Browse Research and Tech Reports - Computer Science by Title

  • Neelakantam, Naveen; Zilles, Craig (2007-01)
    In this paper, we advocate for a general-purpose, fine-grain memory protection mechanism for use by applications and software development tools. The hardware component of this mechanism consists of two bits (fault-on-read ...

    application/pdf

    application/pdfPDF (318Kb)
  • Devaraj, Christo; Nagda, Mehwish; Gupta, Indranil; Agha, Gul A. (2005-04)
    We propose localized and decentralized protocols to construct and maintain an underlay for sensor networks. An underlay lies in between overlay operations (e.g., data indexing, multicast, etc.) and the sensor network itself. ...

    application/pdf

    application/pdfPDF (366Kb)
  • Nelson, Samuel C.; Kravets, Robin; Hu, Yih-Chun (2011-03-07)
    With the recent proliferation of wireless communication devices, intermittent connectivity on the edge will quickly become a reality. These disruption tolerant networks derive structure from human-based interaction and ...

    application/pdf

    application/pdfPDF (898Kb)
  • Iqbal, Shamsi T.; Bailey, Brian P. (2006-10)
    The ability to detect and differentiate breakpoints during task execution is critical for enabling defer-to-breakpoint policies within interruption management. In this work, we examine the feasibility of building models ...

    application/pdf

    application/pdfPDF (252Kb)
  • Liang, Yingyi; Campbell, Roy H. (2008-05)
    The recent international standard IEC 61850 proposes a unified solution of the communication aspect of substation automation. However, the standard itself is not easily understood by users other than domain experts. We ...

    application/pdf

    application/pdfPDF (130Kb)
  • Xiao, Li; He, Guanghui; Nahrstedt, Klara (2004-10)
    The reliability and robustness of the Border Gateway Protocol (BGP) play very important roles in achieving highly stable and prompt Internet data communication. The present BGP uses TCP/IP to exchange routing control ...

    application/pdf

    application/pdfPDF (484Kb)
  • Iqbal, Shamsi T.; Adamczyk, Piotr D.; Zheng, Xianjun S.; Bailey, Brian P. (2004-09)
    To contribute to systems that reason about human attention, our work empirically demonstrates how a user's mental workload changes during task execution. We conducted a study where users performed interactive, hierarchical ...

    application/pdf

    application/pdfPDF (327Kb)
  • Cook, Damon J.; Bailey, Brian P. (2004-10)
    While informal tools can benefit early design, their use requires that a designer give up the richer affordances of physical tools such as paper. To better understand the importance of physical tools for early design, we ...

    application/pdf

    application/pdfPDF (2Mb)
  • Vu, Long; Gupta, Indranil; Nahrstedt, Klara; Liang, Jin (2008-09)
    This paper presents results from our measurement and modeling efforts on the large-scale peer- to-peer (p2p) overlay graphs spanned by the PPLive system, the most popular and largest p2p IPTV (Internet Protocol Television) ...

    application/pdf

    application/pdfPDF (437Kb)
  • Vu, Long; Gupta, Indranil; Nahrstedt, Klara; Liang, Jin (2008-09)
    This paper presents results from our measurement and modeling efforts on the large-scale peer- to-peer (p2p) overlay graphs spanned by the PPLive system, the most popular and largest p2p IPTV (Internet Protocol Television) ...

    application/pdf

    application/pdfPDF (437Kb)
  • Zhang, Honghai (2005-08)
    In this PhD thesis, we study the fundamental limits of the network performance with respect to coverage, connectivity, lifetime, power, energy, and capacity in wireless sensor networks. An interesting finding is that ...

    application/pdf

    application/pdfPDF (1Mb)
  • Huang, Zixia; Arefin, Md Ahsan; Agarwal, Pooja; Nahrstedt, Klara; Wu, Wanmin (2011-12-12)
    Both comparative category rating (CCR) and degradation category rating (DCR) methods have been heavily employed in the subjective evaluations of media systems. The resulting metrics, comparative mean-opinion-score (CMOS) ...

    application/pdf

    application/pdfPDF (815Kb)
  • Li, Man-Lap; Ramachandran, Pradeep; Adve, Sarita V.; Adve, Vikram S.; Zhou, YuanYuan (2007-02)
    With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive ...

    application/pdf

    application/pdfPDF (271Kb)
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1Mb)
  • Lu, Shan (2008-12)
    Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most ...

    application/pdf

    application/pdfPDF (1Mb)
  • Conner, William G.; Hwang, Seung-won; Nahrstedt, Klara (2006-12)
    As more and more data from distributed data sources becomes accessible, supporting queries over peer-to-peer networks of such data sources becomes a more convincing application scenario. In such an application scenario, a ...

    application/pdf

    application/pdfPDF (164Kb)
  • Lakkaraju, Kiran; Gasser, Les (2006-12)
    Multi-Agent Agreement problems (MAP) - the ability of a population of agents to search out and converge on a common state - are central issues in many multi-agent settings, from distributed sensor networks, to meeting ...

    application/pdf

    application/pdfPDF (341Kb)
  • Conner, William G.; Hwang, Seung-won; Nahrstedt, Klara (2007-05)
    Supporting queries over dispersed data stored in large-scale distributed systems, such as peer-to-peer networks, naturally calls for ranked retrieval in order to effectively focus on the most relevant (i.e., top-k) results. ...

    application/pdf

    application/pdfPDF (151Kb)
  • Li, Xin; Roth, Dan (2004-12)
    In this paper, we propose a unified framework for applying supervision to discriminative clustering, which: (1) explicitly formalizes the problem of training a partition function as a supervised metric-learning process; ...

    application/pdf

    application/pdfPDF (174Kb)
  • Roth, Dan; Sammons, Mark (2008-06)
    Traditional approaches to Natural Language Text Processing limit performance and flexibility by committing to canonical reprentations of input text, while many NLP applications for general tasks such as Textual Entailment ...

    application/pdf

    application/pdfPDF (111Kb)