Browse Research and Tech Reports - Computer Science by Title

  • application/pdf

    application/pdfPDF (850Kb)
  • application/pdf

    application/pdfPDF (13Mb)
  • Bell, William N. (2008-08)
    Discrete dierential forms arise in scientic disciplines ranging from computational electromagnetics to computer graphics. Examples include stable discretizations of the eddy-current problem, topological methods for sensor ...

    application/pdf

    application/pdfPDF (13Mb)
  • Boronat, Artur; Meseguer, Jos�� (2007-10)
    Model-Driven Development is a field in Software Engineering that, for several years, has represented software artifacts as models in order to improve productivity, quality, and cost effectiveness. Models provide a more ...

    application/pdf

    application/pdfPDF (3Mb)
  • Boronat, Artur; Meseguer, Jos�� (2008-08)
    In the denition of domain-specic languages a MOF metamodel is used to dene the main types of its abstract syntax, and OCL invariants are used to add semantic constraints. The semantics of a metamodel denition can be given ...

    application/pdf

    application/pdfPDF (372Kb)
  • Boronat, Artur; Meseguer, Jos�� (2008-08)
    In the denition of domain-specic languages a MOF metamodel is used to dene the main types of its abstract syntax, and OCL invariants are used to add semantic constraints. The semantics of a metamodel denition can be given ...

    application/pdf

    application/pdfPDF (372Kb)
  • Garrido, Alejandra; Meseguer, Jos��; Johnson, Ralph (2006-02)
    Refactoring has become a popular technique for the development and maintenance of object-oriented systems. We have been working on the refactoring of C programs, including the C preprocessor (Cpp), and we have built ...

    application/pdf

    application/pdfPDF (201Kb)
  • Meseguer, Jos��; Palomino, Miguel; Marti-Oliet, Narciso (2007-08)
    A fruitful approach to the study of state-based systems consists in their mathematical formalization by means of models like Kripke structures. They allow verification of their associated properties using simulations that ...

    application/pdf

    application/pdfPDF (490Kb)
  • Zimak, Dav A. (2006-05)
    Classification problems in machine learning involve assigning labels to various kinds of output types, from single assignment binary and multi-class classification to more complex assignments such as category ranking, ...

    application/pdf

    application/pdfPDF (942Kb)
  • Chen, Ke (2007-10)
    We present algorithms for three geometric problems -- clustering, orienteering, and conflict-free coloring. In the first part, we obtain small coresets for k-median and k-means clustering in general metric spaces and ...

    application/pdf

    application/pdfPDF (835Kb)
  • Nguyen, Hoang; Pongthawornkamol, Thadpong; Nahrstedt, Klara (2010-08-20)
    Reactive jamming nodes are the nodes of the network that get compromised and become the source of jamming attacks. They assume to know any shared secrets and protocols used in the networks. Thus, they can jam very effectively ...

    application/pdf

    application/pdfPDF (455Kb)
  • Nguyen, Hoang (2009-10-31)
    We consider the problem of identifying the insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in ...

    application/pdf

    application/pdfPDF (210Kb)
  • Nguyen, Hoang; Pongthawornkamol, Thadpong; Nahrstedt, Klara (2008-10)
    We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop wireless LAN environment, where jammers have the inside knowledge of frequency hopping patterns and any protocols used ...

    application/pdf

    application/pdfPDF (345Kb)
  • Nguyen, Hoang; Pongthawornkamol, Thadpong; Nahrstedt, Klara (2008-10)
    We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop wireless LAN environment, where jammers have the inside knowledge of frequency hopping patterns and any protocols used ...

    application/pdf

    application/pdfPDF (345Kb)
  • Rosu, Grigore; Bensalem, Saddek (2006-01)
    The relationship between two well established formalisms for temporal reasoning is first investigated, namely between Allen's interval algebra (or Allen's temporal logic, abbreviated \ATL) and linear temporal logic (\LTL). ...

    application/pdf

    application/pdfPDF (298Kb)
  • Sasanka, Ruchira; Li, Man-Lap; Adve, Sarita V.; Chen, Yen-Kuang; Debes, Eric (2005-07)
    The real-time execution of contemporary complex media applications requires energy-efficient processing capabilities beyond those of current superscalars. We observe that the complexity of contemporary media applications ...

    application/pdf

    application/pdfPDF (139Kb)
  • Li, Man-Lap; Sasanka, Ruchira; Adve, Sarita V.; Chen, Yen-Kuang; Debes, Eric (2005-07)
    Multimedia applications are becoming increasingly important for a large class of general-purpose processors. Contemporary media applications are highly complex and demand high performance. A distinctive feature of these ...

    application/pdf

    application/pdfPDF (119Kb)
  • Vakilian, Mohsen; Johnson, Ralph E. (2013-03-09)
    Modern Integrated Development Environments (IDEs) support many refactorings. Yet, programmers greatly underuse automated refactorings. Recent studies have applied traditional usability testing methodologies such as surveys, ...

    application/pdf

    application/pdfPDF (376Kb)
  • Pongthawornkamol, Thadpong (2007)
    In this work, we analyze the publish/subscribe distributed system paradigm over mobile ad hoc networks with respect to the performance and the impact of different mobility speeds and patterns of all participants in urban ...

    application/pdf

    application/pdfPDF (171Kb)
  • Hu, Chunyu; Kim, Hwangnam; Hou, Jennifer C. (2005-07)
    In the paper, we perform an in-depth analytic study of the binary exponential algorithm (BEBA) that is widely used in distributed MAC protocols, for example, IEEE 802.11 DCF. We begin with a generalized framework of modeling ...

    application/pdf

    application/pdfPDF (215Kb)