Follow

Submissions from 2006

PDF

A Framework to Predict the Quality of Answers with NonTextual, University of Massachusetts Amherst

Optimal power allocation in wireless networks with transmitter-receiver power tradeoffs, S Vasudevan, C Zhang, D Goeckel, and D Towsley

Modeling uncertainty and its implications to sophisticated control in TAEMS agents, TA Wagner, A Raja, and VR Lesser

Architectural building blocks for plug-and-play system design, SZ Wang, GS Avrunin, and LA Clarke

Identifying 802.11 traffic from passive measurements using iterative Bayesian inference, W Wei, S Jaiswal, J Kurose, and D Towsley

Table extraction for answer retrieval, X Wei, B Croft, and A McCallum

Link

Applying little-JIL to describe process-agent knowledge in SoftPM, JC Xiao, LJ Osterweil, L Zhang, A Wise, and Q Wang

CRAMM: Virtual memory support for garbage-collected applications, T Yang, ED Berger, SF Kaplan, and JEB Moss

Can an overlay compensate for a careless underlay?, HG Zhang, J Kurose, and D Towsley

On the benefits of random linear coding for unicast applications in disruption tolerant networks, XL Zhang, G Neglia, J Kurose, and D Towsley

Integrative negotiation among agents situated in organizations, XQ Zhang, V Lesser, and T Wagner

PDF

Capacity Enhancement using Throwboxes in DTNs, Wenrui Zhao, Yang Chen, Mostafa Ammar, Mark Corner, Brain Levine, and Ellen Zegura

On the performance of Internet worm scanning strategies, CC Zou, D Towsley, and WB Gong

Advanced routing worm and its security challenges, CC Zou, D Towsley, WB Gong, and SL Cai

PDF

Adaptive defense against various network attacks, Cliff C. Zou, Nick Duffield, Don Towsley, and Weibo Gong

Submissions from 2005

PDF

Optimal Peer Selection for P2P Downloading and Streaming, Micah Adler, Rakesh Kumar, Keith Ross, Dan Rubenstein, Torsten Suel, and David D. Yao

PDF

Panoramic Video Textures, Aseem Agarwala, Ke Colin Zheng, Chris Pal, Maneesh Agrawala, Michael Cohen, Brian Curless, David Salesin, and Richard Szeliski

PDF

When Will Information Retrieval Be “Good Enough”?, James Allan

First-order expressibility of languages with neutral letters or: The Crane Beach conjecture, DAM Barrington, N Immerman, C Lautemann, N Schweikardt, and D Therien

Analyzing myopic approaches for multi-agent communication, R Becker, V Lesser, and S Zilberstein

PDF

Multi-Way Distributional Clustering via Pairwise Interactions, Ron Bekkerman

Generating admissible heuristics by abstraction for search in stochastic domains, N Beliaeva and S Zilberstein

Approximate optimal control as a model for motor learning, NE Berthier, MT Rosenstein, and AG Barto

PDF

Privacy Vulnerabilities in Encrypted HTTP Streams, George Dean Bissias

A reconfigurable, on-the-fly, resource-aware, streaming pipeline scheduler, MK Bradshaw, J Kurose, LJ Page, P Shenoy, and D Towsley

Improving protein structure prediction with model-based search, TJ Brunette and O Brock

Single-query entropy-guided path planning, B Burns and O Brock

PDF

Sampling-Based Motion Planning Using Predictive Models, Brendan Burns and Oliver Brock

PDF

MV Routing and Capacity Building in Disruption Tolerant Networks, Brendan Burns, Oliver Brock, and Brian Neil Levine

PDF

Incremental Test Collections, Ben Carterette and James Allan

Throughput differentiation using coloring at the network edge and preferential marking at the core, Y Chait, CV Hollot, V Misra, D Towsley, HG Zhang, and Y Cui

PDF

Exploiting the IPID field to infer network path and end-system characteristics, Weifeng Chen, Yong Huang, Bruno F. Ribeiro, Kyoungwon Suh, Honggang Zhang, Edmundo de Souza e Silva, Jim Kurose, and Don Towsley

Optimizing cost-sensitive trust-negotiation protocols, WF Chen, L Clarke, J Kurose, and D Towsley

Process programming to support medical safety: A case study on blood transfusion, LA Clarke, Y Chen, GS Avrunin, B Chen, R Cobleigh, K Frederick, EA Henneman, and LJ Osterweil

PDF

PRESTO: A Predictive Storage Architecture for Sensor Networks, Peter Desnoyers

PDF

Minimum energy reliable paths using unreliable wireless links, Qunfeng Dong

Network tomography from aggregate loss reports, NG Duffield, V Arya, R Bellino, T Friedman, J Horowitz, D Towsley, and T Turletti

On TCP and self-similar traffic, DR Figueiredo, B Liu, A Feldmann, V Misra, D Towsley, and W Willinger

Automated egg counting and sizing from scanned images: Rapid sample processing and large data volumes for fecundity estimates, KD Friedland, D Ama-Abasi, M Manning, L Clarke, G Kligys, and RC Chambers

PDF

ON THE INTERACTION OF DATA REPRESENTATION AND ROUTING IN SENSOR NETWORKS, Deepak Ganesan

PDF

Collective Multi-Label Classification, Nadia Ghamrawi and Andrew McCallum

Chaotic dynamics in an electronic model of a genetic network, L Glass, TJ Perkins, J Mason, HT Siegelmann, and R Edwards

Self-similarity and long range dependence on the internet: a second look at the evidence, origins and implications, WB Gong, Y Liu, V Misra, and D Towsley

Synchronization of TCP flows in networks with small Droptail buffers, H Han, CV Hollot, D Towsley, and Y Chait

Quantifying the performance of garbage collection vs. explicit memory management, M Hertz and ED Berger

Garbage collection without paging, M Hertz, Y Feng, and ED Berger

Distribution strategies for collaborative and adaptive sensor networks, B Horling and V Lesser

Quantitative organizational models for large-scale agent systems, B Horling and V Lesser

Using ODML to model multi-agent organizations, B Horling and V Lesser

PDF

Finding Similar Questions in Large Question and Answer Archives, Jiwoon Jeon

Smart resource reconfiguration by exploiting dynamics in perceptual tasks, D Karuppiah, R Grupen, A Hanson, and E Riseman

Many heads are better than one: Jointly removing bias from multiple MRIs using nonparametric maximum likelihood, EG Learned-Miller and V Jain

PDF

A methodology for efficiently sampling the conformation space of molecular structures, Audrey Lee, Ileana Streinu, and Oliver Brock

Selective block buffering TLB system for embedded processors, JH Lee, C Weems, and SD Kim

Scheduling messages with deadlines in multi-hop real-time sensor networks, H Li, P Shenoy, and K Ramamritham

On the interaction between overlay routing and underlay routing, Y Liu, HG Zhang, WB Gong, and D Towsley

Introducing an active cluster-based information retrieval paradigm, O Loureiro and H Siegelmann

PDF

Proto-Value Functions: Developmental Reinforcement Learning, Sridhar Mahadevan

Switching Kalman filters for prediction and tracking in an adaptive meteorological sensing network, V Manfredi, S Mahadevan, and J Kurose

Integrations with case-based reasoning, C Marling, E Rissland, and A Aamodt

PDF

A Conditional Random Field for Discriminatively-trained Finite-state String Edit Distance, Andrew McCallum, Kedar Bellare, and Fernando Pereira

PDF

The Author-Recipient-Topic Model for Topic and Role Discovery in Social Networks: Experiments with Enron and Academic Email, Andrew McCallum, Andrés Corrada-Emmanuel, and Xuerui Wang

PDF

Topic and Role Discovery in Social Networks, Andrew McCallum, Andrés Corrada-Emmanuel, and Xuerui Wang

Implementing a tamper-evident database system, G Miklau and D Suciu

CISL: A class-based machine description language for co-generation of compilers and simulators, JEB Moss, T Palmer, T Richards, EK Walters, and CC Weems

Leveraging relational autocorrelation with latent group models, J Neville and D Jensen

Link

Unifying microprocess and macroprocess research, LJ Osterweil

Link

Process technology to facilitate the conduct of science, LJ Osterweil, A Wise, LA Clarke, AM Ellison, JL Hadley, E Boose, and DR Foster

PDF

Re-Using Schematic Grasping Policies, Robert Platt

PDF

Automatically analyzing software processes: Experience report, Rodion M. Podorozhny, Dewayne E. Perry, and Leon J. Osterweil

Process definition language support for rapid simulation prototyping, MS Raunak and LJ Osterweil

Case-based reasoning and law, EL Rissland, KD Ashley, and LK Branting

Authenticated routing for ad hoc networks, K Sanzgiri, D LaFlamme, B Dahill, BN Levine, C Shields, and EM Belding-Royer

Learning skills in reinforcement learning using relative novelty, O Simsek and AG Barto

PDF

Identifying Useful Subgoals in Reinforcement Learning by Local Graph Partitioning, Özgür Şimşek, Alicia P. Wolfe, and Andrew G. Barto

Streaming versus batch processing of sensor data in a hazardous weather detection system, M Sims, J Kurose, and V Lesser

Turducken: Hierarchical power management for mobile devices, J Sorber, N Banerjee, MD Corner, and S Rollins

PDF

Efficiently Registering Video into Panoramic Mosaics, Drew Steedly

PDF

Intrinsically Motivated Reinforcement Learning: A Promising Framework For Developmental Robot Learning, Andrew Stout, George D. Konidaris, and Andrew G. Barto

Efficient data migration in self-managing storage systems, V Sundaram, T Wood, and P Shenoy

Dynamic provisioning of multi-tier Internet applications, B Urgaonkar, P Shenoy, A Chandra, and P Goyal

On neighbor discovery in wireless networks with directional antennas, S Vasudevan, J Kurose, and D Towsley

Study of gas-fluidization dynamics with laser-polarized Xe-129, RP Wang, MS Rosen, D Candela, RW Mair, and RL Walsworth

PDF

Incorporating Uncertainty in Agent Commitments, Ping Xuan

On optimal routing with multiple traffic matrices, C Zhang, Y Liu, WB Gong, J Kurose, R Moll, and D Towsley

PDF

TCP Connection Game: A Study on the Selfish Behavior of TCP Users, Honggang Zhang

Efficient management of multi-linked negotiation based on a formalized model, XQ Zhang, V Lesser, and S Abdallah

Multi-dimensional, multistep negotiation for task allocation in a cooperative system, XQ Zhang, V Lesser, and R Podorozhny

Model-P: a basecalling method for resequencing microarrays of diploid samples, YP Zhan and D Kulp

NetRad: Distributed, collaborative and adaptive sensing of the atmosphere calibration and initial benchmarks, M Zink, D Westbrook, E Lyons, K Hondl, J Kurose, F Junyent, L Krnan, and V Chandrasekar

PDF

Efficient Population Registration of 3D Data, Lilla Zollei

The monitoring and early detection of Internet worms, CC Zou, WB Gong, D Towsley, and LX Gao

Submissions from 2004

Organization-based cooperative coalition formation, S Abdallah and V Lesser

PDF

UMass at TREC 2004: Novelty and HARD, Nasreen Abdul-Jaleel, James Allan, W. Bruce Croft, Fernando Diaz, Leah Larkey, Xiaoyan Li, Mark D. Smucker, and Courtney Wade

PDF

Optimal Peer Selection in a Free-Market Peer-Resource Economy, Micah Adler, Rakesh Kumar, Keith Ross, Dan Rubenstein, David Turner, and David D. Yao

PDF

HARD Track Overview in TREC 2004 High Accuracy Retrieval from Documents, James Allan

PDF

Dynamic Composition of Information Retrieval Techniques, Andrew Arnt, Shlomo Zilberstein, and James Allan

Attribute measurement policies for time and cost sensitive classification, A Arnt and S Zilberstein

PDF

Inferring unobservable learning variables from students’ help seeking behavior, Ivon Arroyo

PDF

Web-based Intelligent Multimedia Tutoring for High Stakes Achievement Tests, Ivon Arroyo