Submissions from 2010
Password security through Negative Filtering, Dipankar Dasgupta and Sudip Saha
Techniques for validation and controlled execution of processes, codes and data - A survey, Dipankar Dasgupta, Sudip Saha, and Aregahegn Negatu
Fingerprinting custom botnet protocol stacks, Steve DiBenedetto, Kaustubh Gadkari, Nicholas Diel, Andrea Steiner, Dan Massey, and Christos Papadopoulos
Debugging concurrent software: A study using multithreaded sequence diagrams, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, and Laura K. Dillon
Molecule-inspired methods for coarse-grain multi-system optimization, Max H. Garzon and Andrew J. Neel
A neurocontrol for automatic reconstruction of facial displays, Max H. Garzon and Buvaneshwari Sivakumar
Evolution towards global routing scalability, Varun Khare, Dan Jen, Xin Zhao, Yaoqing Liu, Dan Massey, and Lan Wang
Multi-modal sensor system integrating COTS technology for surveillance and tracking, Robert Kozma, Lan Wang, Khan Iftekharuddin, Ernest McCracken, Mohammed Khan, and Khandekar Islam
An approach to overcoming knowledge sharing challenges in a corporate IT environment, Sarah B. Lee and Sajjan G. Shiva
Knowledge engineering to visualize complexity for legacy modernization planning, Sarah B. Lee, Sajjan G. Shiva, and K. S. Braunsdorf
Paraphrase identification using weighted dependencies and word semantics, Mihai C. Lintean and Vasile Rus
The role of local and global weighting in assessing the semantic similarity of texts using latent semantic analysis, Mihai Lintean, Cristian Moldovan, Vasile Rus, and Danielle McNamara
Automatic question generation for literature review writing support, Ming Liu, Rafael A. Calvo, and Vasile Rus
Incremental forwarding table aggregation, Yaoqing Liu, Xin Zhao, Kyuhan Nam, Lan Wang, and Beichuan Zhang
Semantic methods for textual entailment: How much world knowledge is enough?, Andrew Neel and Max Garzon
Synthetic gene design with a large number of hidden stops, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong
Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter
Stability of RNA structural motifs and its influence on editing efficiency by adenosine deaminases, Vinhthuy Phan, Allen Thomas, Kriangsiri Malasri, and Carrie Hayes Sutter
A survey of game theory as applied to network security, Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu
Computational aspects of the intelligent tutoring system metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo
The first question generation shared task evaluation challenge, Vasile Rus, Brendan Wyse, Paul Pivek, Mihai Lintean, Svetlana Stoyanchev, and Cristian Moldovan
Game theory for cyber security, Sajjan Shiva, Sankardas Roy, and Dipankar Dasgupta
Evolving gaming strategies for attacker-defender in a simulated network environment, Pavan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, and Fernando Nino
Relativized worlds without worst-case to average-case reductions for NP, Thomas Watson
Correlating spam activity with IP address characteristics, Chris Wilcox, Christos Papadopoulos, and John Heidemann
On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks, Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla
Threshold key redistribution for dynamic change of authentication group in wireless mesh networks, Kan Yang, Xiaohua Jia, Bo Zhang, and Zhongming Zheng
A distributed collaborative relay protocol for multi-hop WLAN accesses, Bo Zhang, Zhongming Zheng, Xiaohua Jia, and Kan Yang
On the aggregatability of router forwarding tables, Xin Zhao, Yaoqing Liu, Lan Wang, and Beichuan Zhang
Minimum AP placement for WLAN with rate adaptation using physical interference model, Zhongming Zheng, Bo Zhang, Xiaohua Jia, Jun Zhang, and Kan Yang
Submissions from 2009
Application of enhanced decision tree algorithm to churn analysis, Matthew Anyanwu and Sajjan Shiva
Comparison of cluster measures, Matthew Anyanwu, Sajjan Shiva, and David Lin
MetaTutor: Analyzing self-regulated learning in a tutoring system for biology, Roger Azevedo, Amy Witherspoon, Arthur Graesser, Danielle McNamara, Amber Chauncey, and Emily Siler
Characterizing comment spam in the blogosphere through content analysis, Archana Bhattarai, Vasile Rus, and Dipankar Dasgupta
On the use of informed initialization and extreme solutions sub-population in multiobjective evolutionary algorithms, Dipankar Dasgupta, German Hernandezy, Andres Romeroy, Deon Garrett, Aishwarya Kaushal, and James Simienz
A multiobjective evolutionary algorithm for the task based sailor assignment problem, Dipankar Dasgupta, Fernando Nino, Deon Garrett, Koyel Chaudhuri, Soujanya Medapati, and Aishwarya Kaushal
A biologically inspired password authentication system, Dipankar Dasgupta and Sudip Saha
2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings: Welcome Message, Dipankar Dasgupta and Justin Zhan
Analyzing the aftermath of the McColo shutdown, Steve DiBenedetto, Dan Massey, Christos Papadopoulos, and Patrick J. Walsh
An empirical comparison of memetic algorithm strategies on the multiobjective quadratic Assignment Problem, Deon Garrett and Dipankar Dasgupta
DNA chips for species identification and biological phylogenies, Max H. Garzon, Tit Yee Wong, and Vinhthuy Phan
Uses and challenges for network datasets, John Heidemann and Christos Papadopoulos
Remote detection of bottleneck links using spectral and statistical methods, Xinming He, Christos Papadopoulos, John Heidemann, Urbashi Mitra, and Usman Riaz
V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage, Zhou Ji and Dipankar Dasgupta
A novel approach to knowledge sharing in software systems engineering, Sarah B. Lee and Sajjan G. Shiva
Paraphrase identification using weighted dependencies and word semantics, Mihal Lintean and Vasile Rus
Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang
Securing wireless implantable devices for healthcare: Ideas and challenges [Accepted from Open Call], Kriangsiri Malasri and Lan Wang
On codeword design in metric DNA spaces, Vinhthuy Phan and Max H. Garzon
Analyzing microarray data with transitive directed acyclic graphs, Vinhthuy Phan, E. Olusegun George, Quynth T. Tran, Shirlaean Goodwin, Sridevi Bodreddigari, and Thomas R. Sutter
Automatic detection of student mental models during prior knowledge activation in metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo
Assessing student paraphrases using lexical semantics and word weighting, Vasile Rus, Mihai Lintean, Art Graesser, and Danielle McNamara
Identification of Sentence-to-Sentence Relations Using a Textual Entailer, Vasile Rus, Philip M. McCarthy, Arthur C. Graesser, and Danielle S. McNamara
Clustering of defect reports using graph partitioning algorithms, Vasile Rus, Xiaofei Nan, Sajjan Shiva, and Yixin Chen
Chemical genomics of cancer chemopreventive dithiolethiones, Quynh T. Tran, Lijing Xu, Vinhthuy Phan, Shirlean B. Goodwin, Mostafizur Rahman, and Victor X. Jin
Design and validation of patricia for the mitigation of network flooding attacks, Lan Wang, Qishi Wu, and Yaoqing Liu
Level control maintenance of temporal consistency in wireless sensor networks, Yang Wang, Kan Yang, Liusheng Huang, and Xiong Fu
An integrated cyber security monitoring system using correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Monitoring security events using integrated Correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Visualization of security events using an efficient correlation technique, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta
Design and evaluation of extensions to UML sequence diagrams for modeling multithreaded interactions, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming
Quantum teleportation via GHZ-like state, Kan Yang, Liusheng Huang, Wei Yang, and Fang Song
An empirical study of conserved self pattern recognition algorithm: Comparing to other one-class classifiers and evaluating with random number generators, Senhua Yu and Dipankar Dasgupta
Submissions from 2008
Analysis and optimization of DNA self-assembly in simulation, Derrel R. Blain and Max H. Garzon
Special issue on computational intelligence in cyber security, Dipankar Dasgupta
An investigation of negative authentication systems, Dipankar Dasgupta and Rukhsana Azeem
A Comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem, Dipankar Dasgupta, German Hernandez, Deon Garrett, Pavan Kalyan Vejandla, Aishwarya Kaushal, and Ramjee Yerneni
Immunological computation: Theory and applications, Dipankar Dasgupta and Luis Fernando Niño
Using formal models to objectively judge quality of multi-threaded programs in empirical studies, Laura K. Dillon, R. E.K. Stirewalt, Eileen Kraemer, Shaohua Xie, and Scott D. Fleming
Refining existing theories of program comprehension during maintenance for concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Shaohua Xie
A study of student strategies for the corrective maintenance of concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Shaohua Xie, and Laura K. Dillon
Multiobjective landscape analysis and the generalized assignment problem, Deon Garrett and Dipankar Dasgupta
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, Max H. Garzon and Hao Yan
Preface, Max H. Garzon and Hao Yan
NAM: A network adaptable middleware to enhance response time of web services, Shahram Ghandeharizadeh, Christos Papadopoulos, Min Cai, Runfang Zhou, and P. Pol
Census and survey of the visible Internet, John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister
Large scale experiments with naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus
Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang
Assessing forward-, reverse-, and average-entailer indices on natural language input from the Intelligent Tutoring System, iSTART, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Arthur C. Graesser, and Danielle S. McNamara
Testing a collaborative DDoS defense in a red team/blue team exercise, Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, and Michael Berg
A semantic method for textual entailment, Andrew Neel, Max Garzon, and Vasile Rus
DNA-based memories: A survey, Andrew J. Neel and Max H. Garzon
Motif tool manager: A web-based framework for motif discovery, Vinhthuy Phan and Nicholas A. Furlotte
Toward a combinatorial approach to the sample size problem in multiple-treatment microarray studies, Vinhthuy Phan, E. Olusegun George, Quynh Tran, and Thomas R. Sutter
BioTDMS: a general-purpose system for integrative management of bioinformatics tools and data, Vinhthuy Phan and Kriangsiri Malasri
Synthetic gene design with a large number of hidden stop codons, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong
Paraphrase identification with lexico-syntactic graph subsumption, Vasile Rus, Philip M. McCarthy, Mihai C. Lintean, Danielle S. McNamara, and Arthur C. Graesser
A study of textual entailment, Vasile Rus, Philip M. McCarthy, Danielle S. McNamara, and Arthur C. Graesser
Automatic clustering of defect reports, Vasile Rus, Sameer Mohammed, and Sajjan Shiva
Knowledge management in global software development, Sajjan G. Shiva, Sarah B. Lee, Lubna A. Shala, and Chris B. Simmons
Using semantic Wikis to support software reuse, Sajjan G. Shiva and Lubna A. Shala
Building QKD networks based on a novel QKD scheme, Fang Song, Liusheng Huang, Wei Yang, and Kan Yang
Assessing the benefits of synchronization-adorned sequence diagrams: Two controlled experiments, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming
Conserved self pattern recognition algorithm, Senhua Yu and Dipankar Dasgupta
Submissions from 2007
A framework for evolving multi-shaped detectors in negative selection, Sankalp Balachandran, Dipankar Dasgupta, Fernando Nino, and Deon Garrett
Inherent behaviors for on-line detection of peer-to-peer file sharing, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos
Understanding passive and active service discovery, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos
WormShield: Fast worm signature generation with distributed fingerprint aggregation, Min Cai, Kai Hwang, Jianping Pan, and Christos Papadopoulos
Immuno-inspired autonomic system for cyber defense, Dipankar Dasgupta
Toward a task model of concurrent software maintenance, Scott D. Fleming, R. E.K. Stirewalt, and Eileen Kraemer