Follow

Submissions from 2008

Exterminator: Automatically Correcting Memory Errors with High Probability, G Novark, ED Berger, and BG Zorn

Robust artificial life via artificial programmed death, MM Olsen, N Siegelmann-Danieli, and H Siegelmann

What is software?, LJ Osterweil

Link

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Distributed Collaborative Adaptive Sensor networks for remote sensing applications, D Pepyne, D Westbrook, B Philips, E Lyons, M Zink, and J Kurose

Posttranscriptional regulation of BK channel splice variant stability by miR-9 underlies neuroadaptation to alcohol, AZ Pietrzykowski, RM Friesen, GE Martin, SI Puig, CL Nowak, PM Wynne, HT Siegelmann, and SN Treistman

A Resource-minimalist Flow Size Histogram Estimator, B Ribeiro, T Ye, and D Towsley

Towards universal code generator generation, T Richards, EK Walters, JEB Moss, T Palmer, and CC Weems

Formal models and algorithms for decentralized decision making under uncertainty, S Seuken and S Zilberstein

Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil

Analog-symbolic memory that tracks via reconsolidation, HT Siegelmann

Combining symbolic execution with model checking to verify parallel numerical programs, SF Siegel, A Mironova, GS Avrunin, and LA Clarke

Navigating networks by using homophily and degree, O Simsek and D Jensen

Automated organization design for multi-agent systems, M Sims, D Corkill, and V Lesser

Mobility models for wireless networks: Challenges, pitfalls, and successes, D Towsley

Modeling the Internet is fun! But can you make a living?, D Towsley

Cataclysm: Scalable overload policing for internet applications, B Urgaonkar and P Shenoy

Agile Dynamic Provisioning of Multi-Tier Internet Applications, B Urgaonkar, P Shenoy, A Chandra, P Goyal, and T Wood

CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

PDF

Manifold Alignment using Procrustes Analysis, Chang Wang and Sridhar Mahadevan

Real-time editing and relighting of homogeneous translucent materials, R Wang, E Cheslack-Postava, R Wang, D Luebke, QY Chen, W Hua, QS Peng, and HJ Bao

Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley

Profiling and Modeling Resource Usage of Virtualized Applications, T Wood, L Cherkasova, K Ozonat, and P Shenoy

Passive-logging attacks against anonymous communications systems, MK Wright, M Adler, BN Levine, and C Shields

Decomposition properties in fluid queues, YJ Wu, WB Gong, and D Towsley

Design and implementation of a dual-camera wireless sensor network for object retrieval, D Xie, TX Yan, D Ganesan, and A Hanson

Distributed Image Search in Camera Sensor Networks, TX Yan, D Ganesan, and R Manmatha

Interactive Glossy Reflections using GPU-based Ray Tracing with Adaptive LOD, X Yu, R Wang, and JY Yu

Stability and efficiency of unstructured file sharing networks, HG Zhang, G Neglia, D Towsley, and G Lo Presti

PDF

Watch Global, Cache Local: YouTube Network Traffic at a Campus Network - Measurements and Implications, Michael Zink, Kyoungwon Suh, Yu Gu, and Jim Kurose

Submissions from 2007

Evolving the best-response strategy to decide when to make a proposal, B An, KM Sim, and V Lesser

Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf

PDF

DTN Routing as a Resource Allocation Problem, Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani

PDF

Web Search From a Bus, Aruna Balasubramanian, Yun Zhou, Bruce Croft, Brian Neil Levine, and Arun Venkataramani

An energy-efficient architecture for DTN throwboxes, N Banerjee, MD Comer, and BN Levine

Users and batteries: Interactions and adaptive energy management in mobile systems, N Banerjee, A Rahmati, MD Corner, S Rollins, and L Zhong

Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan

Cheat-proof playout for centralized and peer-to-peer gaming, NE Baughman, M Liberatore, and BN Levine

Bounding Damage From Link Destruction, with Application to the Internet, GD Bissias, BN Levine, and A Rosenberg

Link

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Sampling-based motion planning with sensing uncertainty, B Burns and O Brock

Single-query motion planning with utility-guided random trees, B Burns and O Brock

Cipcadian synchrony in networks of protein rhythm driven neurons (vol 12, pg 67, 2006), WS Bush and HT Siegelmann

NMR measurements of grain and gas motion in a gas-fluidized granular bed, D Candela, C Huan, K Facto, R Wang, RW Mair, and RL Walsworth

PDF

Evaluating Search Engines by Modeling the Relationship Between Relevance and Clicks, Ben Carterette and Rosie Jones

TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger

Canonicalization of Database Records using Adaptive Similarity Measures, A Culotta, M Wick, R Hall, M Marzilli, and A McCallum

PDF

Cryptanalysis of Two Lightweight RFID Authentication Schemes, Benessa Defend, Kevin Fu, and Ari Juels

Hyperion: High volume stream archival for retrospective querying, PJ Desnoyers and P Shenoy

Semi-Supervised Classification with Hybrid Generative/Discriminative Methods, G Druck, C Pal, XJ Zhu, and A McCallum

Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection, A Fast, L Friedland, M Maier, B Taylor, D Jensen, HG Goldberg, and J Komoroske

PDF

Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, Lisa Friedland

Design and analysis of a demand adaptive and locality aware streaming media server cluster, ZH Ge, P Ji, and P Shenoy

Modeling TCP in a multi-rate multi-user CDMA system, M Ghaderi, A Sridharan, H Zang, D Towsley, and R Cruz

Network coding performance for reliable multicast, M Ghaderi, D Towsley, and J Kurose

Hierarchical average reward reinforcement learning, M Ghavamzadeh and S Mahadevan

Learning to communicate in a decentralized environment, CV Goldman, M Allen, and S Zilberstein

P2Cast: peer-to-peer patching for video on demand service, Y Guo, K Suh, J Kurose, and D Towsley

Congestion control for small buffer high speed networks, Y Gu, D Towsley, CV Hollot, and H Zhang

Achievable rates for network coding on the exchange channel, YG Hao, D Goeckel, ZG Ding, D Towsley, and KK Leung

Natural task decomposition with intrinsic potential fields, S Hart and R Grupen

PDF

Anonymizing Social Networks, Michael Hay, Gerome Miklau, David Jensen, Philipp Weis, and Siddharth Srivastava

Link

Increasing patient safety and efficiency in transfusion therapy using formal process definitions, EA Henneman, GS Avrunin, LA Clarke, LJ Osterweil, C Andrzejewski, K Merrigan, R Cobleigh, K Frederick, E Katz-Bassett, and PL Henneman

Vulnerabilities in first-generation RFID-enabled credit cards, TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, and T O'Hare

PDF

Unsupervised Joint Alignment of Complex Images, Gary B. Huang

Cryptogram decoding for OCR using numerization strings, G Huang, E Learned-Miller, and A McCallum

The impact of directional antenna orientation. spacing, and channel separation on long-distance multi-hop 802.11g networks: A measurement study, T Ireland, A Nyzio, M Zink, and J Kurose

PDF

Analyzing in situ gene expression in the mouse brain with image registration, feature extraction and block clustering, Manjunatha Jagalur, Chris Pal, Erik Learned-Miller, R. Thomas Zoeller, and David Kulp

Towards a mechanistic view of protein motion, F Jagodzinski and O Brock

People-LDA: Anchoring topics to people using face recognition, V Jain, E Learned-Miller, and A McCallum

Measurement. and classification of out-of-sequence packets in a tier-1 IP backbone, S Jaiswal, G Iannaccone, C Diot, J Kurose, and D Towsley

PDF

Compact Spectral Bases for Value Function Approximation Using Kronecker Factorization, Jeff Johns

Resource-bounded information gathering for correlation clustering, P Kanani and A McCallum

Building Portable Options: Skill Transfer in Reinforcement Learning, George Konidaris

Further explorations in text alignment with handwritten documents, EM Kornfield, R Manmatha, and J Allan

An application of automated negotiation to distributed task allocation, M Krainin, B An, and V Lesser

Approximate initialization of camera sensor networks, P Kulkarni, P Shenoy, and D Ganesan

PDF

Causal inference of regulator-target pairs by gene mapping of expression phenotypes, David C. Kulp and Manjunatha Jagalur

Resource management for real-time tasks in mobile robotics, H Li, K Ramamritham, P Shenoy, RA Grupen, and JD Sweeney

Maximizing the data utility of a data archiving & querying system through joint coding and scheduling, JN Liu, Z Liu, D Towsley, and CH Xia

PDF

Bounds on the Gain of Network Coding and Broadcasting in Wireless Networks, Junning Liu

Proto-value functions: A Laplacian framework for learning representation and control in Markov decision processes, S Mahadevan and M Maggioni

PDF

Simple, Robust, Scalable Semi-supervised Learning via Expectation Regularization, Gideon S. Mann

Informant: Detecting Sybils using incentives, NB Margolin and BN Levine

Performance evaluation - An international journal, MA Marsan, C Lindemann, and P Shenoy

Topic and role discovery in social networks with experiments on enron and academic email, A McCallum, XR Wang, and A Corrada-Emmanuel

Joint group and topic discovery from relations and text, A McCallum, XR Wang, and N Mohanty

A formal analysis of information disclosure in data exchange, G Miklau and D Suciu

PDF

Expertise Modeling for Matching Papers with Reviewers, David Mimno

PDF

Mixtures of Hierarchical Topics with Pachinko Allocation, David Mimno

Mining a Digital Library for Influential Authors, D Mimno and A McCallum

Organizing the OCA: Learning Faceted Subjects from a Library of Digital Books, D Mimno and A McCallum

PDF

Relational Dependency Networks, Jennifer Neville

PDF

Exterminator: Automatically Correcting Memory Errors with High Probability, Gene Novark

PDF

Learning State-Action Basis Functions for Hierarchical MDPs, Sarah Osentoski

PDF

Engineering medical processes to improve their safety, Leon J. Osterweil, George S. Avrunin, Bin Chen, Lori A. Clarke, Rachel Cobleigh, Elizabeth A. Henneman, and Philip L. Henneman

Link

A future for software engineering?, LJ Osterweil

Noninvasive measurements of gas exchange in a three-dimensional fluidized bed by hyperpolarized Xe-129 NMR, T Pavlin, R Wang, R McGorty, MS Rosen, DG Cory, D Candela, RW Mair, and RL Walsworth

PDF

A Framework for Meta-level Control in Multi-Agent Systems, Anita Raja and Victor Lesser