Submissions from 2008
Exterminator: Automatically Correcting Memory Errors with High Probability, G Novark, ED Berger, and BG Zorn
Robust artificial life via artificial programmed death, MM Olsen, N Siegelmann-Danieli, and H Siegelmann
What is software?, LJ Osterweil
Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum
Distributed Collaborative Adaptive Sensor networks for remote sensing applications, D Pepyne, D Westbrook, B Philips, E Lyons, M Zink, and J Kurose
Posttranscriptional regulation of BK channel splice variant stability by miR-9 underlies neuroadaptation to alcohol, AZ Pietrzykowski, RM Friesen, GE Martin, SI Puig, CL Nowak, PM Wynne, HT Siegelmann, and SN Treistman
A Resource-minimalist Flow Size Histogram Estimator, B Ribeiro, T Ye, and D Towsley
Towards universal code generator generation, T Richards, EK Walters, JEB Moss, T Palmer, and CC Weems
Formal models and algorithms for decentralized decision making under uncertainty, S Seuken and S Zilberstein
Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil
Analog-symbolic memory that tracks via reconsolidation, HT Siegelmann
Combining symbolic execution with model checking to verify parallel numerical programs, SF Siegel, A Mironova, GS Avrunin, and LA Clarke
Navigating networks by using homophily and degree, O Simsek and D Jensen
Automated organization design for multi-agent systems, M Sims, D Corkill, and V Lesser
Mobility models for wireless networks: Challenges, pitfalls, and successes, D Towsley
Modeling the Internet is fun! But can you make a living?, D Towsley
Cataclysm: Scalable overload policing for internet applications, B Urgaonkar and P Shenoy
Agile Dynamic Provisioning of Multi-Tier Internet Applications, B Urgaonkar, P Shenoy, A Chandra, P Goyal, and T Wood
CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems
Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley
Manifold Alignment using Procrustes Analysis, Chang Wang and Sridhar Mahadevan
Real-time editing and relighting of homogeneous translucent materials, R Wang, E Cheslack-Postava, R Wang, D Luebke, QY Chen, W Hua, QS Peng, and HJ Bao
Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley
Profiling and Modeling Resource Usage of Virtualized Applications, T Wood, L Cherkasova, K Ozonat, and P Shenoy
Passive-logging attacks against anonymous communications systems, MK Wright, M Adler, BN Levine, and C Shields
Decomposition properties in fluid queues, YJ Wu, WB Gong, and D Towsley
Design and implementation of a dual-camera wireless sensor network for object retrieval, D Xie, TX Yan, D Ganesan, and A Hanson
Distributed Image Search in Camera Sensor Networks, TX Yan, D Ganesan, and R Manmatha
Interactive Glossy Reflections using GPU-based Ray Tracing with Adaptive LOD, X Yu, R Wang, and JY Yu
Stability and efficiency of unstructured file sharing networks, HG Zhang, G Neglia, D Towsley, and G Lo Presti
Watch Global, Cache Local: YouTube Network Traffic at a Campus Network - Measurements and Implications, Michael Zink, Kyoungwon Suh, Yu Gu, and Jim Kurose
Submissions from 2007
Evolving the best-response strategy to decide when to make a proposal, B An, KM Sim, and V Lesser
Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf
DTN Routing as a Resource Allocation Problem, Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani
Web Search From a Bus, Aruna Balasubramanian, Yun Zhou, Bruce Croft, Brian Neil Levine, and Arun Venkataramani
An energy-efficient architecture for DTN throwboxes, N Banerjee, MD Comer, and BN Levine
Users and batteries: Interactions and adaptive energy management in mobile systems, N Banerjee, A Rahmati, MD Corner, S Rollins, and L Zhong
Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan
Cheat-proof playout for centralized and peer-to-peer gaming, NE Baughman, M Liberatore, and BN Levine
Bounding Damage From Link Destruction, with Application to the Internet, GD Bissias, BN Levine, and A Rosenberg
Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster
Sampling-based motion planning with sensing uncertainty, B Burns and O Brock
Single-query motion planning with utility-guided random trees, B Burns and O Brock
Cipcadian synchrony in networks of protein rhythm driven neurons (vol 12, pg 67, 2006), WS Bush and HT Siegelmann
NMR measurements of grain and gas motion in a gas-fluidized granular bed, D Candela, C Huan, K Facto, R Wang, RW Mair, and RL Walsworth
Evaluating Search Engines by Modeling the Relationship Between Relevance and Clicks, Ben Carterette and Rosie Jones
TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger
Canonicalization of Database Records using Adaptive Similarity Measures, A Culotta, M Wick, R Hall, M Marzilli, and A McCallum
Cryptanalysis of Two Lightweight RFID Authentication Schemes, Benessa Defend, Kevin Fu, and Ari Juels
Hyperion: High volume stream archival for retrospective querying, PJ Desnoyers and P Shenoy
Semi-Supervised Classification with Hybrid Generative/Discriminative Methods, G Druck, C Pal, XJ Zhu, and A McCallum
Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection, A Fast, L Friedland, M Maier, B Taylor, D Jensen, HG Goldberg, and J Komoroske
Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, Lisa Friedland
Design and analysis of a demand adaptive and locality aware streaming media server cluster, ZH Ge, P Ji, and P Shenoy
Modeling TCP in a multi-rate multi-user CDMA system, M Ghaderi, A Sridharan, H Zang, D Towsley, and R Cruz
Network coding performance for reliable multicast, M Ghaderi, D Towsley, and J Kurose
Hierarchical average reward reinforcement learning, M Ghavamzadeh and S Mahadevan
Learning to communicate in a decentralized environment, CV Goldman, M Allen, and S Zilberstein
P2Cast: peer-to-peer patching for video on demand service, Y Guo, K Suh, J Kurose, and D Towsley
Congestion control for small buffer high speed networks, Y Gu, D Towsley, CV Hollot, and H Zhang
Achievable rates for network coding on the exchange channel, YG Hao, D Goeckel, ZG Ding, D Towsley, and KK Leung
Natural task decomposition with intrinsic potential fields, S Hart and R Grupen
Anonymizing Social Networks, Michael Hay, Gerome Miklau, David Jensen, Philipp Weis, and Siddharth Srivastava
Increasing patient safety and efficiency in transfusion therapy using formal process definitions, EA Henneman, GS Avrunin, LA Clarke, LJ Osterweil, C Andrzejewski, K Merrigan, R Cobleigh, K Frederick, E Katz-Bassett, and PL Henneman
Vulnerabilities in first-generation RFID-enabled credit cards, TS Heydt-Benjamin, DV Bailey, K Fu, A Juels, and T O'Hare
Unsupervised Joint Alignment of Complex Images, Gary B. Huang
Cryptogram decoding for OCR using numerization strings, G Huang, E Learned-Miller, and A McCallum
The impact of directional antenna orientation. spacing, and channel separation on long-distance multi-hop 802.11g networks: A measurement study, T Ireland, A Nyzio, M Zink, and J Kurose
Analyzing in situ gene expression in the mouse brain with image registration, feature extraction and block clustering, Manjunatha Jagalur, Chris Pal, Erik Learned-Miller, R. Thomas Zoeller, and David Kulp
Towards a mechanistic view of protein motion, F Jagodzinski and O Brock
People-LDA: Anchoring topics to people using face recognition, V Jain, E Learned-Miller, and A McCallum
Measurement. and classification of out-of-sequence packets in a tier-1 IP backbone, S Jaiswal, G Iannaccone, C Diot, J Kurose, and D Towsley
Compact Spectral Bases for Value Function Approximation Using Kronecker Factorization, Jeff Johns
Resource-bounded information gathering for correlation clustering, P Kanani and A McCallum
Building Portable Options: Skill Transfer in Reinforcement Learning, George Konidaris
Further explorations in text alignment with handwritten documents, EM Kornfield, R Manmatha, and J Allan
An application of automated negotiation to distributed task allocation, M Krainin, B An, and V Lesser
Approximate initialization of camera sensor networks, P Kulkarni, P Shenoy, and D Ganesan
Causal inference of regulator-target pairs by gene mapping of expression phenotypes, David C. Kulp and Manjunatha Jagalur
Resource management for real-time tasks in mobile robotics, H Li, K Ramamritham, P Shenoy, RA Grupen, and JD Sweeney
Maximizing the data utility of a data archiving & querying system through joint coding and scheduling, JN Liu, Z Liu, D Towsley, and CH Xia
Bounds on the Gain of Network Coding and Broadcasting in Wireless Networks, Junning Liu
Proto-value functions: A Laplacian framework for learning representation and control in Markov decision processes, S Mahadevan and M Maggioni
Simple, Robust, Scalable Semi-supervised Learning via Expectation Regularization, Gideon S. Mann
Informant: Detecting Sybils using incentives, NB Margolin and BN Levine
Performance evaluation - An international journal, MA Marsan, C Lindemann, and P Shenoy
Topic and role discovery in social networks with experiments on enron and academic email, A McCallum, XR Wang, and A Corrada-Emmanuel
Joint group and topic discovery from relations and text, A McCallum, XR Wang, and N Mohanty
A formal analysis of information disclosure in data exchange, G Miklau and D Suciu
Expertise Modeling for Matching Papers with Reviewers, David Mimno
Mixtures of Hierarchical Topics with Pachinko Allocation, David Mimno
Mining a Digital Library for Influential Authors, D Mimno and A McCallum
Organizing the OCA: Learning Faceted Subjects from a Library of Digital Books, D Mimno and A McCallum
Relational Dependency Networks, Jennifer Neville
Exterminator: Automatically Correcting Memory Errors with High Probability, Gene Novark
Learning State-Action Basis Functions for Hierarchical MDPs, Sarah Osentoski
Engineering medical processes to improve their safety, Leon J. Osterweil, George S. Avrunin, Bin Chen, Lori A. Clarke, Rachel Cobleigh, Elizabeth A. Henneman, and Philip L. Henneman
A future for software engineering?, LJ Osterweil
Noninvasive measurements of gas exchange in a three-dimensional fluidized bed by hyperpolarized Xe-129 NMR, T Pavlin, R Wang, R McGorty, MS Rosen, DG Cory, D Candela, RW Mair, and RL Walsworth
A Framework for Meta-level Control in Multi-Agent Systems, Anita Raja and Victor Lesser