Submissions from 2009
Auditing a Database Under Retention Restrictions, WT Lu and G Miklau
Minimizing Detection Probability Routing in Ad Hoc Networks Using Directional Antennas, Xiaofeng Lu, Don Towsley, Pietro Lio, Fletcher Wicker, and Zhang Xiong
Separation of Sensor Control and Data in Closed-Loop Sensor Networks, V Manfredi, J Kurose, N Malouch, C Zhang, and M Zink
Ultra-Low Power Data Storage for Sensor Networks, G Mathur, P Desnoyers, P Chukiu, D Ganesan, and P Shenoy
NONPARAMETRIC CURVE ALIGNMENT, MA Mattar, MG Ross, and EG Learned-Miller
The Oil Searching Problem, A Mcgregor, K Onak, and R Panigrahy
Strategic Reasoning About Bundling in Swarming Systems, DS Menasche, G Neglia, D Towsley, and S Zilberstein
Modeling Unavailability in Peer-to-Peer Systems, DS Menasche, AAD Rocha, B Li, D Towsley, and A Venkataramani
Offline Planning For Communication By Exploiting Structured Interactions In Decentralized MDPs, H Mostafa and V Lesser
Efficiently and Precisely Locating Memory Leaks and Bloat, G Novark, ED Berger, and BG Zorn
Formalisms to Support the Definition of Processes, LJ Osterweil
Forecast for Reproducible Data: Partly Cloudy, LJ Osterweil, LA Clarke, and AM Ellison
Workshop on Software Engineering in Health Care (SEHC), LJ Osterweil and B Paech
APPLICATION OF REINFORCEMENT LEARNING IN MULTISENSOR FUSION PROBLEMS WITH CONFLICTING CONTROL OBJECTIVES, SC Ou, AH Fagg, P Shenoy, and LC Chen
Sub-grouped superblock management for high-performance flash storages, J Park, GH Park, C Weems, and S Kim
Refining Keyword Queries for XML Retrieval by Combining Content and Structure, D Petkova, WB Croft, and YL Diao
A Bilinear Programming Approach for Multiagent Planning, M Petrik and S Zilberstein
CELLULAR Micro(RNA)-MANAGEMENT UNDER THE INFLUENCE. ALCOHOL REGULATION OF miR-9 LEADS TO DEVELOPMENT OF BK CHANNEL'S ALCOHOL TOLERANCE, A Pietrzykowski, R Friesen, G Martin, P Wynne, H Siegelmann, and S Treistman
Simulating Patient Flow through an Emergency Department Using Process-Driven Discrete Event Simulation, M Raunak, L Osterweil, A Wise, L Clarke, and P Henneman
Black Swans, Gray Cygnets and Other Rare Birds, EL Rissland
A WEB-BASED ENVIRONMENT FOR DOCUMENTATION AND SHARING OF ENGINEERING DESIGN KNOWLEDGE, JA Rockwell, P Witherell, R Fernandes, I Grosse, S Krishnamurty, and J Wileden
A Decision Support Ontology for Collaborative Decision Making in Engineering Design, J Rockwell, IR Grosse, S Krishnamurty, and JC Wileden
Breadcrumbs: efficient, best-effort content location in cache networks, EJ Rosensweig and J Kurose
Effect on movement selection of an evolving sensory representation: A multiple controller model of skill acquisition, A Shah and AG Barto
SRCP: Simple Remote Control for Perpetual High-Power Sensor Networks, N Sharma, J Gummeson, D Irwin, and P Shenoy
Structural Considerations in Defining Executable Process Models, BI Simidchieva, LJ Osterweil, and A Wise
Bi-directional Joint Inference for Entity Resolution and Segmentation Using Imperatively-Defined Factor Graphs, S Singh, K Schultz, and A McCallum
Scalable satisfiability checking and test data generation from modeling diagrams, Y Smaragdakis, C Csallner, and R Subramanian
Piecewise training for structured prediction, C Sutton and A McCallum
J-Orchestra: Enhancing Java Programs with Distribution Capabilities, E Tilevich and Y Smaragdakis
Probabilistic Inference over RFID Streams in Mobile Environments, T Tran, C Sutton, R Cocci, YM Nie, YL Diao, and P Shenoy
Memory reconsolidation for natural language processing, K Tu, DG Cooper, and HT Siegelmann
Resource Overbooking and Application Profiling in a Shared Internet Hosting Platform, B Urgaonkar, P Shenoy, and T Roscoe
Multipath Live Streaming via TCP: Scheme, Performance and Benefits, B Wang, W Wei, Z Guo, and D Towsley
Bidirectional Importance Sampling for Unstructured Direct Illumination, R Wang and O Akerlund
An Efficient GPU-based Approach for Interactive Global Illumination, R Wang, K Zhou, MH Pan, and HJ Bao
Scene Text Recognition Using Similarity and a Lexicon with Sparse Belief Propagation, JJ Weinman, E Learned-Miller, and AR Hanson
Structure Theorem and Strict Alternation Hierarchy for FO2 on Words, P Weis and N Immerman
Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs, W Wei, K Suh, B Wang, Y Gu, J Kurose, D Towsley, and S Jaiswal
A Meronomic Relatedness Measure for Domain Ontologies Using Concept Probability and Multiset Theory, P Witherell, S Krishnamurty, I Grosse, and J Wileden
FIDOE: A FRAMEWORK FOR INTELLIGENT DISTRIBUTED ONTOLOGIES IN ENGINEERING, P Witherell, S Krishnarnurty, IR Grosse, and J Wileden
Sandpiper: Black-box and gray-box resource management for virtual machines, T Wood, P Shenoy, A Venkataramani, and M Yousif
Court Trial based Detection of Forwarding Misbehaviors in Wireless Networks, S Yang, S Vasudevan, and J Kurose
Efficient Methods for Topic Model Inference on Streaming Document Collections, LM Yao, D Mimno, and A McCallum
A Comparative Study of Utilizing Topic Models for Information Retrieval, X Yi and J Allan
Characteristics of YouTube network traffic at a campus network - Measurements, models, and implications, M Zink, K Suh, Y Gu, and J Kurose
Submissions from 2008
A Multiagent Reinforcement Learning Algorithm with Non-linear Dynamics, S Abdallah and V Lesser
Broadening Participation in Computing: K12-Community-College-University-Graduate Pathways, WR Adrion, S Biskup, D Boisvert, L Clarke, J Fountain, P Grocer, S Mackler, AR Peterfreund, KA Rath, A Smith, DD Snyder, and A Wiens
On the performance benefits of multihoming route control (vol 16, pg 91, 2008), A Akella, B Maggs, S Seshan, A Shaikh, and RK Sitaraman
FIRST-ORDER AND TEMPORAL LOGICS FOR NESTED WORDS, R Alur, M Arenas, P Barcelo, K Etessami, N Immerman, and L Libkin
Enhancing Interactive Web Applications in Hybrid Networks, A Balasubramanian, BN Levine, and A Venkataramani
Interactive WiFi Connectivity For Moving Vehicles, Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, Brian Neil Levine, and John Zahorjan
Relays, Base Stations, and Meshes: Enhancing Mobile Networks with Infrastructure, N Banerjee, MD Corner, D Towsley, and BN Levine
Guiding conformation space search with an all-atom energy potential, TJ Brunette and O Brock
MORA routing and capacity building in disruption-tolerant networks, B Bums, O Brock, and BN Levine
Here or There: Preference Judgments for Relevance, Ben Carterette, Paul N. Bennett, David Maxwell Chickering, and Susan T. Dumais
Hierarchical scheduling for symmetric multiprocessors, A Chandra and P Shenoy
Formally Defining Medical Processes, Stefan Christov, Bin Chen, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, David Brown, Lucinda Cassells, and Wilson Mertens
Rigorously defining and analyzing medical processes: An experience report, Stefan Christov, Bin Chen, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, David Brown, Lucinda Cassells, and Wilson Mertens
Using Software Engineering Technology to Improve the Quality of Medical Processes, LA Clarke, GS Avrunin, and LJ Osterweil
Breaking up is hard to do: An evaluation of automated assume-guarantee reasoning, JM Cobleigh, GS Avrunin, and LA Clarke
Efficient data interpretation and compression over RFID streams, R Cocci, T Tran, Y Diao, and P Shenoy
Autonomous estimates of horizontal decorrelation lengths for digital elevation models, Andres Corrada-Emmanuel and Howard Schultz
Autonomous geometric precision error estimation in low-level computer vision tasks, Andrés Corrada-Emmanuel and Howard Schultz
Mobile manipulators for assisted living in residential settings, P Deegan, R Grupen, A Hanson, E Horrell, SC Ou, E Riseman, S Sen, B Thibodeau, A Williams, and D Xie
Why Stacked Models Perform Effective Collective Classification, A Fast and D Jensen
GRAPH DISTANCES IN THE DATA-STREAM MODEL, J Feigenbaum, S Kannan, A Mcgregor, S Suri, and J Zhang
Design and innovative methodologies in a semantic framework, Rui Fernandes, Ian Grosse, Sundar Krishnamurty, and Jack Wileden
An efficient technique to analyze the impact of bursty TCP traffic in wide-area networks, M Garetto and D Towsley
Communication-based decomposition mechanisms for decentralized MDPs, CV Goldman and S Zilberstein
STREAM ORDER AND ORDER STATISTICS: QUANTILE ESTIMATION IN RANDOM-ORDER STREAMS, S Guha and A Mcgregor
DirectStream: A directory-based peer-to-peer video streaming service, Y Guo, K Suh, J Kurose, and D Towsley
On supporting Kleene closure over event streams, D Gyllstrom, J Agrawal, Y Diao, and N Immerman
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses, Daniel Halperin
Security and privacy for implantable medical devices, D Halperin, T Kohno, TS Heydt-Benjamin, K Fu, and WH Maisel
Modeling Distributed Beamforming in Wireless Networks, K Hardwick, D Goeckel, and D Towsley
Intrinsically motivated hierarchical manipulation, S Hart, S Sen, and R Grupen
Resisting Structural Reidentification Anonymized Social Networks, Michael Hay, Gerome Miklau, David Jensen, Don Towsley, and Philipp Weis
An effective vertical handoff scheme based on service management for ubiquitous computing, CP Hong, CC Weems, and SD Kim
Using quantitative models to search for appropriate organizational designs, B Horling and V Lesser
Towards Unconstrained Face Recognition, GB Huang, M Narayana, and E Learned-Miller
Domain-Specific Languages and Program Generation with Meta-AspectJ, SS Huang, D Zook, and Y Smaragdakis
Estimating Statistical Aggregates on Probabilistic Data Streams, TS Jayram, A Mcgregor, S Muthukrishnan, and E Vee
Beyond prediction: Directions for probabilistic and relational learning, DD Jensen
Manipulating articulated objects with interactive perception, D Katz and O Brock
On the Performance of Random Linear Network Coding in Relay Networks, R Khalili, M Ghaderi, J Kurose, and D Towsley
A distributed minimum-distortion routing algorithm with in-network data processing, R Khalili and J Kurose
Sensorimotor Abstraction Selection for Efficient, Autonomous Robot Skill Acquisition, G Konidaris and A Barto
Value Function Approximation in Reinforcement Learning using the Fourier Basis, George Konidaris and Sarah Osentoski
Adapting information retrieval systems to user queries, G Kumaran and J Allan
A Probabilistic Upper Bound on Differential Entropy, E Learned-Miller and J DeStefano
Electromagnetic Interference (EMI) of Implanted Cardiac Devices by MP3 Player Headphones, S Lee, B Ransford, K Fu, K Tadayoshi, and WH Maisel
Chameleon: Application-level power management, XT Liu, P Shenoy, and MD Corner
Archipelago: Trading address space for reliability and security, VB Lvin, G Novark, ED Berger, and BG Zorn
Multifaceted therapeutic benefits of Ginkgo biloba L.: Chemistry, efficacy, safety, and uses, S Mahadevan and Y Park
Modulation of cholesterol metabolism by Ginkgo biloba L. nuts and their extract, S Mahadevan, Y Park, and Y Park
Quantifying resistance to the Sybil attack, NB Margolin and BN Levine
Optimistic pruning for multiple instance learning, A McGovern and D Jensen
Sherlock: Automatically Locating Objects for Humans, A Nemmaluri, MD Corner, and P Shenoy
A bias/variance decomposition for models using collective inference, J Neville and D Jensen