Browse Research and Tech Reports - Computer Science by Title

  • Chen, Shuo (2005-12)
    Security vulnerabilities pose a serious threat to computer systems and network infrastructures. This dissertation addresses the measurement and analysis of security vulnerabilities and their impact, as well as the design ...

    application/pdf

    application/pdfPDF (799kB)
  • Zheng, Rong (2004-05)
    Energy is a primary resource in multi-hop wireless networks with small devices powered by battery. Minimizing energy consumption without affecting communication activities is crucial to prolong the lifetime and improve ...

    application/pdf

    application/pdfPDF (2MB)
  • Bobba, Rakesh; Grov, Jon; Gupta, Indranil; Liu, Si; Meseguer, Jose; Olveczky, Peter C.; Skeirik, Stephen (2017-06-28)
    To deal with large amounts of data while offering high availability, throughput and low latency, cloud computing systems rely on distributed, partitioned, and replicated data stores. Such cloud storage systems ...

    application/pdf

    application/pdfPDF (1MB)
  • Anwar, Zahid; Potter, Shaya; Narayanaswami, Chandra; Yurcik, William; Gunter, Carl A.; Campbell, Roy H. (2008-04)
    Voice over IP (VoIP) is more susceptible to Denial of Service attacks than traditional data traffic, due to the former's low tolerance to delay and jitter. We describe the design of our VoIP Vulnerability Assessment Tool ...

    application/pdf

    application/pdfPDF (622kB)
  • Nguyen, Hoang; Nahrstedt, Klara (2006-07)
    The August 2003 Blackout event showed that the PowerGrid is vulnerable to the cyber attacks. The event also showed the need for automatic detection of abnormal behaviors in the PowerGrid. In this paper, we propose a solution ...

    application/pdf

    application/pdfPDF (1MB)
  • Sen, Koushik; Rosu, Grigore; Agha, Gul A. (2004-12)
    A generalized predictive analysis technique is proposed for detecting violations of safety properties from apparently successful executions of multithreaded programs. Specifically, we provide an algorithm to monitor ...

    application/pdf

    application/pdfPDF (208kB)
  • Jindal, Prateek; Roth, Dan; Gunter, Carl A. (2013-09-24)
    Recent US government initiatives have led to wide adoption of Electronic Health Records (EHRs). More and more health care institutions are storing patients' data in an electronic format. This emerging practice is posing ...

    application/pdf

    application/pdfPDF (158kB)
  • Hartman-Baker, Rebecca Jean (2005-08)
    In geoprospecting, the conductivity of rock is determined from its effect on electromagnetic waves. From the conductivity, we can deduce the type of rock (or oil or water) and the nature of the geological formation. ...

    application/pdf

    application/pdfPDF (1MB)
  • Zhao, Rongkai (2005-04)
    A 3D brain digital atlas is an important tool for neuroscience research. Many different imaging technologies such as MRI, CT, PET, microscopic imaging, and wet section photography, etc., are available. Among the technologies, ...

    application/pdf

    application/pdfPDF (4MB)
  • VanderZee, Evan; Hirani, Anil N.; Zharnitsky, Vadim; Guoy, Damrong (2009-05-22)
    It is shown that there exists a dihedral acute triangulation of the three-dimensional cube. The method of constructing the acute triangulation is described, and symmetries of the triangulation are discussed.

    application/pdf

    application/pdfPDF (318kB)
  • Wang, Xuanhui; Tao, Tao; Sun, Jian-Tao; Zhai, ChengXiang (2005-11)
    Anti-spamming has become one of the most important challenges to web search engines and attracted increasing attention in both industry and academia recently. Since most search engines now use link-based ranking algorithms, ...

    application/pdf

    application/pdfPDF (244kB)
  • Oezer, Tuna (2008-02)
    This research presents a novel method for learning the lexical semantics of action verbs. The primary focus is on actions that are directed towards objects, such as kicking a ball or pushing a chair. Specifically, this ...

    application/pdf

    application/pdfPDF (2MB)
  • AlTurki, Musab; Meseguer, José (2010-04)
    Orc is a theory of orchestration of services that allows structured programming of distributed and timed computations. Several formal semantics have been proposed for Orc, including a rewriting logic semantics developed ...

    application/pdf

    application/pdfPDF (472kB)
  • Kapadia, Apu C.; Naldurg, Prasad G.; Campbell, Roy H. (2006-02)
    This paper presents an access control model that preserves the unlinkability of audit-logs in a distributed environment. The model restricts entities from accessing and correlating two or more audit-records belonging to ...

    application/pdf

    application/pdfPDF (269kB)
  • Lim, Hyuk; Hou, Jennifer C. (2005-08)
    In this paper, we address the issue of localization in anisotropic sensor networks. Anisotropic networks are differentiated from isotropic networks in that they possess properties that vary according to the direction of ...

    application/pdf

    application/pdfPDF (551kB)
  • Zhang, Lynn Y. (2005-05)
    Traditional approaches to real-time schedulability analysis tend to require detailed timing attributes and resource usages of all applications that may run concurrently in the system. Reconfiguring such a system is expensive ...

    application/pdf

    application/pdfPDF (353kB)
  • Yang, Yaling; Wang, Jun; Kravets, Robin (2004-04)
    This paper presents a distributed contention window control control algorithm, GCA (General Contention window Adaptation), that achieves various bandwidth allocation policies and at same time efficient channel utilization. ...

    application/pdf

    application/pdfPDF (391kB)
  • Yang, Yaling; Kravets, Robin (2004-06)
    In this paper, we propose a new cross-layer framework, named QPART ( QoS br>rotocol for Adhoc Realtime Traffic), which provides QoS guarantees to real-time multimedia applications for wireless ad hoc networks. By adapting ...

    application/pdf

    application/pdfPDF (221kB)
  • Yang, Yaling (2006-08)
    Due to the limited bandwidth in wireless networks, careful resource allocation schemes must be used to allocate bandwidth to applications. There are two typical types of applications in wireless networks that require ...

    application/pdf

    application/pdfPDF (1MB)
  • Jindal, Prateek; Hockenmaier, Julia; Kale, Laxmikant V. (2013-12-04)
    Topic modeling algorithms (like Latent Dirichlet Allocation) tend to be very slow when run over large document collections. In this presentation, we discuss distributed strategies for topic modeling. We use Charm++ as our ...

    application/pdf

    application/pdfPDF (310kB)