heidemann and Christos Papadopoulos

Link

Remote detection of bottleneck links using spectral and statistical methods, Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz

Link

V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage, Zhou Ji and Dipankar Dasgupta

Link

A novel approach to knowledge sharing in software systems engineering, Sarah B. Lee and Sajjan G. Shiva

Paraphrase identification using weighted dependencies and word semantics, Mihal Lintean and Vasile Rus

Link

Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang

Link

Securing wireless implantable devices for healthcare: Ideas and challenges [Accepted from Open Call], Kriangsiri Malasri and Lan Wang

Link

On codeword design in metric DNA spaces, Vinhthuy Phan and Max H. Garzon

Link

Analyzing microarray data with transitive directed acyclic graphs, Vinhthuy Phan, E. Olusegun George, Quynth T. Tran, Shirlaean Goodwin, Sridevi Bodreddigari, and Thomas R. Sutter

Automatic detection of student mental models during prior knowledge activation in metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo

Link

Assessing student paraphrases using lexical semantics and word weighting, Vasile Rus, Mihai Lintean, Art Graesser, and Danielle McNamara

Link

Identification of Sentence-to-Sentence Relations Using a Textual Entailer, Vasile Rus, Philip M. McCarthy, Arthur C. Graesser, and Danielle S. McNamara

Clustering of defect reports using graph partitioning algorithms, Vasile Rus, Xiaofei Nan, Sajjan Shiva, and Yixin Chen

Link

Chemical genomics of cancer chemopreventive dithiolethiones, Quynh T. Tran, Lijing Xu, Vinhthuy Phan, Shirlean B. Goodwin, Mostafizur Rahman, and Victor X. Jin

Link

Design and validation of patricia for the mitigation of network flooding attacks, Lan Wang, Qishi Wu, and Yaoqing Liu

Link

Level control maintenance of temporal consistency in wireless sensor networks, Yang Wang, Kan Yang, Liusheng Huang, and Xiong Fu

An integrated cyber security monitoring system using correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Monitoring security events using integrated Correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Visualization of security events using an efficient correlation technique, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Design and evaluation of extensions to UML sequence diagrams for modeling multithreaded interactions, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming

Link

Quantum teleportation via GHZ-like state, Kan Yang, Liusheng Huang, Wei Yang, and Fang Song

Link

An empirical study of conserved self pattern recognition algorithm: Comparing to other one-class classifiers and evaluating with random number generators, Senhua Yu and Dipankar Dasgupta

Submissions from 2008

Analysis and optimization of DNA self-assembly in simulation, Derrel R. Blain and Max H. Garzon

Link

Special issue on computational intelligence in cyber security, Dipankar Dasgupta

An investigation of negative authentication systems, Dipankar Dasgupta and Rukhsana Azeem

Link

A Comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem, Dipankar Dasgupta, German Hernandez, Deon Garrett, Pavan Kalyan Vejandla, Aishwarya Kaushal, and Ramjee Yerneni

Immunological computation: Theory and applications, Dipankar Dasgupta and Luis Fernando Niño

Link

Using formal models to objectively judge quality of multi-threaded programs in empirical studies, Laura K. Dillon, R. E.K. Stirewalt, Eileen Kraemer, Shaohua Xie, and Scott D. Fleming

Link

Refining existing theories of program comprehension during maintenance for concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Shaohua Xie

Link

A study of student strategies for the corrective maintenance of concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Shaohua Xie, and Laura K. Dillon

Link

Multiobjective landscape analysis and the generalized assignment problem, Deon Garrett and Dipankar Dasgupta

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, Max H. Garzon and Hao Yan

Link

Preface, Max H. Garzon and Hao Yan

Link

NAM: A network adaptable middleware to enhance response time of web services, Shahram Ghandeharizadeh, Christos Papadopoulos, Min Cai, Runfang Zhou, and P. Pol

Link

Census and survey of the visible Internet, John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister

Link

Large scale experiments with naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus

Link

Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang

Assessing forward-, reverse-, and average-entailer indices on natural language input from the Intelligent Tutoring System, iSTART, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Arthur C. Graesser, and Danielle S. McNamara

Link

Testing a collaborative DDoS defense in a red team/blue team exercise, Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, and Michael Berg

A semantic method for textual entailment, Andrew Neel, Max Garzon, and Vasile Rus

Link

DNA-based memories: A survey, Andrew J. Neel and Max H. Garzon

Link

Motif tool manager: A web-based framework for motif discovery, Vinhthuy Phan and Nicholas A. Furlotte

Toward a combinatorial approach to the sample size problem in multiple-treatment microarray studies, Vinhthuy Phan, E. Olusegun George, Quynh Tran, and Thomas R. Sutter

Link

BioTDMS: a general-purpose system for integrative management of bioinformatics tools and data, Vinhthuy Phan and Kriangsiri Malasri

Link

Synthetic gene design with a large number of hidden stop codons, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong

Paraphrase identification with lexico-syntactic graph subsumption, Vasile Rus, Philip M. McCarthy, Mihai C. Lintean, Danielle S. McNamara, and Arthur C. Graesser

Link

A study of textual entailment, Vasile Rus, Philip M. McCarthy, Danielle S. McNamara, and Arthur C. Graesser

Automatic clustering of defect reports, Vasile Rus, Sameer Mohammed, and Sajjan Shiva

Knowledge management in global software development, Sajjan G. Shiva, Sarah B. Lee, Lubna A. Shala, and Chris B. Simmons

Link

Using semantic Wikis to support software reuse, Sajjan G. Shiva and Lubna A. Shala

Link

Building QKD networks based on a novel QKD scheme, Fang Song, Liusheng Huang, Wei Yang, and Kan Yang

Link

Assessing the benefits of synchronization-adorned sequence diagrams: Two controlled experiments, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming

Link

Conserved self pattern recognition algorithm, Senhua Yu and Dipankar Dasgupta

Submissions from 2007

Link

A framework for evolving multi-shaped detectors in negative selection, Sankalp Balachandran, Dipankar Dasgupta, Fernando Nino, and Deon Garrett

Link

Inherent behaviors for on-line detection of peer-to-peer file sharing, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

Understanding passive and active service discovery, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

WormShield: Fast worm signature generation with distributed fingerprint aggregation, Min Cai, Kai Hwang, Jianping Pan, and Christos Papadopoulos

Link

Immuno-inspired autonomic system for cyber defense, Dipankar Dasgupta

Link

Toward a task model of concurrent software maintenance, Scott D. Fleming, R. E.K. Stirewalt, and Eileen Kraemer