Technical Reports
Select a year from the drop down menu:
TR-2024-2
Liu, Jiesong;
Guan, Jiawei;
Zhang, Feng;
Shen, Xipeng
UQ-Guided Hyperparameter Optimization
May 7, 2024
TR-2024-1
Wang, Xiangwei;
Hui, Xinning;
Liao, Chunhua;
Shen, Xipeng
A Study of Using LLM to Clear Barriers for Input-Centric Program Optimizations
May 3, 2024
TR-2023-1
Prasad, Sathvik;
Reaves, Bradley
Robocall Audio from the FTC's Project Point of No Entry
November 14, 2023
TR-2021-3
Schatz, K.;
Melo-Filho, C.;
Chirkova, R.;
Tropsha, A.
Explaining Drug Discovery Hypotheses Using Knowledge Graph Patterns
September 7, 2021
TR-2021-2
Daniel, Shen S.;
Chi, Min
TC-DTW: Accelerating Multivariate Dynamic Time Warping Through Triangle Inequality and Point Clustering
January 18, 2021
TR-2021-1
Wright, D.;
Norris, D.;
Tropsha, A.;
Chirkova, R.;
Korn, D. ;
Quinones, J.;
Parrish, S.
The Rare Disease InfoHub Portal: Actionable Knowledge Appropriately Delivered
January 8, 2021
TR-2020-4
Hou, P.-Y.;
Chirkova, R.;
Wright, D,
Noise Removal with Regular Expressions in Knowledge Graphs
August 28, 2020
TR-2020-3
Ao, J.;
Cheng, Z.;
Chirkova, R.;
Kolaitis, P.
Temporal Enrichment and Querying of Ontology-Compliant Data
May 27, 2020
TR-2020-2
Zhao, Yue;
Shen, Xipeng;
Liao, Chunhua
OpenK: An Open Infrastructure for the Accumulation, Sharing and Reuse
of High Performance Computing Knowledge
May 2, 2020
TR-2020-1
Zhang, Guoqiang;
Shen, Xipeng
Best-Effort Lazy Evaluation for Python Software Built On APIs
April 4, 2020
TR-2019-9
Fisk, Susan;
Stolee, Kathryn T.;
Battestilli, Lina
A Lightweight Intervention to Decrease Gender Bias in Student Evaluations of Teaching (Full Version)
December 9, 2019
TR-2019-8
Elder, Sarah;
Williams, Laurie
A Systematic Analysis of Debated Vulnerabilities in
the National Vulnerability Database
November 19, 2019
TR-2019-7
Hou, P;
Ao, J;
Chirkova, R
Building a Data-Analytics Workflow for Antimicrobial-Resistance Studies: An Experience Report
September 17, 2019
TR-2019-6
Ao, J.;
Chirkova, R.
Temporal Rules and Queries in the Antimicrobial-Resistance Domain: Collection of Examples
September 17, 2019
TR-2019-5
Xia, Tianpei;
Chen, Jianfeng ;
Shu, Rui ;
Menzies, Tim
Sequential Model Optimization for Software Process Control
August 26, 2019
TR-2019-4
Agrawal, Amritanshu;
Menzies, Tim
Is AI different for SE?
August 26, 2019
TR-2019-3
Chen, Jianfeng;
Menzies, Tim
On the Value of Backdoors for Software Engineering: a Case Study with Test Suite Generation
August 26, 2019
TR-2019-2
Rahman, Akond;
Elder, Sarah;
Shezan, Faysal H.;
Frost, Vanessa;
Stallings, Jonathan;
Williams, Laurie
Categorizing Defects in Infrastructure as Code
May 21, 2019
TR-2019-1
Pan, Xing;
Mueller, Frank
The Colored Refresh Server for DRAM
March 27, 2019
TR-2018-4
Ghatpande, Rushikesh
HPCC Benchmarking
May 29, 2018
TR-2018-3
Guan, Hui;
Ning, Lin;
Shen, Xipeng;
Lim, Seung-Hwan;
Menzies, Tim
Generalization of Teacher-Student Network and CNN Pruning
October 28, 2018
TR-2018-2
Lin, Ning;
Shen, Xipeng
Similarities in Neuron Vectors and The Implications to CNN Inferences
October 15, 2018
TR-2018-1
Naresh, Lakshman C.A.;
Shen, Xipeng;
Starly, Binil
A Just-In-Time Compiler for Intelligent Manufacturing
July 17, 2018
TR-2017-5
Oudjit, Aissa;
Stallmann, Matthias F.
Efficient Algorithms for Finding 2-Medians of a Tree
December 5, 2017
TR-2017-4
Zhang, Feng;
Zhai, Jidong;
Shen, Xipeng;
Mutlu, Onur;
Potential of A Method for Text Analytics Directly on Compressed Data
November 13, 2017
TR-2017-3
Awasthi, A. and Battestilli, L.
Two-Stage Programming Projects: Individual Work Followed by Peer Collaboration
August 2, 2017
TR-2017-2
Hsu, Chin-Jung;
Freeh, Vincent W.;
Villanustre, Flavio
Workload-Aware Data Placement for Cloud Computing
June 5, 2017
TR-2017-1
N/A
N/A
May 1, 2017
TR-2016-10
Fogues, Ricard L.;
Murukannaiah, Pradeep K.;
Such, Jose M.;
Singh, Munindar P.
Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making
November 27, 2016
TR-2016-9
Hsu, Chin-Jung;
Panta, Rajesh K.;
Ra, Moo-Ryong;
Freeh, Vincent W.
Inside-Out: Reliable Performance Prediction for Distributed Storage Systems in the Cloud
October 25, 2016
TR-2016-8
Matthias Stallmann;
Jason Cockrell;
Tynan Devries;
Weijia Li;
Alexander McCabe;
Yuang Ni;
Michael Owoc;
Kai Pressler-Marshall;
Galant: A Graph Algorithm Animation Tool
August 10, 2016
TR-2016-7
Fiala, David;
Mueller, Frank;
Ferreira, Kurt B.
FlipSphere: A Software-based DRAM Error Detection and Correction Library for HPC
July 9, 2016
TR-2016-6
Matthias F, Stallmann
Edge Offset in Drawings of Layered Graphs With Evenly-Spaced Nodes on Each Layer
June 12, 2016
TR-2016-5
Zhao, Yue;
Liao, Chunhua;
Shen, Xipeng
Towards Ontology-Based Program Analysis
April 28, 2016
TR-2016-4
Stallmann, Matthias F
A Gentle Introduction to Matroid Algorithmics
April 14, 2016
TR-2016-3
Ning, Lin;
Shen, Xipeng
LCD: A Fast Contrastive Divergence Based Training Algorithm for Restricted Boltzmann Machine
April 8, 2016
TR-2016-2
Gholkar, Neha;
Mueller, Frank;
Rountree, Barry
Power Tuning for HPC Jobs under Manufacturing Variations
February 5, 2016
TR-2016-1
Chen, Guoyang;
Shen, Xipeng;
Zhou, Huiyang
A Software Framework for Efficient Preemptive Scheduling on GPU
January 19, 2016
TR-2015-10
Theisen, Christopher;
Krishna, Rahul;
Williams, Laurie
Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces
November 3, 2015
TR-2015-9
Elliotta, James;
Hoemmen, Mark;
Mueller, Frank
Model Driven Analysis of Faulty IEEE-754 Scalars
November 2, 2015
TR-2015-8
Alborzi, Farid;
Chaudhuri, Surajit;
Chirkova, Rada;
Deo, Pallavi;
Healey, Christopher;
Pingale, Gargi;
Reutter, Juan;
Selvakani, Vaira
DataSlicer: Enabling Data Selection for Visual Data Exploration
October 16, 2015
TR-2015-7
Murphy-Hill, Emerson;
Lee, Da Young ;
Murphy, Gail C.;
McGrenere, Joanna
Appendix to How Do Users Discover New Tools in Software Development and Beyond?
June 1, 2015
TR-2015-6
Alborzi, F;
Chirkova, R;
Doyle, J;
Fathi, Y
Determining Query Readiness for Structured Data
March 26, 2015
TR-2015-5
Kc, Kamal;
Freeh, Vincent W.
Dynamically controlling node-level parallelism in Hadoop
February 21, 2015
TR-2015-4
Kc, Kamal;
Hsu, Chin-Jung;
Freeh, Vincent W.
Evaluation of MapReduce in a large cluster
February 21, 2015
TR-2015-3
Ding, Yufei;
Shen, Xipeng;
Musuvathi, Madanlal;
Mytkowicz, Todd
TOP: A Framework for Enabling Algorithmic Optimizations for Distance-Related Problems
January 10, 2015
TR-2015-2
Ding, Yufei;
Shen, Xipeng;
Musuvathi, Madanlal;
Mytkowicz, Todd
Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup
January 10, 2015
TR-2015-1
Heckman, Sarah;
Al-Zubidy, Ahmed;
Carver, Jeffrey C.;
Sherriff, Mark
A (Updated) Review of Empiricism at the SIGCSE Technical Symposium
January 5, 2015
TR-2014-14
Morrison, Patrick;
Moye, David;
Williams, Laurie
Mapping the Field of Software Security Metrics
October 23, 2014
TR-2014-13
Kc, Kamal;
Freeh, Vincent W.
Dynamic performance tuning of Hadoop
September 23, 2014
TR-2014-12
Poosamani, Nithyananthan ;
Rhee, Injong
A Practical and Energy-efficient System to Discover Wi-Fi Hotspots Using Cellular Signals
September 12, 2014
TR-2014-11
Chen, L;
Yu, T;
Chirkova, R
WaveCluster with Differential Privacy
September 10, 2014
TR-2014-10
Nadkarni, A.;
Sheth, A.;
Weinsberg, U.;
Taft, N.;
Enck, W.
GraphAudit: Privacy Auditing for Massive Graph Mining
August 4, 2014
TR-2014-9
Telang, Pankaj R.;
Singh, Munindar P.;
Yorke-Smith, Neil
Maintenance Commitments and Goals
July 22, 2014
TR-2014-8
Shekhar, Mayank;
Ramaprasad, Harini;
Mueller, Frank
Semi-Partitioned Scheduling for Resource-Sharing Hard-Real-Time Tasks
July 1, 2014
TR-2014-7
Rezaei, Arash ;
Mueller, Frank
DINO: Divergent Node Cloning for Sustained Redundancy in HPC
June 24, 2014
TR-2014-6
Matthias Stallmann;
Jason Cockrell;
Tynan Devries;
Alexander McCabe;
Michael Owoc
Galant: A Graph Algorithm Animation Tool
June 13, 2014
TR-2014-5
Adam Marrs, Benjamin Watson, Chris Healey
Fast Multi-View Soft Shadowing via Fragment Reprojection
May 13, 2014
TR-2014-4
St. Amant, Robert
The Use of Tools
May 24, 2001
TR-2014-3
Loftin, Robert;
MacGlashan, James;
Littman, Michael L.;
Taylor, Matthew E.;
Roberts, David L.
A Strategy-Aware Technique for Learning Behaviors from Discrete Human Feedback
February 25, 2014
TR-2014-2
Murukannaiah, Pradeep K.;
Singh, Munindar P.
Platys: An Active Learning Framework for Place-Aware Application Development and Its Evaluation
September 28, 2014
TR-2014-1
Hsu, Chin-Jung;
Freeh, Vincent W.
Flow Scheduling: An Ef?cient Scheduling Method for MapReduce Framework in the Decoupled Architecture
January 17, 2014
TR-2013-11
Balik, S.;
Mealin, S.;
Stallmann, M.;
Rodman, R.;
Glatz, M.;
Sigler, V.
Including Blind Students in Computer Science Through Access to Graphs
November 20, 2013
TR-2013-10
KC, Kamal;
Freeh, Vincent W
Tuning Hadoop map slot value using CPU and IO metrics
November 6, 2013
TR-2013-9
Slankas, John;
Riaz, Maria;
King, Jason;
Williams, Laurie
Discovering Security Requirements from Natural Language Project Artifacts
October 15, 2013
TR-2013-8
Chirkova, R.;
Yu, T.
Obtaining Information about Queries behind Views and Dependencies
September 30, 2013
TR-2013-7
Balachander, D.;
Chirkova, R.;
Salo, T.
The Problem of Coherence of a Distributed Hash Table
June 19, 2013
TR-2013-6
Bae, JuHee;
Setlur, Vidya;
Watson, Benjamin
GraphTiles: Visualizing Graphs on Mobile Devices
April 23, 2013
TR-2013-5
Christensen, Johanne;
Cusick, Mark;
Villanes, Andrea;
Veryovka, Oleg;
Watson, Ben;
Rappa, Michael
Win, Lose or Cheat: The Analytics of Player Behaviors in Online Games
April 22, 2013
TR-2013-4
Clay, Benjamin;
Shen, Zhiming;
Ma, Xiaosong
Building and Scaling Virtual Clusters with Residual Resources from Interactive Clouds
April 17, 2013
TR-2013-3
Li, Sihan;
Xie, Tao;
Tillmann, Nikolai
A Comprehensive Field Study of End-User Programming on Mobile Devices
March 20, 2013
TR-2013-2
Elliott, James;
Mueller, Frank;
Stoyanov, Miroslav;
Webster, Clayton
Quantifying the Impact of Single Bit Flips on Floating Point Arithmetic
March 12, 2013
TR-2013-1
Chirkova, R.;
Yu, T.
Detecting information leakage in database access control with help from data exchange
February 19, 2013
TR-2012-16
Halladay, J.;
Williams, Laurie;
Voud, Mladen
On the Affordable Use, Administration, and Maintenance of Open Source Health Care IT Applications by Rural/Small-Practice Health Professionals
December 28, 2012
TR-2012-15
Chirkova, R.
Combined-Semantics Equivalence Is Decidable for a Practical Class of Conjunctive Queries
December 19, 2012
TR-2012-14
Slankas, John;
Williams, Laurie
Extracting Database Role Based Access Control from Unconstrained Natural Language Text
November 2, 2012
TR-2012-13
Morrison, Patrick;
Holmgreen, Casper;
Massey, Aaron;
Williams, Laurie
Building Regulatory-Driven Automated Test Suites
October 22, 2012
TR-2012-12
Tsung-Hsuan Ho, Daniel J. Dean, Xiaohui Gu, William Enck
Less is More: Selective Behavior Learning for Efficient Android Root Exploit Detection
September 21, 2012
TR-2012-11
Chung, Seungeun;
Lee, Kyunghan;
Wang, Shuiqing;
Rhee, Injong
CloudBridge: A Cloud-Powered System Enabling Mobile Devices to Control Peripherals Without Drivers
July 24, 2012
TR-2012-10
Yoon, Sungro;
Jung, Bang Chul;
Lee, Kyunghan ;
Rhee, Injong
ADOPT: Practical Add-On MIMO Receiver for Concurrent Transmissions
July 24, 2012
TR-2012-9
Riaz, Maria;
Breaux, Travis;
Williams, Laurie
On the Design of Empirical Studies to Evaluate Software Patterns: A Survey Study
June 14, 2012
TR-2012-8
Clay, Benjamin;
Shen, Zhiming;
Ma, Xiaosong;
Gu, Xiaohui
Adaptive Cluster Sizing for Residual Resource Harvesting in Interactive Clouds
May 25, 2012
TR-2012-7
Carter, M.;
Fornaro, R.;
Heckman, S.;
Heil, M.
Developing a Learning Progression that Integrates Communication in an Undergraduate CS/SE Curriculum
May 25, 2012
TR-2012-6
Jiang, Haiqing;
Wang, Yaogong;
Lee, Kyunghan;
Rhee, Injong
Tackling Bufferbloat in 3G/4G Mobile Networks
March 9, 2012
TR-2012-5
Fiala, David;
Mueller, Frank;
Engelmann, Christian;
Ferreira, Kurt;
Brightwell, Ron;
Riesen, Rolf;
Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing
May 1, 2012
TR-2012-4
Balik, Suzanne P.;
Mealin, Sean P.;
Stallmann, Matthias F.;
Rodman, Robert D.
GSK: Universally Accessible Graph SKetching
April 26, 2012
TR-2012-3
Jiang, Haiqing;
Wang, Yaogong;
Lee, Kyunghan;
Rhee, Injong
Improving TCP Performance in Buffer-bloated Cellular Networks via Dynamic Receive Window Adjustment
January 20, 2012
TR-2012-2
Huang, R. ;
Chirkova, R.;
Fathi, Y.
Deterministic View Selection For Data-Analysis Queries: Properties and Algorithms
April 3, 2012
TR-2012-1
Bahram, Sina
Touch It, Key It, Speak It for Maps
December 1, 2011
TR-2011-22
Huang, R.;
Chirkova, R.;
Fathi, Y.
Two-stage stochastic view selection for data analysis
December 1, 2011
TR-2011-21
Yavua, A.;
Ning, P.;
Reiter, M.
Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging
September 12, 2011
TR-2011-20
Pensyl, T. ;
Huang, R.
Generation of Non-Symmetric Synthetic Datasets
August 12, 2011
TR-2011-19
Miller, Sam A.;
Smith, Andy;
St. Amant, Robert
A glove for rubbing and touch gestures
July 12, 2011
TR-2011-18
Liu, Y.;
Ning, P.
BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks
July 11, 2011
TR-2011-17
Liu, Y.;
Ning, P.
Mimicry Attacks against Wireless Link Signature and Defense using Time-Synched Link Signature
July 11, 2011
TR-2011-16
Tran M.;
Etheridge M. ;
Bletsch T.;
Jiang X.;
Freeh V.;
Ning P.
On the Expressiveness of Return-into-libc Attacks
June 21, 2011
TR-2011-15
Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
Detecting Capability Leaks in Android-based Smartphones
June 21, 2011
TR-2011-14
Kharbas, Kishor;
Kim, Donghoon;
KC, Kamal;
Hoefler, Torsten;
Mueller, Frank
Failure Detection within MPI Jobs: Periodic Outperforms Sporadic
June 15, 2011
TR-2011-13
Zimmer, Christopher;
Mueller, Frank
A Fault Observant Real-Time Embedded Design for Network-on-Chip Control Systems
June 15, 2011
TR-2011-12
Zhang, Linghao;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Jonathan;
Ma, Xiaoxing;
lv, Jian
Automated Testing of Cloud Applications
June 1, 2011
TR-2011-11
Sarkar, Abhik ;
Mueller, Frank;
Ramaprasad, Harini
Static Task Partitioning for Locked Caches in Multi-Core Real-Time Systems
April 23, 2011
TR-2011-10
Huang, R.;
Chirkova, R.;
Fathi, Y.
Synthetic datasets
April 7, 2011
TR-2011-9
Meneely, Andrew;
Rotella, Pete;
Williams, Laurie
Does Adding Manpower Also Affect Quality? An Empirical, Longitudinal Analysis
April 3, 2011
TR-2011-8
Huang, R.;
Chirkova, R. ;
Fathi, Y.
A Two-stage Stochastic View Selection Problem in Database Management Systems
March 19, 2011
TR-2011-7
Xiao, X;
Paradkar, A;
Xie, T
Automated Extraction and Validation of Security Policies from Natural-Language Documents
March 15, 2011
TR-2011-6
Wu, Xing;
Vijayakumar, Karthik;
Mueller, Frank;
Ma, Xiaosong;
Roth, Philip
Probabilistic Communication and I/O Tracing with Deterministic Replay at Scale
March 15, 2011
TR-2011-5
Smith, Ben;
Williams, Laurie
On the Development of A Black Box Security Test Pattern Catalog Based on Empirical Data
March 7, 2011
TR-2011-4
Maxwell, Jeremy C.;
Anton, Annie I.;
Swire, Peter
A Legal Cross-References Taxonomy for Identifying Conflicting Software Requirements
February 23, 2011
TR-2011-3
Boloor, K;
Chirkova, R;
Viniotis, Y
Management of SOA based context-aware applications hosted in a distributed cloud subject to percentile constraints
February 22, 2011
TR-2011-2
Singh, Munindar P.
LoST: Local State Transfer---An Architectural Style for the Distributed Enactment of Business Protocols
February 21, 2011
TR-2011-1
Balik, Suzanne P
Combinatorial Graph Creation and Navigation for Blind People
February 4, 2011
TR-2010-25
Srinivasan, D. ;
Jiang, X.
Time-traveling Analysis of VM-based High-interaction Honeypots
October 15, 2010
TR-2010-24
Chirkova, R.
Equivalence and Minimization of Conjunctive Queries under Combined Semantics
December 7, 2010
TR-2010-23
Horton, Thomas E.;
St. Amant, Robert;
Daughtry, John M.;
Butler, Colin G.
Tool-based direct manipulation environments
November 1, 2010
TR-2010-22
Massey, Aaron;
Anton, Annie I.
Triage for Legal Requirements
October 11, 2010
TR-2010-21
Thummalapenta, Suresh;
Xie, Tao
Alattin: Mining Alternative Patterns for Defect Detection
September 23, 2010
TR-2010-20
Doyle, Jon
Toward a quantitative theory of belief change: Structure, difficulty, and likelihood (A progress report)
September 7, 2010
TR-2010-19
Murphy-Hill, Emerson;
Murphy, Gail C
Peer Interaction Effectively, yet Infrequently, Enables Programmers to Discover New Tools
September 6, 2010
TR-2010-18
Gerard, Scott N.;
Singh, Munindar P.
Formalizing and Verifying Protocol Refinement
August 27, 2010
TR-2010-17
Heckman, Sarah;
Williams, Laurie
A Systematic Literature Review of Actionable Alert Identification Techniques for Automated Static Code Analysis
July 23, 2010
TR-2010-16
Chirkova, R.;
Libkin, L.;
Reutter, J.
Tractable XML Data Exchange via Relations
July 19, 2010
TR-2010-15
Smith, Ben;
Austin, Andrew;
Brown, Matt ;
King, Jason;
Lankford,Jerrod;
Meneely, Andrew ;
Williams, Laurie
Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected
June 30, 2010
TR-2010-14
Stallmann, Matthias;
Brglez, Franc
High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
June 24, 2010
TR-2010-13
Stallmann, Matthias F.;
Gupta, Saurabh
Bottleneck Crossing Minimization in Layered Graphs
June 24, 2010
TR-2010-12
Telang, Pankaj R.;
Singh, Munindar P.
Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach
May 30, 2010
TR-2010-11
Singh, Munindar P.;
Farcas, Emilia;
Tadanki, Kartik;
Krueger, Ingolf;
Arrott, Matthew;
Meisinger, Michael
Governance in Sociotechnical Systems
April 30, 2010
TR-2010-10
Zhang, Lingming;
Xie, Tao;
Zhang, Lu;
Tillmann, Nikolai;
de Halleux, Jonathan;
Mei, Hong
Test Generation via Dynamic Symbolic Execution for Mutation Testing
May 14, 2010
TR-2010-9
Marri, Madhuri;
Thummalapenta, Suresh;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Jonathan
Retrofitting Unit Tests for Parameterized Unit Testing
May 14, 2010
TR-2010-8
Bletsch, T;
Jiang, X;
Freeh, V
Jump-Oriented Programming: A New Class of Code-Reuse Attack
April 16, 2010
TR-2010-7
Xiao, Xusheng;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Peli
Issue Analysis for Residual Structural Coverage in Dynamic Symbolic Execution
March 23, 2010
TR-2010-6
Shin, Yonghee;
Williams, Laurie
Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction?
March 7, 2010
TR-2010-5
Boloor, K;
Viniotis, Y;
Chirkova, R;
Salo, T
Online request scheduling subject to a percentile response time SLA in a distributed cloud computing system
March 4, 2010
TR-2010-4
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, and Dongyan Xu
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
February 28, 2010
TR-2010-3
Maxwell, Jeremy C.;
Anton, Annie I.
A Refined Production Rule Model for Aiding in Regulatory Compliance
February 5, 2010
TR-2010-2
Meneely, Andrew;
Smith, Ben;
Williams, Laurie
Software Metrics Validation Criteria: A Systematic Literature Review
February 2, 2010
TR-2010-1
Austin, Andrew;
Smith, Ben;
Williams, Laurie
Towards Improved Security Criteria for Certification of Electronic Health Record Systems
January 24, 2010
TR-2009-23
Hyun, Sangwon;
Ning, Peng;
Liu, An;
IR-Seluge: Interference-Resilient Code Dissemination in Wireless Sensor Networks
December 18, 2009
TR-2009-22
Wang, Yonghong;
Singh, Munindar P.;
Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems
December 10, 2009
TR-2009-21
Singh, Munindar P.
Formalizing Trust as an Architectural Abstraction
December 9, 2009
TR-2009-20
Chopra, Amit K. ;
Singh, Munindar P.;
Commitment Alignment as a Basis for Interoperability in Service Engagements
December 9, 2009
TR-2009-19
Hazard, Christopher J.;
Singh, Munindar P.;
Reputation Dynamics and Convergence: A Basis for Evaluating Reputation Systems
November 23, 2009
TR-2009-18
Hang, Chung-Wei;
Singh, Munindar P.
Trustworthy Service Selection and Composition
July 15, 2009
TR-2009-17
Gegick, Michael;
Rotella, Pete;
Xie, Tao
Identifying Security Fault Reports via Text Mining
September 2, 2009
TR-2009-16
Anton, Annie I.;
Earp, Julia B.;
Young, Jessica D.
How Internet Users’ Privacy Concerns Have Evolved Since 2002
July 29, 2009
TR-2009-15
Wang, Chao;
Mueller, Frank;
Engelmann, Christian;
Scott, Stephen L.
Proactive Process-Level Live Migration and Back Migration in HPC Environments
June 5, 2009
TR-2009-14
Wang, Chao;
Mueller,Frank ;
Engelmann, Christian;
Scott, Stephen L.;
Hybrid Full/Incremental Checkpoint/Restart for MPI Jobs in HPC Environments
June 2, 2009
TR-2009-13
Amit Awekar, ;
Nagiza F. Samatova,;
Paul Breimyer
Incremental All Pairs Similarity Search for Varying Similarity Thresholds
May 26, 2009
TR-2009-12
Amit Awekar;
Nagiza F. Samatova
Fast Matching for All Pairs Similarity Search
May 26, 2009
TR-2009-11
Chirkova, R.;
Fletcher, George H.L.
Towards Well-Behaved Schema Evolution
April 28, 2009
TR-2009-10
Shin, Yonghee;
Meneely, Andrew;
Williams, L.
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
April 19, 2009
TR-2009-9
Jadeep Marathe;
Vivek Thakkar;
Frank Mueller
Feedback-Directed Page Placement for ccNUMA via Hardware-generated Memory Traces
March 10, 2009
TR-2009-8
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
Systematic Exploration of Efficient Query Plans for Automated Database Restructuring
March 4, 2009
TR-2009-7
Afrati, F.;
Chandrachud, M.;
Chirkova, R.;
Mitra, P.
Approximate Rewriting of Queries Using Views
March 4, 2009
TR-2009-6
Xie, Tao
Improving Automation in Developer Testing: State of the Practice
February 20, 2009
TR-2009-5
Liu, Y;
Ning, P;
Reiter, M
False Data Injection Attacks against State Estimation in Electronic Power Grids
February 16, 2009
TR-2009-4
Maxwell, Jeremey C;
Anton, Annie I
Validating Existing Requirements for Compliance with Law Using a Production Rule Model
February 12, 2009
TR-2009-3
Michael Gegick;
Tao Xie;
Laurie Williams;
Pete Rotella
Which Faults are Security Faults?
February 2, 2009
TR-2009-2
Shin, Kyuyong;
Reeves, Douglas S.;
Rhee, Injong;
Song, Yoonki
Winnowing: Protecting P2P Systems Against Pollution By Cooperative Index Filtering
January 29, 2009
TR-2009-1
Gegick, Michael;
Rotella, Pete;
Williams, Laurie
Predicting Attack-prone Components
January 23, 2009
TR-2008-29
Hang, Chung-Wei;
Wang, Yonghong;
Singh, Munindar P.
Operators for Propagating Trust and their Evaluation in Social Networks
December 13, 2008
TR-2008-28
Meneely, Andrew;
Williams, Laurie
Evaluating a Suite of Developer Activity Metrics as Measures of Security Vulnerabilities
December 11, 2008
TR-2008-27
Chirkova, R.;
Genesereth, M.
Equivalence of SQL Queries In Presence of Embedded Dependencies
December 11, 2008
TR-2008-26
Wang, Zhi;
Jiang, Xuxian;
Cui, Weidong;
Wang, Xinyuan;
ReFormat: Automatic Reverse Engineering of Encrypted Messages
December 10, 2008
TR-2008-25
Maxwell, Jeremy C.;
Anton, Annie I.
Using Production Rules to Aid Security Requirements Acquisition from Legal Texts
November 29, 2008
TR-2008-24
Young, Jessica D.;
Anton, Annie I.
Analyzing Policy Commitments for Privacy and Security Requirements
November 12, 2008
TR-2008-23
Heckman, Sarah;
Williams, Laurie
A Measurement Framework of Alert Characteristics for False Positive Mitigation Models
October 28, 2008
TR-2008-22
Smith, Ben;
Williams, Laurie
A Survey on Code Coverage as a Stopping Criterion for Unit Testing
September 28, 2008
TR-2008-21
Williams, Laurie;
Gegick, Michael;
Meneely, Andrew
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
September 25, 2008
TR-2008-20
Prasanth Anbalagan;
Mladen Vouk
Reliability and Security Analysis of Open Source Software
September 19, 2008
TR-2008-19
Chen, D.;
Chirkova, R.;
Sadri, F.;
Salo, T.
Efficient Query Processing in XML-Based Information Integration
July 31, 2008
TR-2008-18
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
Plan-based View and Index Selection for Query-Performance Improvement
July 31, 2008
TR-2008-17
Watson, Benjamin;
Brink, David;
Stallmann, Matthias;
Devajaran, Ravinder;
Rakow, Matt,;
Rhyne, Theresa-Marie;
Patel, Himesh
Matrix depictions for large layered graphs
July 16, 2008
TR-2008-16
Injong Rhee;
Minsu Shin;
Seongik Hong;
Kyunghan Lee;
Song Chong
On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
May 23, 2008
TR-2008-15
Kyunghan Lee;
Seongik Hong;
Seong Joon Kim;
Injong Rhee;
Song Chong;
Demystifying Levy Walk Patterns in Human Walks
May 23, 2008
TR-2008-14
Ajiw Warrier;
Injong Rhee
DiffQ: Differential Backlog Congestion Control for Wireless Multi-Hop Networks
May 23, 2008
TR-2008-13
Mohan, Sibin;
Mueller, Frank
Preserving Timing Anomalies in Pipelines of High-End Processors
May 19, 2008
TR-2008-11
Heckman, Sarah Smith;
Williams, Laurie
On Establishing a Benchmark for Evaluating Static Analysis Alert Prioritization and Classification Techniques
April 24, 2008
TR-2006-36
Bonto-Kane, Marivic A.
Engineering Models of Human Performance on the Design of Mobile Device Interfaces
November 29, 2006
TR-2008-10
Watson, B.;
Brink, D.;
Stallman, M.;
Devajaran, D.;
Rhyne, T.-M.;
Patel, H.
Visualizing very large layered graphs with quilts
April 8, 2008
TR-2008-9
Smith, Ben;
Williams, Laurie
On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis
February 28, 2008
TR-2008-8
Michael Gegick;
Laurie Williams;
Jason Osborne
Predicting Attack-prone Components with Internal Metrics
February 25, 2008
TR-2008-7
Gegick, Michael;
Williams, Laurie;
Vouk, Mladen
Predictive Models for Identifying Software Components Prone to Failure During Security Attacks
February 25, 2008
TR-2008-6
Travis Breaux, Jonathan Lewis, Paul Otto, Annie I. Anton
Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings
February 12, 2008
TR-2008-5
Breaux, Travis D.;
Anton, Annie I.;
Boucher, Kent;
Dorfman, Merlin
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
February 11, 2008
TR-2008-4
Shin, Yonghee;
Williams, Laurie
Towards a Taxonomy of Techniques to Detect Cross-Site Scripting and SQL Injection Vulnerabilities
February 2, 2008
TR-2008-3
Udupi, Yathiraj B.;
Singh, Munindar P.
Design Patterns for Policy-Based Service Engagements
January 20, 2008
TR-2008-2
Desai, Nirmit;
Chopra, Amit K. ;
Singh, Munindar P.
Amoeba: A Methodology for Modeling and Evolution of Cross-Organizational Business Processes
May 4, 2008
TR-2008-1
Hu, Vincent C.;
Kuhn, D. Richard;
Xie, Tao;
Property Verification for Access Control Models via Model Checking
January 4, 2008
TR-2007-36
Liu, An;
Ning, Peng
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
November 2, 2007
TR-2007-35
Acharya, Mithun;
Xie, Tao
Static Detection of API Error-Handling Bugs via Mining Source Code
October 15, 2007
TR-2007-34
Thummalapenta, Suresh;
Xie, Tao
SpotWeb: Characterizing Framework API Usages Through a Code Search Engine
October 15, 2007
TR-2007-33
Lechner, Tom;
Watson, Benjamin;
Wilensky, Uri;
Tisue, Seth;
Felsen, Martin;
Moddrell, Andy;
Ren, Pin;
Brozefsky, Craig
Procedural Modeling of Urban Land Use
October 4, 2007
TR-2007-32
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
View and Index Selection for Query-Performance Improvement: Algorithms, Heuristics and Complexity
October 2, 2007
TR-2007-31
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
Exact and Inexact Methods for Selecting Views and Indexes for OLAP Performance Improvement.
October 2, 2007
TR-2007-30
Chirkova, R.;
Chen, D.;
Sadri, F.;
Salo, T.J.
Pay-As-You-Go Information Integration: The Semantic Model Approach
October 2, 2007
TR-2007-29
Warrier, A;
Rhee, I
Rethinking Wireless MAC Architecture for Quality of Service Support – Design and Implementation
September 21, 2007
TR-2007-28
Rhee, I;
Shin, M;
Hong, S;
Lee, K;
Chong, S
On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
September 21, 2007
TR-2007-27
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
Exact and Inexact Methods for Solving the Problem Of View Selection for Aggregate Queries
September 20, 2007
TR-2007-26
Breaux,Travis D.;
Antón, Annie I.
Managing Ambiguity and Traceability in Regulatory Requirements: A Tool-supported Frame-based Approach
September 14, 2007
TR-2007-25
Martin, E;
Xie, T;
Hu, V
Assessing Quality of Policy Properties in Verification of Access Control Policies
September 16, 2007
TR-2007-24
Thummalapenta, S;
Xie, T
NEGWeb: Static Defect Detection via Searching Billions of Lines of Open Source Code
September 16, 2007
TR-2007-23
Lin, Heshan;
Ma, Xiaosong;
Li, Jiangtian;
Samatova, Nagiza;
Yu, Ting
Processor and Data Scheduling for Online Parallel Sequence Database Servers
August 20, 2007
TR-2007-22
Ramaprasad, Harini;
Mueller, Frank
Bounding Worst-Case Response Time for Tasks With Non-Preemptive Regions
August 8, 2007
TR-2007-21
Hyun, Sangwon;
Ning, Peng;
Liu, An;
Du, Wenliang;
;
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
August 5, 2007
TR-2007-20
Williams, Laurie
Lessons Learned from Seven Years of Pair Programming at North Carolina State University
August 3, 2007
TR-2007-19
Singh, Munindar P.;
Chopra, Amit K.;
Desai, Nirmit
Commitment-Based SOA
July 18, 2007
TR-2007-18
Zheng, Jiang;
Williams, Laurie;
Robinson, Brian
Pallino: Automation to Support Regression Test Selection for COTS-based Applications
June 26, 2007
TR-2007-17
Park, Young Hee;
Reeves, Douglas S.
Adaptive TIming-Based Active Watermarking for Attack Attribution Through Stepping Stones
June 26, 2007
TR-2007-16
St. Amant, Robert;
Horton, Thomas E.
Revisiting the Definition of Animal Tool Use
June 1, 2007
TR-2007-15
Wang, C;
Liu, A;
Ning, P
Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks
June 4, 2007
TR-2007-14
Stallmann, Matthias F;
Brglez, Franc
High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
May 3, 2007
TR-2007-13
Sherriff, Mark;
Lake, Michael;
Williams, Laurie
Empirical Software Change Impact Analysis using Singular Value Decomposition
April 29, 2007
TR-2007-12
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
A study of a formal model for view selection for aggregate queries
March 27, 2007
TR-2007-11
Desai, Nirmit;
Chopra, Amit K.;
Arrott, Matthew;
Specht, Bill;
Singh, Munindar P.
Engineering Foreign Exchange Processes via Commitment Protocols
March 1, 2007
TR-2007-10
M. Latif and R. Ramaseshan and F. Mueller
Soft Error Protection via Fault-Resilient Data Representations
March 12, 2007
TR-2007-9
Breaux,Travis D. ;
Anton, Annie I.;
Analyzing Regulatory Rules for Privacy and Security Requirements
February 23, 2007
TR-2007-8
Martin, Evan;
Xie, Tao
Automated Test Generation for Access Control Policies via Change-Impact Analysis
February 19, 2007
TR-2007-7
Otto, Paul N. ;
Antón, Annie I. ;
The Role of Law in Requirements Engineering
February 12, 2007
TR-2007-6
Breaux, Travis D.;
Anton, Annie I.;
Impalpable Constraints: Framing Requirements for Formal Methods
February 12, 2007
TR-2007-5
Min Yeol Lim;
Vincent W. Freeh
Determining the Minimum Energy Consumption using Dynamic Voltage and Frequency Scaling
January 23, 2007
TR-2007-4
Vincent W. Freeh;
Tyler K. Bletsch;
Freeman L. Rawson, III
Scaling and Packing on a Chip Multiprocessor
January 22, 2007
TR-2007-3
Li, Jiangtian;
Ma, Xiaosong;
Yoginath, Srikanth;
Kora, Guruprasad;
Samatova, Nagiza
Automatic, Transparent Runtime Parallelization of the R Scripting Language
January 19, 2007
TR-2007-2
Layman, Lucas Layman;
Williams, Laurie;
St. Amant, Robert
Toward Reducing Fault Fix Time: Understanding Developer Behavior for the Design of Automated Fault Detection Tools, the Full Report
January 15, 2007
TR-2007-1
Nagarajan, Arun ;
Mueller, Frank
Proactive Fault Tolerance for HPC with Xen Virtualization
January 4, 2007
TR-2006-34
Nachiappan Nagappan;
Laurie Williams;
Mladen Vouk;
Jason Osborne
Using In-Process Testing Metrics to Estimate Post-Release Field Quality of Java Programs
December 29, 2006
TR-2006-33
Mu, Wei
Towards a Computational Model of Image Schema Theory
November 29, 2006
TR-2006-32
Williams, Lloyd
Survey of Tool Use and Analysis of its Implications for the Design of Robotic Tool Users
November 29, 2006
TR-2006-31
Horton, Thomas E
Behavior-based approaches to vision in habile robotics
November 29, 2006
TR-2006-30
Ho, Chih wei;
Williams, Laurie
Deriving Performance Requirements and Test Cases with the Performance Refinement and Evolution Model
November 20, 2006
TR-2006-29
Chen, D. ;
Chirkova, R.;
Sadri, F.
designing an information integration and interoperability system - first steps
October 19, 2006
TR-2006-28
Ho, Chih-wei;
Williams, Laurie
Managing Software Performance Engineering Activities with the Performance Refinement and Evolution Model (PREM)
September 26, 2006
TR-2006-27
Breaux, Travis D,;
Anton, Annie I.
Acquiring Software Compliance Artifacts from Policies and Regulations
September 8, 2006
TR-2006-26
Irwin, Keith;
Yu, Ting;
William H. Winsborough
On the Modeling and Analysis of Obligations
August 25, 2006
TR-2006-25
Ho, Chih-wei;
Williams, Laurie
An Introduction to Performance Testing
August 20, 2006
TR-2006-24
Miller, Randy;
Williams, Laurie
Personas: Moving Beyond Role-Based Requirements Engineering
August 19, 2006
TR-2006-23
Gegick, Michae;
Isakson, Eric;
Williams, Laurie
An Early Testing and Defense Web Application Framework for Malicous Input Attacks
August 19, 2006
TR-2006-22
Janvi Badlaney;
Rohit Ghatol;
Romit Jadhwani
An Introduction to Data-Flow Testing
August 9, 2006
TR-2006-21
Shin, Yonghee;
Williams, Laurie;
Xie, Tao
SQLUnitGen: Test Case Generation for SQL Injection Detection
August 6, 2006
TR-2006-20
Ma, Xiaosong ;
Vazhkudai, Sudharshan S. ;
Freeh, Vincent W. ;
Yang, Tao ;
Simon, Tyler A. ;
Scott, Stephen L.
Coupling Prefix Caching and Collective Downloads for Remote Dataset Access
July 25, 2006
TR-2006-19
Lim, Min Yeol;
Freeh, Vincent W.;
Lowenthal, David K
Adaptive, Transparent Frequency and Voltage Scaling of Communication Phases in MPI Programs
July 25, 2006
TR-2006-18
Otto, Paul N.;
Anton, Annie I.;
Baumer, David L.
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
July 1, 2006
TR-2006-17
Kailasam, Gayathri Tambaram ;
Kang, Jaewoo
Efficient SKYCUBE Computation using Bitmaps
July 12, 2006
TR-2006-16
Koudas, Nick;
Srivastava, Divesh;
Yu, Ting;
Zhang, Qing
Aggregate Query Answering on Anonymized Tables
July 10, 2006
TR-2006-15
Huang,S.;
Dutta,R.
Dynamic Traffic Grooming: The Changing Role of Traffic Grooming
July 7, 2006
TR-2006-14
Breaux, Travis;
Anton, Annie I.;
Spafford, Eugene H.
A Distributed Requirements Management Framework for Compliance
June 15, 2006
TR-2006-13
Smith, Daniel M.;
Freeh, Vincent W.;
Mueller, Frank
Asymmetric Multiprocessing for Simultaneous Multithreading Processors
June 20, 2006
TR-2006-12
Evan Martin;
Tao Xie
Automated Mutation Testing of Access Control Policies
May 6, 2006
TR-2006-11
Wang, Yonghong;
Singh, Munindar P.
Trust via Evidence Combination: A Mathematical Approach Based on Certainty
May 1, 2006
TR-2006-10
Dev, K.;
Chirkova, R.
Concurrency control in distributed caching
April 13, 2006
TR-2006-9
Breaux, Travis D. ;
Anton, Annie I.;
An Algorithm to Generate Compliance Monitors from Regulations
March 3, 2006
TR-2006-8
Martin, E;
Xie, T;
Yu, T
Defining and Measuring Policy Coverage in Testing Access Control Policies
March 1, 2006
TR-2006-7
Freeh, Vincent W.;
Ma, Xiaosong;
Vazhkudai, Sudharshan S.;
Strickland, Jonathan W.
{Controlling Impact while Aggressively Scavenging Idle Resources
February 20, 2006
TR-2006-6
Breaux, Travis D.;
Anton, Annie I. ;
Vail, Matthew W.
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
February 13, 2006
TR-2006-5
Gou, G.;
Kormilitsin, M.;
Chirkova, R.
Query evaluation using overlapping views: completeness and efficiency
February 12, 2006
TR-2006-4
Gegick, Michael;
Williams, Laurie
Launching Automated Security Attacks through Unit-level Penetration Testing
February 7, 2006
TR-2006-3
Springer IV, Robert C.;
Lowenthal, David K.;
Rountree, Barry ;
Freeh, Vincent W.
{Minimizing Execution Time in MPI Programs on an Energy-Constrained, Power-Scalable Cluster
February 2, 2006
TR-2006-2
Zohreh Asgharzadeh Talebi;
Rada Chirkova;
Yahya Fathi
A Study of a Formal Model For View Selection for Aggregate Queries
January 5, 2006
TR-2006-1
Jetley, Raoul;
Iyer, Purush;
Jones, Paul
An Approach to Revieiwng Software in Medical Devices
January 1, 2006
TR-2005-49
Sbeity, Ihab;
Brenner, Leonardo;
Plateau, Brigitte;
Stewart, William J.
Phase-Type Distributions in Stochastic Automata Networks
December 20, 2005
TR-2005-48
Ramaprasad, Harini;
Mueller, Frank
Tightening the Bounds on Feasible Preemption Points
December 19, 2005
TR-2005-47
Breaux, Travis D. ;
Anton, Annie I. ;
Karat, Clare-Marie;
Karat, John
Enforceability vs. Accountability in Electronic Policies
December 10, 2005
TR-2005-46
Krebs, Williams;
Ho, Chih-wei;
Williams, Laurie;
Layman, Lucas
Rational Unified Process Evaluation Framework Version 1.0
December 1, 2005
TR-2005-45
Sherriff, Mark;
Boehm, Barry;
Williams, Laurie;
Nagappan, Nachiappan
An Empirical Process for Building and Validating Software Engineering Parametric Models
October 19, 2005
TR-2005-44
Srikanth, Hema;
Williams, Laurie;
Osborne, Jason
Towards the Prioritization of System Test Cases
October 11, 2005
TR-2005-43
Zhang, Q;
Yu, T
A Frameworkfor Identifying Compromised Nodes in Sensor Networks
September 25, 2005
TR-2005-42
He, Qingfeng;
Antón, Annie I.
Integrating Access Control Policy Specification into the Software Development Process
September 9, 2005
TR-2005-41
Dennis, Brent M.;
Healey, Christopher G.
A Survery of Preference Elicitation
September 5, 2005
TR-2005-40
Layman, Lucas;
Cornwell, Travis;
Williams, Laurie;
Osborne, Jason
Personality Profiles and Learning Styles of Advanced Undergraduate Computer Science Students
August 29, 2005
TR-2005-39
Ning, P.;
Liu, A.;
Du, W.;
Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks
August 23, 2005
TR-2005-38
Zheng, Jiang;
Robinson, Brian;
Williams, Laurie;
Smiley, Karen
A Lightweight Process for Change Identification and Regression Test Selection in Using COTS Components
July 28, 2005
TR-2005-37
Vazhkudai, Sudharshan S. ;
Ma, Xiaosong ;
Freeh, Vincent W. ;
Strickland, Jonathan W. ;
Tammineedi, Nandan ;
Stephen L. Scott
FreeLoader: Scavenging Desktop Storage Resources for Scientific Data
July 27, 2005
TR-2005-36
Kappiah, Nandini;
Freeh, Vincent W.;
Lowenthal, David K.
{Just In Time Dynamic Voltage Scaling: Exploiting Inter-Node Slack to Save Energy in MPI Programs
July 27, 2005
TR-2005-35
Kocherlakota, Sarat M.;
Healey, Christopher G.
Summarization Techniques for Visualization of Large, Multidimensional Datasets
July 21, 2005
TR-2005-34
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
Experimental Study of an IP Model for the View Selection Problem
July 20, 2005
TR-2005-33
Seo, Sungbo;
Kang, Jaewoo;
Lee, Dongwon;
Ryu, Keun H.
Adaptive Framework for Multivariate Stream Data Processing in Data-Centric Sensor Applications
July 20, 2005
TR-2005-32
Sawant, Amit P.;
Healey, Christopher G.
A Survey of Display Device Properties and Visual Acuity for Visualization
July 19, 2005
TR-2005-31
Breaux, Travis D. ;
Anton, Annie I.
Mining Rule Semantics to Understand Legislative Compliance
June 23, 2005
TR-2005-30
Kang, Jaewoo
Data Models for Exploratory Analysis of Heterogeneous Microarray Data
July 16, 2005
TR-2005-29
Kang, Jaewoo;
Han, Tae S;
Lee, Dongwon;
Mitra, Prasenjit;
Establishing Value Mappings Using Statistical Models and User Feedback
July 16, 2005
TR-2005-28
Kang, Jaewoo;
Lee, Dongwon;
Mitra, Prasenjit
Identifying Value Mappings for Data Integration: An Unsupervised Approach
July 16, 2005
TR-2005-27
Zhai, Yan;
Ning, Peng;
Xu, Jun
Integrating IDS Alert Correlation and OS-Level Dependency Tracking
June 30, 2005
TR-2005-26
Zheng, Jiang;
Williams, Laurie;
Nagappan, Nachiappan;
Snipes, Will;
Hudepohl, John;
Vouk, Mladen
A Study of Static Analysis for Fault Detection in Software
June 19, 2005
TR-2005-25
Shaker, Ayman;
Reeves, Douglas S.
Self-Stabilizing Structured Ring Topology P2P Systems
June 17, 2005
TR-2005-24
Bilgin, A.;
Chirkova, R.;
Singh, M.;
Salo, T.
Deterministic Prefetching for Container-Managed Persistence
June 1, 2005
TR-2005-23
Donggang Liu;
Peng Ning;
Wenliang Du;
Group-Based Key Pre-Distribution in Wireless Sensor Networks
May 26, 2005
TR-2005-22
Gou, Gang;
Chirkova, Rada
XML Query Processing: A Survey
May 11, 2005
TR-2005-21
Injong Rhee
Randomized Dining Philosophers to TDMA Scheduling
February 28, 2005
TR-2005-20
Femal, Mark E.;
Freeh, Vincent W.
Boosting Data Center Performance Through Non-Uniform Power Allocation
April 20, 2005
TR-2005-19
Strickland, Jonathan W. ;
Freeh, Vincent W. ;
Ma, Xiaosong ;
Vazhkudai, Sudharshan S.
Governor: Autonomic Throttling for Aggressive Idle Resource Scavenging
April 20, 2005
TR-2005-18
Freeh, Vincent W. ;
Lowenthal, David K. ;
Pan, Feng ;
Kappiah, Nandani
Using Multiple Energy Gears in MPI Programs on a Power-Scalable Cluster
April 20, 2005
TR-2005-17
Breaux, Travis;
Niehaus, James
Requirements for a Policy-enforceable Agent Architecture
May 14, 2005
TR-2005-16
Yang, Tao;
Ma, Xiaosong;
Mueller, Frank
Predicting Parallel Applications' Performance Across Platforms Using Partial Execution
March 21, 2005
TR-2005-15
St. Amant, Robert;
Wood, Alexander
Tool Use for Autonomous Agents
March 19, 2005
TR-2005-14
Afrati, F;
Chirkova, R;
Mitra, P
Information about Queries Obtained by a Set of Views
February 28, 2005
TR-2005-13
Layman, Lucas;
Williams, Laurie;
Damian, Daniela;
Buresc, Hynek
Conjectures of Informal Communication-Centric Practices Observed in a Distributed Software Development Team
February 28, 2005
TR-2005-12
Li, J.;
Chirkova, R.;
Fathi, Y.
An IP Model for the View Selection Problem
February 26, 2005
TR-2005-11
Pai Peng, Peng Ning, Douglas S. Reeves, and Xinyuan Wang
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
February 25, 2005
TR-2005-10
Xinyuan Wang, Douglas S. Reeves, Peng Ning, and Fang Feng
Robust Network-Based Attack Attribution through Probabilistic Watermarking of Packet Flows
February 25, 2005
TR-2005-9
He, Qingfeng;
Antón, Annie I.
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
February 16, 2005
TR-2005-8
Breaux, Travis ;
Anton, Annie
Analyzing Goal Semantics for Rights, Permissions, and Obligations
February 15, 2005
TR-2005-7
Kohli, Pooja;
Chirkova, Rada Y.
Cache Invalidation and Propagation in Distributed Caching
February 15, 2005
TR-2005-6
Pan, Feng;
Freeh, Vincent W.;
Smith, Daniel M.
Exploring the Energy-Time Tradeoff in High-Performance Computing
February 1, 2005
TR-2005-5
Femal, Mark E. ;
Freeh, Vincent W.
Safe Overprovisioning: Using Power Limits to Increase Aggregate Throughput
February 1, 2005
TR-2005-4
Freeh, Vincent W.;
Lowenthal, David K.;
Pan, Feng;
Kappiah, Nandini;
Springer, Rob;
Exploring the Energy-Time Tradeoff in MPI Programs on a Power-Scalable Cluster
February 1, 2005
TR-2005-3
Kim, K.;
Chirkova, R.
View-Size Estimation in Self-Organizing Databases
January 24, 2005
TR-2005-2
Jiang Zheng;
Laurie Williams;
Nachiappan Nagappan;
Will Snipes;
John Hudepohl ;
Mladen Vouk1;
Kiem Ngo;
On the Effectiveness of Static Analysis Tools for Fault-Detection
January 11, 2005
TR-2005-1
Evan Martin;
Karen Smiley
Experiment and Comparison of Automated Static Code Analyzers and Automated Dynamic Tests
January 11, 2005
TR-2004-35
Zhu, Yifan;
Mueller, Frank
Feedback EDF Scheduling Exploiting Hardware-Assisted Asynchronous Dynamic Voltage Scaling
December 15, 2004
TR-2004-34
Desai, Nirmit ;
Mallya, Ashok U. ;
Chopra, Amit K. ;
Singh, Munindar P.
Processes = Protocols + Policies
November 15, 2004
TR-2004-33
Lobo, Ruben;
Bitzer, Donald;
Vouk, Mladen
Locally Invertible m-Dimensional Convolutional Codes
November 23, 2004
TR-2004-32
Lobo, Ruben;
Bitzer, Donald;
Voul, Mladen
Inverses of Multivariate Polynomial Matrices using Discrete Convolution
November 23, 2004
TR-2004-31
Berenson, Sarah;
Slaten, Kelli;
Williams, Laurie;
Ho, Chih wei
Voices of Women in a Software Engineering Course: Reflections on Collaboration
November 18, 2004
TR-2004-30
Breaux, Travis
Policy-Parametric Software
November 17, 2004
TR-2004-29
Liu, Donggang;
Ning, Peng;
Du, Wenliang
Attack-Resistant Location Estimation in Sensor Networks
March 15, 2004
TR-2004-28
Chirkova, R.;
Afrati, F.;
Gergatsoulis, M.;
Pavlaki, V.
Designing Views to Answer Queries under Set, Bag, and Bag-Set Semantics
October 20, 2004
TR-2004-27
Wu, Kehang;
Reeves, Douglas S.
Capacity Planning of Survivable MPLS Networks Supporting DiffServ
April 1, 2004
TR-2004-26
Afrati, F.;
Chirkova, R.;
Gupta, S.;
Loftis, C.
Designing and Using Views to Improve Performance of Aggregate Queries
September 9, 2004
TR-2004-25
Zhai, Yan;
Ning, Peng;
Iyer, Purush;
Reeves, Douglas
Reasoning about Complementary Intrusion Evidence
September 8, 2004
TR-2004-24
Qingfeng He, Annie Antón
Deriving Access Control Policies from Requirements Specifications and
September 2, 2004
TR-2004-23
Layman, Lucas;
Williams, Laurie;
Cunningham, Lucas
Motivations and Measurements in an Agile Case Study
August 26, 2004
TR-2004-22
Qingfeng He, Annie I. Antón
A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering
August 3, 2004
TR-2004-21
Anton, Annie I.;
Earp, Julia B.;
Vail, Matthew W.;
Jain, Neha;
Gheen, Carrie;
Frink, Jack
An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA
July 24, 2004
TR-2004-20
Chih-wei Ho;
Kelli Slaten;
Laurie Williams;
Sarah Berenson
Examining the Impact of Pair Programming on Female Students
June 17, 2004
TR-2004-19
William Stufflebeam, Annie I. Antón, Qingfeng He, and Neha Jain
Specifying Privacy Policies with P3P and EPAL: Lessons Learned
June 17, 2004
TR-2004-18
Williams, Laurie A.;
Layman, Lucas;
Krebs, William
Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.4
June 17, 2004
TR-2004-17
Tateosian, Laura G.;
Healey, Christopher G.
NPR: Art Enhancing Computer Graphics
May 27, 2004
TR-2004-16
Chen, Bensong;
Dutta, Rudra;
Rouskas, George N
Traffic Grooming in Star Networks
May 24, 2004
TR-2004-15
Anantaraman, Aravindh;
Seth, Kiran;
Patil, Kaustubh;
Rotenberg, Eric;
Mueller, Frank
Exploiting VISA for Higher Concurrency in Safe Real-Time Systems
May 3, 2004
TR-2004-14
Rhee, Injong;
Lee, Jangwon
Distributed Scalable TDMA Scheduling Algorithm}
April 26, 2004
TR-2004-13
Rhee, Injong;
Lee, Jangwon
Energy-efficient Route-aware MAC protocols for Diffusion-based Sensor Networks
April 26, 2004
TR-2004-12
Sarah Berenson;
Kelli M. Slaten;
Laurie Williams;
Collaboration through Agile Software Development Practices: Student Interviews and Lab Observations
April 26, 2004
TR-2004-11
Williams, Laurie;
Krebs, William;
Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.3
April 6, 2004
TR-2004-10
Jackson, Laura E.;
Stallmann, Matthias F.
Directional p-Median in Two Dimensions is NP-Complete
March 16, 2004
TR-2004-9
Nagarajan, Anita;
Marathe, Jaydeep;
Mueller, Frank
Detailed Cache Coherence Characterization for OpenMP Benchmarks
March 2, 2004
TR-2004-8
Layman, Lucas;
Williams, Laurie;
Cunningham, Lynn
Exploring Extreme Programming in Context: An Industrial Case Study
February 29, 2004
TR-2004-7
Jain, Neha ;
Antón, Annie I. ;
Stufflebeam, William H. ;
He, Qingfeng
Privacy Goal Management Tool (PGMT) Software Requirements Specification
February 24, 2004
TR-2004-6
Su, Jie;
Reeves, Douglas S
Replica Placement with Latency Constraints in Content Distribution Networks
February 9, 2004
TR-2004-5
Nagappan, Nachiappan;
Williams, Laurie;
Vouk, Mladen;
Osborne, Jason
Initial Results of Using In-Process Testing Metrics to Estimate Software Reliability
January 25, 2004
TR-2004-4
Jiang, Qinglin;
Reeves, Douglas S.;
Ning, Peng
Certificate Recommendations to Improve Robustness of Webs of Trust
January 21, 2004
TR-2004-3
Williams, Laurie;
Layman, Lucas;
Krebs, William;
Antón, Annie
Exploring the Use of a “Safe Subset” of Extreme Programming: An Industrial Case Study
January 20, 2004
TR-2004-2
Williams, Laurie;
Krebs, William;
Layman, Lucas;
Anton, Annie
Toward a Framework for Evaluating Extreme Programming
January 15, 2004
TR-2004-1
Williams, Laurie;
Krebs, William;
Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.2
January 5, 2004
TR-2003-22
Bicici, Ergun;
St. Amant, Robert
Reasoning about the functionality of tools and physical artifacts
April 14, 2003
TR-2003-21
Antón, Annie I.;
He, Qingfeng
The Complexity Underlying JetBlue’s Privacy Policy Violations
October 23, 2003
TR-2003-20
Williams, Laurie A.;
Krebs, William;
Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.1
October 8, 2003
TR-2003-19
Jiang, Q;
Reeves, D;
Ning, P;
Improving Robustness of PGP Keyrings by Conflict Detection
October 2, 2003
TR-2003-18
William, Laurie;
Krebs, William;
Layman, Lucas;
Antón, Annie I.
Toward an XP Evaluation Framework
September 22, 2003
TR-2003-17
Antón, Annie I.;
Bolchini, Davide;
He, Qingfeng
The Use of Goals to Extract Privacy and Security Requirements from Policy Statements
September 23, 2003
TR-2003-16
Ning, P.;
Xu, D.
Learning Attack Strategies from Intrusion Alerts
August 19, 2003
TR-2003-15
Nagappan, Nachiappan;
Sherriff, Mark;
Williams, Laurie
On the Feasibility of Using Operational Profiles to Determine Software Reliability in Extreme Programming
August 19, 2003
TR-2003-14
Anton, Annie I.;
Earp, Julia B.;
Bolchini, Davide;
He, Qingfeng;
Jensen, Carlos;
Stufflebeam, William
The Lack of Clarity in Financial Privacy Policies and the Need for Standardization
August 1, 2003
TR-2003-13
Zhu, Yifan;
Mueller, Frank
Feedback Dynamic Voltage Scaling DVS-EDF Scheduling:
Feedback Dynamic Voltage Scaling DVS-EDF Scheduling: Correctness and PID-Feedback
June 25, 2003
TR-2003-12
Singh, Munindar P.
Distributed Enactment of Multiagent Flows
May 6, 2003
TR-2003-11
Srikanth,Hema;
Anton, Annie;
Towards Achieving a Balance between Planning and Agility in Software Developm
April 5, 2003
TR-2003-10
Ning, P;
Peng, P;
Hu, Y;
Xu, D
TIAA: A Visual Toolkit for Intrusion Alert Analysis
March 31, 2003
TR-2003-09
He, Q
Privacy Enforcement with an Extended Role-Based Access Control Model
February 28, 2003
TR-2003-08
Liu, D; Ning, P
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
March 1, 2003
TR-2003-07
Ning, P; Sun, K
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
February 12, 2003
TR-2003-06
He, Qingfeng; Anton, Annie I.
A Privacy Protection Comparison of Popular Web Browsers
July 1, 2002
TR-2003-05
Haygood, Hal; He, Qingfeng; Smith, Shane; Snare, Jodi
A Privacy-Aware Database Interface
December 10, 2002
TR-2003-04
Williams, Laurie A.; Shukla, Anuja; Anton, Annie
Pair Programming and the Factors Affecting Brooks' Law
January 31, 2003
TR-2003-03
Liu, D.; Ning, P.; Sun, K.
Efficient and Self-Healing Group Key Distribution with Revocation Capability
January 28, 2003
TR-2003-02
Nagappan, Nachiappan; Baheti, Prashant; Williams, Laurie; Gehringer, Edward; Stotts, David
Virtual Collaboration through Distributed Pair Programming
January 10, 2003
TR-2003-01
Weibe, Eric; Williams, Laurie; Yang, Kai; Miller, Carol
Computer Science Attitude Survey
January 10, 2003