Submissions from 2003
Real-time support for mobile robotics, H Li, J Sweeney, K Ramamritham, R Grupen, and P Shenoy
On the capacity of hybrid wireless networks, BY Liu, Z Liu, and D Towsley
Microarray analysis of global gene expression in the mammary gland following estrogen and progesterone treatment of ovariectomized mice., SL Lu, A Guo, K Becker, H Siegelmann, P Sebastiani, K MacBeth, and J Jerry
Applications of controlled-flow laser-polarized xenon gas to porous and granular media study, RW Mair, R Wang, MS Rosen, D Candela, DG Cory, and RL Walsworth
Decision making and uncertainty management in a 3D reconstruction system, M Marengoni, A Hanson, S Zilberstein, and E Riseman
A Note on the Unification of Information Extraction and Data Mining using Conditional-Probability, Relational Models, Andrew McCallum and David Jensen
Early Results for Named Entity Recognition with Conditional Random Fields, Feature Induction and Web-Enhanced Lexicons, Andrew McCallum and Wei Li
Toward Conditional Models of Identity Uncertainty with Application to Proper Noun Coreference, Andrew McCallum and Ben Wellner
Simple Estimators for Relational Bayesian Classifiers, Jennifer Neville
Scalable consistency maintenance in content distribution networks using cooperative leases, AG Ninan, P Kulkarni, P Shenoy, K Ramamritham, and R Tewari
New Software Engineering Faculty Symposium (NSEFS 03), LJ Osterweil
Augmenting Naive Bayes Classifiers with Statistical Language Models, Fuchun Peng
Lyapunov design for safe reinforcement learning, TJ Perkins and AG Barto
Table Extraction Using Conditional Random Fields, David Pinto
Extending fingertip grasping to whole body grasping, R Platt, AH Fagg, and RA Grupen
A Framework For Humanoid Control and Intelligence, Robert Platt
Relativized Options: Choosing the Right Transformation, Balaraman Ravindran and Andrew G. Barto
AI and Law: A fruitful synergy, EL Rissland, KD Ashley, and RP Loui
Learning to Exploit Dynamics for Robot Motor Coordination, Michael T. Rosenstein
INTERACTIVE COLOR MOSAIC AND DENDROGRAM DISPLAYS FOR SIGNAL/NOISE OPTIMIZATION IN MICROARRAY DATA ANALYSIS, Jinwook Seo
Design considerations for the symphony integrated multimedia file system, P Shenoy, P Goyal, S Rao, and HM Vin
Introduction to selected papers from MMCN 2002, P Shenoy and K Mayer-Patel
Proxy-assisted power-friendly streaming to mobile devices, P Shenoy and P Radkov
Neural and super-Turing computing, HT Siegelmann
Designing Overlay Multicast Networks For Streaming, Ramesh Sitaraman
A practical learning-based approach for dynamic storage bandwidth allocation, V Sundaram and P Shenoy
Scalability and Schedulability in Large, Coordinated, Distributed Robot Systems, John D. Sweeney
Exploration of the performance of a data mining application via hardware based monitoring, MS Thoennes and CC Weems
Leader election algorithms for wireless ad hoc networks, S Vasudevan, B DeCleene, N Immerman, J Kurose, and D Towsley
Using multicast for streaming videos across wide area networks, B Wang, S Sen, M Adler, and D Towsley
On Inferring and Characterizing Internet Routing Policies, Feng Wang
Guided region prefetching: A cooperative hardware/software approach, ZL Wang, D Burger, KS McKinley, SK Reinhardt, and CC Weems
Increment patterns in otoliths and scales from mature Atlantic salmon Salmo salar, BK Wells, KD Friedland, and LM Clarke
The CVCA model: A cellular automaton model of landscape ecological strategies, J Wileden, EA Silva, and J Ahern
Tracking Student Propositions in an Inquiry System, Beverly Park Woolf, David Marshall, Matthew Mattingly, Joshua Lewis, Sean Wright, Michael Jellison, and Tom Murray
Defending anonymous communications against passive logging attacks, M Wright, M Adler, BN Levine, and C Shields
A constructive graphical model approach for knowledge-based systems: A vehicle monitoring case study, Y Xiang and V Lesser
On the role of multiply sectioned Bayesian networks to cooperative multiagent systems, Y Xiang and V Lesser
Exploiting redundancy to implement multi-objective behavior, YD Yang, O Brock, and RA Grupen
A self-tuning structure for adaptation in TCP/AQM networks, HG Zhang, CV Hollot, D Towsley, and V Misra
Optimal sequencing of contract algorithms, S Zilberstein, F Charpillet, and P Chassaing
Submissions from 2002
Estimation of Congestion Price Using Probabilistic Packet Marking, Micah Adler, Jin-Yi Cai, Jonathan K. Shapiro, and Don Towsley
Scheduling time-constrained communication in linear networks, M Adler, AL Rosenberg, RK Sitaraman, and W Unger
Detection as multi-topic tracking, J Allan
Reconsidering custom memory allocation, ED Berger, BG Zorn, and KS McKinley
The complexity of decentralized control of Markov decision processes, DS Bernstein, R Givan, N Immerman, and S Zilberstein
Scheduling contract algorithms on multiple processors, DS Bernstein, TJ Perkins, S Zilberstein, and L Finkelstein
Adaptive push-pull: Disseminating dynamic web data, M Bhide, P Deolasee, A Katkar, A Panchbudhe, K Ramamritham, and P Shenoy
Elastic strips: A framework for motion generation in human environments, O Brock and O Khatib
Problems of Music Information Retrieval in the Real World, Donald Byrd
Availability and locality measurements of peer-to-peer file systems, J Chu, K Labonte, and BN Levine
FLAVERS: A finite state verification technique for software systems, JM Cobleigh, LA Clarke, and LJ Osterweil
An Unsupervised Algorithm for Segmenting Categorical Timeseries into Episodes, Paul Cohen, Brent Heeringa, and Niall Adams
Globally distribued content delivery, J Dilley, B Maggs, J Parikh, H Prokop, R Sitaraman, and B Weihl
A computational model of muscle recruitment for wrist movements, AH Fagg, A Shah, and AG Barto
Acquiring state from control dynamics to learn grasping policies for robot hands, RA Grupen and JA Coelho
Framework for Analyzing Garbage Collection, Matthew Hertz, Neil Immerman, and J. Eliot B. Moss
Uniform constant-depth threshold circuits for division and iterated multiplication, W Hesse, E Allender, and DAM Barrington
Measurement and classification of out-of-sequence packets in a tier-1 IP backbone, S Jaiswal, G Iannaccone, C Diot, J Kurose, and D Towsley
Data Mining in Social Networks, David Jensen
The emergence of multiple movement units in the presence of noise and feedback delay, M Kositsky and AG Barto
Explicit Transport Error Notification (ETEN) for Error-Prone Wireless and Satellite Networks, Rajesh Krishnan
Workshop report: ACM SIGCOMM workshop on computer networking: Curriculum designs and educational challenges, J Kurose, J Liebeherr, S Ostermann, and T Ott-Boisseau
Embedding linkages on an integer lattice, S Landau and N Immerman
A banked-promotion translation lookaside buffer system, JH Lee, SW Jeong, SD Kim, and C Weems
Performance analysis of a selectively compressed memory system, JS Lee, SD Kim, and C Weems
TCP-cognizant adaptive forward error correction in wireless networks, BY Liu, DL Goeckel, and D Towsley
A survey in indexing and searching XML documents, RWP Luk, HV Leong, TS Dillon, ATS Chan, WB Croft, and J Allan
Case-based reasoning integrations, C Marling, M Sqalli, E Rissland, H Munoz-Avila, and D Aha
Basic-block Instruction Scheduling Using Reinforcement Learning and Rollouts, Amy McGovern, Eliot Moss, and Andrew G. Barto
Cooperative Leases: Scalable Consistency Maintenance in Content Distribution Networks, Anoop Ninan, Purushottam Kulkarni, Prashant Shenoy, Krithi Ramamritham, and Renu Tewari
Lightweight vs. heavyweight processes: Is this even the right question?, LJ Osterweil, P Kruchten, M Fowler, and W Schafer
Learning Visual Features to Predict Hand Orientations, Justus H. Piater
Harmonic Models for Polyphonic Music Retrieval, Jeremy Pickens
Polyphonic Score Retrieval Using Polyphonic Audio Queries: A Harmonic Modeling Approach, Jeremy Pickens
Nullspace composition of control laws for grasping, R Platt, AH Fagg, and RA Grupen
Implications of proxy caching for provisioning networks and servers, M Raunak, P Shenoy, P Goyal, K Ramamritham, and P Kulkarni
Velocity-dependent dynamic manipulability, MT Rosenstein and RA Grupen
Detecting shared congestion of flows via end-to-end measurement, D Rubenstein, J Kurose, and D Towsley
The impact of multicast layering on network fairness, D Rubenstein, J Kurose, and D Towsley
Leveled-commitment contracting - A backtracking instrument for multiagent systems, T Sandholm and V Lesser
A Secure Routing Protocol for Ad Hoc Networks, Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer
Maintaining Coherency of Dynamic Data in Cooperating Repositories, Shetal Shah
Topology Discovery Service for Router-Assisted Multicast Transport, Jonathan K. Shapiroa
Optimization-based congestion control for multicast communications, JK Shapiro, D Towsley, and J Kurose
Architectural considerations for next-generation file systems, P Shenoy, P Goyal, and HM Vin
Middleware versus native OS support: Architectural considerations for supporting multimedia applications, P Shenoy, S Hasan, P Kulkarni, and K Ramamritham
Cello: A disk scheduling framework for next generation operating systems, P Shenoy and HM Vin
PROPEL: An approach supporting property elucidation, Rachel L. Smith, George S. Avrunin, Lori A. Clarke, and Leon J. Osterweil
Coordinated Teams of Reactive Mobile Platforms, J. Sweeney
Guest editorial network support for multicast communications, D Towsley, C Diot, BN Levine, and L Rizzo
On viewpoint control, S Uppala, DR Karuppiah, M Brewer, SC Ravela, and RA Grupen
Resource overbooking and application profiling in shared hosting platforms, H Urgaonkar, P Shenoy, and T Roscoe
Evolving real-time local agent control for large-scale multi-agent systems, T Wagner and V Lesser
Optimal Proxy Cache Allocation for Efficient Streaming Media Distribution, Bing Wang, Subhabrata Sen, Micah Adler, and Don Towsley
Learning optimal switching policies for path tracking tasks on a mobile robot, YQ Wang, B Thibodeau, AH Fagg, and RA Grupen
Using the compiler to improve cache replacement decisions, ZL Wang, KS McKinley, AL Rosenberg, and CC Weems
Learning prospective pick and place behavior, DS Wheeler, AH Fagg, and RA Grupen
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems, Matthew K. Wright, Micah Adler, Brian Neil Levine, and Clay Sheilds
Comparison of inter-area rekeying algorithms for secure wireless group communications, C Zhang, B DeCleene, J Kurose, and D Towsley