Follow

Submissions from 2009

Link

Securing wireless implantable devices for healthcare: Ideas and challenges [Accepted from Open Call], Kriangsiri Malasri and Lan Wang

Link

On codeword design in metric DNA spaces, Vinhthuy Phan and Max H. Garzon

Link

Analyzing microarray data with transitive directed acyclic graphs, Vinhthuy Phan, E. Olusegun George, Quynth T. Tran, Shirlaean Goodwin, Sridevi Bodreddigari, and Thomas R. Sutter

Automatic detection of student mental models during prior knowledge activation in metatutor, Vasile Rus, Mihai Lintean, and Roger Azevedo

Link

Assessing student paraphrases using lexical semantics and word weighting, Vasile Rus, Mihai Lintean, Art Graesser, and Danielle McNamara

Link

Identification of Sentence-to-Sentence Relations Using a Textual Entailer, Vasile Rus, Philip M. McCarthy, Arthur C. Graesser, and Danielle S. McNamara

Clustering of defect reports using graph partitioning algorithms, Vasile Rus, Xiaofei Nan, Sajjan Shiva, and Yixin Chen

Link

Chemical genomics of cancer chemopreventive dithiolethiones, Quynh T. Tran, Lijing Xu, Vinhthuy Phan, Shirlean B. Goodwin, Mostafizur Rahman, and Victor X. Jin

Link

Design and validation of patricia for the mitigation of network flooding attacks, Lan Wang, Qishi Wu, and Yaoqing Liu

Link

Level control maintenance of temporal consistency in wireless sensor networks, Yang Wang, Kan Yang, Liusheng Huang, and Xiong Fu

An integrated cyber security monitoring system using correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Monitoring security events using integrated Correlation-based techniques, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Visualization of security events using an efficient correlation technique, Qishi Wu, Denise Ferebee, Yunyue Lin, and Dipankar Dasgupta

Link

Design and evaluation of extensions to UML sequence diagrams for modeling multithreaded interactions, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming

Link

Quantum teleportation via GHZ-like state, Kan Yang, Liusheng Huang, Wei Yang, and Fang Song

Link

An empirical study of conserved self pattern recognition algorithm: Comparing to other one-class classifiers and evaluating with random number generators, Senhua Yu and Dipankar Dasgupta

Submissions from 2008

Analysis and optimization of DNA self-assembly in simulation, Derrel R. Blain and Max H. Garzon

Link

Special issue on computational intelligence in cyber security, Dipankar Dasgupta

An investigation of negative authentication systems, Dipankar Dasgupta and Rukhsana Azeem

Link

A Comparison of multiobjective evolutionary algorithms with informed initialization and kuhn-munkres algorithm for the sailor assignment problem, Dipankar Dasgupta, German Hernandez, Deon Garrett, Pavan Kalyan Vejandla, Aishwarya Kaushal, and Ramjee Yerneni

Immunological computation: Theory and applications, Dipankar Dasgupta and Luis Fernando Niño

Link

Using formal models to objectively judge quality of multi-threaded programs in empirical studies, Laura K. Dillon, R. E.K. Stirewalt, Eileen Kraemer, Shaohua Xie, and Scott D. Fleming

Link

Refining existing theories of program comprehension during maintenance for concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Shaohua Xie

Link

A study of student strategies for the corrective maintenance of concurrent software, Scott D. Fleming, Eileen Kraemer, R. E.K. Stirewalt, Shaohua Xie, and Laura K. Dillon

Link

Multiobjective landscape analysis and the generalized assignment problem, Deon Garrett and Dipankar Dasgupta

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, Max H. Garzon and Hao Yan

Link

Preface, Max H. Garzon and Hao Yan

Link

NAM: A network adaptable middleware to enhance response time of web services, Shahram Ghandeharizadeh, Christos Papadopoulos, Min Cai, Runfang Zhou, and P. Pol

Link

Census and survey of the visible Internet, John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister

Link

Large scale experiments with naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus

Link

Design and implementation of a secure wireless mote-based medical sensor network, Kriangsiri Malasri and Lan Wang

Assessing forward-, reverse-, and average-entailer indices on natural language input from the Intelligent Tutoring System, iSTART, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Arthur C. Graesser, and Danielle S. McNamara

Link

Testing a collaborative DDoS defense in a red team/blue team exercise, Jelena Mirkovic, Peter Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, and Michael Berg

A semantic method for textual entailment, Andrew Neel, Max Garzon, and Vasile Rus

Link

DNA-based memories: A survey, Andrew J. Neel and Max H. Garzon

Link

Motif tool manager: A web-based framework for motif discovery, Vinhthuy Phan and Nicholas A. Furlotte

Toward a combinatorial approach to the sample size problem in multiple-treatment microarray studies, Vinhthuy Phan, E. Olusegun George, Quynh Tran, and Thomas R. Sutter

Link

BioTDMS: a general-purpose system for integrative management of bioinformatics tools and data, Vinhthuy Phan and Kriangsiri Malasri

Link

Synthetic gene design with a large number of hidden stop codons, Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, and Tit Yee Wong

Paraphrase identification with lexico-syntactic graph subsumption, Vasile Rus, Philip M. McCarthy, Mihai C. Lintean, Danielle S. McNamara, and Arthur C. Graesser

Link

A study of textual entailment, Vasile Rus, Philip M. McCarthy, Danielle S. McNamara, and Arthur C. Graesser

Automatic clustering of defect reports, Vasile Rus, Sameer Mohammed, and Sajjan Shiva

Knowledge management in global software development, Sajjan G. Shiva, Sarah B. Lee, Lubna A. Shala, and Chris B. Simmons

Link

Using semantic Wikis to support software reuse, Sajjan G. Shiva and Lubna A. Shala

Link

Building QKD networks based on a novel QKD scheme, Fang Song, Liusheng Huang, Wei Yang, and Kan Yang

Link

Assessing the benefits of synchronization-adorned sequence diagrams: Two controlled experiments, Shaohua Xie, Eileen Kraemer, R. E.K. Stirewalt, Laura K. Dillon, and Scott D. Fleming

Link

Conserved self pattern recognition algorithm, Senhua Yu and Dipankar Dasgupta

Submissions from 2007

Link

A framework for evolving multi-shaped detectors in negative selection, Sankalp Balachandran, Dipankar Dasgupta, Fernando Nino, and Deon Garrett

Link

Inherent behaviors for on-line detection of peer-to-peer file sharing, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

Understanding passive and active service discovery, Genevieve Bartlett, John Heidemann, and Christos Papadopoulos

Link

WormShield: Fast worm signature generation with distributed fingerprint aggregation, Min Cai, Kai Hwang, Jianping Pan, and Christos Papadopoulos

Link

Immuno-inspired autonomic system for cyber defense, Dipankar Dasgupta

Link

Toward a task model of concurrent software maintenance, Scott D. Fleming, R. E.K. Stirewalt, and Eileen Kraemer

Link

Using program families for maintenance experiments, Scott D. Fleming, R. E.Kurt Stirewalt, and Laura K. Dillon

Link

Applying hybrid multiobjective evolutionary algorithms to the sailor assignment problem, Deon Garrett, Dipankar Dasgupta, Joseph Vannucci, and James Simien

Link

Revisiting negative selection algorithms, Zhou Ji and Dipankar Dasgupta

Naive bayes and decision trees for function tagging, Mihai Lintean and Vasile Rus

Link

Addressing security in medical sensor networks, Kriangsiri Malasri and Lan Wang

Link

Textual signatures: Identifying text-types using latent semantic analysis to measure the cohesion of text structures, Philip M. McCarthy, Stephen W. Briner, Vasile Rus, and Danielle S. McNamara

Assessing Entailer with a corpus of natural language from an intelligent tutoring system, Philip M. McCarthy, Vasile Rus, Scott A. Crossley, Sarah C. Bigham, Arthur C. Graesser, and Danielle S. McNamara

How to build a system that manages bioinformatics content, Vinhthuy Phan and Allen Thomas

Link

Neural-based agents cooperate to survive in the defend and gather computer game, Joseph Qualls, Max Garzon, and David J. Russomanno

Link

Experiments on generating questions about facts, Vasile Rus, Zhiqiang Cai, and Arthur C. Graesser

Link

Unsupervised method for parsing coordinated base noun phrases, Vasile Rus, Sireesha Ravi, Mihai C. Lintean, and Philip M. McCarthy

Link

Software reuse: Research and practice, Sajjan G. Shiva and Lubna Abou Shala

Link

Persistent detection and recovery of state inconsistencies, Lan Wang, Daniel Massey, and Lixia Zhang

Link

Understanding BGP session failures in a large ISP, Lan Wang, Malleswari Saranu, Joel M. Gottlieb, and Dan Pei

Link

Engaging edge networks in preventing and mitigating undesirable network traffic, Lan Wang, Qishi Wu, and Dung Dinh Luong

Link

Real-time virtual videophone for low-bandwidth wireless networks, Yang Xiao, Max Garzon, and Mike Nolen

Link

Quantum user authentication with nonentanglement-based QKD protocol, Kan Yang, Liusheng Huang, and Wei Yang

Submissions from 2006

Link

Reasoning and "talking" DNA: Can DNA understand English?, Kiran C. Bobba, Andrew J. Neel, Vinhthuy Phan, and Max H. Garzon

Link

Characterization of non-crosshybridizing DNA oligonucleotides manufactured in vitro, J. Chen, R. Deaton, M. Garzon, J. W. Kim, D. H. Wood, and H. Bi

Link

Advances in artificial immune systems, Dipankar Dasgupta

Link

Computational intelligence in cyber security, Dipankar Dasgupta

Link

Mining security events in a distributed agent society, D. Dasgupta, J. Rodríguez, and S. Balachandran

Link

Recognition of handwritten indic script using clonal selection algorithm, Utpal Garain, Mangal P. Chakraborty, and Dipankar Dasgupta

Analyzing the performance of hybrid evolutionary algorithms for the multiobjective quadratic assignment problem, Deon Garrett and Dipankar Dasgupta

Link

Sensitivity and capacity of microarray encodings, Max H. Garzon, Vinhthuy Phan, Kiran C. Bobba, and Raghuver Kontham

Link

In search of optimal codes for DNA computing, Max H. Garzon, Vinhthuy Phan, Sujoy Roy, and Andrew J. Neel

Link

Evaluating state-of-the-art Treebank-style parsers for Coh-Metrix and other learning technology environments, Christian F. Hempelmann, Vasile Rus, Arthur C. Graesser, and Danielle S. McNamara

Link

Incremental deployment strategies for router-assisted reliable multicast, Xinming He, Christos Papadopoulos, and Pavlin Radoslavov

Link

Identification of repeated denial of service attacks, Alefiya Hussain, John Heidemann, and Christos Papadopoulos

Link

Applicability issues of the real-valued negative selection algorithms, Zhou Ji and Dipankar Dasgupta

Analysis of dental images using artificial immune systems, Zhou Ji, Dipankar Dasgupta, Zhiling Yang, and Hongmei Teng

Link

SNAP: An architecture for secure medical sensor networks, Kriangsiri Malasri and Lan Wang

Link

Detecting and identifying malware: A new signal processing goal, Urbashi Mitra, Antonio Ortega, John Heidemann, and Christos Papadopoulos

Link

Semantic retrieval in DNA-based memories with Gibbs energy models, Andrew Neel and Max Garzon

Dependency-based textual entailment, Vasile Rus

The look and feel of a confident entailer, Vasile Rus and Art Graesser

Deeper natural language processing for evaluating student answers in intelligent tutoring systems, Vasile Rus and Arthur C. Graesser

Link

Analysis of a textual entailer, Vasile Rus, Philip M. McCarthy, and Arthur C. Graesser

Link

Comparative analysis of the sailor assignment problem, Joseph Vannucci, Deon Garrett, and Dipankar Dasgupta

Link

A survey of energy-efficient scheduling mechanisms in sensor networks, Lan Wang and Yang Xiao

Link

Using talking heads for real-time virtual videophone in wireless networks, Xiao Yang, Max H. Garzon, and Michael Nolan

Submissions from 2005

Link

Artificial immune systems, Uwe Aickelin and Dipankar Dasgupta

Link

Characterization of non-crosshybridizing DNA oligonucleotides manufactured in Vitro, Junghuei Chen, Russell Deaton, Max H. Garzon, Jin Woo Kim, David Wood, and Hong Bi

Link

CIDS: An agent-based intrusion detection system, D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii

Link

Efficient visualization of security events in a large agent society, D. Dasgupta, J. Rodríguez, and S. Balachandran

Link

MILA - Multilevel immune learning algorithm and its application to anomaly detection, D. Dasgupta, S. Yu, and N. S. Majumdar

Link

An approach to implementing dynamic adaptation in C++, Scott D. Fleming, Betty H.C. Cheng, R. E. Kurt Stirewalt, and Philip K. McKinley