2020
A note on the fine structure constant, Bilal Khan and Irshadullah Khan
2019
Work-in-Progress Reports Submitted to the Library of Congress as Part of Digital Libraries, Intelligent Data Analytics, and Augmented Description, Chulwoo Pack, Yi Liu, Leen-Kiat Soh, and Elizabeth Lorang
2017
Smart Underground Antenna Arrays: A Soil Moisture Adaptive Beamforming Approach, Abdul Salam and Mehmet C. Vuran
Meeting Real-Time Constraint of Spectrum Management in TV Black-Space Access, Zhongyuan Zhao
2016
Connecting Program Synthesis and Reachability: Automatic Program Repair using Test-Input Generation, ThanhVu Nguyen, Westley Weimer, Deepak Kapur, and Stephanie Forrest
2014
Ultimate Codes: Near-Optimal MDS Array Codes for RAID-6, Zhijie Huang, Hong Jiang, Chong Wang, Ke Zhou, and Yuhong Zhao
S-Code: Lowest Density MDS Array Codes for RAID-6, Zhijie Huang, Hong Jiang, Ke Zhou, Yuhong Zhao, and Chong Wang
Providing Flexible File-Level Data Filtering for Big Data Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, and David Swanson
2013
Improving No-Good Learning in Binary Constraint Satisfaction Problems, Mary D. Burke and Berthe Y. Choueiry
Non-Stationary Phenomenon in Large Team Information Sharing, Adam Eck and Leen-Kiat Soh
Network Innovation using OpenFlow: A Survey, Adrian Lara, Anisha Kolasani, and Byrav Ramamurthy
VSFS: A Versatile Searchable File System for HPC Analytics, Lei Xu, Ziling Huang, Hong Jiang, Lei Tian, and David Swanson
2012
EXPERIMENTS ON VIDEO STREAMING OVER COMPUTER NETWORKS, Steven Becker
A Scalable Inline Cluster Deduplication Framework for Big Data Protection, Yinjin Fu, Hong Jiang, and Nong Xiao
Real-Time Scheduling in MapReduce Clusters, Chen He, Ying Lu, and David Swanson
Algorithms for the Minimal Network of a CSP and a Classifier for Choosing Between Them, Shant K. Karakashian, Robert J. Woodward, Berthe Y. Choueiry, and Stephen Scott
DYNAMIC NETWORK TRAFFIC ISOLATION THROUGH OPENFLOW, Anisha Kolasani
On the Benefits of Providing Versioning Support for End-Users: an Empirical Study, Sandeep Kaur Kuttal, Anita Sarma, and Gregg Rothermel
Finding the Boundary of Use to Improve Repair Mechanisms for Supervised Learning Systems, L. Dee Miller and Leen-Kiat Soh
Solving the Search for Suitable Code: An Initial Implementation, Kathryn T. Stolee and Sebastian Elbaum
Solving Semantic Searches for Source Code, Kathryn T. Stolee, Sebastian Elbaum, and Daniel Dobos
Roles in a Networked Software Development Ecosystem: A Case Study in GitHub, Patrick Wagstrom, Corey Jergensen, and Anita Sarma
SUPPORTING DEVELOPER-ONBOARDING WITH ENHANCED RESOURCE FINDING AND VISUAL EXPLORATION, Jianguo Wang
Automated Generation of Context-Aware Tests, Zhimin Wang, Sebastian Elbaum, and David Rosenblum
Exploiting Structure in Constraint Propagation, Robert J. Woodward, Shant K. Karakashian, Berthe Y. Choueiry, Christian Bessiere, and David B. Marx
2011
A Degree of Conflict Model for Workspace Awareness, Bakhtiar Khan Kasi and Anita Sarma
Rightsizing Bundle Link Capacities for Energy Savings in the Core Network, Lin Liu and Byrav Ramamurthy
Hierarchical Clustering Algorithm with Dynamic Tree Cut for Data Imputation, L. Dee Miller, Nate Stender, Leen-Kiat Soh, Ashok Samal, and Kevin A. Kupzyk
A STUDY OF CORRELATIONS BETWEEN THE DEFINITION AND APPLICATION OF THE GENE ONTOLOGY, Yuji Mo
LOCATION CHEATING: A SECURITY CHALLENGE TO LOCATION-BASED SOCIAL NETWORK SERVICES, Mai Ren
Isomorph-free generation of 2-connected graphs with applications, Derrick Stolee
RELATIONAL NEIGHBORHOOD INVERSE CONSISTENCY FOR CONSTRAINT SATISFACTION: A STRUCTURE-BASED APPROACH FOR ADJUSTING CONSISTENCY & MANAGING PROPAGATION, Robert J. Woodward
Relational Neighborhood Inverse Consistency for Constraint Satisfaction, Robert J. Woodward, Shant Karakashian, Berthe Y. Choueiry, and Christian Bessiere
Propeller: A Scalable Metadata Organization for A Versatile Searchable File System, Lei Xu, Hong Jiang, Xue Liu, Lei Tian, Yu Hua, and Jian Hu
MACHINE LEARNING WITH INCOMPLETE INFORMATION, Yaling Zheng
Response Time Analysis of Hierarchical Scheduling: the Synchronized Deferrable Servers Approach, Haitao Zhu, Steve Goddard, and Matthew B. Dwyer
2010
SimSight: A Virtual Machine Based Dynamic Call-Graph Generator, Xueling Chen, Peng Du, and Witawas Srisaan
Rapport: Semantic-sensitive Namespace Management in Large-scale File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, and Dan Feng
Tree-Based Algorithms for Computing k-Combinations and k-Compositions, Shant Karakashian and Berthe Y. Choueiry
DSFS: Decentralized Security for Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, and Anli Chen
A Slice-based Decision Procedure for Type-based Partial Orders TR-UNL-CSE-2010-0004, Elena Sherman, Brady J. Garvin, and M Dwyer
Reducing Cross-ISP Traffic of P2P Systems: The End or The Beginning of P2P Traffic Control, Peng Yang and Lisong Xu
COSET: Cooperative Set Last Level Caches, Dongyuan Zhan, Hong Jiang, and Sharad Seth
2009
Technical Reports (2004 - 2009)
An Ethical Governor for Constraining Lethal Action in an Autonomous System, Ronald C. Arkin, Patrick Ulam, and Brittany Duncan
Responsibility and Lethality for Unmanned Systems: Ethical Pre-mission Responsibility Advisement, Ronald C. Arkin, Alan R. Wagner, and Brittany Duncan
Lek Behavior as a Model for Multi-Robot Systems, Brittany Duncan, Patrick D. Ulam, and Ronald C. Arkin
Agent Sensing In Limited Resource Environments, Adam Eck and Leen-Kiat Soh
Intelligent User Interfaces with Adaptive Knowledge Assistants, Adam Eck and Leen-Kiat Soh
Exploring Parameterized Relational Consistency, Shant K. Karakashian, Robert J. Woodward, and Berthe Y. Choueiry
A Multiagent Framework for Human Coalition Formation, Nobel Khandaker and Leen-Kiat Soh
Multiagent Simulation of Collaboration and Scaffolding of a CSCL Environment, Nobel Khandaker and Leen-Kiat Soh
Quarantine: Java Heap Protection in the Presence of Native Code, Du Li and Witawas Srisa-an
An Efficient Algorithm for Real-Time Divisible Load Scheduling, Anwar Mamat, Ying Lu, Jitender S. Deogun, and Steve Goddard
Network Coding for WDM All-Optical Multicast, Eric D. Manley, Jitender S. Deogun, Lisong Xu, and Dennis R. Alexander
Design of An All-Optical WDM Lightpath Concentrator, Shivashis Saha and Jitender S. Deogun
Selection of Switching Sites in All-Optical Nework Topology Design, Shivashis Saha, Eric D. Manley, and Jitender S. Deogun
The Coordination Pyramid: A Perspective on the State of the Art in Coordination Technology, Anita Sarma, David Redmiles, and André van der Hoek
Refactoring Pipe-like Mashups for End-User Programmers, Kathryn T. Stolee and Sebastian Elbaum
SPA: On-Line Availability Upgrades for Parity-based RAIDs through Supplementary Parity Augmentations, Lei Tian, Hong Jiang, Dan Feng, Qiang Cao, Changsheng Xie, and Qin Xin
An Efficient Threshold-Based Power Management Mechanism for Heterogeneous Soft Real-Time Clusters, Leping Wang and Ying Lu
DEBAR: A Scalable High-Performance De-duplication Storage System for Backup and Archiving, Tianming Yang, Hong Jiang, Dan Feng, and Zhongying Niu
Exploiting Set-Level Non-Uniformity of Capacity Demand to Enhance CMP Cooperative Caching, Dongyuan Zhan, Hong Jiang, and Sharad C. Seth
2008
DUTs: Targeted Case Studies, Hui Nee Chin, Sebastian Elbaum, Matthew B. Dwyer, and Matthew Jorde
SmartStore: A New Metadata Organization Paradigm with Metadata Semantic-Awareness for Next-Generation File Systems, Yu Hua, Hong Jiang, Yifeng Zhu, Dan Feng, and Lei Tian
On Incorporating Learning Theories to Simulate a Computer-Supported Collaborative Learning Environment, Nobel Khandaker and Leen-Kiat Soh
Network Coding for WDM All-Optical Multicast, Eric D. Manley, Jitender S. Deogun, Lisong Xu, and Dennis R. Alexander
IDEAS: An Identity-based Security Architecture for Large-scale and High-performance Storage Systems, Zhongying Niu, Ke Zhou, Hong Jiang, Dan Feng, and Tianming Yang
NMFLUX: Improving Degradation Behavior of Server Applications through Dynamic Nursery Resizing, Witawas Srisaan and Cheng Huan Jia
An M-Sequence Based Steganography Model for Voice over IP, Lei Tian, Ke Zhou, Hong Jiang, Jin Liu, Yongfeng Huang, and Dan Feng
Efficient Power Management of Heterogeneous Soft Real-Time Clusters, Leping Wang and Ying Lu
FARMER: A Novel Approach to File Access Correlation Mining And Evaluation Reference Model for Optimizing Peta-Scale File System Performance, Peng Xia, Dan Feng, Hong Jiang, Lei Tian, and Fang Wang
Loss-Rate Based Reliable Data Transport Mechanism for Dynamic Event Sensing in Wireless Sensor Networks, Yuyan Xue, Byrav Ramamurthy, and Yong Wang
2007
A Note on the Karp-Lipton Collapse for the Exponential Hierarchy, Chris Bourke
ConferenceXP-Powered I-MINDS: A Multiagent System for Intelligently Supporting Online Collaboration, Adam Eck, L.D. Miller, Leen-Kiat Soh, Hong Jiang, and Tim Chou
Automated Refinement and Augmentation of Web Service Description Files, Marc Fisher II, Sebastian Elbaum, and Gregg Rothermel
Variable Neighbor Selection in Live Peer-to-Peer Multimedia Streaming Networks, Jagannath Ghoshal, Byrav Ramamurthy, and Lisong Xu
Network Architectures for Live Peer-to-Peer Media Streaming, Jagannath Ghoshal, Lisong Xu, Byrav Ramamurthy, and Miao Wang
Software Pattern Communities: Current Practices and Challenges, Scott Henninger and Victor Corrêa
Scalable and Adaptive Metadata Management in Ultra Large-scale File Systems, Yu Hua, Yifeng Zhu, and Hong Jiang
Novel Force Matrix Transformations with Optimal Load-Balance for 3-body Potential based Parallel Molecular Dynamics in a Heterogeneous Cluster Environment, Sumanth J.V, David Swanson, and Hong Jiang
AMP: An Affinity-based Metadata Prefetching Scheme in Large-Scale Distributed Storage Systems, Lin Li, Xuemin Li, Hong Jiang, and Yifeng Zhu
Real-Time Divisible Load Scheduling with Different Processor Available Times, Xuan Lin, Steve Goddard, Ying Lu, and Jitender Deogun
CVRetrieval: Separating Consistency Retrieval from Consistency Maintenance, Yijun Lu, Hong Jiang, and Ying Lu
IDEA: An Infrastructure for Detection-based Adaptive Consistency Control in Replicated Services, Yijun Lu, Ying Lu, and Hong Jiang
IDEA: An Infrastructure for Detection-based Adaptive Consistency Control in Replicated Services, Yijun Lu, Ying Lu, and Hong Jiang
Modelling Computational Requirements of Mobile Robotic Systems Using Zones and Processing Windows, Ala' Qadi, Steve Goddard, Jiangyang Huang, and Shane Farritor
An Architectural Approach to Improving the Availability of Parity-Based RAID Systems, Lei Tian, Hong Jiang, Dan Feng, Qin Xin, and Sai Huang
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks, Yong Wang, Byrav Ramamurthy, and Yuyan Xue
uKeying: A Key Management Framework for Wireless Sensor Networks Utilizing a Unique Session Key, Yong Wang, Byrav Ramamurthy, and Yuyan Xue
An Efficient Scheme for Removing Compromised Sensor Nodes from Wireless Sensor Networks, Yong Wang, Byrav Ramamurthy, Xukai Zou, and Yuyan Xue
2006
On Reoptimizing Multi-Class Classifiers, Kun Deng, Chris Bourke, Stephen Scott, Robert E. Schapire, and N. V. Vinodchandran
Parallel Randomized State-space Search, Matthew B. Dwyer, Sebastian Elbaum, Suzette Person, and Rahul Purandare
Adaptive Online Program Analysis: Concepts, Infrastructure, and Applications, Matthew B. Dwyer, Alex Kinneer, and Sebastian Elbaum
Controlling Factors in Evaluating Path-sensitive Error Detection Techniques, Matthew B. Dwyer, Suzette Person, and Sebastian Elbaum
Web Application Characterization through Directed Requests, Sebastian Elbaum, KalyanRam Chilakamarri, Marc Randall Fisher II, and Gregg Rothermel
Carving Differential Unit Test Cases from System Test Cases, Sebastian Elbaum, Hui Nee Chin, Matthew B. Dwyer, and Jonathan Dokulil
Dynamic Characterization of Web Application Interfaces, Marc Randall Fisher II, Sebastian Elbaum, and Gregg Rothermel
Scaling a Dataflow Testing Methodology to the Multiparadigm World of Commercial Spreadsheets, Marc Randall Fisher II, Gregg Rothermel, Tyler Creelan, and Margaret Burnett