Follow

Submissions from 2008

On the Performance of Random Linear Network Coding in Relay Networks, R Khalili, M Ghaderi, J Kurose, and D Towsley

A distributed minimum-distortion routing algorithm with in-network data processing, R Khalili and J Kurose

Sensorimotor Abstraction Selection for Efficient, Autonomous Robot Skill Acquisition, G Konidaris and A Barto

PDF

Value Function Approximation in Reinforcement Learning using the Fourier Basis, George Konidaris

Adapting information retrieval systems to user queries, G Kumaran and J Allan

A Probabilistic Upper Bound on Differential Entropy, E Learned-Miller and J DeStefano

Electromagnetic Interference (EMI) of Implanted Cardiac Devices by MP3 Player Headphones, S Lee, B Ransford, K Fu, K Tadayoshi, and WH Maisel

Chameleon: Application-level power management, XT Liu, P Shenoy, and MD Corner

Chameleon: Application-level power management, XT Liu, P Shenoy, and MD Corner

Archipelago: Trading address space for reliability and security, VB Lvin, G Novark, ED Berger, and BG Zorn

Multifaceted therapeutic benefits of Ginkgo biloba L.: Chemistry, efficacy, safety, and uses, S Mahadevan and Y Park

Modulation of cholesterol metabolism by Ginkgo biloba L. nuts and their extract, S Mahadevan, Y Park, and Y Park

Quantifying resistance to the Sybil attack, NB Margolin and BN Levine

Optimistic pruning for multiple instance learning, A McGovern and D Jensen

Sherlock: Automatically Locating Objects for Humans, A Nemmaluri, MD Corner, and P Shenoy

Sherlock: Automatically Locating Objects for Humans, A Nemmaluri, MD Corner, and P Shenoy

A bias/variance decomposition for models using collective inference, J Neville and D Jensen

Exterminator: Automatically Correcting Memory Errors with High Probability, G Novark, ED Berger, and BG Zorn

Robust artificial life via artificial programmed death, MM Olsen, N Siegelmann-Danieli, and H Siegelmann

What is software?, LJ Osterweil

What is software?, LJ Osterweil

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Link

Determining the impact of software engineering research on practice, LJ Osterweil, C Ghezzi, J Kramer, AL Wolf, B Ryder, ML Soffa, J Estublier, D Rombach, M Ciolkowski, W Emmerich, M Aoyama, LA Clarke, and DS Rosenblum

Distributed Collaborative Adaptive Sensor networks for remote sensing applications, D Pepyne, D Westbrook, B Philips, E Lyons, M Zink, and J Kurose

Posttranscriptional regulation of BK channel splice variant stability by miR-9 underlies neuroadaptation to alcohol, AZ Pietrzykowski, RM Friesen, GE Martin, SI Puig, CL Nowak, PM Wynne, HT Siegelmann, and SN Treistman

A Resource-minimalist Flow Size Histogram Estimator, B Ribeiro, T Ye, and D Towsley

Towards universal code generator generation, T Richards, EK Walters, JEB Moss, T Palmer, and CC Weems

Formal models and algorithms for decentralized decision making under uncertainty, S Seuken and S Zilberstein

Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil

Automated fault tree analysis for engineering design optimization, TF Shao, ZF Lin, S Krishnamurty, IR Grosse, and LJ Osterweil

Analog-symbolic memory that tracks via reconsolidation, HT Siegelmann

Combining symbolic execution with model checking to verify parallel numerical programs, SF Siegel, A Mironova, GS Avrunin, and LA Clarke

Navigating networks by using homophily and degree, O Simsek and D Jensen

Automated organization design for multi-agent systems, M Sims, D Corkill, and V Lesser

Mobility models for wireless networks: Challenges, pitfalls, and successes, D Towsley

Modeling the Internet is fun! But can you make a living?, D Towsley

Cataclysm: Scalable overload policing for internet applications, B Urgaonkar and P Shenoy

Agile Dynamic Provisioning of Multi-Tier Internet Applications, B Urgaonkar, P Shenoy, A Chandra, P Goyal, and T Wood

CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems

CASL: A rapid-prototyping language for modern micro-architectures, EK Walters, EB Moss, T Palmer, T Richards, and CC Weems

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

Multimedia streaming via TCP: An analytic performance study, B Wang, J Kurose, P Shenoy, and D Towsley

PDF

Manifold Alignment using Procrustes Analysis, Chang Wang and Sridhar Mahadevan

Real-time editing and relighting of homogeneous translucent materials, R Wang, E Cheslack-Postava, R Wang, D Luebke, QY Chen, W Hua, QS Peng, and HJ Bao

Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley

Classification of access network types: Ethernet, wireless LAN, ADSL, cable modem or dialup?, W Wei, B Wang, C Zhang, J Kurose, and D Towsley

Profiling and Modeling Resource Usage of Virtualized Applications, T Wood, L Cherkasova, K Ozonat, and P Shenoy

Passive-logging attacks against anonymous communications systems, MK Wright, M Adler, BN Levine, and C Shields

Decomposition properties in fluid queues, YJ Wu, WB Gong, and D Towsley

Design and implementation of a dual-camera wireless sensor network for object retrieval, D Xie, TX Yan, D Ganesan, and A Hanson

Distributed Image Search in Camera Sensor Networks, TX Yan, D Ganesan, and R Manmatha

Microwave and Terahertz Detection in Bundles of Single-Wall Carbon Nanotubes, KS Yngvesson, K Fu, B Fu, R Zannoni, SH Adams, A Ouarraoui, E Carrion, J Donovan, M Muthee, J Nicholson, and E Polizzi

Interactive Glossy Reflections using GPU-based Ray Tracing with Adaptive LOD, X Yu, R Wang, and JY Yu

Stability and efficiency of unstructured file sharing networks, HG Zhang, G Neglia, D Towsley, and G Lo Presti

PDF

Watch Global, Cache Local: YouTube Network Traffic at a Campus Network - Measurements and Implications, Michael Zink, Kyoungwon Suh, Yu Gu, and Jim Kurose

Watch global, cache local: YouTube network traffic at a campus network - Measurements and implications - art. no. 681805, M Zink, K Suh, Y Gu, and J Kurose

Submissions from 2007

Evolving the best-response strategy to decide when to make a proposal, B An, KM Sim, and V Lesser

Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf

Repairing Disengagement With Non-Invasive Interventions, I Arroyo, K Ferguson, J Johns, T Dragon, H Meheranian, D Fisher, A Barto, S Mahadevan, and BP Woolf

DTN routing as a resource allocation problem, A Balasubramanian, BN Levine, and A Venkataramani

DTN routing as a resource allocation problem, A Balasubramanian, BN Levine, and A Venkataramani

PDF

DTN Routing as a Resource Allocation Problem, Aruna Balasubramanian, Brian Neil Levine, and Arun Venkataramani

PDF

Web Search From a Bus, Aruna Balasubramanian, Yun Zhou, Bruce Croft, Brian Neil Levine, and Arun Venkataramani

An energy-efficient architecture for DTN throwboxes, N Banerjee, MD Comer, and BN Levine

Users and batteries: Interactions and adaptive energy management in mobile systems, N Banerjee, A Rahmati, MD Corner, S Rollins, and L Zhong

Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan

Triage: Balancing Energy and Quality of Service in a Microserver, N Banerjee, J Sorber, MD Corner, S Rollins, and D Ganesan

Cheat-proof playout for centralized and peer-to-peer gaming, NE Baughman, M Liberatore, and BN Levine

Bounding Damage From Link Destruction, with Application to the Internet, GD Bissias, BN Levine, and A Rosenberg

Link

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Ensuring reliable datasets for environmental models and forecasts, ER Boose, AM Ellisona, LJ Osterweil, LA Clarke, R Podorozhny, JL Hadley, A Wise, and DR Foster

Sampling-based motion planning with sensing uncertainty, B Burns and O Brock

Single-query motion planning with utility-guided random trees, B Burns and O Brock

Cipcadian synchrony in networks of protein rhythm driven neurons (vol 12, pg 67, 2006), WS Bush and HT Siegelmann

NMR measurements of grain and gas motion in a gas-fluidized granular bed, D Candela, C Huan, K Facto, R Wang, RW Mair, and RL Walsworth

PDF

Evaluating Search Engines by Modeling the Relationship Between Relevance and Clicks, Ben Carterette and Rosie Jones

TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger

TFS: A transparent file system for contributory storage, J Cipar, MD Corner, and ED Berger

Canonicalization of Database Records using Adaptive Similarity Measures, A Culotta, M Wick, R Hall, M Marzilli, and A McCallum

PDF

Cryptanalysis of Two Lightweight RFID Authentication Schemes, Benessa Defend, Kevin Fu, and Ari Juels

Cryptanalysis of two lightweight RFID authentication schemes, B Defend, K Fu, and A Juels

Hyperion: High volume stream archival for retrospective querying, PJ Desnoyers and P Shenoy

Simulation of minimal infrastructure short-range radar networks, BC Donovan, DJ McLaughlin, M Zink, and J Kurose

Semi-Supervised Classification with Hybrid Generative/Discriminative Methods, G Druck, C Pal, XJ Zhu, and A McCallum

Relational Data Pre-Processing Techniques for Improved Securities Fraud Detection, A Fast, L Friedland, M Maier, B Taylor, D Jensen, HG Goldberg, and J Komoroske

PDF

Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, Lisa Friedland

Finding Tribes: Identifying Close-Knit Individuals from Employment Patterns, L Friedland and D Jensen

Design and analysis of a demand adaptive and locality aware streaming media server cluster, ZH Ge, P Ji, and P Shenoy

Modeling TCP in a multi-rate multi-user CDMA system, M Ghaderi, A Sridharan, H Zang, D Towsley, and R Cruz

Network coding performance for reliable multicast, M Ghaderi, D Towsley, and J Kurose

Network coding performance for reliable multicast, M Ghaderi, D Towsley, and J Kurose

Hierarchical average reward reinforcement learning, M Ghavamzadeh and S Mahadevan

Learning to communicate in a decentralized environment, CV Goldman, M Allen, and S Zilberstein

P2Cast: peer-to-peer patching for video on demand service, Y Guo, K Suh, J Kurose, and D Towsley

P2Cast: peer-to-peer patching for video on demand service, Y Guo, K Suh, J Kurose, and D Towsley

Congestion control for small buffer high speed networks, Y Gu, D Towsley, CV Hollot, and H Zhang

Achievable rates for network coding on the exchange channel, YG Hao, D Goeckel, ZG Ding, D Towsley, and KK Leung