Submissions from 2006
A Framework to Predict the Quality of Answers with NonTextual, University of Massachusetts Amherst
Optimal power allocation in wireless networks with transmitter-receiver power tradeoffs, S Vasudevan, C Zhang, D Goeckel, and D Towsley
Modeling uncertainty and its implications to sophisticated control in TAEMS agents, TA Wagner, A Raja, and VR Lesser
Architectural building blocks for plug-and-play system design, SZ Wang, GS Avrunin, and LA Clarke
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference, W Wei, S Jaiswal, J Kurose, and D Towsley
Table extraction for answer retrieval, X Wei, B Croft, and A McCallum
Applying little-JIL to describe process-agent knowledge in SoftPM, JC Xiao, LJ Osterweil, L Zhang, A Wise, and Q Wang
CRAMM: Virtual memory support for garbage-collected applications, T Yang, ED Berger, SF Kaplan, and JEB Moss
Can an overlay compensate for a careless underlay?, HG Zhang, J Kurose, and D Towsley
On the benefits of random linear coding for unicast applications in disruption tolerant networks, XL Zhang, G Neglia, J Kurose, and D Towsley
Integrative negotiation among agents situated in organizations, XQ Zhang, V Lesser, and T Wagner
Capacity Enhancement using Throwboxes in DTNs, Wenrui Zhao, Yang Chen, Mostafa Ammar, Mark Corner, Brain Levine, and Ellen Zegura
On the performance of Internet worm scanning strategies, CC Zou, D Towsley, and WB Gong
Advanced routing worm and its security challenges, CC Zou, D Towsley, WB Gong, and SL Cai
Adaptive defense against various network attacks, Cliff C. Zou, Nick Duffield, Don Towsley, and Weibo Gong
Submissions from 2005
Optimal Peer Selection for P2P Downloading and Streaming, Micah Adler, Rakesh Kumar, Keith Ross, Dan Rubenstein, Torsten Suel, and David D. Yao
Panoramic Video Textures, Aseem Agarwala, Ke Colin Zheng, Chris Pal, Maneesh Agrawala, Michael Cohen, Brian Curless, David Salesin, and Richard Szeliski
When Will Information Retrieval Be “Good Enough”?, James Allan
First-order expressibility of languages with neutral letters or: The Crane Beach conjecture, DAM Barrington, N Immerman, C Lautemann, N Schweikardt, and D Therien
Analyzing myopic approaches for multi-agent communication, R Becker, V Lesser, and S Zilberstein
Multi-Way Distributional Clustering via Pairwise Interactions, Ron Bekkerman
Generating admissible heuristics by abstraction for search in stochastic domains, N Beliaeva and S Zilberstein
Approximate optimal control as a model for motor learning, NE Berthier, MT Rosenstein, and AG Barto
Privacy Vulnerabilities in Encrypted HTTP Streams, George Dean Bissias
A reconfigurable, on-the-fly, resource-aware, streaming pipeline scheduler, MK Bradshaw, J Kurose, LJ Page, P Shenoy, and D Towsley
Improving protein structure prediction with model-based search, TJ Brunette and O Brock
Single-query entropy-guided path planning, B Burns and O Brock
Sampling-Based Motion Planning Using Predictive Models, Brendan Burns and Oliver Brock
MV Routing and Capacity Building in Disruption Tolerant Networks, Brendan Burns, Oliver Brock, and Brian Neil Levine
Incremental Test Collections, Ben Carterette and James Allan
Throughput differentiation using coloring at the network edge and preferential marking at the core, Y Chait, CV Hollot, V Misra, D Towsley, HG Zhang, and Y Cui
Exploiting the IPID field to infer network path and end-system characteristics, Weifeng Chen, Yong Huang, Bruno F. Ribeiro, Kyoungwon Suh, Honggang Zhang, Edmundo de Souza e Silva, Jim Kurose, and Don Towsley
Optimizing cost-sensitive trust-negotiation protocols, WF Chen, L Clarke, J Kurose, and D Towsley
Process programming to support medical safety: A case study on blood transfusion, LA Clarke, Y Chen, GS Avrunin, B Chen, R Cobleigh, K Frederick, EA Henneman, and LJ Osterweil
PRESTO: A Predictive Storage Architecture for Sensor Networks, Peter Desnoyers
Minimum energy reliable paths using unreliable wireless links, Qunfeng Dong
Network tomography from aggregate loss reports, NG Duffield, V Arya, R Bellino, T Friedman, J Horowitz, D Towsley, and T Turletti
On TCP and self-similar traffic, DR Figueiredo, B Liu, A Feldmann, V Misra, D Towsley, and W Willinger
Automated egg counting and sizing from scanned images: Rapid sample processing and large data volumes for fecundity estimates, KD Friedland, D Ama-Abasi, M Manning, L Clarke, G Kligys, and RC Chambers
ON THE INTERACTION OF DATA REPRESENTATION AND ROUTING IN SENSOR NETWORKS, Deepak Ganesan
Collective Multi-Label Classification, Nadia Ghamrawi and Andrew McCallum
Chaotic dynamics in an electronic model of a genetic network, L Glass, TJ Perkins, J Mason, HT Siegelmann, and R Edwards
Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications, WB Gong, Y Liu, V Misra, and D Towsley
Synchronization of TCP flows in networks with small Droptail buffers, H Han, CV Hollot, D Towsley, and Y Chait
Quantifying the performance of garbage collection vs. explicit memory management, M Hertz and ED Berger
Garbage collection without paging, M Hertz, Y Feng, and ED Berger
Distribution strategies for collaborative and adaptive sensor networks, B Horling and V Lesser
Quantitative organizational models for large-scale agent systems, B Horling and V Lesser
Using ODML to model multi-agent organizations, B Horling and V Lesser
Finding Similar Questions in Large Question and Answer Archives, Jiwoon Jeon
Smart resource reconfiguration by exploiting dynamics in perceptual tasks, D Karuppiah, R Grupen, A Hanson, and E Riseman
Many heads are better than one: Jointly removing bias from multiple MRIs using nonparametric maximum likelihood, EG Learned-Miller and V Jain
A methodology for efficiently sampling the conformation space of molecular structures, Audrey Lee, Ileana Streinu, and Oliver Brock
Selective block buffering TLB system for embedded processors, JH Lee, C Weems, and SD Kim
Scheduling messages with deadlines in multi-hop real-time sensor networks, H Li, P Shenoy, and K Ramamritham
On the interaction between overlay routing and underlay routing, Y Liu, HG Zhang, WB Gong, and D Towsley
Introducing an active cluster-based information retrieval paradigm, O Loureiro and H Siegelmann
Proto-Value Functions: Developmental Reinforcement Learning, Sridhar Mahadevan
Switching Kalman filters for prediction and tracking in an adaptive meteorological sensing network, V Manfredi, S Mahadevan, and J Kurose
Integrations with case-based reasoning, C Marling, E Rissland, and A Aamodt
A Conditional Random Field for Discriminatively-trained Finite-state String Edit Distance, Andrew McCallum, Kedar Bellare, and Fernando Pereira
The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks: Experiments with Enron and Academic Email, Andrew McCallum, Andrés Corrada-Emmanuel, and Xuerui Wang
Topic and Role Discovery in Social Networks, Andrew McCallum, Andrés Corrada-Emmanuel, and Xuerui Wang
Implementing a tamper-evident database system, G Miklau and D Suciu
CISL: A class-based machine description language for co-generation of compilers and simulators, JEB Moss, T Palmer, T Richards, EK Walters, and CC Weems
Leveraging relational autocorrelation with latent group models, J Neville and D Jensen
Unifying microprocess and macroprocess research, LJ Osterweil
Process technology to facilitate the conduct of science, LJ Osterweil, A Wise, LA Clarke, AM Ellison, JL Hadley, E Boose, and DR Foster
Re-Using Schematic Grasping Policies, Robert Platt
Automatically analyzing software processes: Experience report, Rodion M. Podorozhny, Dewayne E. Perry, and Leon J. Osterweil
Process definition language support for rapid simulation prototyping, MS Raunak and LJ Osterweil
Case-based reasoning and law, EL Rissland, KD Ashley, and LK Branting
Authenticated routing for ad hoc networks, K Sanzgiri, D LaFlamme, B Dahill, BN Levine, C Shields, and EM Belding-Royer
Learning skills in reinforcement learning using relative novelty, O Simsek and AG Barto
Identifying Useful Subgoals in Reinforcement Learning by Local Graph Partitioning, Özgür Şimşek, Alicia P. Wolfe, and Andrew G. Barto
Streaming versus batch processing of sensor data in a hazardous weather detection system, M Sims, J Kurose, and V Lesser
Turducken: Hierarchical power management for mobile devices, J Sorber, N Banerjee, MD Corner, and S Rollins
Efficiently Registering Video into Panoramic Mosaics, Drew Steedly
Intrinsically Motivated Reinforcement Learning: A Promising Framework For Developmental Robot Learning, Andrew Stout, George D. Konidaris, and Andrew G. Barto
Efficient data migration in self-managing storage systems, V Sundaram, T Wood, and P Shenoy
Dynamic provisioning of multi-tier Internet applications, B Urgaonkar, P Shenoy, A Chandra, and P Goyal
On neighbor discovery in wireless networks with directional antennas, S Vasudevan, J Kurose, and D Towsley
Study of gas-fluidization dynamics with laser-polarized Xe-129, RP Wang, MS Rosen, D Candela, RW Mair, and RL Walsworth
Incorporating Uncertainty in Agent Commitments, Ping Xuan
On optimal routing with multiple traffic matrices, C Zhang, Y Liu, WB Gong, J Kurose, R Moll, and D Towsley
TCP Connection Game: A Study on the Selfish Behavior of TCP Users, Honggang Zhang
Efficient management of multi-linked negotiation based on a formalized model, XQ Zhang, V Lesser, and S Abdallah
Multi-dimensional, multistep negotiation for task allocation in a cooperative system, XQ Zhang, V Lesser, and R Podorozhny
Model-P: a basecalling method for resequencing microarrays of diploid samples, YP Zhan and D Kulp
NetRad: Distributed, collaborative and adaptive sensing of the atmosphere calibration and initial benchmarks, M Zink, D Westbrook, E Lyons, K Hondl, J Kurose, F Junyent, L Krnan, and V Chandrasekar
Efficient Population Registration of 3D Data, Lilla Zollei
The monitoring and early detection of Internet worms, CC Zou, WB Gong, D Towsley, and LX Gao
Submissions from 2004
Organization-based cooperative coalition formation, S Abdallah and V Lesser
UMass at TREC 2004: Novelty and HARD, Nasreen Abdul-Jaleel, James Allan, W. Bruce Croft, Fernando Diaz, Leah Larkey, Xiaoyan Li, Mark D. Smucker, and Courtney Wade
Optimal Peer Selection in a Free-Market Peer-Resource Economy, Micah Adler, Rakesh Kumar, Keith Ross, Dan Rubenstein, David Turner, and David D. Yao
HARD Track Overview in TREC 2004 High Accuracy Retrieval from Documents, James Allan
Dynamic Composition of Information Retrieval Techniques, Andrew Arnt, Shlomo Zilberstein, and James Allan
Attribute measurement policies for time and cost sensitive classification, A Arnt and S Zilberstein
Inferring unobservable learning variables from students’ help seeking behavior, Ivon Arroyo
Web-based Intelligent Multimedia Tutoring for High Stakes Achievement Tests, Ivon Arroyo