Technical Reports
Click the year to view its related technical reports.
2024
Report No. | Title | Author | Date |
---|---|---|---|
Tree-Based JSON Schema Inference: A Visualizable Approach for Deriving Schemas from JSON Data | Prabhleen Kaur Saini Sai Prasad Matam Bhadrachalam Chitturi |
2023
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-23 | ScanToVR: An RGB-D to VR Reconstruction Framework | Hiranya Garbha Kumar Ninad Arun Khargonkar Balakrishnan Prabhakaran | 2/23 |
2022
Report No. | Title | Author | Date |
---|---|---|---|
ScanToVR: An RGB-D to VR Reconstruction Framework | Hiranya Garbha Kumar Ninad Arun Khargonkar Balakrishnan Prabhakaran |
2021
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-21 | Near Real-Time Forgery Detection and Localization in Stereo RGB and 3D LiDAR Data from Autonomous Vehicles | Somayeh Mohammadpour Sagnik Dakshit Balakrishnan Prabhakaran | 2/21 |
UTDCS-02-21 | CEFEs: A CNN Explainable Framework for ECG Signals | Barbara Mukami Maweu Sagnik Dakshit Rittika Shamsuddin Balakrishnan Prabhakaran | 2/21 |
UTDCS-04-21 | A Mobile App for Managing Infectious Diseases on Campus | Austin Mordahl Abdul Hadi Khan Faraz Khalid Kevin Nguyen Swathi Poseti Jean-Felix Abellera Carlos Hevia Joshua Ruiz Teena Thomas Chinthoorie Yogalingam Naif Alatrash James Chen Evan Guo Michael Smith Meng-Hsiang Chang Rym Zalila-Wenkstern | 4/21 |
UTDCS-06-21 | Sorting R∗2n over a Matchstick Tree | Nairit Sarkar Jarvis Xie Bhadrachalam Chitturi | 6/21 |
UTDCS-10-21 | A 4-Approximation Algorithm for Sorting 2-Permutations Using Adjacent Swaps | Jayakumar P Bhadrachalam Chitturi | 10/21 |
UTDCS-10-18-21 | Adjacent Swaps on Strings | Bhadrachalam Chitturi Minnu Mohandas Hal Sudborough Walter Voit | 10/18/21 |
UTDCS-11-29-21 | Sorting Permutations with Brooms | Indulekha T S Bhadrachalam Chitturi | 11/29/21 |
2020
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-20 | A New Upper Bound for Sorting Permutations with Prefix Transpositions | Bhadrachalam Chitturi Pramod Nair Rajan Sundaravaradhan | 1/20 |
UTDCS-02-20 | An HIL testbed for Medical Cyber-Physical Systems | Bhadrachalam Chitturi Sriram Karunagaran Karuna P. Sahoo Masahiro Fujita | 2/20 |
UTDCS-09-20 | Sorting permutations with transpositions in an amortized time of O(n2) n-bit logical operations | Bhadrachalam Chitturi Priyanshu Das | 9/20 |
UTDCS-09-20 | Improved Upper Bound for Sorting Permutations by Prefix Transpositions | Bhadrachalam Chitturi Rajan Sundaravaradhan Pramod P Nair | 9/20 |
UTDCS-12-20 | Approximation Algorithms for Sorting by Extreme Block-interchanges | Bhadrachalam Chitturi Jayakumar Pai | 12/20 |
2019
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-19 | Exact Upper Bound for Sorting Rn with LE | Bhadrachalam Chitturi Sai Satwik Kuppili | 9/19 |
2018
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-18 | Distances in and Layering of a DAG | Bhadrachalam Chitturi Priyanshu Das | 1/18 |
UTDCS-02-18 | Sorting permutations with transpositions in average case time of O(n^3) | Bhadrachalam Chitturi Priyanshu Das | 3/18 |
UTDCS-03-18 | Multistream Classification with Heterogeneous Feature Space | Yifan Li Yang Gao Hemeng Tao Latifur Khan Patrick Brandt | 9/18 |
UTDCS-04-18 | FRUGAL: Provisioning of Fog Services over 5G Slices To Meet QoS with Minimal Cost | Ashkan Yousefpour Jason P. Jue | 11/18 |
2017
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-17 | QoS-aware Dynamic Fog Service Provisioning | Ashkan Yousefpour Ashish Patil Genya Ishigaki Jason P. Jue Inwoong Kim Xi Wang Hakki C. Cankaya Qiong Zhang Weisheng Xie | 10/17 |
UTDCS-02-17 | The maximum independent set problem on layered graphs | Bhadrachalam Chitturi | 11/17 |
UTDCS-03-17 | Characterization of Super Oriented Cycles | Jayakumar Pai Bhadrachalam Chitturi | 11/17 |
2016
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-16 | Visualizing Large Graphs by Layering and Bundling Graph Edges | Zhuang Cai Kang Zhang Dong-Ni Hu | 2/16 |
UTDCS-03-16 | A Self-Stabilizing Algorithm for the Foraging Problem in Swarm Robotic Systems | Guang Zhou Farokh Bastani Wei Zhu I-Ling Yen | 3/16 |
UTDCS-04-16 | Data Driven Approach to the Science of Cyber Security | Bhavani Thuraisingham Murat Kantarcioglu Kevin Hamlen Elisa Bertino Tim Finin Anupam Joshi Tim Oates | 3/16 |
UTDCS-05-16 | An Agile Cyber Defense Framework | Elisa Bertino et al. | 3/16 |
UTDCS-06-16 | InXite: Stream Data Mining for Social Media | Bhavani Thuraisingham et al. | 3/16 |
UTDCS-08-16 | Spectrum-Efficient Virtual Optical Network Provisioning over Flexible-Grid Multi-Domain Optical Networks | Sangjin Hong Jason P. Jue Pyungkoo Park Sunchul Kim Hoyong Ryu | 4/16 |
UTDCS-10-16 | Compact Structure Patterns in Proteins | Bhadrachalam Chitturi Shuoyong Shi Lisa N. Kinch Nick V. Grishin | 7/16 |
UTDCS-11-16 | A Study of Gene Prioritization Algorithms on PPI Networks | Sinsha K P Bhadrachalam Chitturi | 9/16 |
UTDCS-12-16 | Exploring Functional Clinical Attributes For Macular Dystrophy Detection | Rittika Shamsuddin Yizhong Wang Balakrishnan Prabhakaran | 10/16 |
UTDCS-13-16 | Roughly Polynomial Time: A Concept of Efficiency That Avoids Conflict with Intractablility | Andras Farago | 11/16 |
UTDCS-15-16 | Estimating Clustering Coefficients via Metropolis-Hastings Random Walk and Wedge Sampling on Large OSN Graphs | Emrah Cem Kamil Sarac | 11/16 |
UTDCS-16-16 | A Clustering-Based Approach for Workload Estimation in the Cloud | Yongjia Yu Vasu Jindal I-Ling Yen Farokh Bastani Jie Xu Peter Garraghan | 11/16 |
UTDCS-17-16 | MCDC-Star-An Open-source MC/DC Measurement Tool | Linghuam Hu Ruizhi Gao W. Eric Wong | 11/16 |
2015
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-15 | On Expected Number of Prefix Transpositions Required To Sort A Permutation | Bhadrachalam Chitturi Amrita Vishwa Vidyapeetham Amritapuri Campus | 1/15 |
UTDCS-02-15 | A Validated Regression Model for Complexity of Polygonal Shapes | Lingchen Dai Xianjun Zheng Ying Li Kang Zhang Ralph Martin Jinhui Yu | 3/15 |
UTDCS-03-15 | Adjacencies in Permutations | Bhadrachalam Chitturi Amrita Vishwa Vidyapeetham | 4/15 |
UTDCS-04-15 | Comet Smart Campus Multi-Agent and Visualizations Systems Lab | Jennifer Jiang Nikolay Bourov Sihui Huang Rym Zalila-Wenkstern | 5/15 |
UTDCS-05-15 | Update Propagation in MapReduce Systems | Huseyin Ulusoy Murat Kantarcioglu Erman Pattuk | 6/15 |
UTDCS-06-15 | FIFA: The Framework for Interaction Fidelity Analysis | Ryan P. McMahan Eric D. Ragan Doug A. Bowman Fei Tang Chengyuan Lai | 7/15 |
UTDCS-08-15 | MSeer – An Advanced Technique for Locating Multiple Bugs in Parallel | Ruizhi Gao W. Eric Wong | 8/1 |
UTDCS-11-15 | Toward Sematic Enhancement of Monitoring Data Repository | Shuai Zhang I-Ling Yen Farokh B. Bastani | 11/15 |
UTDCS-12-15 | SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data Stream | Ahsanul Haque Latifur Khan Michael Baron | 12/15 |
UTDCS-13-15 | Improving Efficacy of Internal Binary Search Trees using Local Recovery | Arunmoezhi Ramachandran Neeraj Mittal | 13/15 |
2014
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-14 | SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification | David I. Urbina Juan Caballero Yufei Gu Zhiqiang Lin | 1/14 |
UTDCS-02-14 | A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems | Rym Zalila-Wenkstern Mohammad Al-Zinati | 1/14 |
UTDCS-03-14 | Multidimensional Motif Discovery in Physiological and Biomedical Time Series Data | Arvind Balasubramanian Jun Wang B. Prabhakaran | 2/14 |
UTDCS-04-14 | Exploring Baseline Shift Prediction in Respiration Induced Tumor Motion | Arvind Balasubramanian Rittika Shamsuddin Yam Cheung Amit Sawant Balakrishnan Prabhakaran | 4/14 |
UTDCS-05-14 | Lexico-minimizing Survival Frequency For a Replica Placement Problem in Tree-based Failure Models | K. Alex Mills R. Chandrasekaran Neeraj Mittal | 4/14 |
2013
Report No. | Title | Author | Date |
UTDCS-01-13 | Ghost Agent-Based Autonomic Adapter | Rym Zalila-Wenkstern | 2/13 |
UTDCS-02-13 | Noise Tolerant Motif Discovery in Time Series Datasets | Arvind Balasubramanian Balakrishnan Prabhakaran | 2/13 |
UTDCS-03-13 | Hippocratic Binary Instrumentation: First Do No Harm (Extended Version) | Kevin W. Hamlen Meera Sridhar Richard Wartell | 2/13 |
UTDCS-04-13 | A Self-Organizing Model for Decentralized Virtual Environments In Agent-Based Simulation Systems | F. Araujo M. Al-Zinati J. Valente Rym Z. Wenkstern | 3/13 |
UTDCS-05-13 | Measuring Expertise and Bias in Cyber security Using Cognitive and Neuro-Science Approaches | Daniel Krawczyk James Bartlett Murat Kantarcioglu Kevin Hamlen Bhavani Thuraisingham | 3/13 |
UTDCS-06-13 | An Effective Approach for Web Forum Topic Detection | Zhiming Chen Andras Farago | 3/13 |
UTDCS-07-13 | On the Relationship Between Hyperlinks and Textual Similarity | Zhiming Chen Andras Farago | 3/13 |
UTDCS-08-13 | Decreasing the Size of Grounded Logic Programs | Feliks Kluzniak Kyle Marple | 4/13 |
UTDCS-09-13 | Analyzing and Securing On-Line Social Networks | Bhavani Thuraisingham Satyen Abrol Raymond Heatherly Murat Kantarcioglu Vaibhav Khadilkar Latifur Khan | 4/13 |
UTDCS-10-13 | A Semantic-based Semi-automated Mapping Mechanism | Lijuan Diao Wei She I-Ling Yen Junzhong Gu | 5/01 |
UTDCS-11-13 | A Short Note on Sorting Permutations With Brooms | Bhadrachalam Chitturi (Approved by Dr. Gopal Gupta) | 5/01 |
UTDCS-12-13 | Shingled Graph Disassembly: Finding the Undecideable Path | Richard Wartell Yan Zhou Kevin W. Hamlen Murat Kantarcioglu | 6/13 |
UTDCS-13-13 | Improved Approximation Algorithm for k-interval Cover Problem | Balaji Raghavachari Bhadrachalam Chitturi | 8/13 |
UTDCS-14-13 | Specification and Verification of Serious Educational Game Models | Muhammad Shoaib Kendra M.L. Cooper | 8/13 |
UTDCS-15-13 | Towards Intelligent Semi-automated Game Generation in SimSYS: A Component-based Approach | Kaleb Breault Ricardo Daconceicao Carsten Locke Chris Mojica Kendra M.L. Cooper C. Shaun Longstreet | 8/13 |
UTDCS-16-13 | Employing WiFi Direct to Build a Wireless Network over Both 2.4 GHz and 5.8 GHz Bands | Sabur Hassan Baidya Pramod Shirol Abhishek Basu Ravi Prakash | 9/13 |
UTDCS-01-14 | SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification | David I. Urbina Yufei Gu Juan Caballero Zhiqiang Lin | 1/14 |
UTDCS-02-14 | A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems | Mohammad Al-Zinati Rym Zalila-Wenkstern | 2/14 |
2012
Report No. | Title | Author | Date |
UTDCS-01-12 | Security Analysis for Order Preserving Encryption Schemes | Liangliang Xiao Osbert Bastani 1-LingYen | 1/12 |
UTDCS-02-12 | Extending Order Preserving Encryption For Multi-User Systems | Liangliang Xiao 1-LingYen Dung T. Huynh | 2/12 |
UTDCS-03-12 | An Efficient Homomorphic Encryption Protocol for Multi-User Systems | Liangliang Xiao Osbert Bastani 1-LingYen | 2/12 |
UTDCS-04-12 | Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes | Liangliang Xiao 1-LingYen | 2/12 |
UTDCS-05-12 | A Service Pattern Model and Its Instantiation Using Rule-Based Reasoning | Chien-Hsiang Lee San-Yih Hwang 1-LingYen | 2/12 |
UTDCS-06-12 | Towards Model Driven Game Engineering in SimSYS: Game Requirements for the Agile Software Development Process Game | Kendra M.L. Cooper C. Shaun Longstreet | 3/12 |
UTDCS-07-12 | Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method | Hongbing Lian Andras Farago | 4/12 |
UTDCS-08-12 | Random Network Topology Models With Perturbations | Andras Farago | 4/12 |
UTDCS-09-12 | Towards a Reference Architecture for Agent-Based Autonomic Software Systems | Rym Zalila Wenkstern D. Urbina F. Araujo T. Steel | 6/12 |
UTDCS-10-12 | Concurrent Lock-Free Binary Search Trees | Aravind Natarajan Neeraj Mittal | 7/12 |
UTDCS-11-12 | Online Algorithms to Generate Slices for Regular Temporal Logic Predicates Networks | Aravind Natarajan Neeraj Mittal | 7/12 |
UTDCS-12-12 | Designer Satellite Collisions from Covert Cyber War ( Selected Papers in Security Studies – Volume 8 ) | Jan Kallberg Bhavani Thuraisingham | 8/12 |
UTDCS-13-12 | Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal ( Selected Papers in Security Studies – Volume 9 ) | Jan Kallberg | 8/12 |
UTDCS-14-12 | An Algorithm for Propositional Logic Programs | Feliks Kluzniak Gopal Gupta | 9/12 |
UTDCS-15-12 | Decreasing the Size of Grounded Logic Programs | Feliks Kluzniak Kyle Marple | 9/12 |
UTDCS-16-12 | Concurrent Wait-Free Red Black Trees | Aravind Natarajan Lee H. Savoie Neeraj Mittal | 10/12 |
UTDCS-17-12 | Sorting Permutations With A Transposition Tree | Bhadrachalam Chitturi | 10/12 |
UTDCS-18-12 | A Run-time Self-Organizing Model for Decentralized Virtual Environments | Frederico Araujo J. Valente M. Al-Zinati Rym Z. Wenkstern | 10/12 |
UTDCS-19-12 | Regenerator Site Selection and Regenerator Placement for Mixed Line Rate Optical Networks | Weisheng Xie Jason P. Jue | 10/12 |
UTDCS-20-12 | On Efficient Gene Prioritization | Bhadrachalam Chitturi Balaji Raghavachari Donghyun Kim | 11/12 |
UTDCS-21-12 | Towards High-level Awareness: A Cognitive Awareness Model and A Survey | Cong Chen Kang Zhang | 11/12 |
UTDCS-22-12 | Network Reliability Analysis with Unreliable Information | Andras Farago | 11/12 |
2011
Report No. | Title | Author | Date |
UTDCS-01-11 | Better Upper Bound for Prefix Transposition Distance over Permutations | Bhadrachalam Chitturi Hal Sudborough | 1/11 |
UTDCS-02-11 | Impact of Aspect Oriented Approach on GoF Design Patterns | Jayashree V. Pathangi Kendra M. L. Cooper | 1/11 |
UTDCS-03-11 | Modeling and Verification of Cyber-Physical Systems with Co-inductive Constraint Logic Programming | Neda Saeedloei Gopal Gupta | 1/11 |
UTDCS-04-11 | High-Speed Multi-Input FIFO Queues with Applications | S. Q. Zheng | 1/11 |
UTDCS-05-11 | Low Distortion Metric Embeddings Into Constant Dimension | Andras Farago | 1/11 |
UTDCS-06-11 | Regenerator Placement in Waveband Networks with Impairment Constraints | Saket Varma Jason P. Jue | 1/11 |
UTDCS-07-11 | Impairment-constrained Multi-rate Multicast Flow Aggregation in IP Over Optical Networks | Yi Zhu Jason P. Jue | 2/11 |
UTDCS-08-11 | Analysis of Cloud Architecture Layouts and Commercial Clouds | Sindhuja Narasimhan Kendra M.L. Cooper | 2/11 |
UTDCS-09-11 | The Financial Crisis of 2007-2009: EVENTS AND CAUSES | Irina Sakharova Weili Wu | 2/11 |
UTDCS-10-11 | Modeling Security Using an Aspect-oriented Architecture-Centric Process: A Banking System Study | Eric Blackburn Kendra M.L. Cooper | 2/11 |
UTDCS-11-11 | Routing, Wavelength Assignment, and Spectrum Allocation Algorithms in Transparent Flexible Optical WDM Networks | Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang | 3/11 |
UTDCS-12-11 | Federated Query Processing Using Ontology Structure and Ranking In a Service Oriented Environment | Neda Alipanah Pallabi Parven Latifur Khan Bhavani Thuraisingham | 3/11 |
UTDCS-13-11 | Service-Oriented Approach to Electronic Health Records | Kendra Cooper Thomas Omen | 3/11 |
UTDCS-14-11 | Subnet Level Internet Topology Mapping | M. Engin Tozal Kamil Sarac | 5/11 |
UTDCS-15-11 F. | Automatic Software Engineering: An Achievable Dream? | R. Zalila Wenkstern D. Urbina Araujo T. Steel | 5/11 |
UTDCS-16-11 | Chekov: Aspect-Oriented Runtime Monitor Certification via Model-Checking (Extended Version) | Kevin W. Hamlen Micah M. Jones Meera Sridhar | 5/11 |
UTDCS-17-11 | Exploring Structural Properties Of Web Graphs through 3D Visualization | Zhiming Chen Kang Zhang Andras Farago | 5/11 |
UTDCS-18-11 | TL Reference Manual | Feliks Kluzniak | 6/11 |
UTDCS-19-11 | Domain-Disjoint Routing Based on Topology Aggregation for Survivable Multi-Domain Optical Networks | Chengyi Gao Mohammad M. Hasan Jason P. Jue | 7/11 |
UTDCS-20-11 | Regenerator Site Selection in Waveband Optical Networks Supporting Mixed Line Rates | Saket Varma Jason P. Jue | 7/11 |
UTDCS-21-11 | Handling Deviations in Network Models | Andras Farago | 7/11 |
UTDCS-22-11 | RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Translation | Jyothsna Rachapalli Vaibhav Khadilkar Murat Kantarcioglu Bhavani Thuraisingham | 8/11 |
UTDCS-23-11 | Coinductive Constraint Logic Programming | Neda Saeedloei Gopal Gupta | 8/11 |
UTDCS-24-11 | An Extension of n-Calculus with Real-Time and its Realization in Logic Programming | Neda Saeedloei Gopal Gupta | 8/11 |
UTDCS-25-11 | Estimating Network Layer Subnet Characteristics via Statistical Sampling | M. Engin Tozal Kamil Sarac | 9/11 |
UTDCS-26-11 | Modeling and Analyzing Enterprise Cloud Service Architecture | Longji Tang Farokh B. Bastani Wei-Tek Tsai Jing Dong Liang-Jie Zhang | 9/11 |
UTDCS-27-11 | Towards the Design and Implementation Of a Cloud-Centric Assured Information Sharing System | Bhavani Thuraisingham Vaibhav Khadilkar Tyrone Cadenhead Jyothsna Rachapalli Murat Kantarcioglu Kevin Hamlen Latifur Khan Farhan Husain | 9/11 |
UTDCS-28-11 | Waveband Selection, Spectrum, and Waveband Assignment in Uniform and Non-Uniform OFDM-based Elastic Optical Waveband Network | Saket Varma Jason P. Jue | 10/11 |
UTDCS-29-11 | Routing, Wavelength Assignment, and Spectrum Allocation in Wavelength-Convertible Flexible Optical WDM Networks | Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang | 10/11 |
UTDCS-30-11 | Optimized Ontology-driven Query Expansion Using Map-Reduce Framework To Facilitate Federated Queries | Neda Alipanah Latifur Khan Bhavani Thuraisingham | 11/11 |
UTDCS-31-11 | Risk-Aware Data Processing in Hybrid Clouds | Vaibhav Khadilkar Kerim Yasin Oktay Bijit Hore Murat Kantarcioglu Sharad Mehrotra Bhavani Thuraisingham | 11/11 |
UTDCS-32-11 | A Model for Cognitive Radio Networks | Hongbing Lian Andras Farago | 11/11 |
UTDCS-33-11 | Wait-Free Red-Black Trees with Fast Reads and Writes | Aravind Natarajan Lee Savoie Neeraj Mittal | 11/11 |
UTDCS-34-11 | Selected Papers in Security Studies:Volume 5: Payment Card Fraud: Challenges and Solutions | Irina Sakharova Latifur Khan | 11/11 |
UTDCS-35-11 | Selected Papers in Security Studies: Volume 6: The Continued War on Terrorism – How to Maintain Long-Range Terrorist Deterrence | Jan Kallberg Bhavani Thuraisingham | 12/11 |
UTDCS-36-11 | Selected Papers in Security Studies: Volume 7: Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information Sharing | Bhavani Thuraisingham | 12/11 |
UTDCS-37-11 | Data Stream Classification with Bounding Component Classification Models | Tahseen M. Al-Khateeb Mohammad M. Masud Latifur Khan Jiawei Han | 12/11 |
UTDCS-38-11 | Recurrence and Novel Class Detection With Bounding Component Ensembles | Tahseen M. Al-Khateeb Mohammad M. Masud Latifur Khan Charu C. Aggarwal | 12/11 |
UTDCS-39-11 | A Heuristic Optimization Method and Its Application in Cognitive Radio Networks | Hongbing Lian Andras Farago | 12/11 |
UTDCS-40-11 | Security Analysis for OPE and Generalized OPE Schemes | Liangliang Xiao Osbert Bastani I-Ling Yen | 12/11 |
UTDCS-41-11 | Extending Order Preserving Encryption For Multi-User Systems | Liangliang Xiao I-Ling Yen Dung T. Huynh | 12/11 |
UTDCS-42-11 | An Efficient Homomorphic Encryption Scheme | Liangliang Xiao Osbert Bastani I-Ling Yen | 12/11 |
UTDCS-43-11 | Security Analysis for Prefix-Preserving Encryption Schemes | Liangliang Xiao I-Ling Yen | 12/11 |
UTDCS-44-11 | Combined 2R/3R Regenerators Placement in Optical WDM Networks | Ankitkumar N. Patel Philip N. Ji Avishek Nag Yua-Kai Huang Ezra Ip Jason P. Jue Ramaswami Chandrasekaran Ting Wang | 12/11 |
2010
Report No. | Title | Author | Date |
UTDCS-01-10 | Semantic Web Implementation Scheme for National Vulnerability Database (Common Platform Enumeration Data) | Vaibhav Khadilkar Jyothsna Rachapalli Bhavani Thuraisingham | 1/10 |
UTDCS-02-10 | Security Issues for Cloud Computing | Kevin Hamlen Murat Kantarcioglu Latifur Khan Bhavani Thuraisingham | 2/10 |
UTDCS-03-10 | Securing the Execution Environment Applications and Data from Multi-Trusted Components | Elisa Bertino Gabriel Ghinita Kevin Hamlen Murat Kantarcioglu Hsien-Hsin S. Lee Ninghui Li Calton Pu Ravi Sandhu Waleed Smari Bhavani Thuraisingham Gene Tsudik Dongyan Xu Shouhuai Xu | 2/10 |
UTDCS-04-10 | Ranking Entities from Multiple Ontologies to Facilitate Federated Queries | Neda Alipanah Julie Rauer Latifur Khan Steven B. Seida Bhavani Thuraisingham | 2/10 |
UTDCS-05-10 | Randomized Algorithms for Neighbor Discovery in Cognitive Radio Networks | Neeraj Mittal Yanyan Zeng S. Venkatesan R. Chandrasekaran | 2/10 |
UTDCS-06-10 | Security Analysis for an Order Preserving Encryption Scheme | Liangliang Xiao I-Ling Yen Dongdai Lin | 2/10 |
UTDCS-07-10 | Spectrum-Based Fault Localization Without Test Oracles | Xiaoyuan Xie W. Eric Wong Tsong Yueh Chen Baowen Xu | 2/10 |
UTDCS-08-10 | A Novel Grouping-Based Strategy for Improved Fault Localization | Vidroha Debroy W. Eric Wong Xiaofeng Xu Byoungju Choi | 2/10 |
UTDCS-09-10 | Building Disclosure Risk Aware Query Optimizers for Relational Databases | Mustafa Canim Murat Kantarcioglu Bijit Hore Sharad Mehrotra | 4/10 |
UTDCS-10-10 | Secure, Dependable and High Performance Cloud Storage | Yunqi Ye I-Ling Yen Liangliang XiaoFarokh Bastani | 4/10 |
UTDCS-11-10 | Incentive Compatible Distributed Data Mining | Murat Kantarcioglu Robert Nix | 4/10 |
UTDCS-12-10 | An Improved Scalable Algorithm for Perpetual System Connectivity Using Structure Estimates | Eric Etheridge Neeraj Mittal | 5/10 |
UTDCS-13-10 | Bi-Directional Translation of Relational Data into Virtual RDF Stores | Sunitha Ramanuja Vaibhav Khadilkar Latifur Khan Steven Seida Murat Kantarcioglu Bhavani Thuraisingham | 5/10 |
UTDCS-14-10 | A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model | Alain Bensoussan Murat Kantarcioglu Celine Hoe | 5/10 |
UTDCS-15-10 | Noncooperative Game Theory in Wireless Networks | Dung T. Tran Andras Farago | 6/10 |
UTDCS-16-10 | On Selfish Behavior in TDMA-based Bandwidth Allocation Protocols | Dung T. Tran Andras Farago | 6/10 |
UTDCS-17-10 | Game Theoretic Approach to Network Lifetime Maximization in Wireless Networks | Dung T. Tran Andras Farago | 6/10 |
UTDCS-18-10 | Reining In Windows API Abuses with In-lined Reference Monitors | Kevin W. Hamlen Vishwath Mohan Richard Wartell | 6/10 |
UTDCS-19-10 | Selected Topics in International Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends and Technologies | Bhavani Thuraisingham | 7/10 |
UTDCS-20-10 | RBF Neural Network-based Fault Localization | W. Eric Wong Vidroha Debroy Bhavani Thuraisingham Richard Golden | 7/10 |
UTDCS-21-10 | Multi-label Text Data Classification Using Semi Supervised and Fuzzy Subspace Clustering | Mohammad Salim Ahmed Latifur Khan | 7/10 |
UTDCS-22-10 | Reverse Engineering in the Aspect- Oriented Paradigm – Part I Source Code to Architecture of the Base Design | Sunil Bohra Rohit Goel Jeffrey Koch Sonali Pagade Kendra Cooper | 7/10 |
UTDCS-23-10 | Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions TowardsImplementing these Strategies Version I | Bhavani Thuraisingham | 8/10 |
UTDCS-24-10 | A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining | Amy Xuyang Tan Valerie Li Liu Murat Kantarcioglu Bhavani Thuraisingham | 8/10 |
UTDCS-25-10 | Selected Topics in Terrorism Studies–Volume 2: Al Qaeda Terrorist Financing and Technologies to Track the Finance Network | Irina Sakharova Weili Wu | 8/10 |
UTDCS-26-10 | Minimum Time Broadcasting in Cognitive Radio Networks | Chanaka J. L. Arachchige S. Venkatesan R. Chandrasekaran Neeraj Mittal | 8/10 |
UTDCS-27-10 | Ontology-driven Query Expansion Methods to Facilitate Federated Queries | Neda Alipanah Pallabi Parveen Sheetal Menezes Latifur Khan Steven B. Seida Bhavani Thuraisingham | 9/10 |
UTDCS-28-10 | Minimum Length Scheduling for Aggregated Convergecast in Heterogeneous Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran | 9/10 |
UTDCS-29-10 | On Solving Consensus with Unknown Participants | Divya Chandrasekaran Neeraj Mittal | 10/10 |
UTDCS-30-10 | Optimal Defragmentation of Transparent Flexible Optical WDM (FWDM) Networks | Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang | 10/10 |
UTDCS-31-10 | Energy-efficient Flow Aggregation In Optical Networks | Yi Zhu Jason P. Jue | 10/10 |
UTDCS-32-10 | Waveband Routing in Mixed Line Rate Networks with Impairment Constraints | Saket Varma Jason P. Jue | 10/10 |
UTDCS-33-10 | Safe Software: Does it Cost More to Develop? | W. Eric Wong Andrea Demel Michael F. Siok | 11/10 |
UTDCS-34-10 | Software Safety Standards: Evolution and Lessons Learned | W. Eric Wong Andrea Demel Michael F. Siok | 11/10 |
UTDCS-35-10 | Software Safety Standards: How Good Are They? | W. Eric Wong Andrea Demel Vidroha Debroy Michael F. Siok | 11/10 |
UTDCS-36-10 | On Consensus Among Fault Localization Techniques | W. Eric Wong Vidroha Debroy | 11/10 |
2009
Report No. | Title | Author | Date |
UTDCS-01-09 | A Fine Grained Model for Information Flow Control in Web Service Composition | Wei She I-Ling Yen Bhavani Thuraisingham | 1/09 |
UTDCS-02 09 | A Dual Bound Algorithm for Very Fast and Exact Template-Matching | Haim Schweitzer Robert Finis Anderson Rui (April) Deng | 1/09 |
UTDCS-03-09 | Preventing Private Information Inference Attacks on Social Networks | Raymond Heatherly Murat Kantarcioglu Bhavani Thuraisingham | 2/09 |
UTDCS-04-09 | Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 1: Problem Formulation and Solution Space | S. Q. Zheng Jianping Wang Bing Yang Mei Yang | 3/13 |
UTDCS-05-09 | Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 2: Algorithms and Generalizations | S. Q. Zheng Jianping Wang Bing Yang Mei Yang | 3/13 |
UTDCS-06-09 | A Distributed Termination Detection Algorithm for Dynamic Asynchronous Systems | Paul Johnson Neeraj Mittal | 3/23 |
UTDCS-07-09 | PEQ: A Privacy-Preserving Scheme forExact Query Evaluation in Distributed Sensor Data Networks | Hai Vu Thuc Nguyen Neeraj Mittal S. Venkatesan | 4/09 |
UTDCS-08-09 | RDF Join: A Scalable Data Model for Persistence and Efficient Querying of RDF Datasets | James P. McGlothlin Latifur R. Khan | 4/09 |
UTDCS-09-09 | Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction Operations | Bhavani Thuraisingham Latifur Khan Murat Kantarcioglu | 4/09 |
UTDCS-10-09 | Local vs. Global Scalability in Ad Hoc and Sensor Networks | Andras Farago | 5/09 |
UTDCS-11-09 | Infoshape: High-Level Views of Multidimensional Information | Jie Hao Chunying Zhao Pushpa Kumar Kang Zhang | 5/09 |
UTDCS-12-09 | Composition Operators for Synthesizing Glue Code Based on Code Patterns | Jicheng Fu Jian Liu Farokh Bastani I-Ling Yen | 6/09 |
UTDCS-13-09 | Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams | Mohammad M. Masud Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham | 6/09 |
UTDCS-14-09 | Streaming 3D Deformations in Collaborative Learning Applications | Ziying Tang, Guodong Rong Xiaohu Guo Balakrishnan Prabhakaran | 6/09 |
UTDCS-15-09 | Point-Based Manifold Harmonics | Yang Liu Xiaohu Guo Balakrishnan Prabhakaran | 6/09 |
UTDCS-16-09 | Toward Fully Homomorphic Computation | Liangliang Xiao Osbert Bastani I-Ling Yen | 7/09 |
UTDCS-17-09 | A Corner-Based Method for Computing The Walsh Transform at Multiple Locations in an Image | Rui Deng Robert Finis Anderson Haim Schweitzer | 7/09 |
UTDCS-18-09 | A Family of Secure Key Assignment Schemes for Wireless Communication Networks | Neeraj Mittal | 7/09 |
UTDCS-19-09 | Spectral Hybrid Simulation of Deformable and Rigid Bodies | Yin Yang Guodong Rong Jianfen Ren Luis Torres Xiaohu Guo | 7/09 |
UTDCS-20-09 | An Almost Linear Homomorphic Encrytion Scheme | Liangliang Xiao Osbert Bastani I-Ling Yen | 7/09 |
UTDCS-21-09 | 3R Regenerator Placement for Optical Multicast | Yi Zhu Xiaofeng Gao Jason P. Jue Weili Wu | 7/09 |
UTDCS-22-09 | Fast Deterministic Neighbor Discovery In Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran | 7/09 |
UTDCS-23-09 | Extending Service Model to Build an Effective Service Composition Framework for Cyber-Physical Systems | Jian Huang Farokh Bastani I-Ling Yen Wenke Zhang Feng-Jian Wang Hwai-Jung Hsu | 8/09 |
UTDCS-24-09 | A Tripartite Clustering Analysis on MicroRNA, Gene and Disease Model | Chengcheng Shen Ying Liu | 8/09 |
UTDCS-25-09 | DESIGN and Implementation of Restful Web Services for Blackbook | Pranav Parikh Murat Kantarcioglu Latifur Khan Bhavani Thuraisingham | 8/09 |
UTDCS-26-09 | Parsing Prolog Terms A didactic exercise, Sponsored by Dr. Gopal Gupta | Feliks Kluzniak | 8/09 |
UTDCS-27-09 | Physical Models vs. Graph Models Of Wireless Network Topologies | Andras Farago Stefano Basagni | 9/09 |
UTDCS-28-09 | A Case Study on Geospatial Data Management with Blackbook | Sonia Chib Jyothsna Rachapalli Bhavani Thuraisingham Latifur Khan Murat Kantarcioglu | 9/09 |
UTDCS-29-09 | Agile Product Line Requirements Engineering Questionnaire Data Analysis Using Feature Selection | Kunwu Feng Kendra M.L. Cooper | 9/09 |
UTDCS-30-09 | Agile Product Line Requirements Engineering Process Definitions | Kunwu Feng Kendra M.L. Cooper | 9/09 |
UTDCS-31-09 | Traffic Grooming for Energy-Aware Optical Networks | M.M. Hasan Farid Farahmand Jason P. Jue | 9/09 |
UTDCS-32-09 | Contention-Tolerant Crossbar Packet Switches without and with Speedup | Guannan Qu Hyung Jae Chang Jianping Wang Zhiyi Fang S. Q. Zheng | 9/09 |
UTDCS-33-09 | Bayesian Belief Network Structure Learning Algorithms:A Comparative Survey | Yan Tang Kendra Cooper Joao Cangussu | 9/09 |
UTDCS-34-09 | SoftLink: Visualizing Correlations Among Multiple Program Executions | Chunying Zhao Kang Zhang | 9/09 |
UTDCS-35-09 | FREEZE: Rate Adaptation in Wireless LANs Using Channel Contention Estimates | Ajay Kulkarni Shanthy Menezes Ravi Prakash | 9/09 |
UTDCS-36-09 | Enhanced Information Flow Control for Service Composition and Its Implementation | Wei She I-Ling Yen Bhavani Thuraisingham Elisa Bertino | 09/09 |
UTDCS-37-09 | Cost Efficient Traffic Grooming andRegenerator Placement in Impairment- Aware Optial WDM Network | Ankitkumar N. Patel Chengyi Gao Jason P. Jue Xi Wang Qiong Zhang Paparao Palacharla Takao Naito | 10/09 |
UTDCS-38-09 | Minimum SRLGs Multicast Routing | Yi Zhu Jason P. Jue | 10/09 |
UTDCS-39-09 | Network Aware Energy-Efficient Communication (NAEEC) Protocol For Heterogeneous Wireless Sensor Networks | Manoj K. Garg B. Prabhakaran | 10/09 |
UTDCS-40-09 | Cost-based Query Processing for Large RDF Graph Using Hadoop and MapReduce | Mohammad Husain Pankil Doshi Latifur Khan Syeda A. Rizvi Murat Kantarcioglu Bhavani Thuraisingham | 11/09 |
UTDCS-41-09 | Efficient Query Processing for Large RDF Graphs Using Hadoop and MapReduce | Mohammad Husain Pankil Doshi James McGlothlin Latifur Khan Bhavani Thuraisingham Murat Kantarcioglu | 11/09 |
UTDCS-42-09 | Secure Location Verification with Randomly-Selected Base Stations | Matthew Holiday Neeraj Mittal Subbarayan Venkatesan | 11/09 |
UTDCS-43-09 | ASSERT: A Wireless Networking Testbed | Ehsan Nourbakhsh Jeff Dix Paul Johnson Ryan Burchfield S. Venkatesan Neeraj Mittal Ravi Prakash | 11/09 |
UTDCS-44-09 | Time Efficient Neighbor Discovery In Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran | 11/09 |
UTDCS-45-09 | A Survey of Software Fault Localization | Eric Wong (Pending) | 11/09 |
UTDCS-46-09 | Experience with an NSF REU Program In Software Safety | Eric Wong (Pending) | 11/09 |
UTDCS-47-09 | Industry Involvement in an Undergraduate Software Engineering Project Course: Everybody Wins | Eric Wong (Pending) | 11/09 |
UTDCS-48-09 | Software Safety Standards: How Good Are They? | Eric Wong (Pending) | 11/09 |
UTDCS-49-09 | Recent Catastrophic Accidents: Is Software To Blame? | Eric Wong (Pending) | 11/09 |
UTDCS-50-09 | Evaluating Dependable Distributed Storage Systems | Liangliang Xiao Yunqi Ye I-Ling Yen Farokh Bastani | 12/09 |
UTDCS-51-09 | Secure, Dependable and High Performance Cloud Storage | Yunqi Ye I-Ling Yen Liangliang Xiao Farokh Bastani Bhavani Thuraisingham | 12/09 |
2008
Report No. | Title | Author | Date |
UTDCS-01-08 | Trusted Computing Base for Assured Information Sharing | Yashaswini Harsha Kumar Bhavani Thuraisingham Latifur Khan | 1/08 |
UTDCS-02-08 | Delegation-based Security Model For Web Services | Wei She Bhavani Thuraisingham I-Ling Yen | 1/08 |
UTDCS-03-08 | FIP: A Fast Planning-Graph Based Iterative Planner | Jicheng Fu Farokh Bastani Vincent Ng I-Ling Yen Yansheng Zhang | 2/08 |
UTDCS-04-08 | Using Anonymized Data for Classification | Ali Inan Murat Kantarcioglu | 3/08 |
UTDCS-05-08 | Mining Concept-Drifting Data Stream To Detect Peer to Peer Botnet Traffic | Mohammad M. Masud Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham | 3/08 |
UTDCS-06-08 | A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks | Thuc D. Nguyen Duc H. M. Nguyen Bao N. Tran Hai Vu Neeraj Mittal | 3/08 |
UTDCS-07-08 | On Disjoint Connecting Paths and Unsplittable Flow | Andras Farago | 3/08 |
UTDCS-08-08 | Speeding Up Large Scale Distance Computations | Andras Farago | 3/08 |
UTDCS-09-08 | Fault -Tolerant Dual Power Management in Wireless Sensor Networks | Chang Wang Myung-Ah Park James Willson Andras Farago Ding-Zhu Du | 3/08 |
UTDCS-10-08 | The Effect of Multi-Radio Nodes on Network Connectivity – A Graph Theoretic Analysis | Andras Farago Stefano Basagni | 4/08 |
UTDCS-11-08 | On the Descriptional Complexity of Path Optimization in Graphs | Andras Farago | 4/08 |
UTDCS-12-08 | Cross-Media Mapping Framework for 3D Human Motion Document Retrieval | Yohan Jin B. Prabhakaran | 5/08 |
UTDCS-13-08 | Content-based Ontology Matching for GIS Datasets | Jeffrey L. Partyka Latifur Khan Bhavani Thuraisingham Neda Alipanah Shashi Shekhar | 5/08 |
UTDCS-14-08 | A Fast Active Spanning Tree Maintenance Protocol for Dynamic Distributed Systems | Tarun Bansal Neeraj Mittal | 6/08 |
UTDCS-15-08 | On Lower Bounds for Time Complexity of Departure in Dynamic Distributed Systems | Tarun Bansal Neeraj Mittal | 6/08 |
UTDCS-16-08 | PCFM: Probabilistic Contention Free MAC Protocol for Wireless Network | G. Dattatreya A. Kulkarni | 7/08 |
UTDCS-17-08 | Refining a Survey to Collect Expertise In Agile Product Line Requirements Engineering Processes | Kunwu Feng Yan Tang Kun Tian Kendra M.L. Cooper | 7/08 |
UTDCS-18-08 | Surgical Haptics and Robotics: Influence of Mismatched Haptic and Visual Display Scales | Gregory S. Lee Bhavani Thuraisingham | 7/08 |
UTDCS-19-08 | Leader Election Algorithms for Multi-Channel Wireless Networks | Tarun Bansal Neeraj Mittal S. Venkatesan | 7/08 |
UTDCS-20-08 | Synthesize Virtual World Motions From 2D Video Recognition | Yohan Jin Myunghoon Suk B. Prabhakaran Bhavani Thuraisingham | 7/08 |
UTDCS-21-08 | Inferring Private Information Using Social Network Data | Jack Lindamood Murat Kantarcioglu | 7/08 |
UTDCS-22-08 | Content-based Ontology Matching For GIS Datasets | Jeffrey Partyka Neda Alipanah Latifur Khan Bhavani Thuraisingham Shashi Shekhar | 7/08 |
UTDCS-23-08 | Secure Haptics and Surgical Robotics: Adaptation to Fitts’ Law Performance Measure for Multi-Target Task Comparisons | Gregory S. Lee Bhavani Thuraisingham | 8/08 |
UTDCS-24-08 | An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks | Chanaka J. Liyana Arachchige S. Venkatesan Neeraj Mittal | 8/08 |
UTDCS-25-08 | “RF in the Jungle” Reproducibility of Wireless Experiments | Ehsan Nourbakhsh Ryan Burchfield Jeff Dix Kunal Sahu S. Venkatesan Ravi Prakash | 8/08 |
UTDCS-26-08 | Dynamic Coexistence of Frequency Hopping Networks Using Parallel And Gaussian Allocations | M. M. Hasan Ravi Prakash Jason P. Jue | 9/08 |
UTDCS-27-08 | Improving Fault Tolerance via Multi-Radio Nodes – A Graph Theoretic Analysis | Andras Farago Dung Trung Tran Stefano Basagni | 9/08 |
UTDCS-28-08 | Scalability of Node Degrees in Random Wireless Network Topologies | Andras Farago | 9/08 |
UTDCS-29-08 | Incentive Compatible Privacy-Preserving Data Analysis | Murat Kantarcioglu Wei Jiang | 9/08 |
UTDCS-30-08 | Hybrid Approach to Inferring Gene Networks with Expression Profile And Gene Ontology | Liping Jing Ying Liu Phil Bachman | 9/08 |
UTDCS-31-08 | Multi-Class IP Flow Aggregation In Multicast Optical Networks | Yi Zhu Jason P. Jue | 9/08 |
UTDCS-32-08 | A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data | Mohammad M. Masud Bhavani Thuraisingham Jing Gao Latifur Khan Jiawei Han | 10/08 |
UTDCS-33-08 | A Reusable Process Pattern for Agile Product Line Requirements Engineering | Kojun T. Hatta Kendra M. L. Cooper | 10/08 |
UTDCS-34-08 | Negation in Coinductive Logic Programming | Richard Min Gopal Gupta | 10/08 |
UTDCS-35-08 | Routing and Scheduling for Time-Shift Reservation Circuit Switching | Ankitkumar N. Patel Qingya She Jason P. Jue | 10/08 |
UTDCS-36-08 | Routing and Scheduling for Variable Bandwidth Reservation Circuit Switching | Ankitkumar N. Patel Jason P. Jue | 10/08 |
UTDCS-37-08 | A Kalman Filter for Software Defects Data | Syed Waseem Haider Joao W. Cangussu | 12/08 |
UTDCS-38-08 | PEQ: A Privacy-Preserving Scheme for Answering Exact Queries in Distributed Sensor Data Networks | Neeraj Mittal S. Venkatesan Hai Vu Thuc Nguyen | 12/08 |
UTDCS-39-08 | R2D: Bridging the Gap Between the Semantic Web and Relational Visualization Tool | Sunitha Ramanujam Anubha Gupta Latifur Khan Steven Seida | 12/08 |
UTDCS-40-08 | A Framework for the Relational Transformation of RDF Data | Sunitha Ramanujam Anubha Gupta Latifur Khan Steven Seida Bhavani Thuraisingham | 12/08 |
2007
Report No. | Title | Author | Date |
UTDCS-01-07 | An Integrated Platform for Secure Geospatial Information Exchange Through the Semantic Web | Bhavani Thuraisingham Alam Ashraful Ganesh Subbiah Latifur Khan | 1/07 |
UTDCS-02-07 | Oracle 10 G XE Tutorial (Product of Oracle Corporation) | Srinivasan Iyer Bhavani Thuraisingham | 1/07 |
UTDCS-03-07 | Geospatial Data Mining for National Security: Land Cover Classification And Grouping for Semantic Assessment | Chuanjun Li Latifur Khan M. Husain Bhavani Thuraisingham Shaofei Chen Fang Qiu | 1/07 |
UTDCS-04-07 | A Multilevel Quantization Index Modulation Based Data Hiding Scheme | Hui Li Parag Agarwal Balakrishnan Prabhakaran | 1/07 |
UTDCS-05-07 | From Abstract Art to Information Visualization | Kang Zhang | 1/07 |
UTDCS-06-07 | On Active Departure for Dynamic Asynchronous Systems | Sathya Peri Neeraj Mittal | 1/07 |
UTDCS-07-07 | A Formal Framework for Modeling and Analysis of Pattern-Based Design | Jing Dong Tu Peng Paulo S.C. Alencar Donald D. Cowan | 1/07 |
UTDCS-08-07 | Optimizing Split Networks | Y. Zhang L. Bao Sergey Bereg | 2/07 |
UTDCS-09-07 | A Polynomial Time Solution to Minimum Forwarding Set Problem In Wireless Ad Hoc Networks | Mehmet Baysan Kamil Sarac R. Chandrasekaran Sergey Bereg | 2/07 |
UTDCS-10-07 | Sampling from Independence Systems | András Faragó | 2/07 |
UTDCS-11-07 | Methods for Handling Non-Markovian Performance Models | András Faragó | 2/07 |
UTDCS-12-07 | Complexity of Cut Paste Moves and Prefix Reversal/Transposition Moves for Strings | Bhadrachalam Chitturi Hal Sudborough | 3/07 |
UTDCS-13-07 | Resource non-Intensive Survivable Clustering for Wireless Sensor Networks | Mohammad M. Hasan Jason P. Jue | 3/07 |
UTDCS-14-07 | A Fast Deterministic Algorithm for Neighbor Discovery in Multi-Channel Cognitive Radio Networks | Neeraj Mittal Srinivasan Krishamurthy R. Chandrasekaran S. Venkatesan | 3/07 |
UTDCS-15-07 | Data Hiding Based Compression Mechanism for 3D Models | Hui Li Parag Agarwal Balakrishnan Prabhakaran | 3/07 |
UTDCS-16-07 | Fast Mobile IPv6 Based Handover with Efficient Prediction for WLAN-UMTS Integrated Networks | Shanthy Menezes Aesoon Park S. Venkatesan | 3/07 |
UTDCS-17-07 | Spectral Analysis of Complex Networks | Wenyuan Li Yongjing Lin Ying Liu | 3/07 |
UTDCS-18-07 | Developing a Survey to Collect Expertise in Agile Product Line Requirements Engineering Processes | Kunwu Feng Meli Lempert Yan Tang Kun Tian Kendra M. L. Cooper Xavier Franch | 4/07 |
UTDCS-19-07 | Accelerometer-Based Human Abnormal Movement Detection in Wireless Sensor Networks | T. Ryan Burchfield S. Venkatesan | 4/07 |
UTDCS-20-07 | Tutorial on QoS Based UML Profile | Hyotaeg Jung W. Eric Wong Kendra Cooper | 4/07 |
UTDCS-21-07 | Defining Project Scenarios for the Agile Requirements Engineering Product-line Development Questionnaire | Kunwu Feng Meli Lempert Yan Tang Kun Tian Kendra M. L. Cooper Xavier Franch | 4/07 |
UTDCS-22-07 | Towards Intelligent Services: A Case Study in Chemical Emergency Response | Ajay Bansal Kunal Patel Gopal Gupta B. Raghavachari E. D. Harris James C. Staves | 4/07 |
UTDCS-23-07 | USDL – Formal Definitions in OWL | Srividya Kona Ajay Bansal Gopal Gupta Thomas D. Hite | 4/07 |
UTDCS-24-07 | Maximizing Throughput in ZigBee Wireless Networks through Analysis, Simulations and Implementations | T. Ryan Burchfield S. Venkatesan Douglas Weiner | 5/07 |
UTDCS-25-07 | Evaluation of Differential Expression Analysis Approaches for Microarray Platform Performance Assessment | Hung-Chung Huang Xiuwen Zheng Yun Lian Leming Shi Quanzhen Li Ying Liu | 5/07 |
UTDCS-26-07 | Space-Efficient Keying in Wireless Communication Networks | Neeraj Mittal | 5/07 |
UTDCS-27-07 | Complexity of MCP and MCSP | Bhadrachalam Chitturi I. Hal Sudborough | 7/07 |
UTDCS-28-07 | Bounds for Sorting Permutations with Prefix Transpositions | Bhadrachalam Chitturi I. Hal Sudborough | 8/07 |
UTDCS-29-07 | Opportunistic Optical Hyperchannel And Its Distributed QoS Assuring Access Control | Jing Chen Jianping Wang Hui Yu S. Q. Zheng | 8/07 |
UTDCS-30-07 | 1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels | Jing Chen Ashwin Gumaste | 8/07 |
UTDCS-31-07 | An Improved TCAM-Based IP Lookup Engine | Hui Yu Jing Chen S. Q. Zheng Mehrdad Nourani | 8/07 |
UTDCS-32-07 | High-Performance TCAM-Based IP Lookup Engines | Hui Yu Jing Chen Jianping Wang S. Q. Zheng | 8/07 |
UTDCS-33-07 | Security for Enterprise Resource Planning Systems | Wei She Bhavani Thuraisingham | 8/07 |
UTDCS-34-07 | Secure Semantic Web Services | Bhavani Thuraisingham | 8/07 |
UTDCS-35-07 | Extended RBAC-Based Design and Implementation for A Secure Data Warehouse | Bhavani Thuraisingham Murat Kantarcioglu Srinivasan Iyer | 9/07 |
UTDCS-36-07 | Indexing 3D Human Motion Repositories For Content-based Retrieval | Gaurav N. Pradhan Balakrishnan Prabhakaran | 10/07 |
UTDCS-37-07 | Analysis of Human Performance Using Physiological Data Streams | Gaurav N. Pradhan Balakrishnan Prabhakaran | 10/07 |
UTDCS-38-07 | Multi-stream Pattern Mining with Multi-dimensional Information | Gaurav N. Pradhan Balakrishnan Prabhakaran | 10/07 |
UTDCS-39-07 | Architecture for a Trusted Computing Base For need-to-share in case ofemergencies | Yashaswini Harsha Kumar Bhavani Thuraisingham Latifur Khan | 11/07 |
UTDCS-40-07 | Enforcing Honesty in Assured InformationSharing within a Distributed System | Ryan Layfield Murat Kantarcioglu Bhavani Thuraisingham | 11/07 |
UTDCS-41-07 | Data Mining for Defensive Operations | Mohammad Masud Latifur Khan Bhavani Thuraisingham | 11/07 |
UTDCS-42-07 | WiMap: Fast Handover for 802.11 Mobile Devices | A. Kulkarni S. Menezes H. Vu C. Liyana Arachige G. Dattatreya | 11/07 |
UTDCS-43-07 | WORMEROS: A New Framework for Defending Against Wormhole Attacks In Wireless Networks | Hai Vu Ajay Kulkarni Kamil Sarac Neeraj Mittal | 12/07 |
UTDCS-44-07 | Procedural Plans in the Context of Code Synthesis | Jicheng Fu Farokh Bastani I-Ling Yen Vincent Ng | 12/07 |
UTDCS-45-07 | Information Operations Across Infospheres: Volume 2 | Latifur Khan Bhavani Thuraisingham Murat Kantarcioglu Yashaswini Harsha KumarMehedy Masud Ryan Layfield | 12/07 |
2006
Report No. | Title | Author | Date |
UTDCS-01-06 | OWL-S Ontology Framework Extension For Dynamic Web Service Composition | Jing Dong Yongtao Sun | 1/06 |
UTDCS-02-06 | Dependable and Secure TMO Scheme | Jung-In Kim Bhavani Thuraisingham | 1/06 |
UTDCS-03-06 | Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF) | Ashraful Alam Bhavani Thuraisingham | 1/06 |
UTDCS-04-06 | An Adaptable Perturbation Model of Privacy Preserving Data Mining | Li Liu Bhavani Thuraisingham Murat Kantarcioglu Latifur Khan | 1/06 |
UTDCS-05-06 | Face Recognition Using Various Classifiers: Artificial Neural Network, Linear Discriminant and Principal Component Analysis | Pallabi Parveen Bhavani Thuraisingham | 1/06 |
UTDCS-06-06 | Administering The Semantic Web: CPT: Confidentiality, Privacy and Trust Management | Nathalie Tsybulnik Bhavani Thuraisingham | 2/06 |
UTDCS-07-06 | An Efficient Handover Scheme Based On Fast Mobile IPv6 | Shanthy Menezes Kwang-hyun Ro S. Venkatesan | 2/06 |
UTDCS-08-06 | A Projected Clustering Algorithm in High Dimensional Space | Ping Deng Weili Wu Yaochun Huang Zhongnan Zhang | 2/06 |
UTDCS-09-06 | Topology Sampling: Challenges, Solutions | Kamil Sarac Turgay Korkmaz Sevcan Bilir | 3/06 |
UTDCS-10-06 | Small Group Multicast with Deflection Routing in Optical Burst Switched Networks | Xiaodong Huang Qingya She Jason P. Jue | 3/06 |
UTDCS-11-06 | Coinductive Logic Programming | Luke Simon Ajay Mallya Ajay Bansal Gopal Gupta | 3/06 |
UTDCS-12-06 | Mining Quantitative Maximal Hyperclique Patterns: A Summary Of Results | Yaochun Huang Hui Xiong Weili Wu | 3/06 |
UTDCS-13-06 | On the Complexity of the Privacy Problem in Databases | Bhavani Thuraisingham | 3/06 |
UTDCS-14-06 | Inference Control for Document Release and Dissemination | Bhavani Thuraisingham | 3/06 |
UTDCS-15-06 | Individually Adaptable Perturbation Model for Privacy Preserving Data Mining | Li Liu Murat Kantarcioglu Bhavani Thuraisingham | 3/06 |
UTDCS-16-06 | Enhanced RUP Vision Document for the Quality Assurance Review Assistant Tool: Defining Stakeholders and Goals | Shiney Abraham Ramya Pramod Kendra Cooper | 3/06 |
UTDCS-17-06 | On Maximum Key Pool Size for a Key Pre-Distribution Scheme in Wireless Sensor Networks | Neeraj Mittal Tarun R. Belagodu | 3/06 |
UTDCS-18-06 | USDL: A Service-Semantics Description Language for Automatic Service Discovery and Composition | Srividya Kona Ajay Bansal Luke Simon Thomas D. Hite Ajay Mallya Gopal Gupta | 3/06 |
UTDCS-19-06 | OurCapProbe: Improving CapProbe to find and estimate capacities of bottleneck link and other choke links | Chalam Chitturi Kamil Sarac | 4/06 |
UTDCS-20-06 | Finding the Inversion Distance Between Strings Over a Finite Alphabet | Bhadrachalam Chitturi Hal Sudborough Walter Voit | 4/06 |
UTDCS-21-06 | Co-Logic Programming: Extending Logic Programming with Co-Induction | Luke Simon Ajay Mallya Ajay Bansal Gopal Gupta | 4/06 |
UTDCS-22-06 | Design and Implementation of a Secure Social Network System | Ryan Layfield Bhavani Thuraisingham | 4/06 |
UTDCS-23-06 | Algorithms for Node Discovery and Configuration in Cognitive Radio Networks | Srinivasan Krishnamurthy R. Chandrasekaran S. Venkatesan Neeraj Mittal | 5/06 |
UTDCS-24-06 | A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network | Vinay Madenur Neeraj Mittal | 5/06 |
UTDCS-25-06 | Generalized Replicator Dynamics for Efficiently Building Phylogenetic Tree | Wenyuan Li Ying Liu | 6/06 |
UTDCS-26-06 | Requirements and Software Architecture for the CAT Assistant Tool: Supporting the COTS-Aware Requirements engineering and Software Architecting (CARE/SA) Approach (version 2.0) | Michael McFadden Shirish Pulikkal Kendra Cooper | 6/06 |
UTDCS-27-06 | Detecting New Malicious Executables Using Data Mining | Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Mamoun A. Awad | 7/06 |
UTDCS-28-06 | On Complexity of Transforming Strings with Prefix Reversals and Prefix Transpositions | Bhadrachalam Chitturi I. Hal Sudborough | 7/06 |
UTDCS-29-06 | Solving Computation Slicing Using Predicate Detection | Neeraj Mittal Alper Sen Vijay K. Garg | 7/06 |
UTDCS-30-06 | A Near Optimal Uniform Key Pre-Distribution Scheme Using Deployment Knowledge | Neeraj Mittal | 7/06 |
UTDCS-31-06 | On Lower Bounds for Node Discovery And Configuration in Cognitive Radio Networks | R. Chandrasekaran S. Venkatesan Neeraj Mittal Srinivasan Krishnamurthy | 7/06 |
UTDCS-32-06 | Fingerprint Matching Algorithm Based On Tree Comparison Using Ratios of Relational Distances | Abinandhan Chandrasekaran Bhavani Thuraisingham | 7/06 |
UTDCS-33-06 | Evaluating Dependable Distributed Storage Systems | Yanjin Zhang Liangliang Xiao Manghui Tu I-Ling Yen | 8/06 |
UTDCS-34-06 | Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks | Maulin Patel S. Venkatesan R. Chandrasekaran | 8/06 |
UTDCS-35-06 | Medium Access Control Protocols For Cognitive Radio-based Multi-hop Wireless Networks | Mansi Thoppian Ravi Prakash S. Venkatesan | 8/06 |
UTDCS-36-06 | Robust Blind Watermarking Mechanism For 3D Point Sampled Geometry | Parag Agarwal B. Prabhakaran | 8/06 |
UTDCS-37-06 | Home Appliance Control System Use Case Model Survey, Version 1.0 | Kendra Cooper Christine Ayers | 8/06 |
UTDCS-38-06 | A Survey of Formal Methods for Software Architecture | Longji Tang Jing Dong | 9/06 |
UTDCS-39-06 | A Scalable Clustering Method Based on Density | Kathryn Bean Sergey Bereg Latifur Khan Bhavani Thuraisingham | 9/06 |
UTDCS-40-06 | Detecting Malicious Executables Using Assembly Feature Retrieval | Mohammad M. Masud Latifur Khan Bhavani Thuraisingham | 9/06 |
UTDCS-41-06 | Safe Termination Detection in an Asynchronous Distributed System when Processes may Crash and Recover | Neeraj Mittal Kuppahalli L. Phaneesh Felix C. Freiling | 10/06 |
UTDCS-42-06 | THIS: Threshold Security of Information Aggregation for Sensor Networks | Hai Vu Neeraj Mittal S. Venkatesan | 10/06 |
UTDCS-43-06 | Assured Information Sharing: Technologies, Challenges and Directions | Bhavani Thuraisingham | 10/06 |
UTDCS-44-06 | Design and Implementation of Policy Enforcement, Data Sharing and Mining Components for Trustworthy Coalitions | Mamoun Awad Dilsad Cavus Latifur Khan Manjunath Reddy Bhavani Thuraisingham | 10/06 |
UTDCS-45-06 | Design and Simulation of Agent-based Trust Management Techniques for a Coalition Environment | Srinivasan Iyer Bhavani Thuraisingham | 10/06 |
UTDCS-46-06 | Research and Simulation of Game Theoretical Techniques for Data Sharing Among Semi-Trustworthy Partners | Ryan Layfield Murat Kantarcioglu Bhavani Thuraisingham | 10/06 |
UTDCS-47-06 | Defensive Information Operations: DETECTING MALICIOUS EXECUTABLES USING ASSEMBLY FEATURE RETRIEVAL in an Untrustworthy Environment | M. Mehedy Masud Latifur Khan Bhavani Thuraisingham | 10/06 |
UTDCS-48-06 | Information Operations Across Infospheres: Volume 1 | Latifur Khan Bhavani Thuraisingham Murat Kantarcioglu Mamoun Awad Dilsad Cavus Ryan Layfield Mehedy Masud Srinivasan Iyer | 10/06 |
UTDCS-49-06 | A Wrapped Spherical Covering with Optimal Covering Density | Yuanyi Zhang Sergey Bereg | 10/06 |
UTDCS-50-06 | A Network-flow-based Integral Optimal Algorithm for Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks | Maulin Patel S. Venkatesan R. Chandrasekaran | 10/06 |
UTDCS-51-06 | A Novel Privacy Preserving Decision Tree Algorithm | Li Liu Murat Kantarcioglu Bhavani Thuraisingham | 10/06 |
UTDCS-52-06 | Fault-Tolerant Dual Power Assignment In Wireless Sensor Networks | Myung-Ah Park Wang Chen James K. V. Willson Weili Wu Andras Farago | 10/06 |
UTDCS-53-06 | A Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different Transmission Range | Myung-Ah Park Wang Chen James K. V. Willson My T. Thai Weili Wu Andras Farago | 10/06 |
UTDCS-54-06 | Prefix Reversals on Strings | Bhadrachalam Chitturi Hal Sudborough | 11/06 |
UTDCS-55-06 | Prefix Transpositions on Strings | Bhadrachalam Chitturi Hal Sudborough | 11/06 |
UTDCS-56-06 | Demand-driven Retrieval Schedules For Progressive Transmission of 3D Animations | H. Li V.S. Ramaswamy B. Prabhakaran | 11/06 |
UTDCS-57-06 | Quantifying the Impact of Alias Resolution on traceroute-based Sample Network Topologies | Mehmet Hadi Gunes Nicolas Sanchis Nielsen Kamil Sarac | 11/06 |
UTDCS-58-06 | Face Segmentation for Privacy Preserving Video Surveillance | Sai Chaitanya Bhavani Thuraisingham | 11/06 |
UTDCS-59-06 | Modeling Nonlinearity in Dilution Design Microarray Data | Xiuwen Zheng Hung-Chung Huang Wenyuan Li Peng Liu Quan-Zhen Li Ying Liu | 11/06 |
UTDCS-60-06 | A Comparative Study of a Key Agreement Protocol Based on ECC and RSA | Vibha Sethi Bhavani Thuraisingham | 11/06 |
UTDCS-61-06 | RFID Technologies and Their Applications | Abinandhan Chandrasekaran Bhavani Thuraisingham | 11/06 |
UTDCS-62-06 | Resolving IP Aliases in Building Traceroute-Based Internet Maps | Mehmet H. Gunes Kamil Sarac | 12/06 |
UTDCS-63-06 | CSMA-Based Mac Protocol for Cognitive Radio Based Multi-Hop Wireless Networks | Mansi Thoppian S. Venkatesan Ravi Prakash | 12/06 |
UTDCS-64-06 | Secure Grid Computing | Jianmin Zhu Bhavani Thuraisingham | 12/06 |
UTDCS-65-06 | Face Recognition Using Multiple Classifiers | Pallabi Parveen Bhavania Thuraisingham | 12/06 |
UTDCS-66-06 | A Framework for a Video Analysis Tool for Suspicious Event Detection | Gal Lavee Latifur Khan Bhavani Thuraisingham | 12/06 |
UTDCS-67-06 | HERoISM: Harmonious Existence of RadiOs in the ISM Band | Qasim Javed Kunal Sahu Ravi Prakash | 12/06 |
UTDCS-68-06 | A Model for Risk Adaptive Access Control in RBAC Employed Distributed Environments | Ebru Celikel Murat Kantarcioglu Bhavani Thuraisingham Dilsad Cavus | 12/06 |
UTDCS-69-06 | Rule Generalization in the Component Parameterization Technique – a Formal Approach | Jia Zhou Kendra Cooper I-Ling Yen | 12/06 |
UTDCS-70-06 | Route Finder on PDA – An Application Of the Component Parameterization Technique | Jia Zhou Kendra Cooper I-Ling Yen | 12/06 |