Browse by Subject "computer science"

  • Berkovsky, Shlomo; Eytani, Yaniv; Kuflik, Tsvi; Ricci, Francesco (2007-02)
    Collaborative Filtering (CF) is an attractive and reliable recommendation technique. CF is typically implemented using a centralized storage of user profiles and this is a severe privacy danger, since an attack to this ...

    application/pdf

    application/pdfPDF (106Kb)
  • Chadha, Rohit; Viswanathan, Mahesh (2007-06)
    We consider the problem of verifying the safety of well-structured transition systems (WSTS) with auxiliary storage. WSTSs with storage are automata that have ( possibly) infinitely many control states along with an auxiliary ...

    application/pdf

    application/pdfPDF (266Kb)
  • Prabhakar, Pavithra; Vladimerou, Vladimeros; Viswanathan, Mahesh; Dullerud, Geir E. (2008-01)
    The paper shows the decidability of the reachability problem for planar, monotonic, linear hybrid automata without resets. These automata are a special class of linear hybrid automata with only two variables, whose flows ...

    application/pdf

    application/pdfPDF (193Kb)
  • Hendrix, Joseph D. (2008-09)
    This work develops new automated reasoning techniques for verifying the correctness of equationally specified programs. These techniques are not just theoretical, but have been implemented, and applied to actual program ...

    application/pdf

    application/pdfPDF (1Mb)
  • Baugh, Lee W.; Zilles, Craig (2005-10)
    Because they are based on large content-addressable memories, load-store queues (LSQs) present implementation challenges in superscalar processors, especially as issue width and number of in-flight instructions are scaled. ...

    application/pdf

    application/pdfPDF (198Kb)
  • d'Amorim, Marcelo; Lauterburg, Steven; Marinov, Darko (2007-05)
    State-space exploration is the essence of model checking and an increasingly popular approach for automating test generation. A key issue in exploration of object-oriented programs is handling the program state, in particular ...

    application/pdf

    application/pdfPDF (300Kb)
  • Ding, Hui (2006-11)
    Due to the complexity and requirements of modern real-time systems, multiple teams must often work concurrently and independently to develop the various components of the system. Since a team typically only knows the ...

    application/pdf

    application/pdfPDF (768Kb)
  • Nguyen, Hoang; Nahrstedt, Klara (2006-07)
    The August 2003 Blackout event showed that the PowerGrid is vulnerable to the cyber attacks. The event also showed the need for automatic detection of abnormal behaviors in the PowerGrid. In this paper, we propose a solution ...

    application/pdf

    application/pdfPDF (1Mb)
  • Zhao, Rongkai (2005-04)
    A 3D brain digital atlas is an important tool for neuroscience research. Many different imaging technologies such as MRI, CT, PET, microscopic imaging, and wet section photography, etc., are available. Among the technologies, ...

    application/pdf

    application/pdfPDF (4Mb)
  • Wang, Xuanhui; Tao, Tao; Sun, Jian-Tao; Zhai, ChengXiang (2005-11)
    Anti-spamming has become one of the most important challenges to web search engines and attracted increasing attention in both industry and academia recently. Since most search engines now use link-based ranking algorithms, ...

    application/pdf

    application/pdfPDF (244Kb)
  • Hauguel, Samson A. (2010-05-19)
    Discovery Driven Analysis (DDA) is a common feature of OLAP technology to analyze structured data. In essence, DDA helps analysts to discover anomalous data by highlighting 'unexpected' values in the OLAP ...

    application/pdf

    application/pdfPDF (949Kb)
  • Kapadia, Apu C.; Naldurg, Prasad G.; Campbell, Roy H. (2006-02)
    This paper presents an access control model that preserves the unlinkability of audit-logs in a distributed environment. The model restricts entities from accessing and correlating two or more audit-records belonging to ...

    application/pdf

    application/pdfPDF (269Kb)
  • Hailpern, Joshua; Reid, Loretta Guarino; Boardman, Richard (2009-01)
    Effective tutorial systems can help promote products by reducing barriers of learning new applications. With dynamic web applications becoming as complex as desktop programs, there is a growing need for online tutorial/help ...

    application/pdf

    application/pdfPDF (1Mb)
  • Ni, Xinlai (2007-05)
    In this thesis, a novel adaptive method for tracking moving surfaces is presented. Our methods are based on a framework for surface propagation, called face offsetting, that moves the mesh faces independently, and reconstructs ...

    application/pdf

    application/pdfPDF (5Mb)
  • Chen, Feng; Serbanuta, Traian Florin; Rosu, Grigore (2007-10)
    Predictive runtime analysis has been proposed to improve the effectiveness of concurrent program analysis and testing. Observing an execution, predictive runtime analysis extracts causality which is then used as the model ...

    application/pdf

    application/pdfPDF (283Kb)
  • Termehchy, Arash; Winslett, Marianne (2009-03)
    The popularity of XML has exacerbated the need for an easy-to-use, high precision query interface for XML data. When traditional document-oriented keyword search techniques do not suffice, natural language interfaces and ...

    application/pdf

    application/pdfPDF (553Kb)
  • Escobar, Santiago; Meseguer, Jos��; Sasse, Ralf (2008-04)
    An equational theory decomposed into a set B of equational axioms and a set \Delta of rewrite rules has the \emph{finite variant} (FV) \emph{property} in the sense of Comon-Lundh and Delaune iff for each term t there is a ...

    application/pdf

    application/pdfPDF (468Kb)
  • Iqbal, Shamsi T.; Bailey, Brian P. (2007-09)
    This work reports results from two studies investigating intelligent notification scheduling. The first study tested the performance of composite statistical models for detecting and differentiating three granularities ...

    application/pdf

    application/pdfPDF (251Kb)
  • Hasan, Ragib; Winslett, Marianne; Mitra, Soumyadeb (2009-03)
    The Sarbanes-Oxley Act inspired research on long-term high-integrity retention of business records, based on the long-term immutability guarantees that WORM storage servers offer for files. Researchers recently proposed a ...

    application/pdf

    application/pdfPDF (455Kb)
  • Jang, Myeong-Wuk (2006-02)
    The growth of the computational power of computers and the speed of networks has made large-scale multi-agent systems a promising technology. As the number of agents in a single application approaches thousands or millions, ...

    application/pdf

    application/pdfPDF (707Kb)