Technical Reports

Click the year to view its related technical reports.

2023
Report No.TitleAuthorDate
UTDCS-02-23ScanToVR: An RGB-D to VR Reconstruction FrameworkHiranya Garbha Kumar
Ninad Arun Khargonkar
Balakrishnan Prabhakaran
2/23
2022
Report No.TitleAuthorDate
ScanToVR: An RGB-D to VR Reconstruction FrameworkHiranya Garbha Kumar
Ninad Arun Khargonkar
Balakrishnan Prabhakaran
2021
Report No.TitleAuthorDate
UTDCS-02-21Near Real-Time Forgery Detection and Localization in Stereo RGB and 3D LiDAR Data from Autonomous VehiclesSomayeh Mohammadpour
Sagnik Dakshit
Balakrishnan Prabhakaran
2/21
UTDCS-02-21CEFEs: A CNN Explainable Framework for ECG SignalsBarbara Mukami Maweu
Sagnik Dakshit
Rittika Shamsuddin
Balakrishnan Prabhakaran
2/21
UTDCS-04-21A Mobile App for Managing Infectious Diseases on CampusAustin Mordahl
Abdul Hadi Khan
Faraz Khalid
Kevin Nguyen
Swathi Poseti
Jean-Felix Abellera
Carlos Hevia
Joshua Ruiz
Teena Thomas
Chinthoorie Yogalingam
Naif Alatrash
James Chen
Evan Guo
Michael Smith
Meng-Hsiang Chang
Rym Zalila-Wenkstern
4/21
UTDCS-06-21Sorting R2n over a Matchstick TreeNairit Sarkar
Jarvis Xie
Bhadrachalam Chitturi
6/21
UTDCS-10-21A 4-Approximation Algorithm for Sorting 2-Permutations Using Adjacent SwapsJayakumar P
Bhadrachalam Chitturi
10/21
UTDCS-10-18-21Adjacent Swaps on StringsBhadrachalam Chitturi
Minnu Mohandas
Hal Sudborough
Walter Voit
10/18/21
UTDCS-11-29-21Sorting Permut​ations with ​Brooms​Indulekha T S
Bhadrachalam Chitturi
11/29/21
2020
Report No.TitleAuthorDate
UTDCS-01-20A New Upper Bound for Sorting Permutations with Prefix TranspositionsBhadrachalam Chitturi
Pramod Nair
Rajan Sundaravaradhan
1/20
UTDCS-02-20An HIL testbed for Medical Cyber-Physical SystemsBhadrachalam Chitturi
Sriram Karunagaran
Karuna P. Sahoo
Masahiro Fujita
2/20
UTDCS-09-20Sorting permutations with transpositions in an amortized time of O(n2) n-bit logical operationsBhadrachalam Chitturi
Priyanshu Das
9/20
UTDCS-09-20Improved Upper Bound for Sorting Permutations by Prefix TranspositionsBhadrachalam Chitturi
Rajan Sundaravaradhan
Pramod P Nair
9/20
UTDCS-12-20Approximation Algorithms for Sorting by Extreme Block-interchangesBhadrachalam Chitturi
Jayakumar Pai
12/20
2019
Report No.TitleAuthorDate
UTDCS-01-19Exact Upper Bound for Sorting Rn with LEBhadrachalam Chitturi
Sai Satwik Kuppili
9/19
2018
Report No.TitleAuthorDate
UTDCS-01-18Distances in and Layering of a DAGBhadrachalam Chitturi
Priyanshu Das
1/18
UTDCS-02-18Sorting permutations with transpositions in average case time of O(n^3)Bhadrachalam Chitturi
Priyanshu Das
3/18
UTDCS-03-18Multistream Classification with Heterogeneous Feature SpaceYifan Li
Yang Gao
Hemeng Tao
Latifur Khan
Patrick Brandt
9/18
UTDCS-04-18FRUGAL: Provisioning of Fog Services over 5G Slices To Meet QoS with Minimal CostAshkan Yousefpour
Jason P. Jue
11/18
2017
Report No.TitleAuthorDate
UTDCS-01-17QoS-aware Dynamic Fog Service ProvisioningAshkan Yousefpour
Ashish Patil
Genya Ishigaki
Jason P. Jue
Inwoong Kim
Xi Wang
Hakki C. Cankaya
Qiong Zhang
Weisheng Xie
10/17
UTDCS-02-17The maximum independent set problem on layered graphsBhadrachalam Chitturi11/17
UTDCS-03-17Characterization of Super Oriented CyclesJayakumar Pai
Bhadrachalam Chitturi
11/17
2016
Report No.TitleAuthorDate
UTDCS-02-16Visualizing Large Graphs by Layering and Bundling Graph EdgesZhuang Cai
Kang Zhang
Dong-Ni Hu
2/16
UTDCS-03-16A Self-Stabilizing Algorithm for the Foraging Problem in Swarm Robotic SystemsGuang Zhou
Farokh Bastani
Wei Zhu
I-Ling Yen
3/16
UTDCS-04-16Data Driven Approach to the Science of Cyber SecurityBhavani Thuraisingham
Murat Kantarcioglu
Kevin Hamlen
Elisa Bertino
Tim Finin
Anupam Joshi
Tim Oates
3/16
UTDCS-05-16An Agile Cyber Defense FrameworkElisa Bertino
et al.
3/16
UTDCS-06-16InXite: Stream Data Mining for Social MediaBhavani Thuraisingham
et al.
3/16
UTDCS-08-16Spectrum-Efficient Virtual Optical Network Provisioning over Flexible-Grid Multi-Domain Optical NetworksSangjin Hong
Jason P. Jue
Pyungkoo Park
Sunchul Kim
Hoyong Ryu
4/16
UTDCS-10-16Compact Structure Patterns in ProteinsBhadrachalam Chitturi
Shuoyong Shi
Lisa N. Kinch
Nick V. Grishin
7/16
UTDCS-11-16A Study of Gene Prioritization Algorithms on PPI NetworksSinsha K P
Bhadrachalam Chitturi
9/16
UTDCS-12-16Exploring Functional Clinical Attributes For Macular Dystrophy DetectionRittika Shamsuddin
Yizhong Wang
Balakrishnan Prabhakaran
10/16
UTDCS-13-16Roughly Polynomial Time: A Concept of Efficiency That Avoids Conflict with IntractablilityAndras Farago11/16
UTDCS-15-16Estimating Clustering Coefficients via Metropolis-Hastings Random Walk and Wedge Sampling on Large OSN GraphsEmrah Cem
Kamil Sarac
11/16
UTDCS-16-16A Clustering-Based Approach for Workload Estimation in the CloudYongjia Yu
Vasu Jindal
I-Ling Yen
Farokh Bastani
Jie Xu
Peter Garraghan
11/16
UTDCS-17-16MCDC-Star-An Open-source MC/DC  Measurement ToolLinghuam Hu
Ruizhi Gao
W. Eric Wong
11/16
2015
Report No.TitleAuthorDate
UTDCS-01-15On Expected Number of Prefix Transpositions Required To Sort A PermutationBhadrachalam Chitturi
Amrita Vishwa Vidyapeetham
Amritapuri Campus
1/15
UTDCS-02-15A Validated Regression Model for Complexity of Polygonal ShapesLingchen Dai
Xianjun Zheng
Ying Li
Kang Zhang
Ralph Martin
Jinhui Yu
3/15
UTDCS-03-15Adjacencies in PermutationsBhadrachalam Chitturi
Amrita Vishwa Vidyapeetham
4/15
UTDCS-04-15Comet Smart Campus Multi-Agent and Visualizations Systems LabJennifer Jiang
Nikolay Bourov
Sihui Huang
Rym Zalila-Wenkstern
5/15
UTDCS-05-15Update Propagation in MapReduce SystemsHuseyin Ulusoy
Murat Kantarcioglu
Erman Pattuk
6/15
UTDCS-06-15FIFA: The Framework for Interaction Fidelity AnalysisRyan P. McMahan
Eric D. Ragan
Doug A. Bowman
Fei Tang
Chengyuan Lai
7/15
UTDCS-08-15MSeer – An Advanced Technique for Locating Multiple Bugs in ParallelRuizhi Gao
W. Eric Wong
8/1
UTDCS-11-15Toward Sematic Enhancement of Monitoring Data RepositoryShuai Zhang
I-Ling Yen
Farokh B. Bastani
11/15
UTDCS-12-15SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data StreamAhsanul Haque
Latifur Khan
Michael Baron
12/15
UTDCS-13-15Improving Efficacy of Internal Binary Search Trees using Local RecoveryArunmoezhi Ramachandran
Neeraj Mittal
13/15
2014
Report No.TitleAuthorDate
UTDCS-01-14SIGPATH: A Memory Graph Based Approach for Program Data Introspection and ModificationDavid I. Urbina
Juan Caballero
Yufei Gu
Zhiqiang Lin
1/14
UTDCS-02-14A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation SystemsRym Zalila-Wenkstern
Mohammad Al-Zinati
1/14
UTDCS-03-14Multidimensional Motif Discovery in Physiological and Biomedical Time Series DataArvind Balasubramanian
Jun Wang
B. Prabhakaran
2/14
UTDCS-04-14Exploring Baseline Shift Prediction in Respiration Induced Tumor MotionArvind Balasubramanian
Rittika Shamsuddin
Yam Cheung
Amit Sawant
Balakrishnan Prabhakaran
4/14
UTDCS-05-14Lexico-minimizing Survival Frequency For a Replica Placement Problem in Tree-based Failure ModelsK. Alex Mills
R. Chandrasekaran
Neeraj Mittal
4/14
2013
Report No.TitleAuthorDate
UTDCS-01-13Ghost Agent-Based Autonomic AdapterRym Zalila-Wenkstern2/13
UTDCS-02-13Noise Tolerant Motif Discovery in Time Series DatasetsArvind Balasubramanian
Balakrishnan Prabhakaran
2/13
UTDCS-03-13Hippocratic Binary Instrumentation: First Do No Harm (Extended Version)Kevin W. Hamlen
Meera Sridhar
Richard Wartell
2/13
UTDCS-04-13A Self-Organizing Model for Decentralized Virtual Environments In Agent-Based Simulation SystemsF. Araujo
M. Al-Zinati
J. Valente
Rym Z. Wenkstern
3/13
UTDCS-05-13Measuring Expertise and Bias in Cyber security Using Cognitive and Neuro-Science ApproachesDaniel Krawczyk
James Bartlett
Murat Kantarcioglu
Kevin Hamlen
Bhavani Thuraisingham
3/13
UTDCS-06-13An Effective Approach for Web Forum Topic DetectionZhiming Chen
Andras Farago
3/13
UTDCS-07-13On the Relationship Between Hyperlinks and Textual SimilarityZhiming Chen
Andras Farago
3/13
UTDCS-08-13Decreasing the Size of Grounded Logic ProgramsFeliks Kluzniak
Kyle Marple
4/13
UTDCS-09-13Analyzing and Securing On-Line Social NetworksBhavani Thuraisingham
Satyen Abrol
Raymond Heatherly
Murat Kantarcioglu
Vaibhav Khadilkar
Latifur Khan
4/13
UTDCS-10-13A Semantic-based Semi-automated Mapping MechanismLijuan Diao
Wei She
I-Ling Yen
Junzhong Gu
5/01
UTDCS-11-13A Short Note on Sorting Permutations With BroomsBhadrachalam Chitturi
(Approved by Dr. Gopal Gupta)
5/01
UTDCS-12-13Shingled Graph Disassembly: Finding the Undecideable PathRichard Wartell
Yan Zhou
Kevin W. Hamlen
Murat Kantarcioglu
6/13
UTDCS-13-13Improved Approximation Algorithm for k-interval Cover ProblemBalaji Raghavachari
Bhadrachalam Chitturi
8/13
UTDCS-14-13Specification and Verification of Serious Educational Game ModelsMuhammad Shoaib
Kendra M.L. Cooper
8/13
UTDCS-15-13Towards Intelligent Semi-automated Game Generation in SimSYS: A Component-based ApproachKaleb Breault
Ricardo Daconceicao
Carsten Locke
Chris Mojica
Kendra M.L. Cooper
C. Shaun Longstreet
8/13
UTDCS-16-13Employing WiFi Direct to Build a Wireless Network over Both 2.4 GHz and 5.8 GHz BandsSabur Hassan Baidya
Pramod Shirol
Abhishek Basu
Ravi Prakash
9/13
UTDCS-01-14SIGPATH: A Memory Graph Based Approach for Program Data Introspection and ModificationDavid I. Urbina
Yufei Gu
Juan Caballero
Zhiqiang Lin
1/14
UTDCS-02-14A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation SystemsMohammad Al-Zinati
Rym Zalila-Wenkstern
2/14
2012
Report No.TitleAuthorDate
UTDCS-01-12Security Analysis for Order Preserving Encryption SchemesLiangliang Xiao
Osbert Bastani
1-LingYen
1/12
UTDCS-02-12Extending Order Preserving Encryption
For Multi-User Systems
Liangliang Xiao
1-LingYen
Dung T. Huynh
2/12
UTDCS-03-12An Efficient Homomorphic Encryption Protocol for Multi-User SystemsLiangliang Xiao
Osbert Bastani
1-LingYen
2/12
UTDCS-04-12Security Analysis and Enhancement for Prefix-Preserving Encryption SchemesLiangliang Xiao
1-LingYen
2/12
UTDCS-05-12A Service Pattern Model and Its Instantiation Using Rule-Based ReasoningChien-Hsiang Lee
San-Yih Hwang
1-LingYen
2/12
UTDCS-06-12Towards Model Driven Game
Engineering in SimSYS: Game
Requirements for the Agile Software
Development Process Game
Kendra M.L. Cooper
C. Shaun Longstreet
3/12
UTDCS-07-12Optimizing Virtual Private Network
Design Using a New Heuristic
Optimization Method
Hongbing Lian
Andras Farago
4/12
UTDCS-08-12Random Network Topology Models With PerturbationsAndras Farago4/12
UTDCS-09-12Towards a Reference Architecture for Agent-Based Autonomic Software SystemsRym Zalila Wenkstern
D. Urbina
F. Araujo
T. Steel
6/12
UTDCS-10-12Concurrent Lock-Free Binary Search TreesAravind Natarajan
Neeraj Mittal
7/12
UTDCS-11-12Online Algorithms to Generate Slices for Regular Temporal Logic Predicates
Networks
Aravind Natarajan
Neeraj Mittal
7/12
UTDCS-12-12Designer Satellite Collisions from Covert Cyber War
( Selected Papers in Security Studies – Volume 8 )
Jan Kallberg
Bhavani Thuraisingham
8/12
UTDCS-13-12Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal
( Selected Papers in Security Studies – Volume 9 )
Jan Kallberg8/12
UTDCS-14-12An Algorithm for Propositional Logic ProgramsFeliks Kluzniak
Gopal Gupta
9/12
UTDCS-15-12Decreasing the Size of Grounded Logic ProgramsFeliks Kluzniak
Kyle Marple
9/12
UTDCS-16-12Concurrent Wait-Free Red Black TreesAravind Natarajan
Lee H. Savoie
Neeraj Mittal
10/12
UTDCS-17-12Sorting Permutations With A Transposition TreeBhadrachalam Chitturi10/12
UTDCS-18-12A Run-time Self-Organizing Model for Decentralized Virtual EnvironmentsFrederico Araujo
J. Valente
M. Al-Zinati
Rym Z. Wenkstern
10/12
UTDCS-19-12Regenerator Site Selection and Regenerator Placement for Mixed Line Rate Optical NetworksWeisheng Xie
Jason P. Jue
10/12
UTDCS-20-12On Efficient Gene PrioritizationBhadrachalam Chitturi
Balaji Raghavachari
Donghyun Kim
11/12
UTDCS-21-12Towards High-level Awareness:
A Cognitive Awareness Model and A Survey
Cong Chen
Kang Zhang
11/12
UTDCS-22-12Network Reliability Analysis with Unreliable InformationAndras Farago11/12
2011
Report No.TitleAuthorDate
UTDCS-01-11Better Upper Bound for Prefix Transposition Distance over PermutationsBhadrachalam Chitturi
Hal Sudborough
1/11
UTDCS-02-11Impact of Aspect Oriented Approach on GoF Design PatternsJayashree V. Pathangi
Kendra M. L. Cooper
1/11
UTDCS-03-11Modeling and Verification of Cyber-Physical Systems with Co-inductive Constraint Logic ProgrammingNeda Saeedloei
Gopal Gupta
1/11
UTDCS-04-11High-Speed Multi-Input FIFO Queues with ApplicationsS. Q. Zheng1/11
UTDCS-05-11Low Distortion Metric Embeddings Into Constant DimensionAndras Farago1/11
UTDCS-06-11Regenerator Placement in  Waveband Networks with Impairment ConstraintsSaket Varma
Jason P. Jue
1/11
UTDCS-07-11Impairment-constrained Multi-rate Multicast Flow Aggregation in IP Over Optical NetworksYi Zhu
Jason P. Jue
2/11
UTDCS-08-11Analysis of Cloud Architecture Layouts and Commercial CloudsSindhuja Narasimhan
Kendra M.L. Cooper
2/11
UTDCS-09-11The Financial Crisis of 2007-2009: EVENTS AND CAUSESIrina Sakharova
Weili Wu
2/11
UTDCS-10-11Modeling Security Using an Aspect-oriented Architecture-Centric Process: A Banking System StudyEric Blackburn
Kendra M.L. Cooper
2/11
UTDCS-11-11Routing, Wavelength Assignment, and Spectrum Allocation Algorithms in Transparent Flexible Optical WDM
Networks
Ankitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
3/11
UTDCS-12-11Federated Query Processing Using Ontology Structure and Ranking In a Service Oriented EnvironmentNeda Alipanah
Pallabi Parven
Latifur Khan
Bhavani Thuraisingham
3/11
UTDCS-13-11Service-Oriented Approach to Electronic Health RecordsKendra Cooper
Thomas Omen
3/11
UTDCS-14-11Subnet Level Internet Topology MappingM. Engin Tozal
Kamil Sarac
5/11
UTDCS-15-11 F.Automatic Software Engineering: An Achievable Dream?R. Zalila Wenkstern
D. Urbina
Araujo T. Steel
5/11
UTDCS-16-11Chekov: Aspect-Oriented Runtime Monitor Certification via Model-Checking (Extended Version)Kevin W. Hamlen
Micah M. Jones
Meera Sridhar
5/11
UTDCS-17-11Exploring Structural Properties Of Web Graphs through 3D VisualizationZhiming Chen
Kang Zhang
Andras Farago
5/11
UTDCS-18-11TL Reference ManualFeliks Kluzniak6/11
UTDCS-19-11Domain-Disjoint Routing Based on Topology Aggregation for Survivable Multi-Domain Optical NetworksChengyi Gao
Mohammad M. Hasan
Jason P. Jue
7/11
UTDCS-20-11Regenerator Site Selection in Waveband Optical Networks Supporting Mixed Line RatesSaket Varma
Jason P. Jue
7/11
UTDCS-21-11Handling Deviations in Network ModelsAndras Farago7/11
UTDCS-22-11RETRO: A Framework for Semantics Preserving SQL-to-SPARQL TranslationJyothsna Rachapalli
Vaibhav Khadilkar
Murat Kantarcioglu
Bhavani Thuraisingham
8/11
UTDCS-23-11Coinductive Constraint Logic ProgrammingNeda Saeedloei
Gopal Gupta
8/11
UTDCS-24-11An Extension of n-Calculus with Real-Time and its Realization in Logic ProgrammingNeda Saeedloei
Gopal Gupta
8/11
UTDCS-25-11Estimating Network Layer Subnet Characteristics via Statistical SamplingM. Engin Tozal
Kamil Sarac
9/11
UTDCS-26-11Modeling and Analyzing Enterprise Cloud Service ArchitectureLongji Tang
Farokh B. Bastani
Wei-Tek Tsai
Jing Dong
Liang-Jie Zhang
9/11
UTDCS-27-11Towards the Design and Implementation Of a Cloud-Centric Assured Information Sharing SystemBhavani Thuraisingham
Vaibhav Khadilkar
Tyrone Cadenhead
Jyothsna Rachapalli
Murat Kantarcioglu
Kevin Hamlen
Latifur Khan
Farhan Husain
9/11
UTDCS-28-11Waveband Selection, Spectrum, and Waveband Assignment in Uniform and Non-Uniform OFDM-based Elastic Optical Waveband NetworkSaket Varma
Jason P. Jue
10/11
UTDCS-29-11Routing, Wavelength Assignment, and Spectrum Allocation in Wavelength-Convertible Flexible Optical WDM NetworksAnkitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
10/11
UTDCS-30-11Optimized Ontology-driven Query Expansion Using Map-Reduce Framework To Facilitate Federated QueriesNeda Alipanah
Latifur Khan
Bhavani Thuraisingham
11/11
UTDCS-31-11Risk-Aware Data Processing in Hybrid CloudsVaibhav Khadilkar
Kerim Yasin Oktay
Bijit Hore
Murat Kantarcioglu
Sharad Mehrotra
Bhavani Thuraisingham
11/11
UTDCS-32-11A Model for Cognitive Radio NetworksHongbing Lian
Andras Farago
11/11
UTDCS-33-11Wait-Free Red-Black Trees with Fast Reads and WritesAravind Natarajan
Lee Savoie
Neeraj Mittal
11/11
UTDCS-34-11Selected Papers in Security Studies:Volume 5: Payment Card Fraud: Challenges and SolutionsIrina Sakharova
Latifur Khan
11/11
UTDCS-35-11Selected Papers in Security Studies: Volume 6: The Continued War on Terrorism – How to Maintain Long-Range Terrorist DeterrenceJan Kallberg
Bhavani Thuraisingham
12/11
UTDCS-36-11Selected Papers in Security Studies: Volume 7: Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information SharingBhavani Thuraisingham12/11
UTDCS-37-11Data Stream Classification with Bounding Component Classification ModelsTahseen M. Al-Khateeb
Mohammad M. Masud
Latifur Khan
Jiawei Han
12/11
UTDCS-38-11Recurrence and Novel Class Detection With Bounding Component EnsemblesTahseen M. Al-Khateeb
Mohammad M. Masud
Latifur Khan
Charu C. Aggarwal
12/11
UTDCS-39-11A Heuristic Optimization Method and Its Application in Cognitive Radio NetworksHongbing Lian
Andras Farago
12/11
UTDCS-40-11Security Analysis for OPE and Generalized OPE SchemesLiangliang Xiao
Osbert Bastani
I-Ling Yen
12/11
UTDCS-41-11Extending Order Preserving Encryption For Multi-User SystemsLiangliang Xiao
I-Ling Yen
Dung T. Huynh
12/11
UTDCS-42-11An Efficient Homomorphic Encryption SchemeLiangliang Xiao
Osbert Bastani
I-Ling Yen
12/11
UTDCS-43-11Security Analysis for Prefix-Preserving Encryption SchemesLiangliang Xiao
I-Ling Yen
12/11
UTDCS-44-11Combined 2R/3R Regenerators Placement in Optical WDM NetworksAnkitkumar N. Patel
Philip N. Ji
Avishek Nag
Yua-Kai Huang
Ezra Ip
Jason P. Jue
Ramaswami Chandrasekaran
Ting Wang
12/11
2010
Report No.TitleAuthorDate
UTDCS-01-10Semantic Web Implementation Scheme for National Vulnerability Database (Common Platform Enumeration Data)Vaibhav Khadilkar
Jyothsna Rachapalli
Bhavani Thuraisingham
1/10
UTDCS-02-10Security Issues for Cloud ComputingKevin Hamlen
Murat Kantarcioglu
Latifur Khan
Bhavani Thuraisingham
2/10
UTDCS-03-10Securing the Execution Environment Applications and Data from Multi-Trusted ComponentsElisa Bertino
Gabriel Ghinita
Kevin Hamlen
Murat Kantarcioglu
Hsien-Hsin S. Lee
Ninghui Li
Calton Pu
Ravi Sandhu
Waleed Smari
Bhavani Thuraisingham
Gene Tsudik
Dongyan Xu
Shouhuai Xu
2/10
UTDCS-04-10Ranking Entities from Multiple Ontologies to Facilitate Federated QueriesNeda Alipanah
Julie Rauer
Latifur Khan
Steven B. Seida
Bhavani Thuraisingham
2/10
UTDCS-05-10Randomized Algorithms for Neighbor Discovery in Cognitive Radio NetworksNeeraj Mittal
Yanyan Zeng
S. Venkatesan
R. Chandrasekaran
2/10
UTDCS-06-10Security Analysis for an Order Preserving Encryption SchemeLiangliang Xiao
I-Ling Yen
Dongdai Lin
2/10
UTDCS-07-10Spectrum-Based Fault Localization Without Test OraclesXiaoyuan Xie
W. Eric Wong
Tsong Yueh Chen
Baowen Xu
2/10
UTDCS-08-10A Novel Grouping-Based Strategy for Improved Fault LocalizationVidroha Debroy
W. Eric Wong
Xiaofeng Xu
Byoungju Choi
2/10
UTDCS-09-10Building Disclosure Risk Aware Query Optimizers for Relational DatabasesMustafa Canim
Murat Kantarcioglu
Bijit Hore
Sharad Mehrotra
4/10
UTDCS-10-10Secure, Dependable and High Performance Cloud StorageYunqi Ye
I-Ling Yen
Liangliang XiaoFarokh Bastani
4/10
UTDCS-11-10Incentive Compatible Distributed Data MiningMurat Kantarcioglu
Robert Nix
4/10
UTDCS-12-10An Improved Scalable Algorithm for Perpetual System Connectivity Using Structure EstimatesEric Etheridge
Neeraj Mittal
5/10
UTDCS-13-10Bi-Directional Translation of Relational Data into Virtual RDF StoresSunitha Ramanuja
Vaibhav Khadilkar
Latifur Khan
Steven Seida
Murat Kantarcioglu
Bhavani Thuraisingham
5/10
UTDCS-14-10A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense ModelAlain Bensoussan
Murat Kantarcioglu
Celine Hoe
5/10
UTDCS-15-10Noncooperative Game Theory in Wireless NetworksDung T. Tran
Andras Farago
6/10
UTDCS-16-10On Selfish Behavior in TDMA-based Bandwidth Allocation ProtocolsDung T. Tran
Andras Farago
6/10
UTDCS-17-10Game Theoretic Approach to Network Lifetime Maximization in Wireless NetworksDung T. Tran
Andras Farago
6/10
UTDCS-18-10Reining In Windows API Abuses with In-lined Reference MonitorsKevin W. Hamlen
Vishwath Mohan
Richard Wartell
6/10
UTDCS-19-10Selected Topics in International Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends and TechnologiesBhavani Thuraisingham7/10
UTDCS-20-10RBF Neural Network-based Fault LocalizationW.  Eric Wong
Vidroha Debroy
Bhavani Thuraisingham
Richard Golden
7/10
UTDCS-21-10Multi-label Text Data Classification  Using Semi Supervised and Fuzzy Subspace ClusteringMohammad Salim Ahmed
Latifur Khan
7/10
UTDCS-22-10Reverse Engineering in the Aspect- Oriented Paradigm – Part I Source Code to Architecture of the Base DesignSunil Bohra
Rohit Goel
Jeffrey Koch
Sonali Pagade
Kendra Cooper
7/10
UTDCS-23-10Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions TowardsImplementing these Strategies
Version I
Bhavani Thuraisingham8/10
UTDCS-24-10A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data MiningAmy Xuyang Tan
Valerie Li Liu
Murat Kantarcioglu
Bhavani Thuraisingham
8/10
UTDCS-25-10Selected Topics in Terrorism Studies–Volume 2: Al Qaeda Terrorist Financing and Technologies to Track the Finance NetworkIrina Sakharova
Weili Wu
8/10
UTDCS-26-10Minimum Time Broadcasting in Cognitive Radio NetworksChanaka J. L. Arachchige
S. Venkatesan
R. Chandrasekaran
Neeraj Mittal
8/10
UTDCS-27-10Ontology-driven Query Expansion Methods to Facilitate Federated QueriesNeda Alipanah
Pallabi Parveen
Sheetal Menezes
Latifur Khan
Steven B. Seida
Bhavani Thuraisingham
9/10
UTDCS-28-10Minimum Length Scheduling for Aggregated Convergecast in Heterogeneous Cognitive Radio NetworksYanyan Zeng
Neeraj Mittal
S. Venkatesan
R. Chandrasekaran
9/10
UTDCS-29-10On Solving Consensus with Unknown ParticipantsDivya Chandrasekaran
Neeraj Mittal
10/10
UTDCS-30-10Optimal Defragmentation of Transparent Flexible Optical WDM (FWDM) NetworksAnkitkumar N. Patel
Philip N. Ji
Jason P. Jue
Ting Wang
10/10
UTDCS-31-10Energy-efficient Flow Aggregation In Optical NetworksYi Zhu
Jason P. Jue
10/10
UTDCS-32-10Waveband Routing in Mixed Line Rate Networks with Impairment ConstraintsSaket Varma
Jason P. Jue
10/10
UTDCS-33-10Safe Software: Does it Cost More to Develop?W. Eric Wong
Andrea Demel
Michael F. Siok
11/10
UTDCS-34-10Software Safety Standards: Evolution and Lessons LearnedW. Eric Wong
Andrea Demel
Michael F. Siok
11/10
UTDCS-35-10Software Safety Standards: How Good Are They?W. Eric Wong
Andrea Demel
Vidroha Debroy
Michael F. Siok
11/10
UTDCS-36-10On Consensus Among Fault Localization TechniquesW. Eric  Wong
Vidroha Debroy
11/10
2009
Report No.TitleAuthorDate
UTDCS-01-09  A Fine Grained Model for Information Flow Control in Web Service CompositionWei She
I-Ling Yen
Bhavani Thuraisingham
1/09
UTDCS-02 09    A Dual Bound Algorithm for Very Fast and Exact Template-MatchingHaim Schweitzer
Robert Finis Anderson
Rui (April) Deng
1/09
UTDCS-03-09Preventing Private Information Inference Attacks on Social NetworksRaymond Heatherly
Murat Kantarcioglu
Bhavani Thuraisingham
2/09
UTDCS-04-09Minimum Cost Multiple Paths Subject to Minimum Link and Node  Sharing in a Network Part 1: Problem Formulation and Solution SpaceS. Q. Zheng
Jianping Wang
Bing Yang
Mei Yang
3/13
UTDCS-05-09Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 2: Algorithms and GeneralizationsS. Q.  Zheng
Jianping Wang
Bing Yang
Mei Yang
3/13
UTDCS-06-09A Distributed Termination Detection Algorithm for Dynamic Asynchronous SystemsPaul Johnson
Neeraj Mittal
3/23
UTDCS-07-09PEQ: A Privacy-Preserving Scheme forExact Query Evaluation in Distributed Sensor Data NetworksHai Vu
Thuc Nguyen
Neeraj Mittal
S. Venkatesan
4/09
UTDCS-08-09RDF Join: A Scalable Data Model for Persistence and Efficient Querying of RDF DatasetsJames P. McGlothlin
Latifur R. Khan
4/09
UTDCS-09-09Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction OperationsBhavani Thuraisingham
Latifur Khan
Murat Kantarcioglu
4/09
UTDCS-10-09Local vs. Global Scalability in Ad Hoc and Sensor NetworksAndras Farago5/09
UTDCS-11-09Infoshape: High-Level Views of Multidimensional InformationJie Hao
Chunying Zhao
Pushpa Kumar
Kang Zhang
5/09
UTDCS-12-09Composition Operators for Synthesizing Glue Code Based on Code PatternsJicheng Fu
Jian Liu
Farokh Bastani
I-Ling Yen
6/09
UTDCS-13-09Integrating Novel Class Detection with Classification for Concept-Drifting Data StreamsMohammad M. Masud
Jing Gao
Latifur Khan
Jiawei Han
Bhavani Thuraisingham
6/09
UTDCS-14-09Streaming 3D Deformations in Collaborative Learning ApplicationsZiying Tang,
Guodong Rong
Xiaohu Guo
Balakrishnan Prabhakaran
6/09
UTDCS-15-09Point-Based Manifold HarmonicsYang Liu
Xiaohu Guo
Balakrishnan Prabhakaran
6/09
UTDCS-16-09Toward Fully Homomorphic ComputationLiangliang Xiao
Osbert Bastani
I-Ling Yen
7/09
UTDCS-17-09A Corner-Based Method for Computing The Walsh Transform at Multiple Locations in an ImageRui Deng
Robert Finis Anderson
Haim Schweitzer
7/09
UTDCS-18-09A Family of  Secure Key Assignment Schemes for Wireless Communication NetworksNeeraj Mittal7/09
UTDCS-19-09Spectral Hybrid Simulation of Deformable and Rigid BodiesYin Yang
Guodong Rong
Jianfen Ren
Luis Torres
Xiaohu Guo
7/09
UTDCS-20-09An Almost Linear Homomorphic Encrytion SchemeLiangliang Xiao
Osbert Bastani
I-Ling Yen
7/09
UTDCS-21-093R Regenerator Placement for Optical MulticastYi Zhu
Xiaofeng Gao
Jason P. Jue
Weili Wu
7/09
UTDCS-22-09Fast Deterministic Neighbor Discovery In Cognitive Radio NetworksYanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran7/09
UTDCS-23-09Extending Service Model to Build an Effective Service Composition Framework for Cyber-Physical SystemsJian Huang Farokh Bastani I-Ling Yen Wenke Zhang Feng-Jian Wang Hwai-Jung Hsu8/09
UTDCS-24-09A Tripartite Clustering Analysis on MicroRNA, Gene and Disease ModelChengcheng Shen
Ying Liu
8/09
UTDCS-25-09DESIGN and Implementation of Restful Web Services for BlackbookPranav Parikh
Murat Kantarcioglu
Latifur Khan
Bhavani Thuraisingham
8/09
UTDCS-26-09Parsing Prolog Terms A didactic exercise, Sponsored by Dr. Gopal GuptaFeliks Kluzniak8/09
UTDCS-27-09Physical Models vs. Graph Models Of Wireless Network TopologiesAndras Farago
Stefano Basagni
9/09
UTDCS-28-09A Case Study on Geospatial Data Management with BlackbookSonia Chib
Jyothsna Rachapalli
Bhavani Thuraisingham
Latifur Khan
Murat Kantarcioglu
9/09
UTDCS-29-09Agile Product Line Requirements Engineering Questionnaire Data Analysis Using Feature SelectionKunwu Feng
Kendra M.L. Cooper
9/09
UTDCS-30-09Agile Product Line Requirements Engineering Process DefinitionsKunwu Feng
Kendra M.L. Cooper
9/09
UTDCS-31-09Traffic Grooming for Energy-Aware Optical NetworksM.M. Hasan
Farid Farahmand
Jason P. Jue
9/09
UTDCS-32-09Contention-Tolerant Crossbar Packet Switches without and with SpeedupGuannan Qu
Hyung Jae Chang
Jianping Wang
Zhiyi Fang
S. Q. Zheng
9/09
UTDCS-33-09Bayesian Belief Network Structure Learning Algorithms:A Comparative SurveyYan Tang
Kendra Cooper
Joao Cangussu
9/09
UTDCS-34-09SoftLink: Visualizing Correlations Among Multiple Program ExecutionsChunying Zhao
Kang Zhang
9/09
UTDCS-35-09FREEZE: Rate Adaptation in Wireless LANs Using Channel Contention EstimatesAjay Kulkarni
Shanthy Menezes
Ravi Prakash
9/09
UTDCS-36-09Enhanced Information Flow Control for Service Composition and Its ImplementationWei She
I-Ling Yen
Bhavani Thuraisingham
Elisa Bertino
09/09
UTDCS-37-09Cost Efficient Traffic Grooming andRegenerator Placement in Impairment- Aware Optial WDM NetworkAnkitkumar N. Patel
Chengyi Gao
Jason P. Jue
Xi Wang
Qiong Zhang
Paparao Palacharla
Takao Naito
10/09
UTDCS-38-09Minimum SRLGs Multicast RoutingYi Zhu
Jason P. Jue
10/09
UTDCS-39-09Network Aware Energy-Efficient Communication (NAEEC) Protocol For Heterogeneous Wireless Sensor
Networks
Manoj K. Garg
B.  Prabhakaran
10/09
UTDCS-40-09Cost-based Query Processing for Large RDF Graph Using Hadoop and MapReduceMohammad Husain
Pankil Doshi
Latifur Khan
Syeda A. Rizvi
Murat Kantarcioglu
Bhavani Thuraisingham
11/09
UTDCS-41-09Efficient Query Processing for Large  RDF Graphs Using Hadoop and MapReduceMohammad Husain
Pankil Doshi
James McGlothlin
Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
11/09
UTDCS-42-09Secure Location Verification with Randomly-Selected Base StationsMatthew Holiday
Neeraj Mittal
Subbarayan Venkatesan
11/09
UTDCS-43-09ASSERT: A Wireless Networking TestbedEhsan Nourbakhsh
Jeff  Dix
Paul Johnson
Ryan Burchfield
S. Venkatesan
Neeraj Mittal
Ravi Prakash
11/09
UTDCS-44-09Time Efficient Neighbor Discovery In Cognitive Radio NetworksYanyan Zeng
Neeraj Mittal
S. Venkatesan
R. Chandrasekaran
11/09
UTDCS-45-09A Survey of Software Fault LocalizationEric Wong
(Pending)
11/09
UTDCS-46-09Experience with an NSF REU Program  In Software SafetyEric  Wong
(Pending)
11/09
UTDCS-47-09Industry Involvement in an Undergraduate Software Engineering Project Course:  Everybody WinsEric Wong
(Pending)
11/09
UTDCS-48-09Software Safety Standards: How Good Are They?Eric Wong
(Pending)
11/09
UTDCS-49-09Recent Catastrophic Accidents: Is Software To Blame?Eric Wong
(Pending)
11/09
UTDCS-50-09Evaluating Dependable Distributed Storage SystemsLiangliang Xiao
Yunqi Ye
I-Ling Yen
Farokh Bastani
12/09
UTDCS-51-09Secure, Dependable and High Performance Cloud StorageYunqi Ye
I-Ling Yen
Liangliang Xiao
Farokh Bastani
Bhavani Thuraisingham
12/09
2008
Report No.TitleAuthorDate
UTDCS-01-08Trusted Computing Base for Assured Information Sharing                                                     Yashaswini Harsha Kumar
Bhavani Thuraisingham
Latifur Khan
1/08
UTDCS-02-08   Delegation-based Security Model For Web Services                                                                            Wei She
Bhavani Thuraisingham
I-Ling Yen               
1/08
UTDCS-03-08FIP: A Fast Planning-Graph Based Iterative Planner                                                                                                      Jicheng Fu
Farokh Bastani
Vincent Ng
I-Ling Yen
Yansheng Zhang
2/08
UTDCS-04-08Using Anonymized Data for Classification                                                           Ali Inan
Murat Kantarcioglu                
3/08
UTDCS-05-08        Mining Concept-Drifting Data Stream To Detect Peer to Peer Botnet TrafficMohammad M. Masud
Jing Gao
Latifur Khan
Jiawei Han
Bhavani Thuraisingham
3/08
UTDCS-06-08  A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 NetworksThuc D. Nguyen
Duc H. M. Nguyen
Bao N. Tran
Hai Vu
Neeraj Mittal
3/08
UTDCS-07-08On Disjoint Connecting Paths and Unsplittable FlowAndras Farago3/08
UTDCS-08-08Speeding Up Large Scale Distance ComputationsAndras Farago3/08
UTDCS-09-08Fault -Tolerant Dual Power Management in Wireless Sensor NetworksChang Wang
Myung-Ah Park
James Willson
Andras Farago
Ding-Zhu Du
3/08
UTDCS-10-08The Effect of Multi-Radio Nodes on Network Connectivity – A Graph Theoretic AnalysisAndras Farago
Stefano Basagni
4/08
UTDCS-11-08On the Descriptional Complexity of Path Optimization in GraphsAndras Farago4/08
UTDCS-12-08Cross-Media Mapping Framework for 3D Human Motion Document RetrievalYohan Jin
B. Prabhakaran
5/08
UTDCS-13-08Content-based Ontology Matching for GIS DatasetsJeffrey L. Partyka
Latifur Khan
Bhavani Thuraisingham
Neda Alipanah
Shashi Shekhar
5/08
UTDCS-14-08A Fast Active Spanning Tree Maintenance Protocol for Dynamic Distributed SystemsTarun Bansal
Neeraj Mittal
6/08
UTDCS-15-08On Lower Bounds for Time Complexity of Departure in Dynamic Distributed SystemsTarun Bansal
Neeraj Mittal
6/08
UTDCS-16-08PCFM: Probabilistic Contention Free MAC Protocol for Wireless NetworkG. Dattatreya
A. Kulkarni
7/08
UTDCS-17-08Refining a Survey to Collect Expertise In Agile Product Line Requirements Engineering ProcessesKunwu Feng
Yan Tang
Kun Tian
Kendra M.L. Cooper
7/08
UTDCS-18-08Surgical Haptics and Robotics: Influence of Mismatched Haptic and Visual Display ScalesGregory S. Lee            Bhavani Thuraisingham7/08
UTDCS-19-08Leader Election Algorithms for Multi-Channel Wireless NetworksTarun Bansal              Neeraj Mittal
S. Venkatesan
7/08
UTDCS-20-08Synthesize Virtual World Motions From 2D Video RecognitionYohan Jin                            Myunghoon Suk
B. Prabhakaran
Bhavani Thuraisingham
7/08
UTDCS-21-08Inferring Private Information Using Social Network DataJack Lindamood
Murat Kantarcioglu
7/08
UTDCS-22-08Content-based Ontology Matching  For GIS DatasetsJeffrey Partyka
Neda Alipanah
Latifur Khan
Bhavani Thuraisingham
Shashi Shekhar
  7/08
UTDCS-23-08Secure Haptics and Surgical Robotics: Adaptation to Fitts’ Law Performance Measure for Multi-Target Task ComparisonsGregory S. Lee
Bhavani Thuraisingham
8/08
UTDCS-24-08An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio NetworksChanaka J. Liyana Arachchige
S. Venkatesan
Neeraj Mittal
8/08
UTDCS-25-08“RF in the Jungle” Reproducibility of Wireless ExperimentsEhsan Nourbakhsh
Ryan Burchfield
Jeff Dix
Kunal Sahu
S. Venkatesan
Ravi Prakash
8/08
UTDCS-26-08Dynamic Coexistence of Frequency Hopping Networks Using Parallel And Gaussian AllocationsM. M. Hasan
Ravi Prakash
Jason P. Jue
9/08
UTDCS-27-08Improving Fault Tolerance via Multi-Radio Nodes – A Graph Theoretic AnalysisAndras Farago
Dung Trung Tran
Stefano Basagni
9/08
UTDCS-28-08Scalability of Node Degrees in Random  Wireless Network TopologiesAndras Farago9/08
UTDCS-29-08Incentive Compatible Privacy-Preserving Data AnalysisMurat Kantarcioglu
Wei Jiang
9/08
UTDCS-30-08Hybrid Approach to Inferring Gene Networks with Expression Profile And Gene OntologyLiping Jing
Ying Liu
Phil Bachman
9/08
UTDCS-31-08Multi-Class IP Flow Aggregation In Multicast Optical NetworksYi Zhu
Jason P. Jue
9/08
UTDCS-32-08A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled DataMohammad M. Masud
Bhavani Thuraisingham
Jing Gao
Latifur Khan
Jiawei Han
10/08
UTDCS-33-08A Reusable Process Pattern for Agile Product Line Requirements EngineeringKojun T.  Hatta
Kendra M. L. Cooper
10/08
UTDCS-34-08Negation in Coinductive Logic ProgrammingRichard Min
Gopal Gupta
10/08
UTDCS-35-08Routing and Scheduling for Time-Shift Reservation Circuit SwitchingAnkitkumar N. Patel
Qingya She
Jason P. Jue
10/08
UTDCS-36-08Routing and Scheduling for Variable          Bandwidth Reservation Circuit SwitchingAnkitkumar N. Patel
Jason P. Jue
10/08
UTDCS-37-08A Kalman Filter for Software Defects DataSyed Waseem Haider
Joao W. Cangussu
12/08
UTDCS-38-08PEQ: A Privacy-Preserving Scheme for Answering Exact Queries in Distributed Sensor Data NetworksNeeraj Mittal
S. Venkatesan
Hai Vu                        Thuc Nguyen
12/08
UTDCS-39-08R2D: Bridging the Gap Between the Semantic Web and Relational Visualization ToolSunitha Ramanujam
Anubha Gupta
Latifur Khan
Steven Seida
12/08
UTDCS-40-08A Framework for the Relational Transformation of RDF DataSunitha Ramanujam
Anubha Gupta
Latifur Khan
Steven Seida
Bhavani Thuraisingham
12/08
2007
Report No.TitleAuthorDate
UTDCS-01-07An Integrated Platform for Secure Geospatial Information Exchange Through the Semantic WebBhavani Thuraisingham
Alam Ashraful
Ganesh Subbiah
Latifur Khan
1/07
UTDCS-02-07Oracle 10 G XE Tutorial (Product of Oracle Corporation)Srinivasan Iyer
Bhavani Thuraisingham
1/07
UTDCS-03-07Geospatial Data Mining for National Security: Land Cover Classification And Grouping for Semantic AssessmentChuanjun Li
Latifur Khan
M. Husain
Bhavani Thuraisingham
Shaofei Chen
Fang Qiu
1/07
UTDCS-04-07A Multilevel Quantization Index Modulation Based Data Hiding SchemeHui Li
Parag Agarwal
Balakrishnan Prabhakaran
1/07
UTDCS-05-07From Abstract Art to Information VisualizationKang Zhang1/07
UTDCS-06-07On Active Departure for Dynamic Asynchronous SystemsSathya Peri
Neeraj Mittal
1/07
UTDCS-07-07A Formal Framework for Modeling and Analysis of Pattern-Based DesignJing Dong
Tu Peng
Paulo S.C. Alencar
Donald D. Cowan
1/07
UTDCS-08-07Optimizing Split NetworksY. Zhang
L. Bao
Sergey Bereg
2/07
UTDCS-09-07A Polynomial Time Solution to Minimum Forwarding Set Problem In Wireless Ad Hoc NetworksMehmet Baysan
Kamil Sarac
R. Chandrasekaran
Sergey Bereg
2/07
UTDCS-10-07Sampling from Independence SystemsAndrás Faragó2/07
UTDCS-11-07Methods for Handling Non-Markovian Performance ModelsAndrás Faragó2/07
UTDCS-12-07Complexity of Cut Paste Moves and Prefix Reversal/Transposition Moves for StringsBhadrachalam Chitturi
Hal Sudborough
3/07
UTDCS-13-07Resource non-Intensive Survivable Clustering for Wireless Sensor NetworksMohammad M. Hasan
Jason P. Jue
3/07
UTDCS-14-07A Fast Deterministic Algorithm for Neighbor Discovery in Multi-Channel Cognitive Radio NetworksNeeraj Mittal
Srinivasan Krishamurthy
R. Chandrasekaran
S. Venkatesan
3/07
UTDCS-15-07Data Hiding Based Compression Mechanism for 3D ModelsHui Li
Parag Agarwal
Balakrishnan Prabhakaran
3/07
UTDCS-16-07Fast Mobile IPv6 Based Handover with Efficient Prediction for WLAN-UMTS Integrated NetworksShanthy Menezes
Aesoon Park
S. Venkatesan
3/07
UTDCS-17-07Spectral Analysis of Complex NetworksWenyuan Li
Yongjing Lin
Ying Liu
3/07
UTDCS-18-07Developing a Survey to Collect Expertise in Agile Product Line Requirements Engineering ProcessesKunwu Feng
Meli Lempert
Yan Tang
Kun Tian
Kendra M. L. Cooper
Xavier Franch
4/07
UTDCS-19-07Accelerometer-Based Human Abnormal Movement Detection in Wireless Sensor NetworksT. Ryan Burchfield
S. Venkatesan
4/07
UTDCS-20-07Tutorial on QoS Based UML ProfileHyotaeg Jung
W. Eric Wong
Kendra Cooper
4/07
UTDCS-21-07Defining Project Scenarios for the Agile Requirements Engineering Product-line Development QuestionnaireKunwu Feng
Meli Lempert
Yan Tang
Kun Tian
Kendra M. L. Cooper
Xavier Franch
4/07
UTDCS-22-07Towards Intelligent Services: A Case Study in Chemical Emergency ResponseAjay Bansal
Kunal Patel
Gopal Gupta
B. Raghavachari
E. D. Harris
James C. Staves
4/07
UTDCS-23-07USDL – Formal Definitions in OWLSrividya Kona
Ajay Bansal
Gopal Gupta
Thomas D. Hite
4/07
UTDCS-24-07Maximizing Throughput in ZigBee Wireless Networks through Analysis, Simulations and ImplementationsT. Ryan Burchfield
S. Venkatesan
Douglas Weiner
5/07
UTDCS-25-07Evaluation of Differential Expression Analysis Approaches for Microarray Platform Performance AssessmentHung-Chung Huang
Xiuwen Zheng
Yun Lian
Leming Shi
Quanzhen Li
Ying Liu
5/07
UTDCS-26-07Space-Efficient Keying in Wireless Communication NetworksNeeraj Mittal5/07
UTDCS-27-07Complexity of MCP and MCSPBhadrachalam Chitturi
I. Hal Sudborough
7/07
UTDCS-28-07Bounds for Sorting Permutations with Prefix TranspositionsBhadrachalam Chitturi
I. Hal Sudborough
8/07
UTDCS-29-07Opportunistic Optical Hyperchannel And Its Distributed QoS Assuring Access ControlJing Chen
Jianping Wang
Hui Yu
S. Q. Zheng
8/07
UTDCS-30-071-Persistent Collision-Free MAC Protocols for Opportunistic Optical HyperchannelsJing Chen
Ashwin Gumaste
8/07
UTDCS-31-07An Improved TCAM-Based IP Lookup EngineHui Yu
Jing Chen
S. Q. Zheng
Mehrdad Nourani
8/07
UTDCS-32-07High-Performance TCAM-Based IP Lookup EnginesHui Yu
Jing Chen
Jianping Wang
S. Q. Zheng
8/07
UTDCS-33-07Security for Enterprise Resource Planning SystemsWei She
Bhavani Thuraisingham
8/07
UTDCS-34-07Secure Semantic Web ServicesBhavani Thuraisingham8/07
UTDCS-35-07Extended RBAC-Based Design and Implementation for A Secure Data WarehouseBhavani Thuraisingham
Murat Kantarcioglu
Srinivasan Iyer
9/07
UTDCS-36-07Indexing 3D Human Motion Repositories For Content-based RetrievalGaurav N. Pradhan
Balakrishnan Prabhakaran
10/07
UTDCS-37-07Analysis of Human Performance Using Physiological Data StreamsGaurav N. Pradhan
Balakrishnan Prabhakaran
10/07
UTDCS-38-07Multi-stream Pattern Mining with Multi-dimensional InformationGaurav N. Pradhan
Balakrishnan Prabhakaran
10/07
UTDCS-39-07Architecture for a Trusted Computing Base For need-to-share in case ofemergencies           Yashaswini Harsha Kumar
Bhavani Thuraisingham
Latifur Khan
11/07
UTDCS-40-07Enforcing Honesty in Assured InformationSharing within a Distributed SystemRyan Layfield
Murat Kantarcioglu
Bhavani Thuraisingham
11/07
UTDCS-41-07Data Mining for Defensive OperationsMohammad Masud
Latifur Khan
Bhavani Thuraisingham
11/07
UTDCS-42-07WiMap:  Fast Handover for 802.11 Mobile DevicesA. Kulkarni
S. Menezes
H. Vu
C. Liyana Arachige
G. Dattatreya
11/07
UTDCS-43-07WORMEROS: A New Framework for Defending Against Wormhole Attacks In Wireless NetworksHai Vu
Ajay Kulkarni
Kamil Sarac
Neeraj Mittal
12/07
UTDCS-44-07Procedural Plans in the Context of Code SynthesisJicheng Fu
Farokh Bastani
I-Ling Yen
Vincent Ng
12/07
UTDCS-45-07Information Operations Across Infospheres:  Volume 2Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
Yashaswini Harsha KumarMehedy Masud
Ryan Layfield
12/07
2006
Report No.Title  AuthorDate
UTDCS-01-06OWL-S Ontology Framework Extension For Dynamic Web Service CompositionJing Dong
Yongtao Sun
1/06
UTDCS-02-06Dependable and Secure TMO SchemeJung-In Kim
Bhavani Thuraisingham
1/06
UTDCS-03-06Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF)Ashraful Alam
Bhavani Thuraisingham
1/06
UTDCS-04-06An Adaptable Perturbation Model of Privacy Preserving Data MiningLi Liu
Bhavani Thuraisingham
Murat Kantarcioglu
Latifur Khan
1/06
UTDCS-05-06Face Recognition Using Various Classifiers: Artificial Neural Network, Linear Discriminant and Principal Component AnalysisPallabi Parveen
Bhavani Thuraisingham
1/06
UTDCS-06-06Administering The Semantic Web: CPT: Confidentiality, Privacy and Trust ManagementNathalie Tsybulnik
Bhavani Thuraisingham
2/06
UTDCS-07-06An Efficient Handover Scheme Based On Fast Mobile IPv6Shanthy Menezes
Kwang-hyun Ro
S. Venkatesan
2/06
UTDCS-08-06A Projected Clustering Algorithm in High Dimensional SpacePing Deng
Weili Wu
Yaochun Huang
Zhongnan Zhang
2/06
UTDCS-09-06Topology Sampling: Challenges, SolutionsKamil Sarac
Turgay Korkmaz
Sevcan Bilir
3/06
UTDCS-10-06Small Group Multicast with Deflection Routing in Optical Burst Switched NetworksXiaodong Huang
Qingya She
Jason P. Jue
3/06
UTDCS-11-06Coinductive Logic ProgrammingLuke Simon
Ajay Mallya
Ajay Bansal
Gopal Gupta
3/06
UTDCS-12-06Mining Quantitative Maximal Hyperclique Patterns: A Summary Of ResultsYaochun Huang
Hui Xiong
Weili Wu
3/06
UTDCS-13-06On the Complexity of the Privacy Problem in DatabasesBhavani Thuraisingham3/06
UTDCS-14-06Inference Control for Document Release and DisseminationBhavani Thuraisingham3/06
UTDCS-15-06Individually Adaptable Perturbation Model for Privacy Preserving Data MiningLi Liu
Murat Kantarcioglu
Bhavani Thuraisingham
3/06
UTDCS-16-06Enhanced RUP Vision Document for the Quality Assurance Review Assistant Tool: Defining Stakeholders and GoalsShiney Abraham
Ramya Pramod
Kendra Cooper
3/06
UTDCS-17-06On Maximum Key Pool Size for a Key Pre-Distribution Scheme in Wireless Sensor NetworksNeeraj Mittal
Tarun R. Belagodu
3/06
UTDCS-18-06USDL: A Service-Semantics Description Language for Automatic Service Discovery and CompositionSrividya Kona
Ajay Bansal
Luke Simon
Thomas D. Hite
Ajay Mallya
Gopal Gupta
3/06
UTDCS-19-06OurCapProbe: Improving CapProbe to find and estimate capacities of bottleneck link and other choke linksChalam Chitturi
Kamil Sarac
4/06
UTDCS-20-06Finding the Inversion Distance Between Strings Over a Finite AlphabetBhadrachalam Chitturi
Hal Sudborough
Walter Voit
4/06
UTDCS-21-06Co-Logic Programming: Extending Logic Programming with Co-InductionLuke Simon
Ajay Mallya
Ajay Bansal
Gopal Gupta
4/06
UTDCS-22-06Design and Implementation of a Secure Social Network SystemRyan Layfield
Bhavani Thuraisingham
4/06
UTDCS-23-06Algorithms for Node Discovery and Configuration in Cognitive Radio NetworksSrinivasan Krishnamurthy
R. Chandrasekaran
S. Venkatesan
Neeraj Mittal
5/06
UTDCS-24-06A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree NetworkVinay Madenur
Neeraj Mittal
5/06
UTDCS-25-06Generalized Replicator Dynamics for Efficiently Building Phylogenetic TreeWenyuan Li
Ying Liu
6/06
UTDCS-26-06Requirements and Software Architecture for the CAT Assistant Tool: Supporting the COTS-Aware Requirements engineering and Software Architecting (CARE/SA) Approach (version 2.0)Michael McFadden
Shirish Pulikkal
Kendra Cooper
6/06
UTDCS-27-06Detecting New Malicious Executables Using Data MiningMohammad M. Masud
Latifur Khan
Bhavani Thuraisingham
Mamoun A. Awad
7/06
UTDCS-28-06On Complexity of Transforming Strings with Prefix Reversals and Prefix TranspositionsBhadrachalam Chitturi
I. Hal Sudborough
7/06
UTDCS-29-06Solving Computation Slicing Using Predicate DetectionNeeraj Mittal
Alper Sen
Vijay K. Garg
7/06
UTDCS-30-06A Near Optimal Uniform Key Pre-Distribution Scheme Using Deployment KnowledgeNeeraj Mittal7/06
UTDCS-31-06On Lower Bounds for Node Discovery And Configuration in Cognitive Radio NetworksR. Chandrasekaran
S. Venkatesan
Neeraj Mittal
Srinivasan Krishnamurthy
7/06
UTDCS-32-06Fingerprint Matching Algorithm Based On Tree Comparison Using Ratios of Relational DistancesAbinandhan Chandrasekaran
Bhavani Thuraisingham
7/06
UTDCS-33-06Evaluating Dependable Distributed Storage SystemsYanjin Zhang
Liangliang Xiao
Manghui Tu
I-Ling Yen
8/06
UTDCS-34-06Lexicographic Maximum Lifetime Routing in Wireless Sensor NetworksMaulin Patel
S. Venkatesan
R. Chandrasekaran
8/06
UTDCS-35-06Medium Access Control Protocols For Cognitive Radio-based Multi-hop Wireless NetworksMansi Thoppian
Ravi Prakash
S. Venkatesan
8/06
UTDCS-36-06Robust Blind Watermarking Mechanism For 3D Point Sampled GeometryParag Agarwal
B. Prabhakaran
8/06
UTDCS-37-06Home Appliance Control System Use Case Model Survey, Version 1.0Kendra Cooper
Christine Ayers
8/06
UTDCS-38-06A Survey of Formal Methods for Software ArchitectureLongji Tang
Jing Dong
9/06
UTDCS-39-06A Scalable Clustering Method Based on DensityKathryn Bean
Sergey Bereg
Latifur Khan
Bhavani Thuraisingham
9/06
UTDCS-40-06Detecting Malicious Executables Using Assembly Feature RetrievalMohammad M. Masud
Latifur Khan
Bhavani Thuraisingham
9/06
UTDCS-41-06Safe Termination Detection in an Asynchronous Distributed System when Processes may Crash and RecoverNeeraj Mittal
Kuppahalli L. Phaneesh
Felix C. Freiling
10/06
UTDCS-42-06THIS: Threshold Security of Information Aggregation for Sensor NetworksHai Vu
Neeraj Mittal
S. Venkatesan
10/06
UTDCS-43-06Assured Information Sharing: Technologies, Challenges and DirectionsBhavani Thuraisingham10/06
UTDCS-44-06Design and Implementation of Policy Enforcement, Data Sharing and Mining Components for Trustworthy CoalitionsMamoun Awad
Dilsad Cavus
Latifur Khan
Manjunath Reddy
Bhavani Thuraisingham
10/06
UTDCS-45-06Design and Simulation of Agent-based Trust Management Techniques for a Coalition EnvironmentSrinivasan Iyer
Bhavani Thuraisingham
10/06
UTDCS-46-06Research and Simulation of Game Theoretical Techniques for Data Sharing Among Semi-Trustworthy PartnersRyan Layfield
Murat Kantarcioglu
Bhavani Thuraisingham
10/06
UTDCS-47-06Defensive Information Operations: DETECTING MALICIOUS EXECUTABLES USING ASSEMBLY FEATURE RETRIEVAL in an Untrustworthy EnvironmentM. Mehedy Masud
Latifur Khan
Bhavani Thuraisingham
10/06
UTDCS-48-06Information Operations Across Infospheres: Volume 1Latifur Khan
Bhavani Thuraisingham
Murat Kantarcioglu
Mamoun Awad
Dilsad Cavus
Ryan Layfield
Mehedy Masud
Srinivasan Iyer
10/06
UTDCS-49-06A Wrapped Spherical Covering with Optimal Covering DensityYuanyi Zhang
Sergey Bereg
10/06
UTDCS-50-06A Network-flow-based Integral Optimal Algorithm for Lexicographic Maximum Lifetime Routing in Wireless Sensor NetworksMaulin Patel
S. Venkatesan
R. Chandrasekaran
10/06
UTDCS-51-06A Novel Privacy Preserving Decision Tree AlgorithmLi Liu
Murat Kantarcioglu
Bhavani Thuraisingham
10/06
UTDCS-52-06Fault-Tolerant Dual Power Assignment In Wireless Sensor NetworksMyung-Ah Park
Wang Chen
James K. V. Willson
Weili Wu
Andras Farago
10/06
UTDCS-53-06A Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different Transmission RangeMyung-Ah Park
Wang Chen
James K. V. Willson
My T. Thai
Weili Wu
Andras Farago
10/06
UTDCS-54-06Prefix Reversals on StringsBhadrachalam Chitturi
Hal Sudborough
11/06
UTDCS-55-06Prefix Transpositions on StringsBhadrachalam Chitturi
Hal Sudborough
11/06
UTDCS-56-06Demand-driven Retrieval Schedules For Progressive Transmission of 3D AnimationsH. Li
V.S. Ramaswamy
B. Prabhakaran
11/06
UTDCS-57-06Quantifying the Impact of Alias Resolution on traceroute-based Sample Network TopologiesMehmet Hadi Gunes
Nicolas Sanchis Nielsen
Kamil Sarac
11/06
UTDCS-58-06Face Segmentation for Privacy Preserving Video SurveillanceSai Chaitanya
Bhavani Thuraisingham
11/06
UTDCS-59-06Modeling Nonlinearity in Dilution Design Microarray DataXiuwen Zheng
Hung-Chung Huang
Wenyuan Li
Peng Liu
Quan-Zhen Li
Ying Liu
11/06
UTDCS-60-06A Comparative Study of a Key Agreement Protocol Based on ECC and RSAVibha Sethi
Bhavani Thuraisingham
11/06
UTDCS-61-06RFID Technologies and Their ApplicationsAbinandhan Chandrasekaran
Bhavani Thuraisingham
11/06
UTDCS-62-06Resolving IP Aliases in Building Traceroute-Based Internet MapsMehmet H. Gunes
Kamil Sarac
12/06
UTDCS-63-06CSMA-Based Mac Protocol for Cognitive Radio Based Multi-Hop Wireless NetworksMansi Thoppian
S. Venkatesan
Ravi Prakash
12/06
UTDCS-64-06Secure Grid ComputingJianmin Zhu
Bhavani Thuraisingham
12/06
UTDCS-65-06Face Recognition Using Multiple ClassifiersPallabi Parveen
Bhavania Thuraisingham
12/06
UTDCS-66-06A Framework for a Video Analysis Tool for Suspicious Event DetectionGal Lavee
Latifur Khan
Bhavani Thuraisingham
12/06
UTDCS-67-06HERoISM: Harmonious Existence of RadiOs in the ISM BandQasim Javed
Kunal Sahu
Ravi Prakash
12/06
UTDCS-68-06A Model for Risk Adaptive Access Control in RBAC Employed Distributed EnvironmentsEbru Celikel
Murat Kantarcioglu
Bhavani Thuraisingham
Dilsad Cavus
12/06
UTDCS-69-06Rule Generalization in the Component Parameterization Technique – a Formal ApproachJia Zhou
Kendra Cooper
I-Ling Yen
12/06
UTDCS-70-06Route Finder on PDA – An Application Of the Component Parameterization TechniqueJia Zhou
Kendra Cooper
I-Ling Yen
12/06