Technical Reports

Select a year from the drop down menu:

2023

TR-2023-1
Prasad, Sathvik; Reaves, Bradley
Robocall Audio from the FTC's Project Point of No Entry
November 14, 2023


2021

TR-2021-3
Schatz, K.; Melo-Filho, C.; Chirkova, R.; Tropsha, A.
Explaining Drug Discovery Hypotheses Using Knowledge Graph Patterns
September 7, 2021


TR-2021-2
Daniel, Shen S.; Chi, Min
TC-DTW: Accelerating Multivariate Dynamic Time Warping Through Triangle Inequality and Point Clustering
January 18, 2021


TR-2021-1
Wright, D.; Norris, D.; Tropsha, A.; Chirkova, R.; Korn, D. ; Quinones, J.; Parrish, S.
The Rare Disease InfoHub Portal: Actionable Knowledge Appropriately Delivered
January 8, 2021


2020

TR-2020-4
Hou, P.-Y.; Chirkova, R.; Wright, D,
Noise Removal with Regular Expressions in Knowledge Graphs
August 28, 2020


TR-2020-3
Ao, J.; Cheng, Z.; Chirkova, R.; Kolaitis, P.
Temporal Enrichment and Querying of Ontology-Compliant Data
May 27, 2020


TR-2020-2
Zhao, Yue; Shen, Xipeng; Liao, Chunhua
OpenK: An Open Infrastructure for the Accumulation, Sharing and Reuse of High Performance Computing Knowledge
May 2, 2020


TR-2020-1
Zhang, Guoqiang; Shen, Xipeng
Best-Effort Lazy Evaluation for Python Software Built On APIs
April 4, 2020


2019

TR-2019-9
Fisk, Susan; Stolee, Kathryn T.; Battestilli, Lina
A Lightweight Intervention to Decrease Gender Bias in Student Evaluations of Teaching (Full Version)
December 9, 2019


TR-2019-8
Elder, Sarah; Williams, Laurie
A Systematic Analysis of Debated Vulnerabilities in the National Vulnerability Database
November 19, 2019


TR-2019-7
Hou, P; Ao, J; Chirkova, R
Building a Data-Analytics Workflow for Antimicrobial-Resistance Studies: An Experience Report
September 17, 2019


TR-2019-6
Ao, J.; Chirkova, R.
Temporal Rules and Queries in the Antimicrobial-Resistance Domain: Collection of Examples
September 17, 2019


TR-2019-5
Xia, Tianpei; Chen, Jianfeng ; Shu, Rui ; Menzies, Tim
Sequential Model Optimization for Software Process Control
August 26, 2019


TR-2019-4
Agrawal, Amritanshu; Menzies, Tim
Is AI different for SE?
August 26, 2019


TR-2019-3
Chen, Jianfeng; Menzies, Tim
On the Value of Backdoors for Software Engineering: a Case Study with Test Suite Generation
August 26, 2019


TR-2019-2
Rahman, Akond; Elder, Sarah; Shezan, Faysal H.; Frost, Vanessa; Stallings, Jonathan; Williams, Laurie
Categorizing Defects in Infrastructure as Code
May 21, 2019


TR-2019-1
Pan, Xing; Mueller, Frank
The Colored Refresh Server for DRAM
March 27, 2019


2018

TR-2018-4
Ghatpande, Rushikesh
HPCC Benchmarking
May 29, 2018


TR-2018-3
Guan, Hui; Ning, Lin; Shen, Xipeng; Lim, Seung-Hwan; Menzies, Tim
Generalization of Teacher-Student Network and CNN Pruning
October 28, 2018


TR-2018-2
Lin, Ning; Shen, Xipeng
Similarities in Neuron Vectors and The Implications to CNN Inferences
October 15, 2018


TR-2018-1
Naresh, Lakshman C.A.; Shen, Xipeng; Starly, Binil
A Just-In-Time Compiler for Intelligent Manufacturing
July 17, 2018


2017

TR-2017-5
Oudjit, Aissa; Stallmann, Matthias F.
Efficient Algorithms for Finding 2-Medians of a Tree
December 5, 2017


TR-2017-4
Zhang, Feng; Zhai, Jidong; Shen, Xipeng; Mutlu, Onur;
Potential of A Method for Text Analytics Directly on Compressed Data
November 13, 2017


TR-2017-3
Awasthi, A. and Battestilli, L.
Two-Stage Programming Projects: Individual Work Followed by Peer Collaboration
August 2, 2017


TR-2017-2
Hsu, Chin-Jung; Freeh, Vincent W.; Villanustre, Flavio
Workload-Aware Data Placement for Cloud Computing
June 5, 2017


TR-2017-1
N/A
N/A
May 1, 2017


2016

TR-2016-10
Fogues, Ricard L.; Murukannaiah, Pradeep K.; Such, Jose M.; Singh, Munindar P.
Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making
November 27, 2016


TR-2016-9
Hsu, Chin-Jung; Panta, Rajesh K.; Ra, Moo-Ryong; Freeh, Vincent W.
Inside-Out: Reliable Performance Prediction for Distributed Storage Systems in the Cloud
October 25, 2016


TR-2016-8
Matthias Stallmann; Jason Cockrell; Tynan Devries; Weijia Li; Alexander McCabe; Yuang Ni; Michael Owoc; Kai Pressler-Marshall;
Galant: A Graph Algorithm Animation Tool
August 10, 2016


TR-2016-7
Fiala, David; Mueller, Frank; Ferreira, Kurt B.
FlipSphere: A Software-based DRAM Error Detection and Correction Library for HPC
July 9, 2016


TR-2016-6
Matthias F, Stallmann
Edge Offset in Drawings of Layered Graphs With Evenly-Spaced Nodes on Each Layer
June 12, 2016


TR-2016-5
Zhao, Yue; Liao, Chunhua; Shen, Xipeng
Towards Ontology-Based Program Analysis
April 28, 2016


TR-2016-4
Stallmann, Matthias F
A Gentle Introduction to Matroid Algorithmics
April 14, 2016


TR-2016-3
Ning, Lin; Shen, Xipeng
LCD: A Fast Contrastive Divergence Based Training Algorithm for Restricted Boltzmann Machine
April 8, 2016


TR-2016-2
Gholkar, Neha; Mueller, Frank; Rountree, Barry
Power Tuning for HPC Jobs under Manufacturing Variations
February 5, 2016


TR-2016-1
Chen, Guoyang; Shen, Xipeng; Zhou, Huiyang
A Software Framework for Efficient Preemptive Scheduling on GPU
January 19, 2016


2015

TR-2015-10
Theisen, Christopher; Krishna, Rahul; Williams, Laurie
Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces
November 3, 2015


TR-2015-9
Elliotta, James; Hoemmen, Mark; Mueller, Frank
Model Driven Analysis of Faulty IEEE-754 Scalars
November 2, 2015


TR-2015-8
Alborzi, Farid; Chaudhuri, Surajit; Chirkova, Rada; Deo, Pallavi; Healey, Christopher; Pingale, Gargi; Reutter, Juan; Selvakani, Vaira
DataSlicer: Enabling Data Selection for Visual Data Exploration
October 16, 2015


TR-2015-7
Murphy-Hill, Emerson; Lee, Da Young ; Murphy, Gail C.; McGrenere, Joanna
Appendix to How Do Users Discover New Tools in Software Development and Beyond?
June 1, 2015


TR-2015-6
Alborzi, F; Chirkova, R; Doyle, J; Fathi, Y
Determining Query Readiness for Structured Data
March 26, 2015


TR-2015-5
Kc, Kamal; Freeh, Vincent W.
Dynamically controlling node-level parallelism in Hadoop
February 21, 2015


TR-2015-4
Kc, Kamal; Hsu, Chin-Jung; Freeh, Vincent W.
Evaluation of MapReduce in a large cluster
February 21, 2015


TR-2015-3
Ding, Yufei; Shen, Xipeng; Musuvathi, Madanlal; Mytkowicz, Todd
TOP: A Framework for Enabling Algorithmic Optimizations for Distance-Related Problems
January 10, 2015


TR-2015-2
Ding, Yufei; Shen, Xipeng; Musuvathi, Madanlal; Mytkowicz, Todd
Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup
January 10, 2015


TR-2015-1
Heckman, Sarah; Al-Zubidy, Ahmed; Carver, Jeffrey C.; Sherriff, Mark
A (Updated) Review of Empiricism at the SIGCSE Technical Symposium
January 5, 2015


2014

TR-2014-14
Morrison, Patrick; Moye, David; Williams, Laurie
Mapping the Field of Software Security Metrics
October 23, 2014


TR-2014-13
Kc, Kamal; Freeh, Vincent W.
Dynamic performance tuning of Hadoop
September 23, 2014


TR-2014-12
Poosamani, Nithyananthan ; Rhee, Injong
A Practical and Energy-efficient System to Discover Wi-Fi Hotspots Using Cellular Signals
September 12, 2014


TR-2014-11
Chen, L; Yu, T; Chirkova, R
WaveCluster with Differential Privacy
September 10, 2014


TR-2014-10
Nadkarni, A.; Sheth, A.; Weinsberg, U.; Taft, N.; Enck, W.
GraphAudit: Privacy Auditing for Massive Graph Mining
August 4, 2014


TR-2014-9
Telang, Pankaj R.; Singh, Munindar P.; Yorke-Smith, Neil
Maintenance Commitments and Goals
July 22, 2014


TR-2014-8
Shekhar, Mayank; Ramaprasad, Harini; Mueller, Frank
Semi-Partitioned Scheduling for Resource-Sharing Hard-Real-Time Tasks
July 1, 2014


TR-2014-7
Rezaei, Arash ; Mueller, Frank
DINO: Divergent Node Cloning for Sustained Redundancy in HPC
June 24, 2014


TR-2014-6
Matthias Stallmann; Jason Cockrell; Tynan Devries; Alexander McCabe; Michael Owoc
Galant: A Graph Algorithm Animation Tool
June 13, 2014


TR-2014-5
Adam Marrs, Benjamin Watson, Chris Healey
Fast Multi-View Soft Shadowing via Fragment Reprojection
May 13, 2014


TR-2014-4
St. Amant, Robert
The Use of Tools
May 24, 2001


TR-2014-3
Loftin, Robert; MacGlashan, James; Littman, Michael L.; Taylor, Matthew E.; Roberts, David L.
A Strategy-Aware Technique for Learning Behaviors from Discrete Human Feedback
February 25, 2014


TR-2014-2
Murukannaiah, Pradeep K.; Singh, Munindar P.
Platys: An Active Learning Framework for Place-Aware Application Development and Its Evaluation
September 28, 2014


TR-2014-1
Hsu, Chin-Jung; Freeh, Vincent W.
Flow Scheduling: An Ef?cient Scheduling Method for MapReduce Framework in the Decoupled Architecture
January 17, 2014


2013

TR-2013-11
Balik, S.; Mealin, S.; Stallmann, M.; Rodman, R.; Glatz, M.; Sigler, V.
Including Blind Students in Computer Science Through Access to Graphs
November 20, 2013


TR-2013-10
KC, Kamal; Freeh, Vincent W
Tuning Hadoop map slot value using CPU and IO metrics
November 6, 2013


TR-2013-9
Slankas, John; Riaz, Maria; King, Jason; Williams, Laurie
Discovering Security Requirements from Natural Language Project Artifacts
October 15, 2013


TR-2013-8
Chirkova, R.; Yu, T.
Obtaining Information about Queries behind Views and Dependencies
September 30, 2013


TR-2013-7
Balachander, D.; Chirkova, R.; Salo, T.
The Problem of Coherence of a Distributed Hash Table
June 19, 2013


TR-2013-6
Bae, JuHee; Setlur, Vidya; Watson, Benjamin
GraphTiles: Visualizing Graphs on Mobile Devices
April 23, 2013


TR-2013-5
Christensen, Johanne; Cusick, Mark; Villanes, Andrea; Veryovka, Oleg; Watson, Ben; Rappa, Michael
Win, Lose or Cheat: The Analytics of Player Behaviors in Online Games
April 22, 2013


TR-2013-4
Clay, Benjamin; Shen, Zhiming; Ma, Xiaosong
Building and Scaling Virtual Clusters with Residual Resources from Interactive Clouds
April 17, 2013


TR-2013-3
Li, Sihan; Xie, Tao; Tillmann, Nikolai
A Comprehensive Field Study of End-User Programming on Mobile Devices
March 20, 2013


TR-2013-2
Elliott, James; Mueller, Frank; Stoyanov, Miroslav; Webster, Clayton
Quantifying the Impact of Single Bit Flips on Floating Point Arithmetic
March 12, 2013


TR-2013-1
Chirkova, R.; Yu, T.
Detecting information leakage in database access control with help from data exchange
February 19, 2013


2012

TR-2012-16
Halladay, J.; Williams, Laurie; Voud, Mladen
On the Affordable Use, Administration, and Maintenance of Open Source Health Care IT Applications by Rural/Small-Practice Health Professionals
December 28, 2012


TR-2012-15
Chirkova, R.
Combined-Semantics Equivalence Is Decidable for a Practical Class of Conjunctive Queries
December 19, 2012


TR-2012-14
Slankas, John; Williams, Laurie
Extracting Database Role Based Access Control from Unconstrained Natural Language Text
November 2, 2012


TR-2012-13
Morrison, Patrick; Holmgreen, Casper; Massey, Aaron; Williams, Laurie
Building Regulatory-Driven Automated Test Suites
October 22, 2012


TR-2012-12
Tsung-Hsuan Ho, Daniel J. Dean, Xiaohui Gu, William Enck
Less is More: Selective Behavior Learning for Efficient Android Root Exploit Detection
September 21, 2012


TR-2012-11
Chung, Seungeun; Lee, Kyunghan; Wang, Shuiqing; Rhee, Injong
CloudBridge: A Cloud-Powered System Enabling Mobile Devices to Control Peripherals Without Drivers
July 24, 2012


TR-2012-10
Yoon, Sungro; Jung, Bang Chul; Lee, Kyunghan ; Rhee, Injong
ADOPT: Practical Add-On MIMO Receiver for Concurrent Transmissions
July 24, 2012


TR-2012-9
Riaz, Maria; Breaux, Travis; Williams, Laurie
On the Design of Empirical Studies to Evaluate Software Patterns: A Survey Study
June 14, 2012


TR-2012-8
Clay, Benjamin; Shen, Zhiming; Ma, Xiaosong; Gu, Xiaohui
Adaptive Cluster Sizing for Residual Resource Harvesting in Interactive Clouds
May 25, 2012


TR-2012-7
Carter, M.; Fornaro, R.; Heckman, S.; Heil, M.
Developing a Learning Progression that Integrates Communication in an Undergraduate CS/SE Curriculum
May 25, 2012


TR-2012-6
Jiang, Haiqing; Wang, Yaogong; Lee, Kyunghan; Rhee, Injong
Tackling Bufferbloat in 3G/4G Mobile Networks
March 9, 2012


TR-2012-5
Fiala, David; Mueller, Frank; Engelmann, Christian; Ferreira, Kurt; Brightwell, Ron; Riesen, Rolf;
Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing
May 1, 2012


TR-2012-4
Balik, Suzanne P.; Mealin, Sean P.; Stallmann, Matthias F.; Rodman, Robert D.
GSK: Universally Accessible Graph SKetching
April 26, 2012


TR-2012-3
Jiang, Haiqing; Wang, Yaogong; Lee, Kyunghan; Rhee, Injong
Improving TCP Performance in Buffer-bloated Cellular Networks via Dynamic Receive Window Adjustment
January 20, 2012


TR-2012-2
Huang, R. ; Chirkova, R.; Fathi, Y.
Deterministic View Selection For Data-Analysis Queries: Properties and Algorithms
April 3, 2012


TR-2012-1
Bahram, Sina
Touch It, Key It, Speak It for Maps
December 1, 2011


2011

TR-2011-22
Huang, R.; Chirkova, R.; Fathi, Y.
Two-stage stochastic view selection for data analysis
December 1, 2011


TR-2011-21
Yavua, A.; Ning, P.; Reiter, M.
Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging
September 12, 2011


TR-2011-20
Pensyl, T. ; Huang, R.
Generation of Non-Symmetric Synthetic Datasets
August 12, 2011


TR-2011-19
Miller, Sam A.; Smith, Andy; St. Amant, Robert
A glove for rubbing and touch gestures
July 12, 2011


TR-2011-18
Liu, Y.; Ning, P.
BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks
July 11, 2011


TR-2011-17
Liu, Y.; Ning, P.
Mimicry Attacks against Wireless Link Signature and Defense using Time-Synched Link Signature
July 11, 2011


TR-2011-16
Tran M.; Etheridge M. ; Bletsch T.; Jiang X.; Freeh V.; Ning P.
On the Expressiveness of Return-into-libc Attacks
June 21, 2011


TR-2011-15
Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
Detecting Capability Leaks in Android-based Smartphones
June 21, 2011


TR-2011-14
Kharbas, Kishor; Kim, Donghoon; KC, Kamal; Hoefler, Torsten; Mueller, Frank
Failure Detection within MPI Jobs: Periodic Outperforms Sporadic
June 15, 2011


TR-2011-13
Zimmer, Christopher; Mueller, Frank
A Fault Observant Real-Time Embedded Design for Network-on-Chip Control Systems
June 15, 2011


TR-2011-12
Zhang, Linghao; Xie, Tao; Tillmann, Nikolai; de Halleux, Jonathan; Ma, Xiaoxing; lv, Jian
Automated Testing of Cloud Applications
June 1, 2011


TR-2011-11
Sarkar, Abhik ; Mueller, Frank; Ramaprasad, Harini
Static Task Partitioning for Locked Caches in Multi-Core Real-Time Systems
April 23, 2011


TR-2011-10
Huang, R.; Chirkova, R.; Fathi, Y.
Synthetic datasets
April 7, 2011


TR-2011-9
Meneely, Andrew; Rotella, Pete; Williams, Laurie
Does Adding Manpower Also Affect Quality? An Empirical, Longitudinal Analysis
April 3, 2011


TR-2011-8
Huang, R.; Chirkova, R. ; Fathi, Y.
A Two-stage Stochastic View Selection Problem in Database Management Systems
March 19, 2011


TR-2011-7
Xiao, X; Paradkar, A; Xie, T
Automated Extraction and Validation of Security Policies from Natural-Language Documents
March 15, 2011


TR-2011-6
Wu, Xing; Vijayakumar, Karthik; Mueller, Frank; Ma, Xiaosong; Roth, Philip
Probabilistic Communication and I/O Tracing with Deterministic Replay at Scale
March 15, 2011


TR-2011-5
Smith, Ben; Williams, Laurie
On the Development of A Black Box Security Test Pattern Catalog Based on Empirical Data
March 7, 2011


TR-2011-4
Maxwell, Jeremy C.; Anton, Annie I.; Swire, Peter
A Legal Cross-References Taxonomy for Identifying Conflicting Software Requirements
February 23, 2011


TR-2011-3
Boloor, K; Chirkova, R; Viniotis, Y
Management of SOA based context-aware applications hosted in a distributed cloud subject to percentile constraints
February 22, 2011


TR-2011-2
Singh, Munindar P.
LoST: Local State Transfer---An Architectural Style for the Distributed Enactment of Business Protocols
February 21, 2011


TR-2011-1
Balik, Suzanne P
Combinatorial Graph Creation and Navigation for Blind People
February 4, 2011


2010

TR-2010-25
Srinivasan, D. ; Jiang, X.
Time-traveling Analysis of VM-based High-interaction Honeypots
October 15, 2010


TR-2010-24
Chirkova, R.
Equivalence and Minimization of Conjunctive Queries under Combined Semantics
December 7, 2010


TR-2010-23
Horton, Thomas E.; St. Amant, Robert; Daughtry, John M.; Butler, Colin G.
Tool-based direct manipulation environments
November 1, 2010


TR-2010-22
Massey, Aaron; Anton, Annie I.
Triage for Legal Requirements
October 11, 2010


TR-2010-21
Thummalapenta, Suresh; Xie, Tao
Alattin: Mining Alternative Patterns for Defect Detection
September 23, 2010


TR-2010-20
Doyle, Jon
Toward a quantitative theory of belief change: Structure, difficulty, and likelihood (A progress report)
September 7, 2010


TR-2010-19
Murphy-Hill, Emerson; Murphy, Gail C
Peer Interaction Effectively, yet Infrequently, Enables Programmers to Discover New Tools
September 6, 2010


TR-2010-18
Gerard, Scott N.; Singh, Munindar P.
Formalizing and Verifying Protocol Refinement
August 27, 2010


TR-2010-17
Heckman, Sarah; Williams, Laurie
A Systematic Literature Review of Actionable Alert Identification Techniques for Automated Static Code Analysis
July 23, 2010


TR-2010-16
Chirkova, R.; Libkin, L.; Reutter, J.
Tractable XML Data Exchange via Relations
July 19, 2010


TR-2010-15
Smith, Ben; Austin, Andrew; Brown, Matt ; King, Jason; Lankford,Jerrod; Meneely, Andrew ; Williams, Laurie
Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected
June 30, 2010


TR-2010-14
Stallmann, Matthias; Brglez, Franc
High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
June 24, 2010


TR-2010-13
Stallmann, Matthias F.; Gupta, Saurabh
Bottleneck Crossing Minimization in Layered Graphs
June 24, 2010


TR-2010-12
Telang, Pankaj R.; Singh, Munindar P.
Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach
May 30, 2010


TR-2010-11
Singh, Munindar P.; Farcas, Emilia; Tadanki, Kartik; Krueger, Ingolf; Arrott, Matthew; Meisinger, Michael
Governance in Sociotechnical Systems
April 30, 2010


TR-2010-10
Zhang, Lingming; Xie, Tao; Zhang, Lu; Tillmann, Nikolai; de Halleux, Jonathan; Mei, Hong
Test Generation via Dynamic Symbolic Execution for Mutation Testing
May 14, 2010


TR-2010-9
Marri, Madhuri; Thummalapenta, Suresh; Xie, Tao; Tillmann, Nikolai; de Halleux, Jonathan
Retrofitting Unit Tests for Parameterized Unit Testing
May 14, 2010


TR-2010-8
Bletsch, T; Jiang, X; Freeh, V
Jump-Oriented Programming: A New Class of Code-Reuse Attack
April 16, 2010


TR-2010-7
Xiao, Xusheng; Xie, Tao; Tillmann, Nikolai; de Halleux, Peli
Issue Analysis for Residual Structural Coverage in Dynamic Symbolic Execution
March 23, 2010


TR-2010-6
Shin, Yonghee; Williams, Laurie
Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction?
March 7, 2010


TR-2010-5
Boloor, K; Viniotis, Y; Chirkova, R; Salo, T
Online request scheduling subject to a percentile response time SLA in a distributed cloud computing system
March 4, 2010


TR-2010-4
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, and Dongyan Xu
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
February 28, 2010


TR-2010-3
Maxwell, Jeremy C.; Anton, Annie I.
A Refined Production Rule Model for Aiding in Regulatory Compliance
February 5, 2010


TR-2010-2
Meneely, Andrew; Smith, Ben; Williams, Laurie
Software Metrics Validation Criteria: A Systematic Literature Review
February 2, 2010


TR-2010-1
Austin, Andrew; Smith, Ben; Williams, Laurie
Towards Improved Security Criteria for Certification of Electronic Health Record Systems
January 24, 2010


2009

TR-2009-23
Hyun, Sangwon; Ning, Peng; Liu, An;
IR-Seluge: Interference-Resilient Code Dissemination in Wireless Sensor Networks
December 18, 2009


TR-2009-22
Wang, Yonghong; Singh, Munindar P.;
Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems
December 10, 2009


TR-2009-21
Singh, Munindar P.
Formalizing Trust as an Architectural Abstraction
December 9, 2009


TR-2009-20
Chopra, Amit K. ; Singh, Munindar P.;
Commitment Alignment as a Basis for Interoperability in Service Engagements
December 9, 2009


TR-2009-19
Hazard, Christopher J.; Singh, Munindar P.;
Reputation Dynamics and Convergence: A Basis for Evaluating Reputation Systems
November 23, 2009


TR-2009-18
Hang, Chung-Wei; Singh, Munindar P.
Trustworthy Service Selection and Composition
July 15, 2009


TR-2009-17
Gegick, Michael; Rotella, Pete; Xie, Tao
Identifying Security Fault Reports via Text Mining
September 2, 2009


TR-2009-16
Anton, Annie I.; Earp, Julia B.; Young, Jessica D.
How Internet Users’ Privacy Concerns Have Evolved Since 2002
July 29, 2009


TR-2009-15
Wang, Chao; Mueller, Frank; Engelmann, Christian; Scott, Stephen L.
Proactive Process-Level Live Migration and Back Migration in HPC Environments
June 5, 2009


TR-2009-14
Wang, Chao; Mueller,Frank ; Engelmann, Christian; Scott, Stephen L.;
Hybrid Full/Incremental Checkpoint/Restart for MPI Jobs in HPC Environments
June 2, 2009


TR-2009-13
Amit Awekar, ; Nagiza F. Samatova,; Paul Breimyer
Incremental All Pairs Similarity Search for Varying Similarity Thresholds
May 26, 2009


TR-2009-12
Amit Awekar; Nagiza F. Samatova
Fast Matching for All Pairs Similarity Search
May 26, 2009


TR-2009-11
Chirkova, R.; Fletcher, George H.L.
Towards Well-Behaved Schema Evolution
April 28, 2009


TR-2009-10
Shin, Yonghee; Meneely, Andrew; Williams, L.
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
April 19, 2009


TR-2009-9
Jadeep Marathe; Vivek Thakkar; Frank Mueller
Feedback-Directed Page Placement for ccNUMA via Hardware-generated Memory Traces
March 10, 2009


TR-2009-8
Kormilitsin, M.; Chirkova, R.; Fathi, Y.; Stallmann, M.
Systematic Exploration of Efficient Query Plans for Automated Database Restructuring
March 4, 2009


TR-2009-7
Afrati, F.; Chandrachud, M.; Chirkova, R.; Mitra, P.
Approximate Rewriting of Queries Using Views
March 4, 2009


TR-2009-6
Xie, Tao
Improving Automation in Developer Testing: State of the Practice
February 20, 2009


TR-2009-5
Liu, Y; Ning, P; Reiter, M
False Data Injection Attacks against State Estimation in Electronic Power Grids
February 16, 2009


TR-2009-4
Maxwell, Jeremey C; Anton, Annie I
Validating Existing Requirements for Compliance with Law Using a Production Rule Model
February 12, 2009


TR-2009-3
Michael Gegick; Tao Xie; Laurie Williams; Pete Rotella
Which Faults are Security Faults?
February 2, 2009


TR-2009-2
Shin, Kyuyong; Reeves, Douglas S.; Rhee, Injong; Song, Yoonki
Winnowing: Protecting P2P Systems Against Pollution By Cooperative Index Filtering
January 29, 2009


TR-2009-1
Gegick, Michael; Rotella, Pete; Williams, Laurie
Predicting Attack-prone Components
January 23, 2009


2008

TR-2008-29
Hang, Chung-Wei; Wang, Yonghong; Singh, Munindar P.
Operators for Propagating Trust and their Evaluation in Social Networks
December 13, 2008


TR-2008-28
Meneely, Andrew; Williams, Laurie
Evaluating a Suite of Developer Activity Metrics as Measures of Security Vulnerabilities
December 11, 2008


TR-2008-27
Chirkova, R.; Genesereth, M.
Equivalence of SQL Queries In Presence of Embedded Dependencies
December 11, 2008


TR-2008-26
Wang, Zhi; Jiang, Xuxian; Cui, Weidong; Wang, Xinyuan;
ReFormat: Automatic Reverse Engineering of Encrypted Messages
December 10, 2008


TR-2008-25
Maxwell, Jeremy C.; Anton, Annie I.
Using Production Rules to Aid Security Requirements Acquisition from Legal Texts
November 29, 2008


TR-2008-24
Young, Jessica D.; Anton, Annie I.
Analyzing Policy Commitments for Privacy and Security Requirements
November 12, 2008


TR-2008-23
Heckman, Sarah; Williams, Laurie
A Measurement Framework of Alert Characteristics for False Positive Mitigation Models
October 28, 2008


TR-2008-22
Smith, Ben; Williams, Laurie
A Survey on Code Coverage as a Stopping Criterion for Unit Testing
September 28, 2008


TR-2008-21
Williams, Laurie; Gegick, Michael; Meneely, Andrew
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
September 25, 2008


TR-2008-20
Prasanth Anbalagan; Mladen Vouk
Reliability and Security Analysis of Open Source Software
September 19, 2008


TR-2008-19
Chen, D.; Chirkova, R.; Sadri, F.; Salo, T.
Efficient Query Processing in XML-Based Information Integration
July 31, 2008


TR-2008-18
Kormilitsin, M.; Chirkova, R.; Fathi, Y.; Stallmann, M.
Plan-based View and Index Selection for Query-Performance Improvement
July 31, 2008


TR-2008-17
Watson, Benjamin; Brink, David; Stallmann, Matthias; Devajaran, Ravinder; Rakow, Matt,; Rhyne, Theresa-Marie; Patel, Himesh
Matrix depictions for large layered graphs
July 16, 2008


TR-2008-16
Injong Rhee; Minsu Shin; Seongik Hong; Kyunghan Lee; Song Chong
On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
May 23, 2008


TR-2008-15
Kyunghan Lee; Seongik Hong; Seong Joon Kim; Injong Rhee; Song Chong;
Demystifying Levy Walk Patterns in Human Walks
May 23, 2008


TR-2008-14
Ajiw Warrier; Injong Rhee
DiffQ: Differential Backlog Congestion Control for Wireless Multi-Hop Networks
May 23, 2008


TR-2008-13
Mohan, Sibin; Mueller, Frank
Preserving Timing Anomalies in Pipelines of High-End Processors
May 19, 2008


TR-2008-11
Heckman, Sarah Smith; Williams, Laurie
On Establishing a Benchmark for Evaluating Static Analysis Alert Prioritization and Classification Techniques
April 24, 2008


TR-2006-36
Bonto-Kane, Marivic A.
Engineering Models of Human Performance on the Design of Mobile Device Interfaces
November 29, 2006


TR-2008-10
Watson, B.; Brink, D.; Stallman, M.; Devajaran, D.; Rhyne, T.-M.; Patel, H.
Visualizing very large layered graphs with quilts
April 8, 2008


TR-2008-9
Smith, Ben; Williams, Laurie
On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis
February 28, 2008


TR-2008-8
Michael Gegick; Laurie Williams; Jason Osborne
Predicting Attack-prone Components with Internal Metrics
February 25, 2008


TR-2008-7
Gegick, Michael; Williams, Laurie; Vouk, Mladen
Predictive Models for Identifying Software Components Prone to Failure During Security Attacks
February 25, 2008


TR-2008-6
Travis Breaux, Jonathan Lewis, Paul Otto, Annie I. Anton
Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings
February 12, 2008


TR-2008-5
Breaux, Travis D.; Anton, Annie I.; Boucher, Kent; Dorfman, Merlin
Legal Requirements, Compliance and Practice: An Industry Case Study in Accessibility
February 11, 2008


TR-2008-4
Shin, Yonghee; Williams, Laurie
Towards a Taxonomy of Techniques to Detect Cross-Site Scripting and SQL Injection Vulnerabilities
February 2, 2008


TR-2008-3
Udupi, Yathiraj B.; Singh, Munindar P.
Design Patterns for Policy-Based Service Engagements
January 20, 2008


TR-2008-2
Desai, Nirmit; Chopra, Amit K. ; Singh, Munindar P.
Amoeba: A Methodology for Modeling and Evolution of Cross-Organizational Business Processes
May 4, 2008


TR-2008-1
Hu, Vincent C.; Kuhn, D. Richard; Xie, Tao;
Property Verification for Access Control Models via Model Checking
January 4, 2008


2007

TR-2007-36
Liu, An; Ning, Peng
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
November 2, 2007


TR-2007-35
Acharya, Mithun; Xie, Tao
Static Detection of API Error-Handling Bugs via Mining Source Code
October 15, 2007


TR-2007-34
Thummalapenta, Suresh; Xie, Tao
SpotWeb: Characterizing Framework API Usages Through a Code Search Engine
October 15, 2007


TR-2007-33
Lechner, Tom; Watson, Benjamin; Wilensky, Uri; Tisue, Seth; Felsen, Martin; Moddrell, Andy; Ren, Pin; Brozefsky, Craig
Procedural Modeling of Urban Land Use
October 4, 2007


TR-2007-32
Kormilitsin, M.; Chirkova, R.; Fathi, Y.; Stallmann, M.
View and Index Selection for Query-Performance Improvement: Algorithms, Heuristics and Complexity
October 2, 2007


TR-2007-31
Asgharzadeh Talebi, Z.; Chirkova, R.; Fathi, Y.; Stallmann, M.
Exact and Inexact Methods for Selecting Views and Indexes for OLAP Performance Improvement.
October 2, 2007


TR-2007-30
Chirkova, R.; Chen, D.; Sadri, F.; Salo, T.J.
Pay-As-You-Go Information Integration: The Semantic Model Approach
October 2, 2007


TR-2007-29
Warrier, A; Rhee, I
Rethinking Wireless MAC Architecture for Quality of Service Support – Design and Implementation
September 21, 2007


TR-2007-28
Rhee, I; Shin, M; Hong, S; Lee, K; Chong, S
On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
September 21, 2007


TR-2007-27
Asgharzadeh Talebi, Z.; Chirkova, R.; Fathi, Y.
Exact and Inexact Methods for Solving the Problem Of View Selection for Aggregate Queries
September 20, 2007


TR-2007-26
Breaux,Travis D.; Antón, Annie I.
Managing Ambiguity and Traceability in Regulatory Requirements: A Tool-supported Frame-based Approach
September 14, 2007


TR-2007-25
Martin, E; Xie, T; Hu, V
Assessing Quality of Policy Properties in Verification of Access Control Policies
September 16, 2007


TR-2007-24
Thummalapenta, S; Xie, T
NEGWeb: Static Defect Detection via Searching Billions of Lines of Open Source Code
September 16, 2007


TR-2007-23
Lin, Heshan; Ma, Xiaosong; Li, Jiangtian; Samatova, Nagiza; Yu, Ting
Processor and Data Scheduling for Online Parallel Sequence Database Servers
August 20, 2007


TR-2007-22
Ramaprasad, Harini; Mueller, Frank
Bounding Worst-Case Response Time for Tasks With Non-Preemptive Regions
August 8, 2007


TR-2007-21
Hyun, Sangwon; Ning, Peng; Liu, An; Du, Wenliang; ;
Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
August 5, 2007


TR-2007-20
Williams, Laurie
Lessons Learned from Seven Years of Pair Programming at North Carolina State University
August 3, 2007


TR-2007-19
Singh, Munindar P.; Chopra, Amit K.; Desai, Nirmit
Commitment-Based SOA
July 18, 2007


TR-2007-18
Zheng, Jiang; Williams, Laurie; Robinson, Brian
Pallino: Automation to Support Regression Test Selection for COTS-based Applications
June 26, 2007


TR-2007-17
Park, Young Hee; Reeves, Douglas S.
Adaptive TIming-Based Active Watermarking for Attack Attribution Through Stepping Stones
June 26, 2007


TR-2007-16
St. Amant, Robert; Horton, Thomas E.
Revisiting the Definition of Animal Tool Use
June 1, 2007


TR-2007-15
Wang, C; Liu, A; Ning, P
Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks
June 4, 2007


TR-2007-14
Stallmann, Matthias F; Brglez, Franc
High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
May 3, 2007


TR-2007-13
Sherriff, Mark; Lake, Michael; Williams, Laurie
Empirical Software Change Impact Analysis using Singular Value Decomposition
April 29, 2007


TR-2007-12
Asgharzadeh Talebi, Z.; Chirkova, R.; Fathi, Y.
A study of a formal model for view selection for aggregate queries
March 27, 2007


TR-2007-11
Desai, Nirmit; Chopra, Amit K.; Arrott, Matthew; Specht, Bill; Singh, Munindar P.
Engineering Foreign Exchange Processes via Commitment Protocols
March 1, 2007


TR-2007-10
M. Latif and R. Ramaseshan and F. Mueller
Soft Error Protection via Fault-Resilient Data Representations
March 12, 2007


TR-2007-9
Breaux,Travis D. ; Anton, Annie I.;
Analyzing Regulatory Rules for Privacy and Security Requirements
February 23, 2007


TR-2007-8
Martin, Evan; Xie, Tao
Automated Test Generation for Access Control Policies via Change-Impact Analysis
February 19, 2007


TR-2007-7
Otto, Paul N. ; Antón, Annie I. ;
The Role of Law in Requirements Engineering
February 12, 2007


TR-2007-6
Breaux, Travis D.; Anton, Annie I.;
Impalpable Constraints: Framing Requirements for Formal Methods
February 12, 2007


TR-2007-5
Min Yeol Lim; Vincent W. Freeh
Determining the Minimum Energy Consumption using Dynamic Voltage and Frequency Scaling
January 23, 2007


TR-2007-4
Vincent W. Freeh; Tyler K. Bletsch; Freeman L. Rawson, III
Scaling and Packing on a Chip Multiprocessor
January 22, 2007


TR-2007-3
Li, Jiangtian; Ma, Xiaosong; Yoginath, Srikanth; Kora, Guruprasad; Samatova, Nagiza
Automatic, Transparent Runtime Parallelization of the R Scripting Language
January 19, 2007


TR-2007-2
Layman, Lucas Layman; Williams, Laurie; St. Amant, Robert
Toward Reducing Fault Fix Time: Understanding Developer Behavior for the Design of Automated Fault Detection Tools, the Full Report
January 15, 2007


TR-2007-1
Nagarajan, Arun ; Mueller, Frank
Proactive Fault Tolerance for HPC with Xen Virtualization
January 4, 2007


2006

TR-2006-34
Nachiappan Nagappan; Laurie Williams; Mladen Vouk; Jason Osborne
Using In-Process Testing Metrics to Estimate Post-Release Field Quality of Java Programs
December 29, 2006


TR-2006-33
Mu, Wei
Towards a Computational Model of Image Schema Theory
November 29, 2006


TR-2006-32
Williams, Lloyd
Survey of Tool Use and Analysis of its Implications for the Design of Robotic Tool Users
November 29, 2006


TR-2006-31
Horton, Thomas E
Behavior-based approaches to vision in habile robotics
November 29, 2006


TR-2006-30
Ho, Chih wei; Williams, Laurie
Deriving Performance Requirements and Test Cases with the Performance Refinement and Evolution Model
November 20, 2006


TR-2006-29
Chen, D. ; Chirkova, R.; Sadri, F.
designing an information integration and interoperability system - first steps
October 19, 2006


TR-2006-28
Ho, Chih-wei; Williams, Laurie
Managing Software Performance Engineering Activities with the Performance Refinement and Evolution Model (PREM)
September 26, 2006


TR-2006-27
Breaux, Travis D,; Anton, Annie I.
Acquiring Software Compliance Artifacts from Policies and Regulations
September 8, 2006


TR-2006-26
Irwin, Keith; Yu, Ting; William H. Winsborough
On the Modeling and Analysis of Obligations
August 25, 2006


TR-2006-25
Ho, Chih-wei; Williams, Laurie
An Introduction to Performance Testing
August 20, 2006


TR-2006-24
Miller, Randy; Williams, Laurie
Personas: Moving Beyond Role-Based Requirements Engineering
August 19, 2006


TR-2006-23
Gegick, Michae; Isakson, Eric; Williams, Laurie
An Early Testing and Defense Web Application Framework for Malicous Input Attacks
August 19, 2006


TR-2006-22
Janvi Badlaney; Rohit Ghatol; Romit Jadhwani
An Introduction to Data-Flow Testing
August 9, 2006


TR-2006-21
Shin, Yonghee; Williams, Laurie; Xie, Tao
SQLUnitGen: Test Case Generation for SQL Injection Detection
August 6, 2006


TR-2006-20
Ma, Xiaosong ; Vazhkudai, Sudharshan S. ; Freeh, Vincent W. ; Yang, Tao ; Simon, Tyler A. ; Scott, Stephen L.
Coupling Prefix Caching and Collective Downloads for Remote Dataset Access
July 25, 2006


TR-2006-19
Lim, Min Yeol; Freeh, Vincent W.; Lowenthal, David K
Adaptive, Transparent Frequency and Voltage Scaling of Communication Phases in MPI Programs
July 25, 2006


TR-2006-18
Otto, Paul N.; Anton, Annie I.; Baumer, David L.
The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
July 1, 2006


TR-2006-17
Kailasam, Gayathri Tambaram ; Kang, Jaewoo
Efficient SKYCUBE Computation using Bitmaps
July 12, 2006


TR-2006-16
Koudas, Nick; Srivastava, Divesh; Yu, Ting; Zhang, Qing
Aggregate Query Answering on Anonymized Tables
July 10, 2006


TR-2006-15
Huang,S.; Dutta,R.
Dynamic Traffic Grooming: The Changing Role of Traffic Grooming
July 7, 2006


TR-2006-14
Breaux, Travis; Anton, Annie I.; Spafford, Eugene H.
A Distributed Requirements Management Framework for Compliance
June 15, 2006


TR-2006-13
Smith, Daniel M.; Freeh, Vincent W.; Mueller, Frank
Asymmetric Multiprocessing for Simultaneous Multithreading Processors
June 20, 2006


TR-2006-12
Evan Martin; Tao Xie
Automated Mutation Testing of Access Control Policies
May 6, 2006


TR-2006-11
Wang, Yonghong; Singh, Munindar P.
Trust via Evidence Combination: A Mathematical Approach Based on Certainty
May 1, 2006


TR-2006-10
Dev, K.; Chirkova, R.
Concurrency control in distributed caching
April 13, 2006


TR-2006-9
Breaux, Travis D. ; Anton, Annie I.;
An Algorithm to Generate Compliance Monitors from Regulations
March 3, 2006


TR-2006-8
Martin, E; Xie, T; Yu, T
Defining and Measuring Policy Coverage in Testing Access Control Policies
March 1, 2006


TR-2006-7
Freeh, Vincent W.; Ma, Xiaosong; Vazhkudai, Sudharshan S.; Strickland, Jonathan W.
{Controlling Impact while Aggressively Scavenging Idle Resources
February 20, 2006


TR-2006-6
Breaux, Travis D.; Anton, Annie I. ; Vail, Matthew W.
Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations
February 13, 2006


TR-2006-5
Gou, G.; Kormilitsin, M.; Chirkova, R.
Query evaluation using overlapping views: completeness and efficiency
February 12, 2006


TR-2006-4
Gegick, Michael; Williams, Laurie
Launching Automated Security Attacks through Unit-level Penetration Testing
February 7, 2006


TR-2006-3
Springer IV, Robert C.; Lowenthal, David K.; Rountree, Barry ; Freeh, Vincent W.
{Minimizing Execution Time in MPI Programs on an Energy-Constrained, Power-Scalable Cluster
February 2, 2006


TR-2006-2
Zohreh Asgharzadeh Talebi; Rada Chirkova; Yahya Fathi
A Study of a Formal Model For View Selection for Aggregate Queries
January 5, 2006


TR-2006-1
Jetley, Raoul; Iyer, Purush; Jones, Paul
An Approach to Revieiwng Software in Medical Devices
January 1, 2006


2005

TR-2005-49
Sbeity, Ihab; Brenner, Leonardo; Plateau, Brigitte; Stewart, William J.
Phase-Type Distributions in Stochastic Automata Networks
December 20, 2005


TR-2005-48
Ramaprasad, Harini; Mueller, Frank
Tightening the Bounds on Feasible Preemption Points
December 19, 2005


TR-2005-47
Breaux, Travis D. ; Anton, Annie I. ; Karat, Clare-Marie; Karat, John
Enforceability vs. Accountability in Electronic Policies
December 10, 2005


TR-2005-46
Krebs, Williams; Ho, Chih-wei; Williams, Laurie; Layman, Lucas
Rational Unified Process Evaluation Framework Version 1.0
December 1, 2005


TR-2005-45
Sherriff, Mark; Boehm, Barry; Williams, Laurie; Nagappan, Nachiappan
An Empirical Process for Building and Validating Software Engineering Parametric Models
October 19, 2005


TR-2005-44
Srikanth, Hema; Williams, Laurie; Osborne, Jason
Towards the Prioritization of System Test Cases
October 11, 2005


TR-2005-43
Zhang, Q; Yu, T
A Frameworkfor Identifying Compromised Nodes in Sensor Networks
September 25, 2005


TR-2005-42
He, Qingfeng; Antón, Annie I.
Integrating Access Control Policy Specification into the Software Development Process
September 9, 2005


TR-2005-41
Dennis, Brent M.; Healey, Christopher G.
A Survery of Preference Elicitation
September 5, 2005


TR-2005-40
Layman, Lucas; Cornwell, Travis; Williams, Laurie; Osborne, Jason
Personality Profiles and Learning Styles of Advanced Undergraduate Computer Science Students
August 29, 2005


TR-2005-39
Ning, P.; Liu, A.; Du, W.;
Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks
August 23, 2005


TR-2005-38
Zheng, Jiang; Robinson, Brian; Williams, Laurie; Smiley, Karen
A Lightweight Process for Change Identification and Regression Test Selection in Using COTS Components
July 28, 2005


TR-2005-37
Vazhkudai, Sudharshan S. ; Ma, Xiaosong ; Freeh, Vincent W. ; Strickland, Jonathan W. ; Tammineedi, Nandan ; Stephen L. Scott
FreeLoader: Scavenging Desktop Storage Resources for Scientific Data
July 27, 2005


TR-2005-36
Kappiah, Nandini; Freeh, Vincent W.; Lowenthal, David K.
{Just In Time Dynamic Voltage Scaling: Exploiting Inter-Node Slack to Save Energy in MPI Programs
July 27, 2005


TR-2005-35
Kocherlakota, Sarat M.; Healey, Christopher G.
Summarization Techniques for Visualization of Large, Multidimensional Datasets
July 21, 2005


TR-2005-34
Asgharzadeh Talebi, Z.; Chirkova, R.; Fathi, Y.
Experimental Study of an IP Model for the View Selection Problem
July 20, 2005


TR-2005-33
Seo, Sungbo; Kang, Jaewoo; Lee, Dongwon; Ryu, Keun H.
Adaptive Framework for Multivariate Stream Data Processing in Data-Centric Sensor Applications
July 20, 2005


TR-2005-32
Sawant, Amit P.; Healey, Christopher G.
A Survey of Display Device Properties and Visual Acuity for Visualization
July 19, 2005


TR-2005-31
Breaux, Travis D. ; Anton, Annie I.
Mining Rule Semantics to Understand Legislative Compliance
June 23, 2005


TR-2005-30
Kang, Jaewoo
Data Models for Exploratory Analysis of Heterogeneous Microarray Data
July 16, 2005


TR-2005-29
Kang, Jaewoo; Han, Tae S; Lee, Dongwon; Mitra, Prasenjit;
Establishing Value Mappings Using Statistical Models and User Feedback
July 16, 2005


TR-2005-28
Kang, Jaewoo; Lee, Dongwon; Mitra, Prasenjit
Identifying Value Mappings for Data Integration: An Unsupervised Approach
July 16, 2005


TR-2005-27
Zhai, Yan; Ning, Peng; Xu, Jun
Integrating IDS Alert Correlation and OS-Level Dependency Tracking
June 30, 2005


TR-2005-26
Zheng, Jiang; Williams, Laurie; Nagappan, Nachiappan; Snipes, Will; Hudepohl, John; Vouk, Mladen
A Study of Static Analysis for Fault Detection in Software
June 19, 2005


TR-2005-25
Shaker, Ayman; Reeves, Douglas S.
Self-Stabilizing Structured Ring Topology P2P Systems
June 17, 2005


TR-2005-24
Bilgin, A.; Chirkova, R.; Singh, M.; Salo, T.
Deterministic Prefetching for Container-Managed Persistence
June 1, 2005


TR-2005-23
Donggang Liu; Peng Ning; Wenliang Du;
Group-Based Key Pre-Distribution in Wireless Sensor Networks
May 26, 2005


TR-2005-22
Gou, Gang; Chirkova, Rada
XML Query Processing: A Survey
May 11, 2005


TR-2005-21
Injong Rhee
Randomized Dining Philosophers to TDMA Scheduling
February 28, 2005


TR-2005-20
Femal, Mark E.; Freeh, Vincent W.
Boosting Data Center Performance Through Non-Uniform Power Allocation
April 20, 2005


TR-2005-19
Strickland, Jonathan W. ; Freeh, Vincent W. ; Ma, Xiaosong ; Vazhkudai, Sudharshan S.
Governor: Autonomic Throttling for Aggressive Idle Resource Scavenging
April 20, 2005


TR-2005-18
Freeh, Vincent W. ; Lowenthal, David K. ; Pan, Feng ; Kappiah, Nandani
Using Multiple Energy Gears in MPI Programs on a Power-Scalable Cluster
April 20, 2005


TR-2005-17
Breaux, Travis; Niehaus, James
Requirements for a Policy-enforceable Agent Architecture
May 14, 2005


TR-2005-16
Yang, Tao; Ma, Xiaosong; Mueller, Frank
Predicting Parallel Applications' Performance Across Platforms Using Partial Execution
March 21, 2005


TR-2005-15
St. Amant, Robert; Wood, Alexander
Tool Use for Autonomous Agents
March 19, 2005


TR-2005-14
Afrati, F; Chirkova, R; Mitra, P
Information about Queries Obtained by a Set of Views
February 28, 2005


TR-2005-13
Layman, Lucas; Williams, Laurie; Damian, Daniela; Buresc, Hynek
Conjectures of Informal Communication-Centric Practices Observed in a Distributed Software Development Team
February 28, 2005


TR-2005-12
Li, J.; Chirkova, R.; Fathi, Y.
An IP Model for the View Selection Problem
February 26, 2005


TR-2005-11
Pai Peng, Peng Ning, Douglas S. Reeves, and Xinyuan Wang
Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
February 25, 2005


TR-2005-10
Xinyuan Wang, Douglas S. Reeves, Peng Ning, and Fang Feng
Robust Network-Based Attack Attribution through Probabilistic Watermarking of Packet Flows
February 25, 2005


TR-2005-9
He, Qingfeng; Antón, Annie I.
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
February 16, 2005


TR-2005-8
Breaux, Travis ; Anton, Annie
Analyzing Goal Semantics for Rights, Permissions, and Obligations
February 15, 2005


TR-2005-7
Kohli, Pooja; Chirkova, Rada Y.
Cache Invalidation and Propagation in Distributed Caching
February 15, 2005


TR-2005-6
Pan, Feng; Freeh, Vincent W.; Smith, Daniel M.
Exploring the Energy-Time Tradeoff in High-Performance Computing
February 1, 2005


TR-2005-5
Femal, Mark E. ; Freeh, Vincent W.
Safe Overprovisioning: Using Power Limits to Increase Aggregate Throughput
February 1, 2005


TR-2005-4
Freeh, Vincent W.; Lowenthal, David K.; Pan, Feng; Kappiah, Nandini; Springer, Rob;
Exploring the Energy-Time Tradeoff in MPI Programs on a Power-Scalable Cluster
February 1, 2005


TR-2005-3
Kim, K.; Chirkova, R.
View-Size Estimation in Self-Organizing Databases
January 24, 2005


TR-2005-2
Jiang Zheng; Laurie Williams; Nachiappan Nagappan; Will Snipes; John Hudepohl ; Mladen Vouk1; Kiem Ngo;
On the Effectiveness of Static Analysis Tools for Fault-Detection
January 11, 2005


TR-2005-1
Evan Martin; Karen Smiley
Experiment and Comparison of Automated Static Code Analyzers and Automated Dynamic Tests
January 11, 2005


2004

TR-2004-35
Zhu, Yifan; Mueller, Frank
Feedback EDF Scheduling Exploiting Hardware-Assisted Asynchronous Dynamic Voltage Scaling
December 15, 2004


TR-2004-34
Desai, Nirmit ; Mallya, Ashok U. ; Chopra, Amit K. ; Singh, Munindar P.
Processes = Protocols + Policies
November 15, 2004


TR-2004-33
Lobo, Ruben; Bitzer, Donald; Vouk, Mladen
Locally Invertible m-Dimensional Convolutional Codes
November 23, 2004


TR-2004-32
Lobo, Ruben; Bitzer, Donald; Voul, Mladen
Inverses of Multivariate Polynomial Matrices using Discrete Convolution
November 23, 2004


TR-2004-31
Berenson, Sarah; Slaten, Kelli; Williams, Laurie; Ho, Chih wei
Voices of Women in a Software Engineering Course: Reflections on Collaboration
November 18, 2004


TR-2004-30
Breaux, Travis
Policy-Parametric Software
November 17, 2004


TR-2004-29
Liu, Donggang; Ning, Peng; Du, Wenliang
Attack-Resistant Location Estimation in Sensor Networks
March 15, 2004


TR-2004-28
Chirkova, R.; Afrati, F.; Gergatsoulis, M.; Pavlaki, V.
Designing Views to Answer Queries under Set, Bag, and Bag-Set Semantics
October 20, 2004


TR-2004-27
Wu, Kehang; Reeves, Douglas S.
Capacity Planning of Survivable MPLS Networks Supporting DiffServ
April 1, 2004


TR-2004-26
Afrati, F.; Chirkova, R.; Gupta, S.; Loftis, C.
Designing and Using Views to Improve Performance of Aggregate Queries
September 9, 2004


TR-2004-25
Zhai, Yan; Ning, Peng; Iyer, Purush; Reeves, Douglas
Reasoning about Complementary Intrusion Evidence
September 8, 2004


TR-2004-24
Qingfeng He, Annie Antón
Deriving Access Control Policies from Requirements Specifications and
September 2, 2004


TR-2004-23
Layman, Lucas; Williams, Laurie; Cunningham, Lucas
Motivations and Measurements in an Agile Case Study
August 26, 2004


TR-2004-22
Qingfeng He, Annie I. Antón
A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering
August 3, 2004


TR-2004-21
Anton, Annie I.; Earp, Julia B.; Vail, Matthew W.; Jain, Neha; Gheen, Carrie; Frink, Jack
An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA
July 24, 2004


TR-2004-20
Chih-wei Ho; Kelli Slaten; Laurie Williams; Sarah Berenson
Examining the Impact of Pair Programming on Female Students
June 17, 2004


TR-2004-19
William Stufflebeam, Annie I. Antón, Qingfeng He, and Neha Jain
Specifying Privacy Policies with P3P and EPAL: Lessons Learned
June 17, 2004


TR-2004-18
Williams, Laurie A.; Layman, Lucas; Krebs, William
Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.4
June 17, 2004


TR-2004-17
Tateosian, Laura G.; Healey, Christopher G.
NPR: Art Enhancing Computer Graphics
May 27, 2004


TR-2004-16
Chen, Bensong; Dutta, Rudra; Rouskas, George N
Traffic Grooming in Star Networks
May 24, 2004


TR-2004-15
Anantaraman, Aravindh; Seth, Kiran; Patil, Kaustubh; Rotenberg, Eric; Mueller, Frank
Exploiting VISA for Higher Concurrency in Safe Real-Time Systems
May 3, 2004


TR-2004-14
Rhee, Injong; Lee, Jangwon
Distributed Scalable TDMA Scheduling Algorithm}
April 26, 2004


TR-2004-13
Rhee, Injong; Lee, Jangwon
Energy-efficient Route-aware MAC protocols for Diffusion-based Sensor Networks
April 26, 2004


TR-2004-12
Sarah Berenson; Kelli M. Slaten; Laurie Williams;
Collaboration through Agile Software Development Practices: Student Interviews and Lab Observations
April 26, 2004


TR-2004-11
Williams, Laurie; Krebs, William; Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.3
April 6, 2004


TR-2004-10
Jackson, Laura E.; Stallmann, Matthias F.
Directional p-Median in Two Dimensions is NP-Complete
March 16, 2004


TR-2004-9
Nagarajan, Anita; Marathe, Jaydeep; Mueller, Frank
Detailed Cache Coherence Characterization for OpenMP Benchmarks
March 2, 2004


TR-2004-8
Layman, Lucas; Williams, Laurie; Cunningham, Lynn
Exploring Extreme Programming in Context: An Industrial Case Study
February 29, 2004


TR-2004-7
Jain, Neha ; Antón, Annie I. ; Stufflebeam, William H. ; He, Qingfeng
Privacy Goal Management Tool (PGMT) Software Requirements Specification
February 24, 2004


TR-2004-6
Su, Jie; Reeves, Douglas S
Replica Placement with Latency Constraints in Content Distribution Networks
February 9, 2004


TR-2004-5
Nagappan, Nachiappan; Williams, Laurie; Vouk, Mladen; Osborne, Jason
Initial Results of Using In-Process Testing Metrics to Estimate Software Reliability
January 25, 2004


TR-2004-4
Jiang, Qinglin; Reeves, Douglas S.; Ning, Peng
Certificate Recommendations to Improve Robustness of Webs of Trust
January 21, 2004


TR-2004-3
Williams, Laurie; Layman, Lucas; Krebs, William; Antón, Annie
Exploring the Use of a “Safe Subset” of Extreme Programming: An Industrial Case Study
January 20, 2004


TR-2004-2
Williams, Laurie; Krebs, William; Layman, Lucas; Anton, Annie
Toward a Framework for Evaluating Extreme Programming
January 15, 2004


TR-2004-1
Williams, Laurie; Krebs, William; Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.2
January 5, 2004


2003

TR-2003-22
Bicici, Ergun; St. Amant, Robert
Reasoning about the functionality of tools and physical artifacts
April 14, 2003


TR-2003-21
Antón, Annie I.; He, Qingfeng
The Complexity Underlying JetBlue’s Privacy Policy Violations
October 23, 2003


TR-2003-20
Williams, Laurie A.; Krebs, William; Layman, Lucas
Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.1
October 8, 2003


TR-2003-19
Jiang, Q; Reeves, D; Ning, P;
Improving Robustness of PGP Keyrings by Conflict Detection
October 2, 2003


TR-2003-18
William, Laurie; Krebs, William; Layman, Lucas; Antón, Annie I.
Toward an XP Evaluation Framework
September 22, 2003


TR-2003-17
Antón, Annie I.; Bolchini, Davide; He, Qingfeng
The Use of Goals to Extract Privacy and Security Requirements from Policy Statements
September 23, 2003


TR-2003-16
Ning, P.; Xu, D.
Learning Attack Strategies from Intrusion Alerts
August 19, 2003


TR-2003-15
Nagappan, Nachiappan; Sherriff, Mark; Williams, Laurie
On the Feasibility of Using Operational Profiles to Determine Software Reliability in Extreme Programming
August 19, 2003


TR-2003-14
Anton, Annie I.; Earp, Julia B.; Bolchini, Davide; He, Qingfeng; Jensen, Carlos; Stufflebeam, William
The Lack of Clarity in Financial Privacy Policies and the Need for Standardization
August 1, 2003


TR-2003-13
Zhu, Yifan; Mueller, Frank
Feedback Dynamic Voltage Scaling DVS-EDF Scheduling: Feedback Dynamic Voltage Scaling DVS-EDF Scheduling: Correctness and PID-Feedback
June 25, 2003


TR-2003-12
Singh, Munindar P.
Distributed Enactment of Multiagent Flows
May 6, 2003


TR-2003-11
Srikanth,Hema; Anton, Annie;
Towards Achieving a Balance between Planning and Agility in Software Developm
April 5, 2003


TR-2003-10
Ning, P; Peng, P; Hu, Y; Xu, D
TIAA: A Visual Toolkit for Intrusion Alert Analysis
March 31, 2003


TR-2003-09
He, Q
Privacy Enforcement with an Extended Role-Based Access Control Model
February 28, 2003


TR-2003-08
Liu, D; Ning, P
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
March 1, 2003


TR-2003-07
Ning, P; Sun, K
How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
February 12, 2003


TR-2003-06
He, Qingfeng; Anton, Annie I.
A Privacy Protection Comparison of Popular Web Browsers
July 1, 2002


TR-2003-05
Haygood, Hal; He, Qingfeng; Smith, Shane; Snare, Jodi
A Privacy-Aware Database Interface
December 10, 2002


TR-2003-04
Williams, Laurie A.; Shukla, Anuja; Anton, Annie
Pair Programming and the Factors Affecting Brooks' Law
January 31, 2003


TR-2003-03
Liu, D.; Ning, P.; Sun, K.
Efficient and Self-Healing Group Key Distribution with Revocation Capability
January 28, 2003


TR-2003-02
Nagappan, Nachiappan; Baheti, Prashant; Williams, Laurie; Gehringer, Edward; Stotts, David
Virtual Collaboration through Distributed Pair Programming
January 10, 2003


TR-2003-01
Weibe, Eric; Williams, Laurie; Yang, Kai; Miller, Carol
Computer Science Attitude Survey
January 10, 2003