Skip to content

Reports

Technical Reports

Click the year to view its related technical reports.

Report No. Title Author Date
UTDCS-02-16 Visualizing Large Graphs by Layering and Bundling Graph Edges Zhuang Cai
Kang Zhang
Dong-Ni Hu
2/16
UTDCS-03-16 A Self-Stabilizing Algorithm for the Foraging Problem in Swarm Robotic Systems Guang Zhou
Farokh Bastani
Wei Zhu
I-Ling Yen
3/16
UTDCS-04-16 Data Driven Approach to the Science of Cyber Security Bhavani Thuraisingham
Murat Kantarcioglu
Kevin Hamlen
Elisa Bertino
Tim Finin
Anupam Joshi
Tim Oates
3/16
UTDCS-05-16 An Agile Cyber Defense Framework Elisa Bertino
et al.
3/16
UTDCS-06-16 InXite: Stream Data Mining for Social Media Bhavani Thuraisingham
et al.
3/16
UTDCS-08-16 Spectrum-Efficient Virtual Optical Network Provisioning over Flexible-Grid Multi-Domain Optical Networks Sangjin Hong
Jason P. Jue
Pyungkoo Park
Sunchul Kim
Hoyong Ryu
4/16
UTDCS-10-16 Compact Structure Patterns in Proteins Bhadrachalam Chitturi
Shuoyong Shi
Lisa N. Kinch
Nick V. Grishin
7/16
UTDCS-11-16 A Study of Gene Prioritization Algorithms on PPI Networks Sinsha K P
Bhadrachalam Chitturi
9/16
UTDCS-12-16 Exploring Functional Clinical Attributes For Macular Dystrophy Detection Rittika Shamsuddin
Yizhong Wang
Balakrishnan Prabhakaran
10/16
UTDCS-13-16 Roughly Polynomial Time: A Concept of Efficiency That Avoids Conflict with Intractablility Andras Farago 11/16
UTDCS-15-16 Estimating Clustering Coefficients via Metropolis-Hastings Random Walk and Wedge Sampling on Large OSN Graphs Emrah Cem
Kamil Sarac
11/16
UTDCS-16-16 A Clustering-Based Approach for Workload Estimation in the Cloud Yongjia Yu
Vasu Jindal
I-Ling Yen
Farokh Bastani
Jie Xu
Peter Garraghan
11/16
UTDCS-17-16 MCDC-Star-An Open-source MC/DC  Measurement Tool Linghuam Hu
Ruizhi Gao
W. Eric Wong
11/16

Report No. Title Author Date
UTDCS-01-15 On Expected Number of Prefix Transpositions Required To Sort A Permutation Bhadrachalam Chitturi
Amrita Vishwa Vidyapeetham
Amritapuri Campus
1/15
UTDCS-02-15 A Validated Regression Model for Complexity of Polygonal Shapes Lingchen Dai
Xianjun Zheng
Ying Li
Kang Zhang
Ralph Martin
Jinhui Yu
3/15
UTDCS-03-15 Adjacencies in Permutations Bhadrachalam Chitturi
Amrita Vishwa Vidyapeetham
4/15
UTDCS-04-15 Comet Smart Campus Multi-Agent and Visualizations Systems Lab Jennifer Jiang
Nikolay Bourov
Sihui Huang
Rym Zalila-Wenkstern
5/15
UTDCS-05-15 Update Propagation in MapReduce Systems Huseyin Ulusoy
Murat Kantarcioglu
Erman Pattuk
6/15
UTDCS-06-15 FIFA: The Framework for Interaction Fidelity Analysis Ryan P. McMahan
Eric D. Ragan
Doug A. Bowman
Fei Tang
Chengyuan Lai
7/15
UTDCS-08-15 MSeer – An Advanced Technique for Locating Multiple Bugs in Parallel Ruizhi Gao
W. Eric Wong
8/1
UTDCS-11-15 Toward Sematic Enhancement of Monitoring Data Repository Shuai Zhang
I-Ling Yen
Farokh B. Bastani
11/15
UTDCS-12-15 SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data Stream Ahsanul Haque
Latifur Khan
Michael Baron
12/15
UTDCS-13-15 Improving Efficacy of Internal Binary Search Trees using Local Recovery Arunmoezhi Ramachandran
Neeraj Mittal
13/15

Report No. Title Author Date
UTDCS-01-14 SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification David I. Urbina
Juan Caballero
Yufei Gu
Zhiqiang Lin
1/14
UTDCS-02-14 A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems Rym Zalila-Wenkstern
Mohammad Al-Zinati
1/14
UTDCS-03-14 Multidimensional Motif Discovery in Physiological and Biomedical Time Series Data Arvind Balasubramanian
Jun Wang
B. Prabhakaran
2/14
UTDCS-04-14 Exploring Baseline Shift Prediction in Respiration Induced Tumor Motion Arvind Balasubramanian
Rittika Shamsuddin
Yam Cheung
Amit Sawant
Balakrishnan Prabhakaran
4/14
UTDCS-05-14 Lexico-minimizing Survival Frequency For a Replica Placement Problem in Tree-based Failure Models K. Alex Mills
R. Chandrasekaran
Neeraj Mittal
4/14

Report No. Title Author Date
UTDCS-01-13 Ghost Agent-Based Autonomic Adapter Rym Zalila-Wenkstern 2/13
UTDCS-02-13 Noise Tolerant Motif Discovery in Time Series Datasets Arvind Balasubramanian
Balakrishnan Prabhakaran
2/13
UTDCS-03-13 Hippocratic Binary Instrumentation: First Do No Harm (Extended Version) Kevin W. Hamlen
Meera Sridhar
Richard Wartell
2/13
UTDCS-04-13 A Self-Organizing Model for Decentralized Virtual Environments In Agent-Based Simulation Systems F. Araujo
M. Al-Zinati
J. Valente
Rym Z. Wenkstern
3/13
UTDCS-05-13 Measuring Expertise and Bias in Cyber security Using Cognitive and Neuro-Science Approaches Daniel Krawczyk
James Bartlett
Murat Kantarcioglu
Kevin Hamlen
Bhavani Thuraisingham
3/13
UTDCS-06-13 An Effective Approach for Web Forum Topic Detection Zhiming Chen
Andras Farago
3/13
UTDCS-07-13 On the Relationship Between Hyperlinks and Textual Similarity Zhiming Chen
Andras Farago
3/13
UTDCS-08-13 Decreasing the Size of Grounded Logic Programs Feliks Kluzniak
Kyle Marple
4/13
UTDCS-09-13 Analyzing and Securing On-Line Social Networks Bhavani Thuraisingham
Satyen Abrol
Raymond Heatherly
Murat Kantarcioglu
Vaibhav Khadilkar
Latifur Khan
4/13
UTDCS-10-13 A Semantic-based Semi-automated Mapping Mechanism Lijuan Diao
Wei She
I-Ling Yen
Junzhong Gu
5/01
UTDCS-11-13 A Short Note on Sorting Permutations With Brooms Bhadrachalam Chitturi
(Approved by Dr. Gopal Gupta)
5/01
UTDCS-12-13 Shingled Graph Disassembly: Finding the Undecideable Path Richard Wartell
Yan Zhou
Kevin W. Hamlen
Murat Kantarcioglu
6/13
UTDCS-13-13 Improved Approximation Algorithm for k-interval Cover Problem Balaji Raghavachari
Bhadrachalam Chitturi
8/13
UTDCS-14-13 Specification and Verification of Serious Educational Game Models Muhammad Shoaib
Kendra M.L. Cooper
8/13
UTDCS-15-13 Towards Intelligent Semi-automated Game Generation in SimSYS: A Component-based Approach Kaleb Breault
Ricardo Daconceicao
Carsten Locke
Chris Mojica
Kendra M.L. Cooper
C. Shaun Longstreet
8/13
UTDCS-16-13 Employing WiFi Direct to Build a Wireless Network over Both 2.4 GHz and 5.8 GHz Bands Sabur Hassan Baidya
Pramod Shirol
Abhishek Basu
Ravi Prakash
9/13
UTDCS-01-14 SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification David I. Urbina
Yufei Gu
Juan Caballero
Zhiqiang Lin
1/14
UTDCS-02-14 A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems Mohammad Al-Zinati
Rym Zalila-Wenkstern
2/14

Report No. Title Author Date
UTDCS-01-12 Security Analysis for Order Preserving Encryption Schemes Liangliang Xiao
Osbert Bastani
1-LingYen
1/12
UTDCS-02-12 Extending Order Preserving Encryption
For Multi-User Systems
Liangliang Xiao
1-LingYen
Dung T. Huynh
2/12
UTDCS-03-12 An Efficient Homomorphic Encryption Protocol for Multi-User Systems Liangliang Xiao
Osbert Bastani
1-LingYen
2/12
UTDCS-04-12 Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes Liangliang Xiao
1-LingYen
2/12
UTDCS-05-12 A Service Pattern Model and Its Instantiation Using Rule-Based Reasoning Chien-Hsiang Lee
San-Yih Hwang
1-LingYen
2/12
UTDCS-06-12 Towards Model Driven Game
Engineering in SimSYS: Game
Requirements for the Agile Software
Development Process Game
Kendra M.L. Cooper
C. Shaun Longstreet
3/12
UTDCS-07-12 Optimizing Virtual Private Network
Design Using a New Heuristic
Optimization Method
Hongbing Lian
Andras Farago
4/12
UTDCS-08-12 Random Network Topology Models With Perturbations Andras Farago 4/12
UTDCS-09-12 Towards a Reference Architecture for Agent-Based Autonomic Software Systems Rym Zalila Wenkstern
D. Urbina
F. Araujo
T. Steel
6/12
UTDCS-10-12 Concurrent Lock-Free Binary Search Trees Aravind Natarajan
Neeraj Mittal
7/12
UTDCS-11-12 Online Algorithms to Generate Slices for Regular Temporal Logic Predicates
Networks
Aravind Natarajan
Neeraj Mittal
7/12
UTDCS-12-12 Designer Satellite Collisions from Covert Cyber War
( Selected Papers in Security Studies – Volume 8 )
Jan Kallberg
Bhavani Thuraisingham
8/12
UTDCS-13-12 Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal
( Selected Papers in Security Studies – Volume 9 )
Jan Kallberg 8/12
UTDCS-14-12 An Algorithm for Propositional Logic Programs Feliks Kluzniak
Gopal Gupta
9/12
UTDCS-15-12 Decreasing the Size of Grounded Logic Programs Feliks Kluzniak
Kyle Marple
9/12
UTDCS-16-12 Concurrent Wait-Free Red Black Trees Aravind Natarajan
Lee H. Savoie
Neeraj Mittal
10/12
UTDCS-17-12 Sorting Permutations With A Transposition Tree Bhadrachalam Chitturi 10/12
UTDCS-18-12 A Run-time Self-Organizing Model for Decentralized Virtual Environments Frederico Araujo
J. Valente
M. Al-Zinati
Rym Z. Wenkstern
10/12
UTDCS-19-12 Regenerator Site Selection and Regenerator Placement for Mixed Line Rate Optical Networks Weisheng Xie
Jason P. Jue
10/12
UTDCS-20-12 On Efficient Gene Prioritization Bhadrachalam Chitturi
Balaji Raghavachari
Donghyun Kim
11/12
UTDCS-21-12 Towards High-level Awareness:
A Cognitive Awareness Model and A Survey
Cong Chen
Kang Zhang
11/12
UTDCS-22-12 Network Reliability Analysis with Unreliable Information Andras Farago 11/12

Report No. Title Author Date
UTDCS-01-11 Better Upper Bound for Prefix Transposition Distance over Permutations Bhadrachalam Chitturi
Hal Sudborough
1/11
UTDCS-02-11 Impact of Aspect Oriented Approach on GoF Design Patterns Jayashree V. Pathangi
Kendra M. L. Cooper
1/11
UTDCS-03-11 Modeling and Verification of Cyber-Physical Systems with Co-inductive Constraint Logic Programming Neda Saeedloei
Gopal Gupta
1/11
UTDCS-04-11 High-Speed Multi-Input FIFO Queues with Applications S. Q. Zheng 1/11
UTDCS-05-11 Low Distortion Metric Embeddings Into Constant Dimension Andras Farago 1/11
UTDCS-06-11 Regenerator Placement in  Waveband Networks with Impairment Constraints Saket Varma
Jason P. Jue
1/11
UTDCS-07-11 Impairment-constrained Multi-rate Multicast Flow Aggregation in IP Over Optical Networks Yi Zhu
Jason P. Jue
2/11
UTDCS-08-11 Analysis of Cloud Architecture Layouts and Commercial Clouds Sindhuja Narasimhan
Kendra M.L. Cooper
2/11
UTDCS-09-11 The Financial Crisis of 2007-2009: EVENTS AND CAUSES Irina Sakharova
Weili Wu
2/11
UTDCS-10-11 Modeling Security Using an Aspect-oriented Architecture-Centric Process: A Banking System Study Eric Blackburn
Kendra M.L. Cooper
2/11
UTDCS-11-11 Routing, Wavelength Assignment, and Spectrum Allocation Algorithms in Transparent Flexible Optical WDM
Networks
Ankitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
3/11
UTDCS-12-11 Federated Query Processing Using Ontology Structure and Ranking In a Service Oriented Environment Neda Alipanah
Pallabi Parven
Latifur Khan
Bhavani Thuraisingham
3/11
UTDCS-13-11 Service-Oriented Approach to Electronic Health Records Kendra Cooper
Thomas Omen
3/11
UTDCS-14-11 Subnet Level Internet Topology Mapping M. Engin Tozal
Kamil Sarac
5/11
UTDCS-15-11 F. Automatic Software Engineering: An Achievable Dream? R. Zalila Wenkstern
D. Urbina
Araujo T. Steel
5/11
UTDCS-16-11 Chekov: Aspect-Oriented Runtime Monitor Certification via Model-Checking (Extended Version) Kevin W. Hamlen
Micah M. Jones
Meera Sridhar
5/11
UTDCS-17-11 Exploring Structural Properties Of Web Graphs through 3D Visualization Zhiming Chen
Kang Zhang
Andras Farago
5/11
UTDCS-18-11 TL Reference Manual Feliks Kluzniak 6/11
UTDCS-19-11 Domain-Disjoint Routing Based on Topology Aggregation for Survivable Multi-Domain Optical Networks Chengyi Gao
Mohammad M. Hasan
Jason P. Jue
7/11
UTDCS-20-11 Regenerator Site Selection in Waveband Optical Networks Supporting Mixed Line Rates Saket Varma
Jason P. Jue
7/11
UTDCS-21-11 Handling Deviations in Network Models Andras Farago 7/11
UTDCS-22-11 RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Translation Jyothsna Rachapalli
Vaibhav Khadilkar
Murat Kantarcioglu
Bhavani Thuraisingham
8/11
UTDCS-23-11 Coinductive Constraint Logic Programming Neda Saeedloei
Gopal Gupta
8/11
UTDCS-24-11 An Extension of n-Calculus with Real-Time and its Realization in Logic Programming Neda Saeedloei
Gopal Gupta
8/11
UTDCS-25-11 Estimating Network Layer Subnet Characteristics via Statistical Sampling M. Engin Tozal
Kamil Sarac
9/11
UTDCS-26-11 Modeling and Analyzing Enterprise Cloud Service Architecture Longji Tang
Farokh B. Bastani
Wei-Tek Tsai
Jing Dong
Liang-Jie Zhang
9/11
UTDCS-27-11 Towards the Design and Implementation Of a Cloud-Centric Assured Information Sharing System Bhavani Thuraisingham
Vaibhav Khadilkar
Tyrone Cadenhead
Jyothsna Rachapalli
Murat Kantarcioglu
Kevin Hamlen
Latifur Khan
Farhan Husain
9/11
UTDCS-28-11 Waveband Selection, Spectrum, and Waveband Assignment in Uniform and Non-Uniform OFDM-based Elastic Optical Waveband Network Saket Varma
Jason P. Jue
10/11
UTDCS-29-11 Routing, Wavelength Assignment, and Spectrum Allocation in Wavelength-Convertible Flexible Optical WDM Networks Ankitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
10/11
UTDCS-30-11 Optimized Ontology-driven Query Expansion Using Map-Reduce Framework To Facilitate Federated Queries Neda Alipanah
Latifur Khan
Bhavani Thuraisingham
11/11
UTDCS-31-11 Risk-Aware Data Processing in Hybrid Clouds Vaibhav Khadilkar
Kerim Yasin Oktay
Bijit Hore
Murat Kantarcioglu
Sharad Mehrotra
Bhavani Thuraisingham
11/11
UTDCS-32-11 A Model for Cognitive Radio Networks Hongbing Lian
Andras Farago
11/11
UTDCS-33-11 Wait-Free Red-Black Trees with Fast Reads and Writes Aravind Natarajan
Lee Savoie
Neeraj Mittal
11/11
UTDCS-34-11 Selected Papers in Security Studies:Volume 5: Payment Card Fraud: Challenges and Solutions Irina Sakharova
Latifur Khan
11/11
UTDCS-35-11 Selected Papers in Security Studies: Volume 6: The Continued War on Terrorism – How to Maintain Long-Range Terrorist Deterrence Jan Kallberg
Bhavani Thuraisingham
12/11
UTDCS-36-11 Selected Papers in Security Studies: Volume 7: Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information Sharing Bhavani Thuraisingham 12/11
UTDCS-37-11 Data Stream Classification with Bounding Component Classification Models Tahseen M. Al-Khateeb
Mohammad M. Masud
Latifur Khan
Jiawei Han
12/11
UTDCS-38-11 Recurrence and Novel Class Detection With Bounding Component Ensembles Tahseen M. Al-Khateeb
Mohammad M. Masud
Latifur Khan
Charu C. Aggarwal
12/11
UTDCS-39-11 A Heuristic Optimization Method and Its Application in Cognitive Radio Networks Hongbing Lian
Andras Farago
12/11
UTDCS-40-11 Security Analysis for OPE and Generalized OPE Schemes Liangliang Xiao
Osbert Bastani
I-Ling Yen
12/11
UTDCS-41-11 Extending Order Preserving Encryption For Multi-User Systems Liangliang Xiao
I-Ling Yen
Dung T. Huynh
12/11
UTDCS-42-11 An Efficient Homomorphic Encryption Scheme Liangliang Xiao
Osbert Bastani
I-Ling Yen
12/11
UTDCS-43-11 Security Analysis for Prefix-Preserving Encryption Schemes Liangliang Xiao
I-Ling Yen
12/11
UTDCS-44-11 Combined 2R/3R Regenerators Placement in Optical WDM Networks Ankitkumar N. Patel
Philip N. Ji
Avishek Nag
Yua-Kai Huang
Ezra Ip
Jason P. Jue
Ramaswami Chandrasekaran
Ting Wang
12/11

Report No. Title Author Date
UTDCS-01-10 Semantic Web Implementation Scheme for National Vulnerability Database (Common Platform Enumeration Data) Vaibhav Khadilkar
Jyothsna Rachapalli
Bhavani Thuraisingham
1/10
UTDCS-02-10 Security Issues for Cloud Computing Kevin Hamlen
Murat Kantarcioglu
Latifur Khan
Bhavani Thuraisingham
2/10
UTDCS-03-10 Securing the Execution Environment Applications and Data from Multi-Trusted Components Elisa Bertino
Gabriel Ghinita
Kevin Hamlen
Murat Kantarcioglu
Hsien-Hsin S. Lee
Ninghui Li
Calton Pu
Ravi Sandhu
Waleed Smari
Bhavani Thuraisingham
Gene Tsudik
Dongyan Xu
Shouhuai Xu
2/10
UTDCS-04-10 Ranking Entities from Multiple Ontologies to Facilitate Federated Queries Neda Alipanah
Julie Rauer
Latifur Khan
Steven B. Seida
Bhavani Thuraisingham
2/10
UTDCS-05-10 Randomized Algorithms for Neighbor Discovery in Cognitive Radio Networks Neeraj Mittal
Yanyan Zeng
S. Venkatesan
R. Chandrasekaran
2/10
UTDCS-06-10 Security Analysis for an Order Preserving Encryption Scheme Liangliang Xiao
I-Ling Yen
Dongdai Lin
2/10
UTDCS-07-10 Spectrum-Based Fault Localization Without Test Oracles Xiaoyuan Xie
W. Eric Wong
Tsong Yueh Chen
Baowen Xu
2/10
UTDCS-08-10 A Novel Grouping-Based Strategy for Improved Fault Localization Vidroha Debroy
W. Eric Wong
Xiaofeng Xu
Byoungju Choi
2/10
UTDCS-09-10 Building Disclosure Risk Aware Query Optimizers for Relational Databases Mustafa Canim
Murat Kantarcioglu
Bijit Hore
Sharad Mehrotra
4/10
UTDCS-10-10 Secure, Dependable and High Performance Cloud Storage Yunqi Ye
I-Ling Yen
Liangliang XiaoFarokh Bastani
4/10
UTDCS-11-10 Incentive Compatible Distributed Data Mining Murat Kantarcioglu
Robert Nix
4/10
UTDCS-12-10 An Improved Scalable Algorithm for Perpetual System Connectivity Using Structure Estimates Eric Etheridge
Neeraj Mittal
5/10
UTDCS-13-10 Bi-Directional Translation of Relational Data into Virtual RDF Stores Sunitha Ramanuja
Vaibhav Khadilkar
Latifur Khan
Steven Seida
Murat Kantarcioglu
Bhavani Thuraisingham
5/10
UTDCS-14-10 A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model Alain Bensoussan
Murat Kantarcioglu
Celine Hoe
5/10
UTDCS-15-10 Noncooperative Game Theory in Wireless Networks Dung T. Tran
Andras Farago
6/10
UTDCS-16-10 On Selfish Behavior in TDMA-based Bandwidth Allocation Protocols Dung T. Tran
Andras Farago
6/10
UTDCS-17-10 Game Theoretic Approach to Network Lifetime Maximization in Wireless Networks Dung T. Tran
Andras Farago
6/10
UTDCS-18-10 Reining In Windows API Abuses with In-lined Reference Monitors Kevin W. Hamlen
Vishwath Mohan
Richard Wartell
6/10
UTDCS-19-10 Selected Topics in International Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends and Technologies Bhavani Thuraisingham 7/10
UTDCS-20-10 RBF Neural Network-based Fault Localization W.  Eric Wong
Vidroha Debroy
Bhavani Thuraisingham
Richard Golden
7/10
UTDCS-21-10 Multi-label Text Data Classification  Using Semi Supervised and Fuzzy Subspace Clustering Mohammad Salim Ahmed
Latifur Khan
7/10
UTDCS-22-10 Reverse Engineering in the Aspect- Oriented Paradigm – Part I Source Code to Architecture of the Base Design Sunil Bohra
Rohit Goel
Jeffrey Koch
Sonali Pagade
Kendra Cooper
7/10
UTDCS-23-10 Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions TowardsImplementing these Strategies
Version I
Bhavani Thuraisingham 8/10
UTDCS-24-10 A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining Amy Xuyang Tan
Valerie Li Liu
Murat Kantarcioglu
Bhavani Thuraisingham
8/10
UTDCS-25-10 Selected Topics in Terrorism Studies–Volume 2: Al Qaeda Terrorist Financing and Technologies to Track the Finance Network Irina Sakharova
Weili Wu
8/10
UTDCS-26-10 Minimum Time Broadcasting in Cognitive Radio Networks Chanaka J. L. Arachchige
S. Venkatesan
R. Chandrasekaran
Neeraj Mittal
8/10
UTDCS-27-10 Ontology-driven Query Expansion Methods to Facilitate Federated Queries Neda Alipanah
Pallabi Parveen
Sheetal Menezes
Latifur Khan
Steven B. Seida
Bhavani Thuraisingham
9/10
UTDCS-28-10 Minimum Length Scheduling for Aggregated Convergecast in Heterogeneous Cognitive Radio Networks Yanyan Zeng
Neeraj Mittal
S. Venkatesan
R. Chandrasekaran
9/10
UTDCS-29-10 On Solving Consensus with Unknown Participants Divya Chandrasekaran
Neeraj Mittal
10/10
UTDCS-30-10 Optimal Defragmentation of Transparent Flexible Optical WDM (FWDM) Networks Ankitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
10/10
UTDCS-31-10 Energy-efficient Flow Aggregation In Optical Networks Yi Zhu
Jason P. Jue
10/10
UTDCS-32-10 Waveband Routing in Mixed Line Rate Networks with Impairment Constraints Saket Varma
Jason P. Jue
10/10
UTDCS-33-10 Safe Software: Does it Cost More to Develop? W. Eric Wong
Andrea Demel
Michael F. Siok
11/10
UTDCS-34-10 Software Safety Standards: Evolution and Lessons Learned W. Eric Wong
Andrea Demel
Michael F. Siok
11/10
UTDCS-35-10 Software Safety Standards: How Good Are They? W. Eric Wong
Andrea Demel
Vidroha Debroy
Michael F. Siok
11/10
UTDCS-36-10 On Consensus Among Fault Localization Techniques W. Eric  Wong
Vidroha Debroy
11/10

Report No. Title Author Date

UTDCS-01-09  

A Fine Grained Model for Information Flow Control in Web Service Composition

Wei She
I-Ling Yen
Bhavani Thuraisingham
1/09
UTDCS-02 09     A Dual Bound Algorithm for Very Fast and Exact Template-Matching Haim Schweitzer
Robert Finis Anderson
Rui (April) Deng
1/09
UTDCS-03-09 Preventing Private Information Inference Attacks on Social Networks Raymond Heatherly
Murat Kantarcioglu
Bhavani Thuraisingham
2/09
UTDCS-04-09 Minimum Cost Multiple Paths Subject to Minimum Link and Node  Sharing in a Network Part 1: Problem Formulation and Solution Space S. Q. Zheng
Jianping Wang
Bing Yang
Mei Yang
3/13
UTDCS-05-09 Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 2: Algorithms and Generalizations S. Q.  Zheng
Jianping Wang
Bing Yang
Mei Yang
3/13
UTDCS-06-09 A Distributed Termination Detection Algorithm for Dynamic Asynchronous Systems Paul Johnson
Neeraj Mittal
3/23
UTDCS-07-09 PEQ: A Privacy-Preserving Scheme forExact Query Evaluation in Distributed Sensor Data Networks Hai Vu
Thuc Nguyen
Neeraj Mittal
S. Venkatesan
4/09
UTDCS-08-09 RDF Join: A Scalable Data Model for Persistence and Efficient Querying of RDF Datasets James P. McGlothlin
Latifur R. Khan
4/09
UTDCS-09-09 Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction Operations Bhavani Thuraisingham
Latifur Khan
Murat Kantarcioglu
4/09
UTDCS-10-09 Local vs. Global Scalability in Ad Hoc and Sensor Networks Andras Farago 5/09
UTDCS-11-09 Infoshape: High-Level Views of Multidimensional Information Jie Hao
Chunying Zhao
Pushpa Kumar
Kang Zhang
5/09
UTDCS-12-09 Composition Operators for Synthesizing Glue Code Based on Code Patterns Jicheng Fu
Jian Liu
Farokh Bastani
I-Ling Yen
6/09
UTDCS-13-09 Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams Mohammad M. Masud
Jing Gao
Latifur Khan
Jiawei Han
Bhavani Thuraisingham
6/09
UTDCS-14-09 Streaming 3D Deformations in Collaborative Learning Applications Ziying Tang,
Guodong Rong
Xiaohu Guo
Balakrishnan Prabhakaran
6/09
UTDCS-15-09 Point-Based Manifold Harmonics Yang Liu
Xiaohu Guo
Balakrishnan Prabhakaran
6/09
UTDCS-16-09 Toward Fully Homomorphic Computation Liangliang Xiao
Osbert Bastani
I-Ling Yen
7/09
UTDCS-17-09 A Corner-Based Method for Computing The Walsh Transform at Multiple Locations in an Image Rui Deng
Robert Finis Anderson
Haim Schweitzer
7/09
UTDCS-18-09 A Family of  Secure Key Assignment Schemes for Wireless Communication Networks Neeraj Mittal 7/09
UTDCS-19-09 Spectral Hybrid Simulation of Deformable and Rigid Bodies Yin Yang
Guodong Rong
Jianfen Ren
Luis Torres
Xiaohu Guo
7/09
UTDCS-20-09 An Almost Linear Homomorphic Encrytion Scheme Liangliang Xiao
Osbert Bastani
I-Ling Yen
7/09
UTDCS-21-09 3R Regenerator Placement for Optical Multicast Yi Zhu
Xiaofeng Gao
Jason P. Jue
Weili Wu
7/09
UTDCS-22-09 Fast Deterministic Neighbor Discovery In Cognitive Radio Networks Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran 7/09
UTDCS-23-09 Extending Service Model to Build an Effective Service Composition Framework for Cyber-Physical Systems Jian Huang Farokh Bastani I-Ling Yen Wenke Zhang Feng-Jian Wang Hwai-Jung Hsu 8/09
UTDCS-24-09 A Tripartite Clustering Analysis on MicroRNA, Gene and Disease Model Chengcheng Shen
Ying Liu
8/09
UTDCS-25-09 DESIGN and Implementation of Restful Web Services for Blackbook Pranav Parikh
Murat Kantarcioglu
Latifur Khan
Bhavani Thuraisingham
8/09
UTDCS-26-09 Parsing Prolog Terms A didactic exercise, Sponsored by Dr. Gopal Gupta Feliks Kluzniak 8/09
UTDCS-27-09 Physical Models vs. Graph Models Of Wireless Network Topologies Andras Farago
Stefano Basagni
9/09
UTDCS-28-09 A Case Study on Geospatial Data Management with Blackbook Sonia Chib
Jyothsna Rachapalli
Bhavani Thuraisingham
Latifur Khan
Murat Kantarcioglu
9/09
UTDCS-29-09 Agile Product Line Requirements Engineering Questionnaire Data Analysis Using Feature Selection Kunwu Feng
Kendra M.L. Cooper
9/09
UTDCS-30-09 Agile Product Line Requirements Engineering Process Definitions Kunwu Feng
Kendra M.L. Cooper
9/09
UTDCS-31-09 Traffic Grooming for Energy-Aware Optical Networks M.M. Hasan
Farid Farahmand
Jason P. Jue
9/09
UTDCS-32-09 Contention-Tolerant Crossbar Packet Switches without and with Speedup Guannan Qu
Hyung Jae Chang
Jianping Wang
Zhiyi Fang
S. Q. Zheng
9/09
UTDCS-33-09 Bayesian Belief Network Structure Learning Algorithms:A Comparative Survey Yan Tang
Kendra Cooper
Joao Cangussu
9/09
UTDCS-34-09 SoftLink: Visualizing Correlations Among Multiple Program Executions Chunying Zhao
Kang Zhang
9/09
UTDCS-35-09 FREEZE: Rate Adaptation in Wireless LANs Using Channel Contention Estimates Ajay Kulkarni
Shanthy Menezes
Ravi Prakash
9/09
UTDCS-36-09 Enhanced Information Flow Control for Service Composition and Its Implementation Wei She
I-Ling Yen
Bhavani Thuraisingham
Elisa Bertino
09/09
UTDCS-37-09 Cost Efficient Traffic Grooming andRegenerator Placement in Impairment- Aware Optial WDM Network Ankitkumar N. Patel
Chengyi Gao
Jason P. Jue
Xi Wang
Qiong Zhang
Paparao Palacharla
Takao Naito
10/09
UTDCS-38-09 Minimum SRLGs Multicast Routing Yi Zhu
Jason P. Jue
10/09
UTDCS-39-09 Network Aware Energy-Efficient Communication (NAEEC) Protocol For Heterogeneous Wireless Sensor
Networks
Manoj K. Garg
B.  Prabhakaran
10/09
UTDCS-40-09 Cost-based Query Processing for Large RDF Graph Using Hadoop and MapReduce Mohammad Husain
Pankil Doshi
Latifur Khan
Syeda A. Rizvi
Murat Kantarcioglu
Bhavani Thuraisingham
11/09
UTDCS-41-09 Efficient Query Processing for Large  RDF Graphs Using Hadoop and MapReduce Mohammad Husain
Pankil Doshi
James McGlothlin
Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
11/09
UTDCS-42-09 Secure Location Verification with Randomly-Selected Base Stations Matthew Holiday
Neeraj Mittal
Subbarayan Venkatesan
11/09
UTDCS-43-09 ASSERT: A Wireless Networking Testbed Ehsan Nourbakhsh
Jeff  Dix
Paul Johnson
Ryan Burchfield
S. Venkatesan
Neeraj Mittal
Ravi Prakash
11/09
UTDCS-44-09 Time Efficient Neighbor Discovery In Cognitive Radio Networks Yanyan Zeng
Neeraj Mittal
S. Venkatesan
R. Chandrasekaran
11/09
UTDCS-45-09 A Survey of Software Fault Localization Eric Wong
(Pending)
11/09
UTDCS-46-09 Experience with an NSF REU Program  In Software Safety Eric  Wong
(Pending)
11/09
UTDCS-47-09 Industry Involvement in an Undergraduate Software Engineering Project Course:  Everybody Wins Eric Wong
(Pending)
11/09
UTDCS-48-09 Software Safety Standards: How Good Are They? Eric Wong
(Pending)
11/09
UTDCS-49-09 Recent Catastrophic Accidents: Is Software To Blame? Eric Wong
(Pending)
11/09
UTDCS-50-09 Evaluating Dependable Distributed Storage Systems Liangliang Xiao
Yunqi Ye
I-Ling Yen
Farokh Bastani
12/09
UTDCS-51-09 Secure, Dependable and High Performance Cloud Storage Yunqi Ye
I-Ling Yen
Liangliang Xiao
Farokh Bastani
Bhavani Thuraisingham
12/09

Report No. Title Author Date
UTDCS-01-08

Trusted Computing Base for Assured Information Sharing                                                     

Yashaswini Harsha Kumar
Bhavani Thuraisingham
Latifur Khan
1/08
UTDCS-02-08   

Delegation-based Security Model For Web Services                                                                            

Wei She
Bhavani Thuraisingham
I-Ling Yen               
1/08
UTDCS-03-08

FIP: A Fast Planning-Graph Based Iterative Planner                                                                                                      

Jicheng Fu
Farokh Bastani
Vincent Ng
I-Ling Yen
Yansheng Zhang
2/08
UTDCS-04-08

Using Anonymized Data for Classification                                                           

Ali Inan
Murat Kantarcioglu                
3/08
UTDCS-05-08        

Mining Concept-Drifting Data Stream To Detect Peer to Peer Botnet Traffic

Mohammad M. Masud
Jing Gao
Latifur Khan
Jiawei Han
Bhavani Thuraisingham
3/08
UTDCS-06-08  

A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks

Thuc D. Nguyen
Duc H. M. Nguyen
Bao N. Tran
Hai Vu
Neeraj Mittal
3/08
UTDCS-07-08
On Disjoint Connecting Paths and Unsplittable Flow

Andras Farago

3/08
UTDCS-08-08

Speeding Up Large Scale Distance Computations

Andras Farago

3/08
UTDCS-09-08

Fault -Tolerant Dual Power Management in Wireless Sensor Networks

Chang Wang
Myung-Ah Park
James Willson
Andras Farago
Ding-Zhu Du

3/08
UTDCS-10-08
The Effect of Multi-Radio Nodes on Network Connectivity – A Graph Theoretic Analysis
Andras Farago
Stefano Basagni
4/08
UTDCS-11-08

On the Descriptional Complexity of Path Optimization in Graphs

Andras Farago

4/08
UTDCS-12-08

Cross-Media Mapping Framework for 3D Human Motion Document Retrieval

Yohan Jin
B. Prabhakaran

5/08
UTDCS-13-08
Content-based Ontology Matching for GIS Datasets

Jeffrey L. Partyka
Latifur Khan
Bhavani Thuraisingham
Neda Alipanah
Shashi Shekhar

5/08
UTDCS-14-08

A Fast Active Spanning Tree Maintenance Protocol for Dynamic Distributed Systems

Tarun Bansal
Neeraj Mittal

6/08

UTDCS-15-08

On Lower Bounds for Time Complexity of Departure in Dynamic Distributed Systems
Tarun Bansal
Neeraj Mittal
6/08

UTDCS-16-08

PCFM: Probabilistic Contention Free MAC Protocol for Wireless Network
G. Dattatreya
A. Kulkarni
7/08

UTDCS-17-08

Refining a Survey to Collect Expertise In Agile Product Line Requirements Engineering Processes
Kunwu Feng
Yan Tang
Kun Tian
Kendra M.L. Cooper
7/08

UTDCS-18-08

Surgical Haptics and Robotics: Influence of Mismatched Haptic and Visual Display Scales
Gregory S. Lee            Bhavani Thuraisingham
7/08

UTDCS-19-08

Leader Election Algorithms for Multi-Channel Wireless Networks
Tarun Bansal              Neeraj Mittal
S. Venkatesan
7/08

UTDCS-20-08

Synthesize Virtual World Motions From 2D Video Recognition
Yohan Jin                            Myunghoon Suk
B. Prabhakaran
Bhavani Thuraisingham
7/08

UTDCS-21-08

Inferring Private Information Using Social Network Data
Jack Lindamood
Murat Kantarcioglu
7/08

UTDCS-22-08

Content-based Ontology Matching  For GIS Datasets
Jeffrey Partyka
Neda Alipanah
Latifur Khan
Bhavani Thuraisingham
Shashi Shekhar
  7/08

UTDCS-23-08

Secure Haptics and Surgical Robotics: Adaptation to Fitts’ Law Performance Measure for Multi-Target Task Comparisons
Gregory S. Lee
Bhavani Thuraisingham
8/08

UTDCS-24-08

An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks
Chanaka J. Liyana Arachchige
S. Venkatesan
Neeraj Mittal
8/08

UTDCS-25-08

“RF in the Jungle” Reproducibility of Wireless Experiments
Ehsan Nourbakhsh
Ryan Burchfield
Jeff Dix
Kunal Sahu
S. Venkatesan
Ravi Prakash
8/08

UTDCS-26-08

Dynamic Coexistence of Frequency Hopping Networks Using Parallel And Gaussian Allocations
M. M. Hasan
Ravi Prakash
Jason P. Jue
9/08

UTDCS-27-08

Improving Fault Tolerance via Multi-Radio Nodes – A Graph Theoretic Analysis
Andras Farago
Dung Trung Tran
Stefano Basagni
9/08

UTDCS-28-08

Scalability of Node Degrees in Random  Wireless Network Topologies
Andras Farago
9/08

UTDCS-29-08

Incentive Compatible Privacy-Preserving Data Analysis
Murat Kantarcioglu
Wei Jiang
9/08

UTDCS-30-08

Hybrid Approach to Inferring Gene Networks with Expression Profile And Gene Ontology
Liping Jing
Ying Liu
Phil Bachman
9/08

UTDCS-31-08

Multi-Class IP Flow Aggregation In Multicast Optical Networks
Yi Zhu
Jason P. Jue
9/08

UTDCS-32-08

A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data

Mohammad M. Masud
Bhavani Thuraisingham
Jing Gao
Latifur Khan
Jiawei Han
10/08
UTDCS-33-08

A Reusable Process Pattern for Agile Product Line Requirements Engineering

Kojun T.  Hatta
Kendra M. L. Cooper
10/08
UTDCS-34-08
Negation in Coinductive Logic Programming
Richard Min
Gopal Gupta
10/08
UTDCS-35-08

Routing and Scheduling for Time-Shift Reservation Circuit Switching

Ankitkumar N. Patel
Qingya She
Jason P. Jue
10/08
UTDCS-36-08

Routing and Scheduling for Variable          Bandwidth Reservation Circuit Switching

Ankitkumar N. Patel
Jason P. Jue
10/08

UTDCS-37-08

A Kalman Filter for Software Defects Data
Syed Waseem Haider
Joao W. Cangussu
12/08

UTDCS-38-08

PEQ: A Privacy-Preserving Scheme for Answering Exact Queries in Distributed Sensor Data Networks
Neeraj Mittal
S. Venkatesan
Hai Vu                        Thuc Nguyen
12/08

UTDCS-39-08

R2D: Bridging the Gap Between the Semantic Web and Relational Visualization Tool
Sunitha Ramanujam
Anubha Gupta
Latifur Khan
Steven Seida
12/08
UTDCS-40-08
A Framework for the Relational Transformation of RDF Data
Sunitha Ramanujam
Anubha Gupta
Latifur Khan
Steven Seida
Bhavani Thuraisingham
12/08

Report No. Title Author Date
UTDCS-01-07
An Integrated Platform for Secure Geospatial Information Exchange Through the Semantic Web
Bhavani Thuraisingham
Alam Ashraful
Ganesh Subbiah
Latifur Khan
1/07
UTDCS-02-07
Oracle 10 G XE Tutorial (Product of Oracle Corporation)
Srinivasan Iyer
Bhavani Thuraisingham
1/07
UTDCS-03-07
Geospatial Data Mining for National Security: Land Cover Classification And Grouping for Semantic Assessment
Chuanjun Li
Latifur Khan
M. Husain
Bhavani Thuraisingham
Shaofei Chen
Fang Qiu
1/07
UTDCS-04-07
A Multilevel Quantization Index Modulation Based Data Hiding Scheme
Hui Li
Parag Agarwal
Balakrishnan Prabhakaran
1/07
UTDCS-05-07
From Abstract Art to Information Visualization
Kang Zhang
1/07
UTDCS-06-07
On Active Departure for Dynamic Asynchronous Systems
Sathya Peri
Neeraj Mittal
1/07
UTDCS-07-07
A Formal Framework for Modeling and Analysis of Pattern-Based Design
Jing Dong
Tu Peng
Paulo S.C. Alencar
Donald D. Cowan
1/07
UTDCS-08-07
Optimizing Split Networks
Y. Zhang
L. Bao
Sergey Bereg
2/07
UTDCS-09-07
A Polynomial Time Solution to Minimum Forwarding Set Problem In Wireless Ad Hoc Networks
Mehmet Baysan
Kamil Sarac
R. Chandrasekaran
Sergey Bereg
2/07
UTDCS-10-07
Sampling from Independence Systems
András Faragó
2/07
UTDCS-11-07
Methods for Handling Non-Markovian Performance Models
András Faragó
2/07
UTDCS-12-07
Complexity of Cut Paste Moves and Prefix Reversal/Transposition Moves for Strings
Bhadrachalam Chitturi
Hal Sudborough
3/07
UTDCS-13-07
Resource non-Intensive Survivable Clustering for Wireless Sensor Networks
Mohammad M. Hasan
Jason P. Jue
3/07
UTDCS-14-07
A Fast Deterministic Algorithm for Neighbor Discovery in Multi-Channel Cognitive Radio Networks
Neeraj Mittal
Srinivasan Krishamurthy
R. Chandrasekaran
S. Venkatesan
3/07
UTDCS-15-07
Data Hiding Based Compression Mechanism for 3D Models
Hui Li
Parag Agarwal
Balakrishnan Prabhakaran
3/07
UTDCS-16-07
Fast Mobile IPv6 Based Handover with Efficient Prediction for WLAN-UMTS Integrated Networks
Shanthy Menezes
Aesoon Park
S. Venkatesan
3/07
UTDCS-17-07
Spectral Analysis of Complex Networks
Wenyuan Li
Yongjing Lin
Ying Liu
3/07
UTDCS-18-07
Developing a Survey to Collect Expertise in Agile Product Line Requirements Engineering Processes
Kunwu Feng
Meli Lempert
Yan Tang
Kun Tian
Kendra M. L. Cooper
Xavier Franch
4/07
UTDCS-19-07
Accelerometer-Based Human Abnormal Movement Detection in Wireless Sensor Networks
T. Ryan Burchfield
S. Venkatesan
4/07
UTDCS-20-07
Tutorial on QoS Based UML Profile
Hyotaeg Jung
W. Eric Wong
Kendra Cooper
4/07
UTDCS-21-07
Defining Project Scenarios for the Agile Requirements Engineering Product-line Development Questionnaire
Kunwu Feng
Meli Lempert
Yan Tang
Kun Tian
Kendra M. L. Cooper
Xavier Franch
4/07
UTDCS-22-07
Towards Intelligent Services: A Case Study in Chemical Emergency Response
Ajay Bansal
Kunal Patel
Gopal Gupta
B. Raghavachari
E. D. Harris
James C. Staves
4/07
UTDCS-23-07
USDL – Formal Definitions in OWL
Srividya Kona
Ajay Bansal
Gopal Gupta
Thomas D. Hite
4/07
UTDCS-24-07
Maximizing Throughput in ZigBee Wireless Networks through Analysis, Simulations and Implementations
T. Ryan Burchfield
S. Venkatesan
Douglas Weiner
5/07
UTDCS-25-07
Evaluation of Differential Expression Analysis Approaches for Microarray Platform Performance Assessment
Hung-Chung Huang
Xiuwen Zheng
Yun Lian
Leming Shi
Quanzhen Li
Ying Liu
5/07
UTDCS-26-07
Space-Efficient Keying in Wireless Communication Networks
Neeraj Mittal
5/07

UTDCS-27-07

Complexity of MCP and MCSP
Bhadrachalam Chitturi
I. Hal Sudborough
7/07
UTDCS-28-07
Bounds for Sorting Permutations with Prefix Transpositions
Bhadrachalam Chitturi
I. Hal Sudborough
8/07
UTDCS-29-07
Opportunistic Optical Hyperchannel And Its Distributed QoS Assuring Access Control
Jing Chen
Jianping Wang
Hui Yu
S. Q. Zheng
8/07
UTDCS-30-07

1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels

Jing Chen
Ashwin Gumaste
8/07
UTDCS-31-07

An Improved TCAM-Based IP Lookup Engine

Hui Yu
Jing Chen
S. Q. Zheng
Mehrdad Nourani
8/07
UTDCS-32-07
High-Performance TCAM-Based IP Lookup Engines
Hui Yu
Jing Chen
Jianping Wang
S. Q. Zheng
8/07
UTDCS-33-07
Security for Enterprise Resource Planning Systems

Wei She
Bhavani Thuraisingham

8/07

UTDCS-34-07
Secure Semantic Web Services
Bhavani Thuraisingham
8/07
UTDCS-35-07
Extended RBAC-Based Design and Implementation for A Secure Data Warehouse
Bhavani Thuraisingham
Murat Kantarcioglu
Srinivasan Iyer
9/07
UTDCS-36-07
Indexing 3D Human Motion Repositories For Content-based Retrieval
Gaurav N. Pradhan
Balakrishnan Prabhakaran

10/07

UTDCS-37-07
Analysis of Human Performance Using Physiological Data Streams
Gaurav N. Pradhan
Balakrishnan Prabhakaran
10/07
UTDCS-38-07
Multi-stream Pattern Mining with Multi-dimensional Information
Gaurav N. Pradhan
Balakrishnan Prabhakaran

10/07

UTDCS-39-07
Architecture for a Trusted Computing Base For need-to-share in case ofemergencies           
Yashaswini Harsha Kumar
Bhavani Thuraisingham
Latifur Khan
11/07
UTDCS-40-07
Enforcing Honesty in Assured InformationSharing within a Distributed System
Ryan Layfield
Murat Kantarcioglu
Bhavani Thuraisingham

11/07

UTDCS-41-07
Data Mining for Defensive Operations
Mohammad Masud
Latifur Khan
Bhavani Thuraisingham

11/07

UTDCS-42-07
WiMap:  Fast Handover for 802.11 Mobile Devices
A. Kulkarni
S. Menezes
H. Vu
C. Liyana Arachige
G. Dattatreya
11/07
UTDCS-43-07
WORMEROS: A New Framework for Defending Against Wormhole Attacks In Wireless Networks
Hai Vu
Ajay Kulkarni
Kamil Sarac
Neeraj Mittal
12/07
UTDCS-44-07
Procedural Plans in the Context of Code Synthesis
Jicheng Fu
Farokh Bastani
I-Ling Yen
Vincent Ng
12/07
UTDCS-45-07
Information Operations Across Infospheres:  Volume 2
Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
Yashaswini Harsha KumarMehedy Masud
Ryan Layfield
12/07

Report No. Title   Author Date
UTDCS-01-06
OWL-S Ontology Framework Extension For Dynamic Web Service Composition
Jing Dong
Yongtao Sun
1/06
UTDCS-02-06
Dependable and Secure TMO Scheme
Jung-In Kim
Bhavani Thuraisingham
1/06
UTDCS-03-06
Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF)
Ashraful Alam
Bhavani Thuraisingham
1/06
UTDCS-04-06
An Adaptable Perturbation Model of Privacy Preserving Data Mining
Li Liu
Bhavani Thuraisingham
Murat Kantarcioglu
Latifur Khan
1/06
UTDCS-05-06
Face Recognition Using Various Classifiers: Artificial Neural Network, Linear Discriminant and Principal Component Analysis
Pallabi Parveen
Bhavani Thuraisingham
1/06
UTDCS-06-06
Administering The Semantic Web: CPT: Confidentiality, Privacy and Trust Management
Nathalie Tsybulnik
Bhavani Thuraisingham
2/06
UTDCS-07-06
An Efficient Handover Scheme Based On Fast Mobile IPv6
Shanthy Menezes
Kwang-hyun Ro
S. Venkatesan
2/06
UTDCS-08-06
A Projected Clustering Algorithm in High Dimensional Space
Ping Deng
Weili Wu
Yaochun Huang
Zhongnan Zhang
2/06
UTDCS-09-06
Topology Sampling: Challenges, Solutions
Kamil Sarac
Turgay Korkmaz
Sevcan Bilir
3/06
UTDCS-10-06
Small Group Multicast with Deflection Routing in Optical Burst Switched Networks
Xiaodong Huang
Qingya She
Jason P. Jue
3/06
UTDCS-11-06
Coinductive Logic Programming
Luke Simon
Ajay Mallya
Ajay Bansal
Gopal Gupta
3/06
UTDCS-12-06
Mining Quantitative Maximal Hyperclique Patterns: A Summary Of Results
Yaochun Huang
Hui Xiong
Weili Wu
3/06
UTDCS-13-06
On the Complexity of the Privacy Problem in Databases
Bhavani Thuraisingham
3/06
UTDCS-14-06
Inference Control for Document Release and Dissemination
Bhavani Thuraisingham
3/06
UTDCS-15-06
Individually Adaptable Perturbation Model for Privacy Preserving Data Mining
Li Liu
Murat Kantarcioglu
Bhavani Thuraisingham
3/06
UTDCS-16-06
Enhanced RUP Vision Document for the Quality Assurance Review Assistant Tool: Defining Stakeholders and Goals
Shiney Abraham
Ramya Pramod
Kendra Cooper
3/06
UTDCS-17-06
On Maximum Key Pool Size for a Key Pre-Distribution Scheme in Wireless Sensor Networks
Neeraj Mittal
Tarun R. Belagodu
3/06
UTDCS-18-06
USDL: A Service-Semantics Description Language for Automatic Service Discovery and Composition
Srividya Kona
Ajay Bansal
Luke Simon
Thomas D. Hite
Ajay Mallya
Gopal Gupta
3/06
UTDCS-19-06
OurCapProbe: Improving CapProbe to find and estimate capacities of bottleneck link and other choke links
Chalam Chitturi
Kamil Sarac
4/06
UTDCS-20-06
Finding the Inversion Distance Between Strings Over a Finite Alphabet
Bhadrachalam Chitturi
Hal Sudborough
Walter Voit
4/06
UTDCS-21-06
Co-Logic Programming: Extending Logic Programming with Co-Induction
Luke Simon
Ajay Mallya
Ajay Bansal
Gopal Gupta
4/06
UTDCS-22-06
Design and Implementation of a Secure Social Network System
Ryan Layfield
Bhavani Thuraisingham
4/06
UTDCS-23-06
Algorithms for Node Discovery and Configuration in Cognitive Radio Networks
Srinivasan Krishnamurthy
R. Chandrasekaran
S. Venkatesan
Neeraj Mittal
5/06
UTDCS-24-06
A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network
Vinay Madenur
Neeraj Mittal
5/06
UTDCS-25-06
Generalized Replicator Dynamics for Efficiently Building Phylogenetic Tree
Wenyuan Li
Ying Liu
6/06
UTDCS-26-06
Requirements and Software Architecture for the CAT Assistant Tool: Supporting the COTS-Aware Requirements engineering and Software Architecting (CARE/SA) Approach (version 2.0)
Michael McFadden
Shirish Pulikkal
Kendra Cooper
6/06
UTDCS-27-06
Detecting New Malicious Executables Using Data Mining
Mohammad M. Masud
Latifur Khan
Bhavani Thuraisingham
Mamoun A. Awad
7/06
UTDCS-28-06
On Complexity of Transforming Strings with Prefix Reversals and Prefix Transpositions
Bhadrachalam Chitturi
I. Hal Sudborough
7/06
UTDCS-29-06
Solving Computation Slicing Using Predicate Detection
Neeraj Mittal
Alper Sen
Vijay K. Garg
7/06
UTDCS-30-06
A Near Optimal Uniform Key Pre-Distribution Scheme Using Deployment Knowledge
Neeraj Mittal
7/06
UTDCS-31-06
On Lower Bounds for Node Discovery And Configuration in Cognitive Radio Networks
R. Chandrasekaran
S. Venkatesan
Neeraj Mittal
Srinivasan Krishnamurthy
7/06
UTDCS-32-06
Fingerprint Matching Algorithm Based On Tree Comparison Using Ratios of Relational Distances
Abinandhan Chandrasekaran
Bhavani Thuraisingham
7/06
UTDCS-33-06
Evaluating Dependable Distributed Storage Systems
Yanjin Zhang
Liangliang Xiao
Manghui Tu
I-Ling Yen
8/06
UTDCS-34-06
Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks
Maulin Patel
S. Venkatesan
R. Chandrasekaran
8/06
UTDCS-35-06
Medium Access Control Protocols For Cognitive Radio-based Multi-hop Wireless Networks
Mansi Thoppian
Ravi Prakash
S. Venkatesan
8/06
UTDCS-36-06
Robust Blind Watermarking Mechanism For 3D Point Sampled Geometry
Parag Agarwal
B. Prabhakaran
8/06
UTDCS-37-06
Home Appliance Control System Use Case Model Survey, Version 1.0
Kendra Cooper
Christine Ayers
8/06
UTDCS-38-06
A Survey of Formal Methods for Software Architecture
Longji Tang
Jing Dong
9/06
UTDCS-39-06
A Scalable Clustering Method Based on Density
Kathryn Bean
Sergey Bereg
Latifur Khan
Bhavani Thuraisingham
9/06
UTDCS-40-06
Detecting Malicious Executables Using Assembly Feature Retrieval
Mohammad M. Masud
Latifur Khan
Bhavani Thuraisingham
9/06
UTDCS-41-06
Safe Termination Detection in an Asynchronous Distributed System when Processes may Crash and Recover
Neeraj Mittal
Kuppahalli L. Phaneesh
Felix C. Freiling
10/06
UTDCS-42-06
THIS: Threshold Security of Information Aggregation for Sensor Networks
Hai Vu
Neeraj Mittal
S. Venkatesan
10/06
UTDCS-43-06
Assured Information Sharing: Technologies, Challenges and Directions
Bhavani Thuraisingham
10/06
UTDCS-44-06
Design and Implementation of Policy Enforcement, Data Sharing and Mining Components for Trustworthy Coalitions
Mamoun Awad
Dilsad Cavus
Latifur Khan
Manjunath Reddy
Bhavani Thuraisingham
10/06
UTDCS-45-06
Design and Simulation of Agent-based Trust Management Techniques for a Coalition Environment
Srinivasan Iyer
Bhavani Thuraisingham
10/06
UTDCS-46-06
Research and Simulation of Game Theoretical Techniques for Data Sharing Among Semi-Trustworthy Partners
Ryan Layfield
Murat Kantarcioglu
Bhavani Thuraisingham
10/06
UTDCS-47-06
Defensive Information Operations: DETECTING MALICIOUS EXECUTABLES USING ASSEMBLY FEATURE RETRIEVAL in an Untrustworthy Environment
M. Mehedy Masud
Latifur Khan
Bhavani Thuraisingham
10/06
UTDCS-48-06
Information Operations Across Infospheres: Volume 1
Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
Mamoun Awad
Dilsad Cavus
Ryan Layfield
Mehedy Masud
Srinivasan Iyer
10/06
UTDCS-49-06
A Wrapped Spherical Covering with Optimal Covering Density
Yuanyi Zhang
Sergey Bereg
10/06
UTDCS-50-06
A Network-flow-based Integral Optimal Algorithm for Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks
Maulin Patel
S. Venkatesan
R. Chandrasekaran
10/06
UTDCS-51-06
A Novel Privacy Preserving Decision Tree Algorithm
Li Liu
Murat Kantarcioglu
Bhavani Thuraisingham
10/06
UTDCS-52-06
Fault-Tolerant Dual Power Assignment In Wireless Sensor Networks
Myung-Ah Park
Wang Chen
James K. V. Willson
Weili Wu
Andras Farago
10/06
UTDCS-53-06
A Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different Transmission Range
Myung-Ah Park
Wang Chen
James K. V. Willson
My T. Thai
Weili Wu
Andras Farago
10/06
UTDCS-54-06
Prefix Reversals on Strings
Bhadrachalam Chitturi
Hal Sudborough
11/06
UTDCS-55-06
Prefix Transpositions on Strings
Bhadrachalam Chitturi
Hal Sudborough
11/06
UTDCS-56-06
Demand-driven Retrieval Schedules For Progressive Transmission of 3D Animations
H. Li
V.S. Ramaswamy
B. Prabhakaran
11/06
UTDCS-57-06
Quantifying the Impact of Alias Resolution on traceroute-based Sample Network Topologies
Mehmet Hadi Gunes
Nicolas Sanchis Nielsen
Kamil Sarac
11/06
UTDCS-58-06
Face Segmentation for Privacy Preserving Video Surveillance
Sai Chaitanya
Bhavani Thuraisingham
11/06
UTDCS-59-06
Modeling Nonlinearity in Dilution Design Microarray Data
Xiuwen Zheng
Hung-Chung Huang
Wenyuan Li
Peng Liu
Quan-Zhen Li
Ying Liu
11/06
UTDCS-60-06
A Comparative Study of a Key Agreement Protocol Based on ECC and RSA
Vibha Sethi
Bhavani Thuraisingham
11/06
UTDCS-61-06
RFID Technologies and Their Applications
Abinandhan Chandrasekaran
Bhavani Thuraisingham
11/06
UTDCS-62-06
Resolving IP Aliases in Building Traceroute-Based Internet Maps
Mehmet H. Gunes
Kamil Sarac
12/06
UTDCS-63-06
CSMA-Based Mac Protocol for Cognitive Radio Based Multi-Hop Wireless Networks
Mansi Thoppian
S. Venkatesan
Ravi Prakash
12/06
UTDCS-64-06
Secure Grid Computing
Jianmin Zhu
Bhavani Thuraisingham
12/06
UTDCS-65-06
Face Recognition Using Multiple Classifiers
Pallabi Parveen
Bhavania Thuraisingham
12/06
UTDCS-66-06
A Framework for a Video Analysis Tool for Suspicious Event Detection
Gal Lavee
Latifur Khan
Bhavani Thuraisingham
12/06
UTDCS-67-06
HERoISM: Harmonious Existence of RadiOs in the ISM Band
Qasim Javed
Kunal Sahu
Ravi Prakash
12/06
UTDCS-68-06
A Model for Risk Adaptive Access Control in RBAC Employed Distributed Environments
Ebru Celikel
Murat Kantarcioglu
Bhavani Thuraisingham
Dilsad Cavus
12/06
UTDCS-69-06
Rule Generalization in the Component Parameterization Technique – a Formal Approach
Jia Zhou
Kendra Cooper
I-Ling Yen
12/06
UTDCS-70-06
Route Finder on PDA – An Application Of the Component Parameterization Technique
Jia Zhou
Kendra Cooper
I-Ling Yen
12/06