Follow

Submissions from 2003

Real-time support for mobile robotics, H Li, J Sweeney, K Ramamritham, R Grupen, and P Shenoy

On the capacity of hybrid wireless networks, BY Liu, Z Liu, and D Towsley

Microarray analysis of global gene expression in the mammary gland following estrogen and progesterone treatment of ovariectomized mice., SL Lu, A Guo, K Becker, H Siegelmann, P Sebastiani, K MacBeth, and J Jerry

Applications of controlled-flow laser-polarized xenon gas to porous and granular media study, RW Mair, R Wang, MS Rosen, D Candela, DG Cory, and RL Walsworth

Decision making and uncertainty management in a 3D reconstruction system, M Marengoni, A Hanson, S Zilberstein, and E Riseman

PDF

A Note on the Unification of Information Extraction and Data Mining using Conditional-Probability, Relational Models, Andrew McCallum and David Jensen

PDF

Early Results for Named Entity Recognition with Conditional Random Fields, Feature Induction and Web-Enhanced Lexicons, Andrew McCallum and Wei Li

PDF

Toward Conditional Models of Identity Uncertainty with Application to Proper Noun Coreference, Andrew McCallum and Ben Wellner

PDF

Simple Estimators for Relational Bayesian Classifiers, Jennifer Neville

Scalable consistency maintenance in content distribution networks using cooperative leases, AG Ninan, P Kulkarni, P Shenoy, K Ramamritham, and R Tewari

New Software Engineering Faculty Symposium (NSEFS 03), LJ Osterweil

PDF

Augmenting Naive Bayes Classifiers with Statistical Language Models, Fuchun Peng

Lyapunov design for safe reinforcement learning, TJ Perkins and AG Barto

PDF

Table Extraction Using Conditional Random Fields, David Pinto

Extending fingertip grasping to whole body grasping, R Platt, AH Fagg, and RA Grupen

PDF

A Framework For Humanoid Control and Intelligence, Robert Platt

PDF

Relativized Options: Choosing the Right Transformation, Balaraman Ravindran and Andrew G. Barto

AI and Law: A fruitful synergy, EL Rissland, KD Ashley, and RP Loui

PDF

Learning to Exploit Dynamics for Robot Motor Coordination, Michael T. Rosenstein

PDF

INTERACTIVE COLOR MOSAIC AND DENDROGRAM DISPLAYS FOR SIGNAL/NOISE OPTIMIZATION IN MICROARRAY DATA ANALYSIS, Jinwook Seo

Design considerations for the symphony integrated multimedia file system, P Shenoy, P Goyal, S Rao, and HM Vin

Introduction to selected papers from MMCN 2002, P Shenoy and K Mayer-Patel

Proxy-assisted power-friendly streaming to mobile devices, P Shenoy and P Radkov

Neural and super-Turing computing, HT Siegelmann

PDF

Designing Overlay Multicast Networks For Streaming, Ramesh Sitaraman

A practical learning-based approach for dynamic storage bandwidth allocation, V Sundaram and P Shenoy

PDF

Scalability and Schedulability in Large, Coordinated, Distributed Robot Systems, John D. Sweeney

Exploration of the performance of a data mining application via hardware based monitoring, MS Thoennes and CC Weems

Leader election algorithms for wireless ad hoc networks, S Vasudevan, B DeCleene, N Immerman, J Kurose, and D Towsley

Using multicast for streaming videos across wide area networks, B Wang, S Sen, M Adler, and D Towsley

PDF

On Inferring and Characterizing Internet Routing Policies, Feng Wang

Guided region prefetching: A cooperative hardware/software approach, ZL Wang, D Burger, KS McKinley, SK Reinhardt, and CC Weems

Increment patterns in otoliths and scales from mature Atlantic salmon Salmo salar, BK Wells, KD Friedland, and LM Clarke

The CVCA model: A cellular automaton model of landscape ecological strategies, J Wileden, EA Silva, and J Ahern

PDF

Tracking Student Propositions in an Inquiry System, Beverly Park Woolf, David Marshall, Matthew Mattingly, Joshua Lewis, Sean Wright, Michael Jellison, and Tom Murray

Defending anonymous communications against passive logging attacks, M Wright, M Adler, BN Levine, and C Shields

A constructive graphical model approach for knowledge-based systems: A vehicle monitoring case study, Y Xiang and V Lesser

On the role of multiply sectioned Bayesian networks to cooperative multiagent systems, Y Xiang and V Lesser

Exploiting redundancy to implement multi-objective behavior, YD Yang, O Brock, and RA Grupen

A self-tuning structure for adaptation in TCP/AQM networks, HG Zhang, CV Hollot, D Towsley, and V Misra

Optimal sequencing of contract algorithms, S Zilberstein, F Charpillet, and P Chassaing

Submissions from 2002

PDF

Estimation of Congestion Price Using Probabilistic Packet Marking, Micah Adler, Jin-Yi Cai, Jonathan K. Shapiro, and Don Towsley

Scheduling time-constrained communication in linear networks, M Adler, AL Rosenberg, RK Sitaraman, and W Unger

Detection as multi-topic tracking, J Allan

Reconsidering custom memory allocation, ED Berger, BG Zorn, and KS McKinley

The complexity of decentralized control of Markov decision processes, DS Bernstein, R Givan, N Immerman, and S Zilberstein

Scheduling contract algorithms on multiple processors, DS Bernstein, TJ Perkins, S Zilberstein, and L Finkelstein

Adaptive push-pull: Disseminating dynamic web data, M Bhide, P Deolasee, A Katkar, A Panchbudhe, K Ramamritham, and P Shenoy

Elastic strips: A framework for motion generation in human environments, O Brock and O Khatib

PDF

Problems of Music Information Retrieval in the Real World, Donald Byrd

Availability and locality measurements of peer-to-peer file systems, J Chu, K Labonte, and BN Levine

FLAVERS: A finite state verification technique for software systems, JM Cobleigh, LA Clarke, and LJ Osterweil

PDF

An Unsupervised Algorithm for Segmenting Categorical Timeseries into Episodes, Paul Cohen, Brent Heeringa, and Niall Adams

Globally distribued content delivery, J Dilley, B Maggs, J Parikh, H Prokop, R Sitaraman, and B Weihl

A computational model of muscle recruitment for wrist movements, AH Fagg, A Shah, and AG Barto

Acquiring state from control dynamics to learn grasping policies for robot hands, RA Grupen and JA Coelho

PDF

Framework for Analyzing Garbage Collection, Matthew Hertz, Neil Immerman, and J. Eliot B. Moss

Uniform constant-depth threshold circuits for division and iterated multiplication, W Hesse, E Allender, and DAM Barrington

Measurement and classification of out-of-sequence packets in a tier-1 IP backbone, S Jaiswal, G Iannaccone, C Diot, J Kurose, and D Towsley

PDF

Data Mining in Social Networks, David Jensen

The emergence of multiple movement units in the presence of noise and feedback delay, M Kositsky and AG Barto

PDF

Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks, Rajesh Krishnan

Workshop report: ACM SIGCOMM workshop on computer networking: Curriculum designs and educational challenges, J Kurose, J Liebeherr, S Ostermann, and T Ott-Boisseau

Embedding linkages on an integer lattice, S Landau and N Immerman

A banked-promotion translation lookaside buffer system, JH Lee, SW Jeong, SD Kim, and C Weems

Performance analysis of a selectively compressed memory system, JS Lee, SD Kim, and C Weems

TCP-cognizant adaptive forward error correction in wireless networks, BY Liu, DL Goeckel, and D Towsley

A survey in indexing and searching XML documents, RWP Luk, HV Leong, TS Dillon, ATS Chan, WB Croft, and J Allan

Case-based reasoning integrations, C Marling, M Sqalli, E Rissland, H Munoz-Avila, and D Aha

PDF

Basic-block Instruction Scheduling Using Reinforcement Learning and Rollouts, Amy McGovern, Eliot Moss, and Andrew G. Barto

PDF

Cooperative Leases: Scalable Consistency Maintenance in Content Distribution Networks, Anoop Ninan, Purushottam Kulkarni, Prashant Shenoy, Krithi Ramamritham, and Renu Tewari

Link

Lightweight vs. heavyweight processes: Is this even the right question?, LJ Osterweil, P Kruchten, M Fowler, and W Schafer

PDF

Learning Visual Features to Predict Hand Orientations, Justus H. Piater

PDF

Harmonic Models for Polyphonic Music Retrieval, Jeremy Pickens

PDF

Polyphonic Score Retrieval Using Polyphonic Audio Queries: A Harmonic Modeling Approach, Jeremy Pickens

Nullspace composition of control laws for grasping, R Platt, AH Fagg, and RA Grupen

Implications of proxy caching for provisioning networks and servers, M Raunak, P Shenoy, P Goyal, K Ramamritham, and P Kulkarni

Velocity-dependent dynamic manipulability, MT Rosenstein and RA Grupen

Detecting shared congestion of flows via end-to-end measurement, D Rubenstein, J Kurose, and D Towsley

The impact of multicast layering on network fairness, D Rubenstein, J Kurose, and D Towsley

Leveled-commitment contracting - A backtracking instrument for multiagent systems, T Sandholm and V Lesser

PDF

A Secure Routing Protocol for Ad Hoc Networks, Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer

PDF

Maintaining Coherency of Dynamic Data in Cooperating Repositories, Shetal Shah

Topology Discovery Service for Router-Assisted Multicast Transport, Jonathan K. Shapiroa

Optimization-based congestion control for multicast communications, JK Shapiro, D Towsley, and J Kurose

Architectural considerations for next-generation file systems, P Shenoy, P Goyal, and HM Vin

Middleware versus native OS support: Architectural considerations for supporting multimedia applications, P Shenoy, S Hasan, P Kulkarni, and K Ramamritham

Cello: A disk scheduling framework for next generation operating systems, P Shenoy and HM Vin

Link

PROPEL: An approach supporting property elucidation, Rachel L. Smith, George S. Avrunin, Lori A. Clarke, and Leon J. Osterweil

PDF

Coordinated Teams of Reactive Mobile Platforms, J. Sweeney

Guest editorial network support for multicast communications, D Towsley, C Diot, BN Levine, and L Rizzo

On viewpoint control, S Uppala, DR Karuppiah, M Brewer, SC Ravela, and RA Grupen

Resource overbooking and application profiling in shared hosting platforms, H Urgaonkar, P Shenoy, and T Roscoe

Evolving real-time local agent control for large-scale multi-agent systems, T Wagner and V Lesser

PDF

Optimal Proxy Cache Allocation for Efficient Streaming Media Distribution, Bing Wang, Subhabrata Sen, Micah Adler, and Don Towsley

Learning optimal switching policies for path tracking tasks on a mobile robot, YQ Wang, B Thibodeau, AH Fagg, and RA Grupen

Using the compiler to improve cache replacement decisions, ZL Wang, KS McKinley, AL Rosenberg, and CC Weems

Learning prospective pick and place behavior, DS Wheeler, AH Fagg, and RA Grupen

PDF

The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems, Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Sheilds

Comparison of inter-area rekeying algorithms for secure wireless group communications, C Zhang, B DeCleene, J Kurose, and D Towsley