Follow

Submissions from 2008

An effective vertical handoff scheme based on service management for ubiquitous computing, CP Hong, CC Weems, and SD Kim

Using quantitative models to search for appropriate organizational designs, B Horling and V Lesser

Towards Unconstrained Face Recognition, GB Huang, M Narayana, and E Learned-Miller

Domain-Specific Languages and Program Generation with Meta-AspectJ, SS Huang, D Zook, and Y Smaragdakis

Estimating Statistical Aggregates on Probabilistic Data Streams, TS Jayram, A Mcgregor, S Muthukrishnan, and E Vee

Beyond prediction: Directions for probabilistic and relational learning, DD Jensen

Manipulating articulated objects with interactive perception, D Katz and O Brock

On the Performance of Random Linear Network Coding in Relay Networks, R Khalili, M Ghaderi, J Kurose, and D Towsley

On the Performance of Random Linear Network Coding in Relay Networks, R Khalili, M Ghaderi, J Kurose, and D Towsley

A distributed minimum-distortion routing algorithm with in-network data processing, R Khalili and J Kurose

Sensorimotor Abstraction Selection for Efficient, Autonomous Robot Skill Acquisition, G Konidaris and A Barto

PDF

Value Function Approximation in Reinforcement Learning using the Fourier Basis, George Konidaris

Adapting information retrieval systems to user queries, G Kumaran and J Allan

A Probabilistic Upper Bound on Differential Entropy, E Learned-Miller and J DeStefano

Electromagnetic Interference (EMI) of Implanted Cardiac Devices by MP3 Player Headphones, S Lee, B Ransford, K Fu, K Tadayoshi, and WH Maisel

Chameleon: Application-level power management, XT Liu, P Shenoy, and MD Corner

Chameleon: Application-level power management, XT Liu, P Shenoy, and MD Corner

Archipelago: Trading address space for reliability and security, VB Lvin, G Novark, ED Berger, and BG Zorn

Multifaceted therapeutic benefits of Ginkgo biloba L.: Chemistry, efficacy, safety, and uses, S Mahadevan and Y Park

Modulation of cholesterol metabolism by Ginkgo biloba L. nuts and their extract, S Mahadevan, Y Park, and Y Park

Quantifying resistance to the Sybil attack, NB Margolin and BN Levine

Optimistic pruning for multiple instance learning, A McGovern and D Jensen

Sherlock: Automatically Locating Objects for Humans, A Nemmaluri, MD Corner, and P Shenoy

Sherlock: Automatically Locating Objects for Humans, A Nemmaluri, MD Corner, and P Shenoy

A bias/variance decomposition for models using collective inference, J Neville and D Jensen

Exterminator: Automatically Correcting Memory Errors with High Probability, G Novark, ED Berger, and BG Zorn

Robust artificial life via artificial programmed death, MM Olsen, N Siegelmann-Danieli, and H Siegelmann

What is software?, LJ Osterweil

What is software?, LJ Osterweil

Link

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Distributed Collaborative Adaptive Sensor networks for remote sensing applications, D Pepyne, D Westbrook, B Philips, E Lyons, M Zink, and J Kurose

Posttranscriptional regulation of BK channel splice variant stability by miR-9 underlies neuroadaptation to alcohol, AZ Pietrzykowski, RM Friesen, GE Martin, SI Puig, CL Nowak, PM Wynne, HT Siegelmann, and SN Treistman

A Resource-minimalist Flow Size Histogram Estimator, B Ribeiro, T Ye, and D Towsley

Towards universal code generator generation, T Richards, EK Walters, JEB Moss, T Palmer, and CC Weems

Formal models and algorithms for decentralized decision making under uncertainty, S Seuken and S Zilberstein

Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil

Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil

Analog-symbolic memory that tracks via reconsolidation, HT Siegelmann

Combining symbolic execution with model checking to verify parallel numerical programs, SF Siegel, A Mironova, GS Avrunin, and LA Clarke

Navigating networks by using homophily and degree, O Simsek and D Jensen

Automated organization design for multi-agent systems, M Sims, D Corkill, and V Lesser

Mobility models for wireless networks: Challenges, pitfalls, and successes, D Towsley

Modeling the Internet is fun! But can you make a living?, D Towsley

Cataclysm: Scalable overload policing for internet applications, B Urgaonkar and P Shenoy

Agile Dynamic Provisioning of Multi-Tier Internet Applications, B Urgaonkar, P Shenoy, A Chandra, P Goyal, and T Wood

CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems

CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

PDF

Manifold Alignment using Procrustes Analysis, Chang Wang and Sridhar Mahadevan

Real-time editing and relighting of homogeneous translucent materials, R Wang, E Cheslack-Postava, R Wang, D Luebke, QY Chen, W Hua, QS Peng, and HJ Bao

Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley

Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley

Profiling and Modeling Resource Usage of Virtualized Applications, T Wood, L Cherkasova, K Ozonat, and P Shenoy

Passive-logging attacks against anonymous communications systems, MK Wright, M Adler, BN Levine, and C Shields

Decomposition properties in fluid queues, YJ Wu, WB Gong, and D Towsley

Design and implementation of a dual-camera wireless sensor network for object retrieval, D Xie, TX Yan, D Ganesan, and A Hanson

Distributed Image Search in Camera Sensor Networks, TX Yan, D Ganesan, and R Manmatha

Microwave and Terahertz Detection in Bundles of Single-Wall Carbon Nanotubes, KS Yngvesson, K Fu, B Fu, R Zannoni, SH Adams, A Ouarraoui, E Carrion, J Donovan, M Muthee, J Nicholson, and E Polizzi

Interactive Glossy Reflections using GPU-based Ray Tracing with Adaptive LOD, X Yu, R Wang, and JY Yu

Stability and efficiency of unstructured file sharing networks, HG Zhang, G Neglia, D Towsley, and G Lo Presti

PDF

Watch Global, Cache Local: YouTube Network Traffic at a Campus Network - Measurements and Implications, Michael Zink, Kyoungwon Suh, Yu Gu, and Jim Kurose

Watch global, cache local: YouTube network traffic at a campus network - Measurements and implications - art. no. 681805, M Zink, K Suh, Y Gu, and J Kurose

Submissions from 2007

Evolving the best-response strategy to decide when to make a proposal, B An, KM Sim, and V Lesser

Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf

Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf

DTN routing as a resource allocation problem, A Balasubramanian, BN Levine, and A Venkataramani

DTN routing as a resource allocation problem, A Balasubramanian, BN Levine, and A Venkataramani

PDF

DTN Routing as a Resource Allocation Problem, Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani

PDF

Web Search From a Bus, Aruna Balasubramanian, Yun Zhou, Bruce Croft, Brian Neil Levine, and Arun Venkataramani

An energy-efficient architecture for DTN throwboxes, N Banerjee, MD Comer, and BN Levine

Users and batteries: Interactions and adaptive energy management in mobile systems, N Banerjee, A Rahmati, MD Corner, S Rollins, and L Zhong

Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan

Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan

Cheat-proof playout for centralized and peer-to-peer gaming, NE Baughman, M Liberatore, and BN Levine

Bounding Damage From Link Destruction, with Application to the Internet, GD Bissias, BN Levine, and A Rosenberg

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Link

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Sampling-based motion planning with sensing uncertainty, B Burns and O Brock

Single-query motion planning with utility-guided random trees, B Burns and O Brock

Cipcadian synchrony in networks of protein rhythm driven neurons (vol 12, pg 67, 2006), WS Bush and HT Siegelmann

NMR measurements of grain and gas motion in a gas-fluidized granular bed, D Candela, C Huan, K Facto, R Wang, RW Mair, and RL Walsworth

PDF

Evaluating Search Engines by Modeling the Relationship Between Relevance and Clicks, Ben Carterette and Rosie Jones

TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger

TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger

Canonicalization of Database Records using Adaptive Similarity Measures, A Culotta, M Wick, R Hall, M Marzilli, and A McCallum

PDF

Cryptanalysis of Two Lightweight RFID Authentication Schemes, Benessa Defend, Kevin Fu, and Ari Juels

Cryptanalysis of two lightweight RFID authentication schemes, B Defend, K Fu, and A Juels

Hyperion: High volume stream archival for retrospective querying, PJ Desnoyers and P Shenoy

Simulation of minimal infrastructure short-range radar networks, BC Donovan, DJ McLaughlin, M Zink, and J Kurose

Semi-Supervised Classification with Hybrid Generative/Discriminative Methods, G Druck, C Pal, XJ Zhu, and A McCallum

Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection, A Fast, L Friedland, M Maier, B Taylor, D Jensen, HG Goldberg, and J Komoroske

PDF

Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, Lisa Friedland

Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, L Friedland and D Jensen

Design and analysis of a demand adaptive and locality aware streaming media server cluster, ZH Ge, P Ji, and P Shenoy

Modeling TCP in a multi-rate multi-user CDMA system, M Ghaderi, A Sridharan, H Zang, D Towsley, and R Cruz