Technical Reports
Click the year to view its related technical reports.
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-23 | ScanToVR: An RGB-D to VR Reconstruction Framework | Hiranya Garbha Kumar Ninad Arun Khargonkar Balakrishnan Prabhakaran |
2/23 |
Report No. | Title | Author | Date |
---|
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-21 | Near Real-Time Forgery Detection and Localization in Stereo RGB and 3D LiDAR Data from Autonomous Vehicles | Somayeh Mohammadpour Sagnik Dakshit Balakrishnan Prabhakaran |
2/21 |
UTDCS-02-21 | CEFEs: A CNN Explainable Framework for ECG Signals | Barbara Mukami Maweu Sagnik Dakshit Rittika Shamsuddin Balakrishnan Prabhakaran |
2/21 |
UTDCS-04-21 | A Mobile App for Managing Infectious Diseases on Campus | Austin Mordahl Abdul Hadi Khan Faraz Khalid Kevin Nguyen Swathi Poseti Jean-Felix Abellera Carlos Hevia Joshua Ruiz Teena Thomas Chinthoorie Yogalingam Naif Alatrash James Chen Evan Guo Michael Smith Meng-Hsiang Chang Rym Zalila-Wenkstern |
4/21 |
UTDCS-06-21 | Sorting R∗2n over a Matchstick Tree | Nairit Sarkar Jarvis Xie Bhadrachalam Chitturi |
6/21 |
UTDCS-10-21 | A 4-Approximation Algorithm for Sorting 2-Permutations Using Adjacent Swaps | Jayakumar P Bhadrachalam Chitturi |
10/21 |
UTDCS-10-18-21 | Adjacent Swaps on Strings | Bhadrachalam Chitturi Minnu Mohandas Hal Sudborough Walter Voit |
10/18/21 |
UTDCS-11-29-21 | Sorting Permutations with Brooms | Indulekha T S Bhadrachalam Chitturi |
11/29/21 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-20 | A New Upper Bound for Sorting Permutations with Prefix Transpositions | Bhadrachalam Chitturi Pramod Nair Rajan Sundaravaradhan |
1/20 |
UTDCS-02-20 | An HIL testbed for Medical Cyber-Physical Systems | Bhadrachalam Chitturi Sriram Karunagaran Karuna P. Sahoo Masahiro Fujita |
2/20 |
UTDCS-09-20 | Sorting permutations with transpositions in an amortized time of O(n2) n-bit logical operations | Bhadrachalam Chitturi Priyanshu Das |
9/20 |
UTDCS-09-20 | Improved Upper Bound for Sorting Permutations by Prefix Transpositions | Bhadrachalam Chitturi Rajan Sundaravaradhan Pramod P Nair |
9/20 |
UTDCS-12-20 | Approximation Algorithms for Sorting by Extreme Block-interchanges | Bhadrachalam Chitturi Jayakumar Pai |
12/20 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-19 | Exact Upper Bound for Sorting Rn with LE | Bhadrachalam Chitturi Sai Satwik Kuppili |
9/19 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-18 | Distances in and Layering of a DAG | Bhadrachalam Chitturi Priyanshu Das |
1/18 |
UTDCS-02-18 | Sorting permutations with transpositions in average case time of O(n^3) | Bhadrachalam Chitturi Priyanshu Das |
3/18 |
UTDCS-03-18 | Multistream Classification with Heterogeneous Feature Space | Yifan Li Yang Gao Hemeng Tao Latifur Khan Patrick Brandt |
9/18 |
UTDCS-04-18 | FRUGAL: Provisioning of Fog Services over 5G Slices To Meet QoS with Minimal Cost | Ashkan Yousefpour Jason P. Jue |
11/18 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-17 | QoS-aware Dynamic Fog Service Provisioning | Ashkan Yousefpour Ashish Patil Genya Ishigaki Jason P. Jue Inwoong Kim Xi Wang Hakki C. Cankaya Qiong Zhang Weisheng Xie |
10/17 |
UTDCS-02-17 | The maximum independent set problem on layered graphs | Bhadrachalam Chitturi | 11/17 |
UTDCS-03-17 | Characterization of Super Oriented Cycles | Jayakumar Pai Bhadrachalam Chitturi |
11/17 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-02-16 | Visualizing Large Graphs by Layering and Bundling Graph Edges | Zhuang Cai Kang Zhang Dong-Ni Hu |
2/16 |
UTDCS-03-16 | A Self-Stabilizing Algorithm for the Foraging Problem in Swarm Robotic Systems | Guang Zhou Farokh Bastani Wei Zhu I-Ling Yen |
3/16 |
UTDCS-04-16 | Data Driven Approach to the Science of Cyber Security | Bhavani Thuraisingham Murat Kantarcioglu Kevin Hamlen Elisa Bertino Tim Finin Anupam Joshi Tim Oates |
3/16 |
UTDCS-05-16 | An Agile Cyber Defense Framework | Elisa Bertino et al. |
3/16 |
UTDCS-06-16 | InXite: Stream Data Mining for Social Media | Bhavani Thuraisingham et al. |
3/16 |
UTDCS-08-16 | Spectrum-Efficient Virtual Optical Network Provisioning over Flexible-Grid Multi-Domain Optical Networks | Sangjin Hong Jason P. Jue Pyungkoo Park Sunchul Kim Hoyong Ryu |
4/16 |
UTDCS-10-16 | Compact Structure Patterns in Proteins | Bhadrachalam Chitturi Shuoyong Shi Lisa N. Kinch Nick V. Grishin |
7/16 |
UTDCS-11-16 | A Study of Gene Prioritization Algorithms on PPI Networks | Sinsha K P Bhadrachalam Chitturi |
9/16 |
UTDCS-12-16 | Exploring Functional Clinical Attributes For Macular Dystrophy Detection | Rittika Shamsuddin Yizhong Wang Balakrishnan Prabhakaran |
10/16 |
UTDCS-13-16 | Roughly Polynomial Time: A Concept of Efficiency That Avoids Conflict with Intractablility | Andras Farago | 11/16 |
UTDCS-15-16 | Estimating Clustering Coefficients via Metropolis-Hastings Random Walk and Wedge Sampling on Large OSN Graphs | Emrah Cem Kamil Sarac |
11/16 |
UTDCS-16-16 | A Clustering-Based Approach for Workload Estimation in the Cloud | Yongjia Yu Vasu Jindal I-Ling Yen Farokh Bastani Jie Xu Peter Garraghan |
11/16 |
UTDCS-17-16 | MCDC-Star-An Open-source MC/DC Measurement Tool | Linghuam Hu Ruizhi Gao W. Eric Wong |
11/16 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-15 | On Expected Number of Prefix Transpositions Required To Sort A Permutation | Bhadrachalam Chitturi Amrita Vishwa Vidyapeetham Amritapuri Campus |
1/15 |
UTDCS-02-15 | A Validated Regression Model for Complexity of Polygonal Shapes | Lingchen Dai Xianjun Zheng Ying Li Kang Zhang Ralph Martin Jinhui Yu |
3/15 |
UTDCS-03-15 | Adjacencies in Permutations | Bhadrachalam Chitturi Amrita Vishwa Vidyapeetham |
4/15 |
UTDCS-04-15 | Comet Smart Campus Multi-Agent and Visualizations Systems Lab | Jennifer Jiang Nikolay Bourov Sihui Huang Rym Zalila-Wenkstern |
5/15 |
UTDCS-05-15 | Update Propagation in MapReduce Systems | Huseyin Ulusoy Murat Kantarcioglu Erman Pattuk |
6/15 |
UTDCS-06-15 | FIFA: The Framework for Interaction Fidelity Analysis | Ryan P. McMahan Eric D. Ragan Doug A. Bowman Fei Tang Chengyuan Lai |
7/15 |
UTDCS-08-15 | MSeer – An Advanced Technique for Locating Multiple Bugs in Parallel | Ruizhi Gao W. Eric Wong |
8/1 |
UTDCS-11-15 | Toward Sematic Enhancement of Monitoring Data Repository | Shuai Zhang I-Ling Yen Farokh B. Bastani |
11/15 |
UTDCS-12-15 | SAND: Semi-Supervised Adaptive Novel Class Detection and Classification over Data Stream | Ahsanul Haque Latifur Khan Michael Baron |
12/15 |
UTDCS-13-15 | Improving Efficacy of Internal Binary Search Trees using Local Recovery | Arunmoezhi Ramachandran Neeraj Mittal |
13/15 |
Report No. | Title | Author | Date |
---|---|---|---|
UTDCS-01-14 | SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification | David I. Urbina Juan Caballero Yufei Gu Zhiqiang Lin |
1/14 |
UTDCS-02-14 | A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems | Rym Zalila-Wenkstern Mohammad Al-Zinati |
1/14 |
UTDCS-03-14 | Multidimensional Motif Discovery in Physiological and Biomedical Time Series Data | Arvind Balasubramanian Jun Wang B. Prabhakaran |
2/14 |
UTDCS-04-14 | Exploring Baseline Shift Prediction in Respiration Induced Tumor Motion | Arvind Balasubramanian Rittika Shamsuddin Yam Cheung Amit Sawant Balakrishnan Prabhakaran |
4/14 |
UTDCS-05-14 | Lexico-minimizing Survival Frequency For a Replica Placement Problem in Tree-based Failure Models | K. Alex Mills R. Chandrasekaran Neeraj Mittal |
4/14 |
Report No. | Title | Author | Date |
UTDCS-01-13 | Ghost Agent-Based Autonomic Adapter | Rym Zalila-Wenkstern | 2/13 |
UTDCS-02-13 | Noise Tolerant Motif Discovery in Time Series Datasets | Arvind Balasubramanian Balakrishnan Prabhakaran |
2/13 |
UTDCS-03-13 | Hippocratic Binary Instrumentation: First Do No Harm (Extended Version) | Kevin W. Hamlen Meera Sridhar Richard Wartell |
2/13 |
UTDCS-04-13 | A Self-Organizing Model for Decentralized Virtual Environments In Agent-Based Simulation Systems | F. Araujo M. Al-Zinati J. Valente Rym Z. Wenkstern |
3/13 |
UTDCS-05-13 | Measuring Expertise and Bias in Cyber security Using Cognitive and Neuro-Science Approaches | Daniel Krawczyk James Bartlett Murat Kantarcioglu Kevin Hamlen Bhavani Thuraisingham |
3/13 |
UTDCS-06-13 | An Effective Approach for Web Forum Topic Detection | Zhiming Chen Andras Farago |
3/13 |
UTDCS-07-13 | On the Relationship Between Hyperlinks and Textual Similarity | Zhiming Chen Andras Farago |
3/13 |
UTDCS-08-13 | Decreasing the Size of Grounded Logic Programs | Feliks Kluzniak Kyle Marple |
4/13 |
UTDCS-09-13 | Analyzing and Securing On-Line Social Networks | Bhavani Thuraisingham Satyen Abrol Raymond Heatherly Murat Kantarcioglu Vaibhav Khadilkar Latifur Khan |
4/13 |
UTDCS-10-13 | A Semantic-based Semi-automated Mapping Mechanism | Lijuan Diao Wei She I-Ling Yen Junzhong Gu |
5/01 |
UTDCS-11-13 | A Short Note on Sorting Permutations With Brooms | Bhadrachalam Chitturi (Approved by Dr. Gopal Gupta) |
5/01 |
UTDCS-12-13 | Shingled Graph Disassembly: Finding the Undecideable Path | Richard Wartell Yan Zhou Kevin W. Hamlen Murat Kantarcioglu |
6/13 |
UTDCS-13-13 | Improved Approximation Algorithm for k-interval Cover Problem | Balaji Raghavachari Bhadrachalam Chitturi |
8/13 |
UTDCS-14-13 | Specification and Verification of Serious Educational Game Models | Muhammad Shoaib Kendra M.L. Cooper |
8/13 |
UTDCS-15-13 | Towards Intelligent Semi-automated Game Generation in SimSYS: A Component-based Approach | Kaleb Breault Ricardo Daconceicao Carsten Locke Chris Mojica Kendra M.L. Cooper C. Shaun Longstreet |
8/13 |
UTDCS-16-13 | Employing WiFi Direct to Build a Wireless Network over Both 2.4 GHz and 5.8 GHz Bands | Sabur Hassan Baidya Pramod Shirol Abhishek Basu Ravi Prakash |
9/13 |
UTDCS-01-14 | SIGPATH: A Memory Graph Based Approach for Program Data Introspection and Modification | David I. Urbina Yufei Gu Juan Caballero Zhiqiang Lin |
1/14 |
UTDCS-02-14 | A Self-Organizing Model for Decentralized Virtual Environments in Agent-Based Simulation Systems | Mohammad Al-Zinati Rym Zalila-Wenkstern |
2/14 |
Report No. | Title | Author | Date |
UTDCS-01-12 | Security Analysis for Order Preserving Encryption Schemes | Liangliang Xiao Osbert Bastani 1-LingYen |
1/12 |
UTDCS-02-12 | Extending Order Preserving Encryption For Multi-User Systems |
Liangliang Xiao 1-LingYen Dung T. Huynh |
2/12 |
UTDCS-03-12 | An Efficient Homomorphic Encryption Protocol for Multi-User Systems | Liangliang Xiao Osbert Bastani 1-LingYen |
2/12 |
UTDCS-04-12 | Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes | Liangliang Xiao 1-LingYen |
2/12 |
UTDCS-05-12 | A Service Pattern Model and Its Instantiation Using Rule-Based Reasoning | Chien-Hsiang Lee San-Yih Hwang 1-LingYen |
2/12 |
UTDCS-06-12 | Towards Model Driven Game Engineering in SimSYS: Game Requirements for the Agile Software Development Process Game |
Kendra M.L. Cooper C. Shaun Longstreet |
3/12 |
UTDCS-07-12 | Optimizing Virtual Private Network Design Using a New Heuristic Optimization Method |
Hongbing Lian Andras Farago |
4/12 |
UTDCS-08-12 | Random Network Topology Models With Perturbations | Andras Farago | 4/12 |
UTDCS-09-12 | Towards a Reference Architecture for Agent-Based Autonomic Software Systems | Rym Zalila Wenkstern D. Urbina F. Araujo T. Steel |
6/12 |
UTDCS-10-12 | Concurrent Lock-Free Binary Search Trees | Aravind Natarajan Neeraj Mittal |
7/12 |
UTDCS-11-12 | Online Algorithms to Generate Slices for Regular Temporal Logic Predicates Networks |
Aravind Natarajan Neeraj Mittal |
7/12 |
UTDCS-12-12 | Designer Satellite Collisions from Covert Cyber War ( Selected Papers in Security Studies – Volume 8 ) |
Jan Kallberg Bhavani Thuraisingham |
8/12 |
UTDCS-13-12 | Common Criteria Meets Realpolitik Trust, Alliances, and Potential Betrayal ( Selected Papers in Security Studies – Volume 9 ) |
Jan Kallberg | 8/12 |
UTDCS-14-12 | An Algorithm for Propositional Logic Programs | Feliks Kluzniak Gopal Gupta |
9/12 |
UTDCS-15-12 | Decreasing the Size of Grounded Logic Programs | Feliks Kluzniak Kyle Marple |
9/12 |
UTDCS-16-12 | Concurrent Wait-Free Red Black Trees | Aravind Natarajan Lee H. Savoie Neeraj Mittal |
10/12 |
UTDCS-17-12 | Sorting Permutations With A Transposition Tree | Bhadrachalam Chitturi | 10/12 |
UTDCS-18-12 | A Run-time Self-Organizing Model for Decentralized Virtual Environments | Frederico Araujo J. Valente M. Al-Zinati Rym Z. Wenkstern |
10/12 |
UTDCS-19-12 | Regenerator Site Selection and Regenerator Placement for Mixed Line Rate Optical Networks | Weisheng Xie Jason P. Jue |
10/12 |
UTDCS-20-12 | On Efficient Gene Prioritization | Bhadrachalam Chitturi Balaji Raghavachari Donghyun Kim |
11/12 |
UTDCS-21-12 | Towards High-level Awareness: A Cognitive Awareness Model and A Survey |
Cong Chen Kang Zhang |
11/12 |
UTDCS-22-12 | Network Reliability Analysis with Unreliable Information | Andras Farago | 11/12 |
Report No. | Title | Author | Date |
UTDCS-01-11 | Better Upper Bound for Prefix Transposition Distance over Permutations | Bhadrachalam Chitturi Hal Sudborough |
1/11 |
UTDCS-02-11 | Impact of Aspect Oriented Approach on GoF Design Patterns | Jayashree V. Pathangi Kendra M. L. Cooper |
1/11 |
UTDCS-03-11 | Modeling and Verification of Cyber-Physical Systems with Co-inductive Constraint Logic Programming | Neda Saeedloei Gopal Gupta |
1/11 |
UTDCS-04-11 | High-Speed Multi-Input FIFO Queues with Applications | S. Q. Zheng | 1/11 |
UTDCS-05-11 | Low Distortion Metric Embeddings Into Constant Dimension | Andras Farago | 1/11 |
UTDCS-06-11 | Regenerator Placement in Waveband Networks with Impairment Constraints | Saket Varma Jason P. Jue |
1/11 |
UTDCS-07-11 | Impairment-constrained Multi-rate Multicast Flow Aggregation in IP Over Optical Networks | Yi Zhu Jason P. Jue |
2/11 |
UTDCS-08-11 | Analysis of Cloud Architecture Layouts and Commercial Clouds | Sindhuja Narasimhan Kendra M.L. Cooper |
2/11 |
UTDCS-09-11 | The Financial Crisis of 2007-2009: EVENTS AND CAUSES | Irina Sakharova Weili Wu |
2/11 |
UTDCS-10-11 | Modeling Security Using an Aspect-oriented Architecture-Centric Process: A Banking System Study | Eric Blackburn Kendra M.L. Cooper |
2/11 |
UTDCS-11-11 | Routing, Wavelength Assignment, and Spectrum Allocation Algorithms in Transparent Flexible Optical WDM Networks |
Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang |
3/11 |
UTDCS-12-11 | Federated Query Processing Using Ontology Structure and Ranking In a Service Oriented Environment | Neda Alipanah Pallabi Parven Latifur Khan Bhavani Thuraisingham |
3/11 |
UTDCS-13-11 | Service-Oriented Approach to Electronic Health Records | Kendra Cooper Thomas Omen |
3/11 |
UTDCS-14-11 | Subnet Level Internet Topology Mapping | M. Engin Tozal Kamil Sarac |
5/11 |
UTDCS-15-11 F. | Automatic Software Engineering: An Achievable Dream? | R. Zalila Wenkstern D. Urbina Araujo T. Steel |
5/11 |
UTDCS-16-11 | Chekov: Aspect-Oriented Runtime Monitor Certification via Model-Checking (Extended Version) | Kevin W. Hamlen Micah M. Jones Meera Sridhar |
5/11 |
UTDCS-17-11 | Exploring Structural Properties Of Web Graphs through 3D Visualization | Zhiming Chen Kang Zhang Andras Farago |
5/11 |
UTDCS-18-11 | TL Reference Manual | Feliks Kluzniak | 6/11 |
UTDCS-19-11 | Domain-Disjoint Routing Based on Topology Aggregation for Survivable Multi-Domain Optical Networks | Chengyi Gao Mohammad M. Hasan Jason P. Jue |
7/11 |
UTDCS-20-11 | Regenerator Site Selection in Waveband Optical Networks Supporting Mixed Line Rates | Saket Varma Jason P. Jue |
7/11 |
UTDCS-21-11 | Handling Deviations in Network Models | Andras Farago | 7/11 |
UTDCS-22-11 | RETRO: A Framework for Semantics Preserving SQL-to-SPARQL Translation | Jyothsna Rachapalli Vaibhav Khadilkar Murat Kantarcioglu Bhavani Thuraisingham |
8/11 |
UTDCS-23-11 | Coinductive Constraint Logic Programming | Neda Saeedloei Gopal Gupta |
8/11 |
UTDCS-24-11 | An Extension of n-Calculus with Real-Time and its Realization in Logic Programming | Neda Saeedloei Gopal Gupta |
8/11 |
UTDCS-25-11 | Estimating Network Layer Subnet Characteristics via Statistical Sampling | M. Engin Tozal Kamil Sarac |
9/11 |
UTDCS-26-11 | Modeling and Analyzing Enterprise Cloud Service Architecture | Longji Tang Farokh B. Bastani Wei-Tek Tsai Jing Dong Liang-Jie Zhang |
9/11 |
UTDCS-27-11 | Towards the Design and Implementation Of a Cloud-Centric Assured Information Sharing System | Bhavani Thuraisingham Vaibhav Khadilkar Tyrone Cadenhead Jyothsna Rachapalli Murat Kantarcioglu Kevin Hamlen Latifur Khan Farhan Husain |
9/11 |
UTDCS-28-11 | Waveband Selection, Spectrum, and Waveband Assignment in Uniform and Non-Uniform OFDM-based Elastic Optical Waveband Network | Saket Varma Jason P. Jue |
10/11 |
UTDCS-29-11 | Routing, Wavelength Assignment, and Spectrum Allocation in Wavelength-Convertible Flexible Optical WDM Networks | Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang |
10/11 |
UTDCS-30-11 | Optimized Ontology-driven Query Expansion Using Map-Reduce Framework To Facilitate Federated Queries | Neda Alipanah Latifur Khan Bhavani Thuraisingham |
11/11 |
UTDCS-31-11 | Risk-Aware Data Processing in Hybrid Clouds | Vaibhav Khadilkar Kerim Yasin Oktay Bijit Hore Murat Kantarcioglu Sharad Mehrotra Bhavani Thuraisingham |
11/11 |
UTDCS-32-11 | A Model for Cognitive Radio Networks | Hongbing Lian Andras Farago |
11/11 |
UTDCS-33-11 | Wait-Free Red-Black Trees with Fast Reads and Writes | Aravind Natarajan Lee Savoie Neeraj Mittal |
11/11 |
UTDCS-34-11 | Selected Papers in Security Studies:Volume 5: Payment Card Fraud: Challenges and Solutions | Irina Sakharova Latifur Khan |
11/11 |
UTDCS-35-11 | Selected Papers in Security Studies: Volume 6: The Continued War on Terrorism – How to Maintain Long-Range Terrorist Deterrence | Jan Kallberg Bhavani Thuraisingham |
12/11 |
UTDCS-36-11 | Selected Papers in Security Studies: Volume 7: Data Supply Chain Management: Supply Chain Management for Incentive and Risk-based Assured Information Sharing | Bhavani Thuraisingham | 12/11 |
UTDCS-37-11 | Data Stream Classification with Bounding Component Classification Models | Tahseen M. Al-Khateeb Mohammad M. Masud Latifur Khan Jiawei Han |
12/11 |
UTDCS-38-11 | Recurrence and Novel Class Detection With Bounding Component Ensembles | Tahseen M. Al-Khateeb Mohammad M. Masud Latifur Khan Charu C. Aggarwal |
12/11 |
UTDCS-39-11 | A Heuristic Optimization Method and Its Application in Cognitive Radio Networks | Hongbing Lian Andras Farago |
12/11 |
UTDCS-40-11 | Security Analysis for OPE and Generalized OPE Schemes | Liangliang Xiao Osbert Bastani I-Ling Yen |
12/11 |
UTDCS-41-11 | Extending Order Preserving Encryption For Multi-User Systems | Liangliang Xiao I-Ling Yen Dung T. Huynh |
12/11 |
UTDCS-42-11 | An Efficient Homomorphic Encryption Scheme | Liangliang Xiao Osbert Bastani I-Ling Yen |
12/11 |
UTDCS-43-11 | Security Analysis for Prefix-Preserving Encryption Schemes | Liangliang Xiao I-Ling Yen |
12/11 |
UTDCS-44-11 | Combined 2R/3R Regenerators Placement in Optical WDM Networks | Ankitkumar N. Patel Philip N. Ji Avishek Nag Yua-Kai Huang Ezra Ip Jason P. Jue Ramaswami Chandrasekaran Ting Wang |
12/11 |
Report No. | Title | Author | Date |
UTDCS-01-10 | Semantic Web Implementation Scheme for National Vulnerability Database (Common Platform Enumeration Data) | Vaibhav Khadilkar Jyothsna Rachapalli Bhavani Thuraisingham |
1/10 |
UTDCS-02-10 | Security Issues for Cloud Computing | Kevin Hamlen Murat Kantarcioglu Latifur Khan Bhavani Thuraisingham |
2/10 |
UTDCS-03-10 | Securing the Execution Environment Applications and Data from Multi-Trusted Components | Elisa Bertino Gabriel Ghinita Kevin Hamlen Murat Kantarcioglu Hsien-Hsin S. Lee Ninghui Li Calton Pu Ravi Sandhu Waleed Smari Bhavani Thuraisingham Gene Tsudik Dongyan Xu Shouhuai Xu |
2/10 |
UTDCS-04-10 | Ranking Entities from Multiple Ontologies to Facilitate Federated Queries | Neda Alipanah Julie Rauer Latifur Khan Steven B. Seida Bhavani Thuraisingham |
2/10 |
UTDCS-05-10 | Randomized Algorithms for Neighbor Discovery in Cognitive Radio Networks | Neeraj Mittal Yanyan Zeng S. Venkatesan R. Chandrasekaran |
2/10 |
UTDCS-06-10 | Security Analysis for an Order Preserving Encryption Scheme | Liangliang Xiao I-Ling Yen Dongdai Lin |
2/10 |
UTDCS-07-10 | Spectrum-Based Fault Localization Without Test Oracles | Xiaoyuan Xie W. Eric Wong Tsong Yueh Chen Baowen Xu |
2/10 |
UTDCS-08-10 | A Novel Grouping-Based Strategy for Improved Fault Localization | Vidroha Debroy W. Eric Wong Xiaofeng Xu Byoungju Choi |
2/10 |
UTDCS-09-10 | Building Disclosure Risk Aware Query Optimizers for Relational Databases | Mustafa Canim Murat Kantarcioglu Bijit Hore Sharad Mehrotra |
4/10 |
UTDCS-10-10 | Secure, Dependable and High Performance Cloud Storage | Yunqi Ye I-Ling Yen Liangliang XiaoFarokh Bastani |
4/10 |
UTDCS-11-10 | Incentive Compatible Distributed Data Mining | Murat Kantarcioglu Robert Nix |
4/10 |
UTDCS-12-10 | An Improved Scalable Algorithm for Perpetual System Connectivity Using Structure Estimates | Eric Etheridge Neeraj Mittal |
5/10 |
UTDCS-13-10 | Bi-Directional Translation of Relational Data into Virtual RDF Stores | Sunitha Ramanuja Vaibhav Khadilkar Latifur Khan Steven Seida Murat Kantarcioglu Bhavani Thuraisingham |
5/10 |
UTDCS-14-10 | A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model | Alain Bensoussan Murat Kantarcioglu Celine Hoe |
5/10 |
UTDCS-15-10 | Noncooperative Game Theory in Wireless Networks | Dung T. Tran Andras Farago |
6/10 |
UTDCS-16-10 | On Selfish Behavior in TDMA-based Bandwidth Allocation Protocols | Dung T. Tran Andras Farago |
6/10 |
UTDCS-17-10 | Game Theoretic Approach to Network Lifetime Maximization in Wireless Networks | Dung T. Tran Andras Farago |
6/10 |
UTDCS-18-10 | Reining In Windows API Abuses with In-lined Reference Monitors | Kevin W. Hamlen Vishwath Mohan Richard Wartell |
6/10 |
UTDCS-19-10 | Selected Topics in International Terrorism and the Application of Information Technology: Volume I: Terrorism Tactics, Trends and Technologies | Bhavani Thuraisingham | 7/10 |
UTDCS-20-10 | RBF Neural Network-based Fault Localization | W. Eric Wong Vidroha Debroy Bhavani Thuraisingham Richard Golden |
7/10 |
UTDCS-21-10 | Multi-label Text Data Classification Using Semi Supervised and Fuzzy Subspace Clustering | Mohammad Salim Ahmed Latifur Khan |
7/10 |
UTDCS-22-10 | Reverse Engineering in the Aspect- Oriented Paradigm – Part I Source Code to Architecture of the Base Design | Sunil Bohra Rohit Goel Jeffrey Koch Sonali Pagade Kendra Cooper |
7/10 |
UTDCS-23-10 | Information Sharing Strategies of the United States Federal Government and Its Allies and Our Contributions TowardsImplementing these Strategies Version I |
Bhavani Thuraisingham | 8/10 |
UTDCS-24-10 | A Comparison of Approaches for Large-Scale Data Mining Utilizing MapReduce in Large-Scale Data Mining | Amy Xuyang Tan Valerie Li Liu Murat Kantarcioglu Bhavani Thuraisingham |
8/10 |
UTDCS-25-10 | Selected Topics in Terrorism Studies–Volume 2: Al Qaeda Terrorist Financing and Technologies to Track the Finance Network | Irina Sakharova Weili Wu |
8/10 |
UTDCS-26-10 | Minimum Time Broadcasting in Cognitive Radio Networks | Chanaka J. L. Arachchige S. Venkatesan R. Chandrasekaran Neeraj Mittal |
8/10 |
UTDCS-27-10 | Ontology-driven Query Expansion Methods to Facilitate Federated Queries | Neda Alipanah Pallabi Parveen Sheetal Menezes Latifur Khan Steven B. Seida Bhavani Thuraisingham |
9/10 |
UTDCS-28-10 | Minimum Length Scheduling for Aggregated Convergecast in Heterogeneous Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran |
9/10 |
UTDCS-29-10 | On Solving Consensus with Unknown Participants | Divya Chandrasekaran Neeraj Mittal |
10/10 |
UTDCS-30-10 | Optimal Defragmentation of Transparent Flexible Optical WDM (FWDM) Networks | Ankitkumar N. Patel Philip N. Ji Jason P. Jue Ting Wang |
10/10 |
UTDCS-31-10 | Energy-efficient Flow Aggregation In Optical Networks | Yi Zhu Jason P. Jue |
10/10 |
UTDCS-32-10 | Waveband Routing in Mixed Line Rate Networks with Impairment Constraints | Saket Varma Jason P. Jue |
10/10 |
UTDCS-33-10 | Safe Software: Does it Cost More to Develop? | W. Eric Wong Andrea Demel Michael F. Siok |
11/10 |
UTDCS-34-10 | Software Safety Standards: Evolution and Lessons Learned | W. Eric Wong Andrea Demel Michael F. Siok |
11/10 |
UTDCS-35-10 | Software Safety Standards: How Good Are They? | W. Eric Wong Andrea Demel Vidroha Debroy Michael F. Siok |
11/10 |
UTDCS-36-10 | On Consensus Among Fault Localization Techniques | W. Eric Wong Vidroha Debroy |
11/10 |
Report No. | Title | Author | Date |
UTDCS-01-09 |
A Fine Grained Model for Information Flow Control in Web Service Composition |
Wei She I-Ling Yen Bhavani Thuraisingham |
1/09 |
UTDCS-02 09 | A Dual Bound Algorithm for Very Fast and Exact Template-Matching | Haim Schweitzer Robert Finis Anderson Rui (April) Deng |
1/09 |
UTDCS-03-09 | Preventing Private Information Inference Attacks on Social Networks | Raymond Heatherly Murat Kantarcioglu Bhavani Thuraisingham |
2/09 |
UTDCS-04-09 | Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 1: Problem Formulation and Solution Space | S. Q. Zheng Jianping Wang Bing Yang Mei Yang |
3/13 |
UTDCS-05-09 | Minimum Cost Multiple Paths Subject to Minimum Link and Node Sharing in a Network Part 2: Algorithms and Generalizations | S. Q. Zheng Jianping Wang Bing Yang Mei Yang |
3/13 |
UTDCS-06-09 | A Distributed Termination Detection Algorithm for Dynamic Asynchronous Systems | Paul Johnson Neeraj Mittal |
3/23 |
UTDCS-07-09 | PEQ: A Privacy-Preserving Scheme forExact Query Evaluation in Distributed Sensor Data Networks | Hai Vu Thuc Nguyen Neeraj Mittal S. Venkatesan |
4/09 |
UTDCS-08-09 | RDF Join: A Scalable Data Model for Persistence and Efficient Querying of RDF Datasets | James P. McGlothlin Latifur R. Khan |
4/09 |
UTDCS-09-09 | Design of a Temporal Geosocial Semantic Web for Military Stabilization and Reconstruction Operations | Bhavani Thuraisingham Latifur Khan Murat Kantarcioglu |
4/09 |
UTDCS-10-09 | Local vs. Global Scalability in Ad Hoc and Sensor Networks | Andras Farago | 5/09 |
UTDCS-11-09 | Infoshape: High-Level Views of Multidimensional Information | Jie Hao Chunying Zhao Pushpa Kumar Kang Zhang |
5/09 |
UTDCS-12-09 | Composition Operators for Synthesizing Glue Code Based on Code Patterns | Jicheng Fu Jian Liu Farokh Bastani I-Ling Yen |
6/09 |
UTDCS-13-09 | Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams | Mohammad M. Masud Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham |
6/09 |
UTDCS-14-09 | Streaming 3D Deformations in Collaborative Learning Applications | Ziying Tang, Guodong Rong Xiaohu Guo Balakrishnan Prabhakaran |
6/09 |
UTDCS-15-09 | Point-Based Manifold Harmonics | Yang Liu Xiaohu Guo Balakrishnan Prabhakaran |
6/09 |
UTDCS-16-09 | Toward Fully Homomorphic Computation | Liangliang Xiao Osbert Bastani I-Ling Yen |
7/09 |
UTDCS-17-09 | A Corner-Based Method for Computing The Walsh Transform at Multiple Locations in an Image | Rui Deng Robert Finis Anderson Haim Schweitzer |
7/09 |
UTDCS-18-09 | A Family of Secure Key Assignment Schemes for Wireless Communication Networks | Neeraj Mittal | 7/09 |
UTDCS-19-09 | Spectral Hybrid Simulation of Deformable and Rigid Bodies | Yin Yang Guodong Rong Jianfen Ren Luis Torres Xiaohu Guo |
7/09 |
UTDCS-20-09 | An Almost Linear Homomorphic Encrytion Scheme | Liangliang Xiao Osbert Bastani I-Ling Yen |
7/09 |
UTDCS-21-09 | 3R Regenerator Placement for Optical Multicast | Yi Zhu Xiaofeng Gao Jason P. Jue Weili Wu |
7/09 |
UTDCS-22-09 | Fast Deterministic Neighbor Discovery In Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran | 7/09 |
UTDCS-23-09 | Extending Service Model to Build an Effective Service Composition Framework for Cyber-Physical Systems | Jian Huang Farokh Bastani I-Ling Yen Wenke Zhang Feng-Jian Wang Hwai-Jung Hsu | 8/09 |
UTDCS-24-09 | A Tripartite Clustering Analysis on MicroRNA, Gene and Disease Model | Chengcheng Shen Ying Liu |
8/09 |
UTDCS-25-09 | DESIGN and Implementation of Restful Web Services for Blackbook | Pranav Parikh Murat Kantarcioglu Latifur Khan Bhavani Thuraisingham |
8/09 |
UTDCS-26-09 | Parsing Prolog Terms A didactic exercise, Sponsored by Dr. Gopal Gupta | Feliks Kluzniak | 8/09 |
UTDCS-27-09 | Physical Models vs. Graph Models Of Wireless Network Topologies | Andras Farago Stefano Basagni |
9/09 |
UTDCS-28-09 | A Case Study on Geospatial Data Management with Blackbook | Sonia Chib Jyothsna Rachapalli Bhavani Thuraisingham Latifur Khan Murat Kantarcioglu |
9/09 |
UTDCS-29-09 | Agile Product Line Requirements Engineering Questionnaire Data Analysis Using Feature Selection | Kunwu Feng Kendra M.L. Cooper |
9/09 |
UTDCS-30-09 | Agile Product Line Requirements Engineering Process Definitions | Kunwu Feng Kendra M.L. Cooper |
9/09 |
UTDCS-31-09 | Traffic Grooming for Energy-Aware Optical Networks | M.M. Hasan Farid Farahmand Jason P. Jue |
9/09 |
UTDCS-32-09 | Contention-Tolerant Crossbar Packet Switches without and with Speedup | Guannan Qu Hyung Jae Chang Jianping Wang Zhiyi Fang S. Q. Zheng |
9/09 |
UTDCS-33-09 | Bayesian Belief Network Structure Learning Algorithms:A Comparative Survey | Yan Tang Kendra Cooper Joao Cangussu |
9/09 |
UTDCS-34-09 | SoftLink: Visualizing Correlations Among Multiple Program Executions | Chunying Zhao Kang Zhang |
9/09 |
UTDCS-35-09 | FREEZE: Rate Adaptation in Wireless LANs Using Channel Contention Estimates | Ajay Kulkarni Shanthy Menezes Ravi Prakash |
9/09 |
UTDCS-36-09 | Enhanced Information Flow Control for Service Composition and Its Implementation | Wei She I-Ling Yen Bhavani Thuraisingham Elisa Bertino |
09/09 |
UTDCS-37-09 | Cost Efficient Traffic Grooming andRegenerator Placement in Impairment- Aware Optial WDM Network | Ankitkumar N. Patel Chengyi Gao Jason P. Jue Xi Wang Qiong Zhang Paparao Palacharla Takao Naito |
10/09 |
UTDCS-38-09 | Minimum SRLGs Multicast Routing | Yi Zhu Jason P. Jue |
10/09 |
UTDCS-39-09 | Network Aware Energy-Efficient Communication (NAEEC) Protocol For Heterogeneous Wireless Sensor Networks |
Manoj K. Garg B. Prabhakaran |
10/09 |
UTDCS-40-09 | Cost-based Query Processing for Large RDF Graph Using Hadoop and MapReduce | Mohammad Husain Pankil Doshi Latifur Khan Syeda A. Rizvi Murat Kantarcioglu Bhavani Thuraisingham |
11/09 |
UTDCS-41-09 | Efficient Query Processing for Large RDF Graphs Using Hadoop and MapReduce | Mohammad Husain Pankil Doshi James McGlothlin Latifur Khan Bhavani Thuraisingham Murat Kantarcioglu |
11/09 |
UTDCS-42-09 | Secure Location Verification with Randomly-Selected Base Stations | Matthew Holiday Neeraj Mittal Subbarayan Venkatesan |
11/09 |
UTDCS-43-09 | ASSERT: A Wireless Networking Testbed | Ehsan Nourbakhsh Jeff Dix Paul Johnson Ryan Burchfield S. Venkatesan Neeraj Mittal Ravi Prakash |
11/09 |
UTDCS-44-09 | Time Efficient Neighbor Discovery In Cognitive Radio Networks | Yanyan Zeng Neeraj Mittal S. Venkatesan R. Chandrasekaran |
11/09 |
UTDCS-45-09 | A Survey of Software Fault Localization | Eric Wong (Pending) |
11/09 |
UTDCS-46-09 | Experience with an NSF REU Program In Software Safety | Eric Wong (Pending) |
11/09 |
UTDCS-47-09 | Industry Involvement in an Undergraduate Software Engineering Project Course: Everybody Wins | Eric Wong (Pending) |
11/09 |
UTDCS-48-09 | Software Safety Standards: How Good Are They? | Eric Wong (Pending) |
11/09 |
UTDCS-49-09 | Recent Catastrophic Accidents: Is Software To Blame? | Eric Wong (Pending) |
11/09 |
UTDCS-50-09 | Evaluating Dependable Distributed Storage Systems | Liangliang Xiao Yunqi Ye I-Ling Yen Farokh Bastani |
12/09 |
UTDCS-51-09 | Secure, Dependable and High Performance Cloud Storage | Yunqi Ye I-Ling Yen Liangliang Xiao Farokh Bastani Bhavani Thuraisingham |
12/09 |
Report No. | Title | Author | Date |
UTDCS-01-08
|
Trusted Computing Base for Assured Information Sharing |
Yashaswini Harsha Kumar
Bhavani Thuraisingham Latifur Khan |
1/08
|
UTDCS-02-08
|
Delegation-based Security Model For Web Services |
Wei She
Bhavani Thuraisingham I-Ling Yen |
1/08
|
UTDCS-03-08
|
FIP: A Fast Planning-Graph Based Iterative Planner |
Jicheng Fu
Farokh Bastani Vincent Ng I-Ling Yen Yansheng Zhang |
2/08
|
UTDCS-04-08
|
Using Anonymized Data for Classification |
Ali Inan
Murat Kantarcioglu |
3/08
|
UTDCS-05-08
|
Mining Concept-Drifting Data Stream To Detect Peer to Peer Botnet Traffic |
Mohammad M. Masud
Jing Gao Latifur Khan Jiawei Han Bhavani Thuraisingham |
3/08
|
UTDCS-06-08
|
A Lightweight Solution for Defending Against Deauthentication/Disassociation Attacks on 802.11 Networks |
Thuc D. Nguyen
Duc H. M. Nguyen Bao N. Tran Hai Vu Neeraj Mittal |
3/08
|
UTDCS-07-08
|
On Disjoint Connecting Paths and Unsplittable Flow
|
Andras Farago |
3/08
|
UTDCS-08-08
|
Speeding Up Large Scale Distance Computations |
Andras Farago |
3/08
|
UTDCS-09-08
|
Fault -Tolerant Dual Power Management in Wireless Sensor Networks |
Chang Wang |
3/08
|
UTDCS-10-08
|
The Effect of Multi-Radio Nodes on Network Connectivity – A Graph Theoretic Analysis
|
Andras Farago
Stefano Basagni |
4/08
|
UTDCS-11-08
|
On the Descriptional Complexity of Path Optimization in Graphs |
Andras Farago |
4/08
|
UTDCS-12-08
|
Cross-Media Mapping Framework for 3D Human Motion Document Retrieval |
Yohan Jin |
5/08
|
UTDCS-13-08
|
Content-based Ontology Matching for GIS Datasets
|
Jeffrey L. Partyka |
5/08
|
UTDCS-14-08
|
A Fast Active Spanning Tree Maintenance Protocol for Dynamic Distributed Systems |
Tarun Bansal |
6/08
|
UTDCS-15-08 |
On Lower Bounds for Time Complexity of Departure in Dynamic Distributed Systems
|
Tarun Bansal
Neeraj Mittal |
6/08
|
UTDCS-16-08 |
PCFM: Probabilistic Contention Free MAC Protocol for Wireless Network
|
G. Dattatreya
A. Kulkarni |
7/08
|
UTDCS-17-08 |
Refining a Survey to Collect Expertise In Agile Product Line Requirements Engineering Processes
|
Kunwu Feng
Yan Tang Kun Tian Kendra M.L. Cooper |
7/08
|
UTDCS-18-08 |
Surgical Haptics and Robotics: Influence of Mismatched Haptic and Visual Display Scales
|
Gregory S. Lee Bhavani Thuraisingham
|
7/08
|
UTDCS-19-08 |
Leader Election Algorithms for Multi-Channel Wireless Networks
|
Tarun Bansal Neeraj Mittal
S. Venkatesan |
7/08
|
UTDCS-20-08 |
Synthesize Virtual World Motions From 2D Video Recognition
|
Yohan Jin Myunghoon Suk
B. Prabhakaran Bhavani Thuraisingham |
7/08
|
UTDCS-21-08 |
Inferring Private Information Using Social Network Data
|
Jack Lindamood
Murat Kantarcioglu |
7/08
|
UTDCS-22-08 |
Content-based Ontology Matching For GIS Datasets
|
Jeffrey Partyka
Neda Alipanah Latifur Khan Bhavani Thuraisingham Shashi Shekhar |
7/08
|
UTDCS-23-08 |
Secure Haptics and Surgical Robotics: Adaptation to Fitts’ Law Performance Measure for Multi-Target Task Comparisons
|
Gregory S. Lee
Bhavani Thuraisingham |
8/08
|
UTDCS-24-08 |
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks
|
Chanaka J. Liyana Arachchige
S. Venkatesan Neeraj Mittal |
8/08
|
UTDCS-25-08 |
“RF in the Jungle” Reproducibility of Wireless Experiments
|
Ehsan Nourbakhsh
Ryan Burchfield Jeff Dix Kunal Sahu S. Venkatesan Ravi Prakash |
8/08
|
UTDCS-26-08 |
Dynamic Coexistence of Frequency Hopping Networks Using Parallel And Gaussian Allocations
|
M. M. Hasan
Ravi Prakash Jason P. Jue |
9/08
|
UTDCS-27-08 |
Improving Fault Tolerance via Multi-Radio Nodes – A Graph Theoretic Analysis
|
Andras Farago
Dung Trung Tran Stefano Basagni |
9/08
|
UTDCS-28-08 |
Scalability of Node Degrees in Random Wireless Network Topologies
|
Andras Farago
|
9/08
|
UTDCS-29-08 |
Incentive Compatible Privacy-Preserving Data Analysis
|
Murat Kantarcioglu
Wei Jiang |
9/08
|
UTDCS-30-08 |
Hybrid Approach to Inferring Gene Networks with Expression Profile And Gene Ontology
|
Liping Jing
Ying Liu Phil Bachman |
9/08
|
UTDCS-31-08 |
Multi-Class IP Flow Aggregation In Multicast Optical Networks
|
Yi Zhu
Jason P. Jue |
9/08
|
UTDCS-32-08 |
A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data |
Mohammad M. Masud
Bhavani Thuraisingham Jing Gao Latifur Khan Jiawei Han |
10/08
|
UTDCS-33-08
|
A Reusable Process Pattern for Agile Product Line Requirements Engineering |
Kojun T. Hatta
Kendra M. L. Cooper |
10/08
|
UTDCS-34-08
|
Negation in Coinductive Logic Programming
|
Richard Min
Gopal Gupta |
10/08
|
UTDCS-35-08
|
Routing and Scheduling for Time-Shift Reservation Circuit Switching |
Ankitkumar N. Patel
Qingya She Jason P. Jue |
10/08
|
UTDCS-36-08
|
Routing and Scheduling for Variable Bandwidth Reservation Circuit Switching |
Ankitkumar N. Patel
Jason P. Jue |
10/08
|
UTDCS-37-08 |
A Kalman Filter for Software Defects Data
|
Syed Waseem Haider
Joao W. Cangussu |
12/08
|
UTDCS-38-08 |
PEQ: A Privacy-Preserving Scheme for Answering Exact Queries in Distributed Sensor Data Networks
|
Neeraj Mittal
S. Venkatesan Hai Vu Thuc Nguyen |
12/08
|
UTDCS-39-08 |
R2D: Bridging the Gap Between the Semantic Web and Relational Visualization Tool
|
Sunitha Ramanujam
Anubha Gupta Latifur Khan Steven Seida |
12/08
|
UTDCS-40-08
|
A Framework for the Relational Transformation of RDF Data
|
Sunitha Ramanujam
Anubha Gupta Latifur Khan Steven Seida Bhavani Thuraisingham |
12/08
|
Report No. | Title | Author | Date |
UTDCS-01-07
|
An Integrated Platform for Secure Geospatial Information Exchange Through the Semantic Web
|
Bhavani Thuraisingham
Alam Ashraful Ganesh Subbiah Latifur Khan |
1/07
|
UTDCS-02-07
|
Oracle 10 G XE Tutorial (Product of Oracle Corporation)
|
Srinivasan Iyer
Bhavani Thuraisingham |
1/07
|
UTDCS-03-07
|
Geospatial Data Mining for National Security: Land Cover Classification And Grouping for Semantic Assessment
|
Chuanjun Li
Latifur Khan M. Husain Bhavani Thuraisingham Shaofei Chen Fang Qiu |
1/07
|
UTDCS-04-07
|
A Multilevel Quantization Index Modulation Based Data Hiding Scheme
|
Hui Li
Parag Agarwal Balakrishnan Prabhakaran |
1/07
|
UTDCS-05-07
|
From Abstract Art to Information Visualization
|
Kang Zhang
|
1/07
|
UTDCS-06-07
|
On Active Departure for Dynamic Asynchronous Systems
|
Sathya Peri
Neeraj Mittal |
1/07
|
UTDCS-07-07
|
A Formal Framework for Modeling and Analysis of Pattern-Based Design
|
Jing Dong
Tu Peng Paulo S.C. Alencar Donald D. Cowan |
1/07
|
UTDCS-08-07
|
Optimizing Split Networks
|
Y. Zhang
L. Bao Sergey Bereg |
2/07
|
UTDCS-09-07
|
A Polynomial Time Solution to Minimum Forwarding Set Problem In Wireless Ad Hoc Networks
|
Mehmet Baysan
Kamil Sarac R. Chandrasekaran Sergey Bereg |
2/07
|
UTDCS-10-07
|
Sampling from Independence Systems
|
András Faragó
|
2/07
|
UTDCS-11-07
|
Methods for Handling Non-Markovian Performance Models
|
András Faragó
|
2/07
|
UTDCS-12-07
|
Complexity of Cut Paste Moves and Prefix Reversal/Transposition Moves for Strings
|
Bhadrachalam Chitturi
Hal Sudborough |
3/07
|
UTDCS-13-07
|
Resource non-Intensive Survivable Clustering for Wireless Sensor Networks
|
Mohammad M. Hasan
Jason P. Jue |
3/07
|
UTDCS-14-07
|
A Fast Deterministic Algorithm for Neighbor Discovery in Multi-Channel Cognitive Radio Networks
|
Neeraj Mittal
Srinivasan Krishamurthy R. Chandrasekaran S. Venkatesan |
3/07
|
UTDCS-15-07
|
Data Hiding Based Compression Mechanism for 3D Models
|
Hui Li
Parag Agarwal Balakrishnan Prabhakaran |
3/07
|
UTDCS-16-07
|
Fast Mobile IPv6 Based Handover with Efficient Prediction for WLAN-UMTS Integrated Networks
|
Shanthy Menezes
Aesoon Park S. Venkatesan |
3/07
|
UTDCS-17-07
|
Spectral Analysis of Complex Networks
|
Wenyuan Li
Yongjing Lin Ying Liu |
3/07
|
UTDCS-18-07
|
Developing a Survey to Collect Expertise in Agile Product Line Requirements Engineering Processes
|
Kunwu Feng
Meli Lempert Yan Tang Kun Tian Kendra M. L. Cooper Xavier Franch |
4/07
|
UTDCS-19-07
|
Accelerometer-Based Human Abnormal Movement Detection in Wireless Sensor Networks
|
T. Ryan Burchfield
S. Venkatesan |
4/07
|
UTDCS-20-07
|
Tutorial on QoS Based UML Profile
|
Hyotaeg Jung
W. Eric Wong Kendra Cooper |
4/07
|
UTDCS-21-07
|
Defining Project Scenarios for the Agile Requirements Engineering Product-line Development Questionnaire
|
Kunwu Feng
Meli Lempert Yan Tang Kun Tian Kendra M. L. Cooper Xavier Franch |
4/07
|
UTDCS-22-07
|
Towards Intelligent Services: A Case Study in Chemical Emergency Response
|
Ajay Bansal
Kunal Patel Gopal Gupta B. Raghavachari E. D. Harris James C. Staves |
4/07
|
UTDCS-23-07
|
USDL – Formal Definitions in OWL
|
Srividya Kona
Ajay Bansal Gopal Gupta Thomas D. Hite |
4/07
|
UTDCS-24-07
|
Maximizing Throughput in ZigBee Wireless Networks through Analysis, Simulations and Implementations
|
T. Ryan Burchfield
S. Venkatesan Douglas Weiner |
5/07
|
UTDCS-25-07
|
Evaluation of Differential Expression Analysis Approaches for Microarray Platform Performance Assessment
|
Hung-Chung Huang
Xiuwen Zheng Yun Lian Leming Shi Quanzhen Li Ying Liu |
5/07
|
UTDCS-26-07
|
Space-Efficient Keying in Wireless Communication Networks
|
Neeraj Mittal
|
5/07
|
UTDCS-27-07 |
Complexity of MCP and MCSP
|
Bhadrachalam Chitturi
I. Hal Sudborough |
7/07
|
UTDCS-28-07
|
Bounds for Sorting Permutations with Prefix Transpositions
|
Bhadrachalam Chitturi
I. Hal Sudborough |
8/07
|
UTDCS-29-07
|
Opportunistic Optical Hyperchannel And Its Distributed QoS Assuring Access Control
|
Jing Chen
Jianping Wang Hui Yu S. Q. Zheng |
8/07
|
UTDCS-30-07
|
1-Persistent Collision-Free MAC Protocols for Opportunistic Optical Hyperchannels |
Jing Chen
Ashwin Gumaste |
8/07
|
UTDCS-31-07
|
An Improved TCAM-Based IP Lookup Engine |
Hui Yu
Jing Chen S. Q. Zheng Mehrdad Nourani |
8/07
|
UTDCS-32-07
|
High-Performance TCAM-Based IP Lookup Engines
|
Hui Yu
Jing Chen Jianping Wang S. Q. Zheng |
8/07
|
UTDCS-33-07
|
Security for Enterprise Resource Planning Systems
|
Wei She |
8/07 |
UTDCS-34-07
|
Secure Semantic Web Services
|
Bhavani Thuraisingham
|
8/07
|
UTDCS-35-07
|
Extended RBAC-Based Design and Implementation for A Secure Data Warehouse
|
Bhavani Thuraisingham
Murat Kantarcioglu Srinivasan Iyer |
9/07
|
UTDCS-36-07
|
Indexing 3D Human Motion Repositories For Content-based Retrieval
|
Gaurav N. Pradhan
Balakrishnan Prabhakaran |
10/07 |
UTDCS-37-07
|
Analysis of Human Performance Using Physiological Data Streams
|
Gaurav N. Pradhan
Balakrishnan Prabhakaran |
10/07
|
UTDCS-38-07
|
Multi-stream Pattern Mining with Multi-dimensional Information
|
Gaurav N. Pradhan
Balakrishnan Prabhakaran |
10/07 |
UTDCS-39-07
|
Architecture for a Trusted Computing Base For need-to-share in case ofemergencies
|
Yashaswini Harsha Kumar
Bhavani Thuraisingham Latifur Khan |
11/07
|
UTDCS-40-07
|
Enforcing Honesty in Assured InformationSharing within a Distributed System
|
Ryan Layfield
Murat Kantarcioglu Bhavani Thuraisingham |
11/07 |
UTDCS-41-07
|
Data Mining for Defensive Operations
|
Mohammad Masud
Latifur Khan Bhavani Thuraisingham |
11/07 |
UTDCS-42-07
|
WiMap: Fast Handover for 802.11 Mobile Devices
|
A. Kulkarni
S. Menezes H. Vu C. Liyana Arachige G. Dattatreya |
11/07
|
UTDCS-43-07
|
WORMEROS: A New Framework for Defending Against Wormhole Attacks In Wireless Networks
|
Hai Vu
Ajay Kulkarni Kamil Sarac Neeraj Mittal |
12/07
|
UTDCS-44-07
|
Procedural Plans in the Context of Code Synthesis
|
Jicheng Fu
Farokh Bastani I-Ling Yen Vincent Ng |
12/07
|
UTDCS-45-07
|
Information Operations Across Infospheres: Volume 2
|
Latifur Khan
Bhavani Thuraisingham Murat Kantarcioglu Yashaswini Harsha KumarMehedy Masud Ryan Layfield |
12/07
|
Report No. | Title | Author | Date |
UTDCS-01-06
|
OWL-S Ontology Framework Extension For Dynamic Web Service Composition
|
Jing Dong
Yongtao Sun |
1/06
|
UTDCS-02-06
|
Dependable and Secure TMO Scheme
|
Jung-In Kim
Bhavani Thuraisingham |
1/06
|
UTDCS-03-06
|
Geography Resource Description Framework (GRDF) and Secure GRDF (S-GRDF)
|
Ashraful Alam
Bhavani Thuraisingham |
1/06
|
UTDCS-04-06
|
An Adaptable Perturbation Model of Privacy Preserving Data Mining
|
Li Liu
Bhavani Thuraisingham Murat Kantarcioglu Latifur Khan |
1/06
|
UTDCS-05-06
|
Face Recognition Using Various Classifiers: Artificial Neural Network, Linear Discriminant and Principal Component Analysis
|
Pallabi Parveen
Bhavani Thuraisingham |
1/06
|
UTDCS-06-06
|
Administering The Semantic Web: CPT: Confidentiality, Privacy and Trust Management
|
Nathalie Tsybulnik
Bhavani Thuraisingham |
2/06
|
UTDCS-07-06
|
An Efficient Handover Scheme Based On Fast Mobile IPv6
|
Shanthy Menezes
Kwang-hyun Ro S. Venkatesan |
2/06
|
UTDCS-08-06
|
A Projected Clustering Algorithm in High Dimensional Space
|
Ping Deng
Weili Wu Yaochun Huang Zhongnan Zhang |
2/06
|
UTDCS-09-06
|
Topology Sampling: Challenges, Solutions
|
Kamil Sarac
Turgay Korkmaz Sevcan Bilir |
3/06
|
UTDCS-10-06
|
Small Group Multicast with Deflection Routing in Optical Burst Switched Networks
|
Xiaodong Huang
Qingya She Jason P. Jue |
3/06
|
UTDCS-11-06
|
Coinductive Logic Programming
|
Luke Simon
Ajay Mallya Ajay Bansal Gopal Gupta |
3/06
|
UTDCS-12-06
|
Mining Quantitative Maximal Hyperclique Patterns: A Summary Of Results
|
Yaochun Huang
Hui Xiong Weili Wu |
3/06
|
UTDCS-13-06
|
On the Complexity of the Privacy Problem in Databases
|
Bhavani Thuraisingham
|
3/06
|
UTDCS-14-06
|
Inference Control for Document Release and Dissemination
|
Bhavani Thuraisingham
|
3/06
|
UTDCS-15-06
|
Individually Adaptable Perturbation Model for Privacy Preserving Data Mining
|
Li Liu
Murat Kantarcioglu Bhavani Thuraisingham |
3/06
|
UTDCS-16-06
|
Enhanced RUP Vision Document for the Quality Assurance Review Assistant Tool: Defining Stakeholders and Goals
|
Shiney Abraham
Ramya Pramod Kendra Cooper |
3/06
|
UTDCS-17-06
|
On Maximum Key Pool Size for a Key Pre-Distribution Scheme in Wireless Sensor Networks
|
Neeraj Mittal
Tarun R. Belagodu |
3/06
|
UTDCS-18-06
|
USDL: A Service-Semantics Description Language for Automatic Service Discovery and Composition
|
Srividya Kona
Ajay Bansal Luke Simon Thomas D. Hite Ajay Mallya Gopal Gupta |
3/06
|
UTDCS-19-06
|
OurCapProbe: Improving CapProbe to find and estimate capacities of bottleneck link and other choke links
|
Chalam Chitturi
Kamil Sarac |
4/06
|
UTDCS-20-06
|
Finding the Inversion Distance Between Strings Over a Finite Alphabet
|
Bhadrachalam Chitturi
Hal Sudborough Walter Voit |
4/06
|
UTDCS-21-06
|
Co-Logic Programming: Extending Logic Programming with Co-Induction
|
Luke Simon
Ajay Mallya Ajay Bansal Gopal Gupta |
4/06
|
UTDCS-22-06
|
Design and Implementation of a Secure Social Network System
|
Ryan Layfield
Bhavani Thuraisingham |
4/06
|
UTDCS-23-06
|
Algorithms for Node Discovery and Configuration in Cognitive Radio Networks
|
Srinivasan Krishnamurthy
R. Chandrasekaran S. Venkatesan Neeraj Mittal |
5/06
|
UTDCS-24-06
|
A Delay-Optimal Group Mutual Exclusion Algorithm for a Tree Network
|
Vinay Madenur
Neeraj Mittal |
5/06
|
UTDCS-25-06
|
Generalized Replicator Dynamics for Efficiently Building Phylogenetic Tree
|
Wenyuan Li
Ying Liu |
6/06
|
UTDCS-26-06
|
Requirements and Software Architecture for the CAT Assistant Tool: Supporting the COTS-Aware Requirements engineering and Software Architecting (CARE/SA) Approach (version 2.0)
|
Michael McFadden
Shirish Pulikkal Kendra Cooper |
6/06
|
UTDCS-27-06
|
Detecting New Malicious Executables Using Data Mining
|
Mohammad M. Masud
Latifur Khan Bhavani Thuraisingham Mamoun A. Awad |
7/06
|
UTDCS-28-06
|
On Complexity of Transforming Strings with Prefix Reversals and Prefix Transpositions
|
Bhadrachalam Chitturi
I. Hal Sudborough |
7/06
|
UTDCS-29-06
|
Solving Computation Slicing Using Predicate Detection
|
Neeraj Mittal
Alper Sen Vijay K. Garg |
7/06
|
UTDCS-30-06
|
A Near Optimal Uniform Key Pre-Distribution Scheme Using Deployment Knowledge
|
Neeraj Mittal
|
7/06
|
UTDCS-31-06
|
On Lower Bounds for Node Discovery And Configuration in Cognitive Radio Networks
|
R. Chandrasekaran
S. Venkatesan Neeraj Mittal Srinivasan Krishnamurthy |
7/06
|
UTDCS-32-06
|
Fingerprint Matching Algorithm Based On Tree Comparison Using Ratios of Relational Distances
|
Abinandhan Chandrasekaran
Bhavani Thuraisingham |
7/06
|
UTDCS-33-06
|
Evaluating Dependable Distributed Storage Systems
|
Yanjin Zhang
Liangliang Xiao Manghui Tu I-Ling Yen |
8/06
|
UTDCS-34-06
|
Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks
|
Maulin Patel
S. Venkatesan R. Chandrasekaran |
8/06
|
UTDCS-35-06
|
Medium Access Control Protocols For Cognitive Radio-based Multi-hop Wireless Networks
|
Mansi Thoppian
Ravi Prakash S. Venkatesan |
8/06
|
UTDCS-36-06
|
Robust Blind Watermarking Mechanism For 3D Point Sampled Geometry
|
Parag Agarwal
B. Prabhakaran |
8/06
|
UTDCS-37-06
|
Home Appliance Control System Use Case Model Survey, Version 1.0
|
Kendra Cooper
Christine Ayers |
8/06
|
UTDCS-38-06
|
A Survey of Formal Methods for Software Architecture
|
Longji Tang
Jing Dong |
9/06
|
UTDCS-39-06
|
A Scalable Clustering Method Based on Density
|
Kathryn Bean
Sergey Bereg Latifur Khan Bhavani Thuraisingham |
9/06
|
UTDCS-40-06
|
Detecting Malicious Executables Using Assembly Feature Retrieval
|
Mohammad M. Masud
Latifur Khan Bhavani Thuraisingham |
9/06
|
UTDCS-41-06
|
Safe Termination Detection in an Asynchronous Distributed System when Processes may Crash and Recover
|
Neeraj Mittal
Kuppahalli L. Phaneesh Felix C. Freiling |
10/06
|
UTDCS-42-06
|
THIS: Threshold Security of Information Aggregation for Sensor Networks
|
Hai Vu
Neeraj Mittal S. Venkatesan |
10/06
|
UTDCS-43-06
|
Assured Information Sharing: Technologies, Challenges and Directions
|
Bhavani Thuraisingham
|
10/06
|
UTDCS-44-06
|
Design and Implementation of Policy Enforcement, Data Sharing and Mining Components for Trustworthy Coalitions
|
Mamoun Awad
Dilsad Cavus Latifur Khan Manjunath Reddy Bhavani Thuraisingham |
10/06
|
UTDCS-45-06
|
Design and Simulation of Agent-based Trust Management Techniques for a Coalition Environment
|
Srinivasan Iyer
Bhavani Thuraisingham |
10/06
|
UTDCS-46-06
|
Research and Simulation of Game Theoretical Techniques for Data Sharing Among Semi-Trustworthy Partners
|
Ryan Layfield
Murat Kantarcioglu Bhavani Thuraisingham |
10/06
|
UTDCS-47-06
|
Defensive Information Operations: DETECTING MALICIOUS EXECUTABLES USING ASSEMBLY FEATURE RETRIEVAL in an Untrustworthy Environment
|
M. Mehedy Masud
Latifur Khan Bhavani Thuraisingham |
10/06
|
UTDCS-48-06
|
Information Operations Across Infospheres: Volume 1
|
Latifur Khan
Bhavani Thuraisingham Murat Kantarcioglu Mamoun Awad Dilsad Cavus Ryan Layfield Mehedy Masud Srinivasan Iyer |
10/06
|
UTDCS-49-06
|
A Wrapped Spherical Covering with Optimal Covering Density
|
Yuanyi Zhang
Sergey Bereg |
10/06
|
UTDCS-50-06
|
A Network-flow-based Integral Optimal Algorithm for Lexicographic Maximum Lifetime Routing in Wireless Sensor Networks
|
Maulin Patel
S. Venkatesan R. Chandrasekaran |
10/06
|
UTDCS-51-06
|
A Novel Privacy Preserving Decision Tree Algorithm
|
Li Liu
Murat Kantarcioglu Bhavani Thuraisingham |
10/06
|
UTDCS-52-06
|
Fault-Tolerant Dual Power Assignment In Wireless Sensor Networks
|
Myung-Ah Park
Wang Chen James K. V. Willson Weili Wu Andras Farago |
10/06
|
UTDCS-53-06
|
A Dominating and Absorbent Set in Wireless Ad-hoc Networks with Different Transmission Range
|
Myung-Ah Park
Wang Chen James K. V. Willson My T. Thai Weili Wu Andras Farago |
10/06
|
UTDCS-54-06
|
Prefix Reversals on Strings
|
Bhadrachalam Chitturi
Hal Sudborough |
11/06
|
UTDCS-55-06
|
Prefix Transpositions on Strings
|
Bhadrachalam Chitturi
Hal Sudborough |
11/06
|
UTDCS-56-06
|
Demand-driven Retrieval Schedules For Progressive Transmission of 3D Animations
|
H. Li
V.S. Ramaswamy B. Prabhakaran |
11/06
|
UTDCS-57-06
|
Quantifying the Impact of Alias Resolution on traceroute-based Sample Network Topologies
|
Mehmet Hadi Gunes
Nicolas Sanchis Nielsen Kamil Sarac |
11/06
|
UTDCS-58-06
|
Face Segmentation for Privacy Preserving Video Surveillance
|
Sai Chaitanya
Bhavani Thuraisingham |
11/06
|
UTDCS-59-06
|
Modeling Nonlinearity in Dilution Design Microarray Data
|
Xiuwen Zheng
Hung-Chung Huang Wenyuan Li Peng Liu Quan-Zhen Li Ying Liu |
11/06
|
UTDCS-60-06
|
A Comparative Study of a Key Agreement Protocol Based on ECC and RSA
|
Vibha Sethi
Bhavani Thuraisingham |
11/06
|
UTDCS-61-06
|
RFID Technologies and Their Applications
|
Abinandhan Chandrasekaran
Bhavani Thuraisingham |
11/06
|
UTDCS-62-06
|
Resolving IP Aliases in Building Traceroute-Based Internet Maps
|
Mehmet H. Gunes
Kamil Sarac |
12/06
|
UTDCS-63-06
|
CSMA-Based Mac Protocol for Cognitive Radio Based Multi-Hop Wireless Networks
|
Mansi Thoppian
S. Venkatesan Ravi Prakash |
12/06
|
UTDCS-64-06
|
Secure Grid Computing
|
Jianmin Zhu
Bhavani Thuraisingham |
12/06
|
UTDCS-65-06
|
Face Recognition Using Multiple Classifiers
|
Pallabi Parveen
Bhavania Thuraisingham |
12/06
|
UTDCS-66-06
|
A Framework for a Video Analysis Tool for Suspicious Event Detection
|
Gal Lavee
Latifur Khan Bhavani Thuraisingham |
12/06
|
UTDCS-67-06
|
HERoISM: Harmonious Existence of RadiOs in the ISM Band
|
Qasim Javed
Kunal Sahu Ravi Prakash |
12/06
|
UTDCS-68-06
|
A Model for Risk Adaptive Access Control in RBAC Employed Distributed Environments
|
Ebru Celikel
Murat Kantarcioglu Bhavani Thuraisingham Dilsad Cavus |
12/06
|
UTDCS-69-06
|
Rule Generalization in the Component Parameterization Technique – a Formal Approach
|
Jia Zhou
Kendra Cooper I-Ling Yen |
12/06
|
UTDCS-70-06
|
Route Finder on PDA – An Application Of the Component Parameterization Technique
|
Jia Zhou
Kendra Cooper I-Ling Yen |
12/06
|