Follow

Submissions from 2010

Optimizing fixed-size stochastic controllers for POMDPs and decentralized POMDPs, C Amato, DS Bernstein, and S Zilberstein

Characterizing Contract-Based Multiagent Resource Allocation in Networks, B An and V Lesser

Replication Routing in DTNs: A Resource Allocation Approach, A Balasubramanian, BN Levine, and A Venkataramani

Replication Routing in DTNs: A Resource Allocation Approach, A Balasubramanian, BN Levine, and A Venkataramani

Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes, N Banerjee, MD Corner, and BN Levine

Design and Field Experimentation of an Energy-Efficient Architecture for DTN Throwboxes, N Banerjee, MD Corner, and BN Levine

A Near-Optimal Algorithm for Estimating the Entropy of a Stream, A Chakrabarti, G Cormode, and A Mcgregor

Efficient Recovery from False State in Distributed Routing Algorithms, D Gyllstrom, S Vasudevan, J Kurose, and G Miklau

Efficient Recovery from False State in Distributed Routing Algorithms, D Gyllstrom, S Vasudevan, J Kurose, and G Miklau

EVOLVING EMBEDDED SYSTEMS, G Karsai, F Massacci, L Osterweil, and I Schieferdecker

EVOLVING EMBEDDED SYSTEMS, G Karsai, F Massacci, L Osterweil, and I Schieferdecker

Automatic resource allocation in a distributed camera network, DR Karuppiah, RA Grupen, ZG Zhu, and AR Hanson

Link

Exception Handling Patterns for Process Modeling, BS Lerner, S Christov, LJ Osterweil, R Bendraou, U Kannengiesser, and A Wise

Exception Handling Patterns for Process Modeling, BS Lerner, S Christov, LJ Osterweil, R Bendraou, U Kannengiesser, and A Wise

Anti-localization anonymous routing for Delay Tolerant Network, XF Lu, P Hui, D Towsley, JH Pu, and Z Xiong

LOPP: A Location Privacy Protected Anonymous Routing Protocol for Disruption Tolerant Network, XF Lu, P Hui, D Towsley, JH Pu, and Z Xiong

Generalized Expectation Criteria for Semi-Supervised Learning with Weakly Labeled Data, GS Mann and A McCallum

On the Hardness of Approximating Stopping and Trapping Sets, A Mcgregor and O Milenkovic

Resolving and Exploiting the k-CFA Paradox Illuminating Functional vs. Object-Oriented Program Analysis, M Might, Y Smaragdakis, and D Van Horn

Flexible Kernel Memory, D Nowicki and H Siegelmann

Dynamic Computational Model Suggests That Cellular Citizenship Is Fundamental for Selective Tumor Apoptosis, M Olsen, N Siegelmann-Danieli, and HT Siegelmann

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report, LJ Osterweil, LA Clarke, and GS Avrunin

Link

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report, LJ Osterweil, LA Clarke, and GS Avrunin

An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report, LJ Osterweil, LA Clarke, and GS Avrunin

Link

Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance, LJ Osterweil, LA Clarke, AM Ellison, E Boose, R Podorozhny, and A Wise

Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance, LJ Osterweil, LA Clarke, AM Ellison, E Boose, R Podorozhny, and A Wise

Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance, LJ Osterweil, LA Clarke, AM Ellison, E Boose, R Podorozhny, and A Wise

Null-Space Grasp Control: Theory and Experiments, R Platt, AH Fagg, and RA Grupen

Improved knowledge management through first-order logic in engineering design ontologies, P Witherell, S Krishnamurty, IR Grosse, and JC Wileden

Elastic roadmaps-motion generation for autonomous mobile manipulation, YD Yang and O Brock

Closed-loop architecture for distributed collaborative adaptive sensing of the atmosphere: meteorological command and control, M Zink, E Lyons, D Westbrook, J Kurose, and DL Pepyne

Submissions from 2009

Planar and Grid Graph Reachability Problems, E Allender, DAM Barrington, T Chakraborty, S Datta, and S Roy

The complexity of satisfiability problems: Refining Schaefer's theorem, E Allender, M Bauland, N Immerman, H Schnoor, and H Vollmer

Bilateral Bargaining with One-Sided Two-Type Uncertainty, B An, N Gatti, and V Lesser

Extending Alternating-Offers Bargaining in One-to-Many and Many-to-Many Settings, B An, N Gatti, and V Lesser

Syntactic Query Models for Restatement Retrieval, N Balasubramanian and J Allan

PDF

ANALYZING MYOPIC APPROACHES FOR MULTI-AGENT COMMUNICATION, RAPHEN BECKER

ANALYZING MYOPIC APPROACHES FOR MULTI-AGENT COMMUNICATION, R Becker, A Carlin, V Lesser, and S Zilberstein

ANALYZING MYOPIC APPROACHES FOR MULTI-AGENT COMMUNICATION, R Becker, A Carlin, V Lesser, and S Zilberstein

Grace: Safe Multithreaded Programming for C/C++, ED Berger, T Yang, TP Liu, and G Novark

Policy Iteration for Decentralized Control of Markov Decision Processes, DS Bernstein, C Amato, EA Hansen, and S Zilberstein

Strictly Declarative Specification of Sophisticated Points-to Analyses, M Bravenboer and Y Smaragdakis

Myopic and Non-Myopic Communication Under Partial Observability, A Carlin and S Zilberstein

Performance Debugging in Data Centers: Doing More with Less, E Cecchet, M Natu, V Sadaphal, P Shenoy, and H Vin

On the Study of Network Coding with Diversity, ZG Ding, KK Leung, DL Goeckel, and D Towsley

Transfer Learning and Representation Discovery in Intelligent Tutoring Systems, K Ferguson, BP Woolf, and S Mahadevan

Inside Risks Reducing Risks of Implantable Medical Devices, K Fu

Estimating Clock Uncertainty for Efficient Duty-Cycling in Sensor Networks, S Ganeriwal, I Tsigkogiannis, H Shim, V Tsiatsis, MB Srivastava, and D Ganesan

TCP-Aware Channel Allocation in CDMA Networks, M Ghaderi, A Sridharan, H Zang, D Towsley, and R Cruz

Asymptotic Connectivity Properties of Cooperative Wireless Ad Hoc Networks, D Goeckel, BY Liu, D Towsley, LR Wang, and C Westphal

Sublinear Estimation of Entropy and Information Distances, S Guha, A Mcgregor, and S Venkatasubramanian

An Adaptive Link Layer for Range Diversity in Multi-radio Mobile Sensor Networks, J Gummeson, D Ganesan, MD Corner, and P Shenoy

An Adaptive Link Layer for Range Diversity in Multi-radio Mobile Sensor Networks, J Gummeson, D Ganesan, MD Corner, and P Shenoy

An Adaptive Link Layer for Range Diversity in Multi-radio Mobile Sensor Networks, J Gummeson, D Ganesan, MD Corner, and P Shenoy

Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers, DE Holcomb, WP Burleson, and K Fu

A Profile-Based Multimedia Sharing Scheme With Virtual Community, Based on Personal Space in a Ubiquitous Computing Environment, CP Hong, EH Lee, CC Weems, and SD Kim

Hybrid least-squares algorithms for approximate policy evaluation, J Johns, M Petrik, and S Mahadevan

Hybrid Least-Squares Algorithms for Approximate Policy Evaluation, J Johns, M Petrik, and S Mahadevan

Hierarchical power management in disruption tolerant networks using traffic-aware optimization, H Jun, MH Ammar, MD Corner, and EW Zegura

Cluster-Swap : A Distributed K-median Algorithm for Sensor Networks, YH Kim, V Lesser, D Ganesan, and R Sitaraman

Cluster-Swap : A Distributed K-median Algorithm for Sensor Networks, YH Kim, V Lesser, D Ganesan, and R Sitaraman

Cluster-Swap : A Distributed K-median Algorithm for Sensor Networks, YH Kim, V Lesser, D Ganesan, and R Sitaraman

Dexterous Mobility with the uBot-5 Mobile Manipulator, SR Kuindersma, E Hannigan, D Ruiken, and RA Grupen

Improving Gene-finding in Chlamydomonas reinhardtii:GreenGenie2, AL Kwan, LY Li, DC Kulp, SK Dutcher, and GD Stormo

SIMULATING REACHABILITY USING FIRST-ORDER LOGIC WITH APPLICATIONS TO VERIFICATION OF LINKED DATA STRUCTURES, T Lev-Ami, N Immerman, TW Reps, M Sagiv, S Srivastava, and G Yorsh

DEX: Digital evidence provenance supporting reproducibility and comparison, BN Levine and M Liberatore

DRUG ADDICTION: A COMPUTATIONAL MULTISCALE MODEL COMBINING NEUROPSYCHOLOGY, COGNITION AND BEHAVIOR, YZ Levy, D Levy, JS Meyer, and HT Siegelmann

Drug Addiction as a Non-monotonic Process: a Multiscale Computational Model, YZ Levy, D Levy, JS Meyer, and HT Siegelmann

PRESTO: Feedback-Driven Data Management in Sensor Networks, M Li, D Ganesan, and P Shenoy

PRESTO: Feedback-Driven Data Management in Sensor Networks, M Li, D Ganesan, and P Shenoy

Bounds on the Throughput Gain of Network Coding in Unicast and Multicast Wireless Networks, JN Liu, D Goeckel, and D Towsley

SEVA: Sensor-Enhanced Video Annotation, XT Liu, M Corner, and P Shenoy

SEVA: Sensor-Enhanced Video Annotation, XT Liu, M Corner, and P Shenoy

Auditing a Database Under Retention Restrictions, WT Lu and G Miklau

Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas, XF Lu, D Towsley, P Lio, F Wicker, and Z Xiong

Separation of Sensor Control and Data in Closed-Loop Sensor Networks, V Manfredi, J Kurose, N Malouch, C Zhang, and M Zink

Ultra-Low Power Data Storage for Sensor Networks, G Mathur, P Desnoyers, P Chukiu, D Ganesan, and P Shenoy

Ultra-Low Power Data Storage for Sensor Networks, G Mathur, P Desnoyers, P Chukiu, D Ganesan, and P Shenoy

NONPARAMETRIC CURVE ALIGNMENT, MA Mattar, MG Ross, and EG Learned-Miller

The Oil Searching Problem, A Mcgregor, K Onak, and R Panigrahy

SHORT-WAVELENGTH TECHNOLOGY AND THE POTENTIAL FOR DISTRIBUTED NETWORKS OF SMALL RADAR SYSTEMS, D McLaughlin, D Pepyne, V Chandrasekar, B Philips, J Kurose, M Zink, K Droegemeier, S Cruz-Pol, F Junyent, J Brotzge, D Westbrook, N Bharadwaj, YT Wang, E Lyons, K Hondl, YX Liu, E Knapp, M Xue, A Hopf, K Kloesel, A DeFonzo, P Kollias, K Brewster, R Contreras, B Dolan, T Djaferis, E Insanic, S Frasier, and F Carr

Strategic Reasoning About Bundling in Swarming Systems, DS Menasche, G Neglia, D Towsley, and S Zilberstein

Strategic Reasoning About Bundling in Swarming Systems, DS Menasche, G Neglia, D Towsley, and S Zilberstein

Modeling Unavailability in Peer-to-Peer Systems, DS Menasche, AAD Rocha, B Li, D Towsley, and A Venkataramani

Modeling Unavailability in Peer-to-Peer Systems, DS Menasche, AAD Rocha, B Li, D Towsley, and A Venkataramani

Offline Planning For Communication By Exploiting Structured Interactions In Decentralized MDPs, H Mostafa and V Lesser

Efficiently and Precisely Locating Memory Leaks and Bloat, G Novark, ED Berger, and BG Zorn

Efficiently and Precisely Locating Memory Leaks and Bloat, G Novark, ED Berger, and BG Zorn

Link

Formalisms to Support the Definition of Processes, LJ Osterweil

Formalisms to Support the Definition of Processes, LJ Osterweil

Link

Forecast for Reproducible Data: Partly Cloudy, LJ Osterweil, LA Clarke, and AM Ellison

Forecast for Reproducible Data: Partly Cloudy, LJ Osterweil, LA Clarke, and AM Ellison

Forecast for Reproducible Data: Partly Cloudy, LJ Osterweil, LA Clarke, and AM Ellison

Link

Workshop on Software Engineering in Health Care (SEHC), LJ Osterweil and B Paech

Workshop on Software Engineering in Health Care (SEHC), LJ Osterweil and B Paech

APPLICATION OF REINFORCEMENT LEARNING IN MULTISENSOR FUSION PROBLEMS WITH CONFLICTING CONTROL OBJECTIVES, SC Ou, AH Fagg, P Shenoy, and LC Chen

Sub-grouped superblock management for high-performance flash storages, J Park, GH Park, C Weems, and S Kim

Refining Keyword Queries for XML Retrieval by Combining Content and Structure, D Petkova, WB Croft, and YL Diao

A Bilinear Programming Approach for Multiagent Planning, M Petrik and S Zilberstein

CELLULAR Micro(RNA)-MANAGEMENT UNDER THE INFLUENCE. ALCOHOL REGULATION OF miR-9 LEADS TO DEVELOPMENT OF BK CHANNEL'S ALCOHOL TOLERANCE, A Pietrzykowski, R Friesen, G Martin, P Wynne, H Siegelmann, and S Treistman