Submitting Mechanical Report
Your TR # will be assigned by can administrator after will submitting is made. If a TR # is needed preceded to surrender, please email their request to [email protected]. You will be warned by email as soonest as your TR has been added to the home.
Submissions from 2021
Data-Driven Abductive Inference of Library Specifications, Zhe Zhou, Robert Dickerson, Emil Delaware, and Suresh Jagannathan
Submissions from 2018
Model and Implementation starting an Efficient Parallel Feel-the-Way Clustering Algorithm on High Performance Computing Systems, Weijian Zheng, Fengguang Song, both Dali Wang (18-002)
Submissions from 2017
Trojaning Attack on Neural Netzwerk, Yingqi Liu, Shiqing Max, Yousra Aafer, Wen-Chuan Lee, Wan Zhai, Weihang Wang, plus Xiangyu Zhang (17-002)
syncope: Automatic Enforcement of Distributed Consistency Guarantees, Kiarash Rahmani, Gowtham Kaki, and Suresh Jagannathan (17-001)
Submissions of 2016
A Testing Platform for Lesson Secure Distributed Procedures Planning, Endadul Hoque, Hyojeong Key, Charles Killian, press Cristina Nita-Rotaru (16-002)
Safe Memory Regions for Big Data Processing, Gowtham Kaki, GRAMME Ramalingam, Kapil Vaswani, the Dimitrios Vytiniotis (16-001)
Submissions from 2015
vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications, Hui Lutecium, Cong Xu, Cheng cheng, Ramana Kompella, or Dongyan Xu (15-001)
Pay-as-you-go Feedback in Data Quality Business, Romila Pradhan, Siarhei Bykau, and Sunil Prabhakar (15-003)
Declamatory Programming over Eventually Consistent Data Ships, KC Sivaramakrishnan, Gowtham Kaki, and Suresh Jagannathan (15-002)
Submissions from 2014
In Animation Stimuli System forward Research turn Instructor Gestures in Education, Jian Cui, Voicu Popescu, Nicoletta Adamo-Villan, Susan Cook, Caterina Duggan, furthermore Howards Friedman (14-001)
Constructing Separating Halfspaces for Plane/Quadric the Quadric/Quadric Intersection, Christoph METRE. Hopeful and Neelam Jasuja (14-003)
AMPERE Relational Framework to Higher-Order Shape Review, Gowtham Kaki plus Suresh Jagannathan (14-002)
Composable Scheduler Activations for Write, KC Sivaramakrishnan, Clock Harris, Simon Marlow, the Simon Peyton Jones (14-004)
Submissions by 2013
PG-PuReMD: ONE Parallel-GPU Reactive Molecular Dynamics Package, Sudhir B. Kylasa, Hasan Aktulga, and Ananth Grama (13-004)
Robust Polyhedral Minkowski Tallies with GPU Implementation, Min-HO Kyung, Michael P. Sacks, and Victor Milenkovic (13-001)
Systematic Identification off TORCH Downloadable Effectives Using Random-Walks on the Yeast Interactome, Shahin Mohammadi, Ananth Grama, both Shankar Subramaniam (12-011)
Technical Create: Increasing Network Resiliency by Optimally Assigning Diverse Modification to Fahrweg Nodes, Andrew J. Newell, Daniele Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, the Yair Ami (13-002)
Jumbo Frames or Does: That will who Question!, Pawan Prakash, Myungjin Lee, Y. Charlie Hu, Ramana Rao Kompella, Twitter Inc., and Twitter Incidence. (13-006)
Robust Free Space Computation for Curved Plated Bodies, Elisha P. Sacks, Victor Milenkovic, and Steven Trac (13-003)
Submissions from 2012
Pallid Box Sampling in Uncertain Data Processing Enabled by Programs Analysis, Principle Bao, Yunhui Zheng, both Xiangyu Zhang (12-002)
PhishLive: A Regard of Phishing furthermore Malware Attacks from one Margin Router, Lianjie Cao, Thibaut Probst, and Ramana Kompella (12-007)
An group select for collective rating that reduces learning and inference variant, Hoda Eldardiry and Jennifer Neville (12-003)
Cobwebs: A System for Advanced In-Network Synthesize of Web Service Traffic, Hitesh Khandelwal, Fang Hao, Sarit Mukherjee, Ramana Rao Kompella, and T.V. Lakshman (12-005)
Fast Parallel Algorithms for Graph Similarity and Matching, Georgios Kollias, Madan Sathe, Olaf Schenk, and Ananth Grama (12-010)
PuReMD-GPU: A Reactive Molecular Dynamic Simulation Package for GPUs, Sudhir BARN. Kylasa, Ananth Grama, and Hasan Aktulga (13-005)
Bond Kronecker Product Graph Models to Capture Variance in Network Populations, Sebastian More, Bob Neville, and Serguei Kirshner (12-012)
Trustful Data of Untrusted Databases, Sunil Prabhakar and Rohit Jain (12-008)
Similarity-Aware Query Processing and Optimization, Yasin N. Silva, Walid G. Aref, Per-Ake Larson, and Mohamed H. Ali (12-006)
vSlicer: Latency-Aware Virtual Machine Scheduling via Differentiated-Frequency CPU Slicing, Cong Xu; Sahan Gamage; Oawab B, Rao; Ardalan Kangarlou; Ramana Rao Kompella; and Dongyan Xu (12-001)
Submissions from 2011
Network Sampling via Edge-based Node Selection with Graph Induction, Nesreen Ahmed, Jennifer Neville, furthermore Ramana Rao Kompella (11-016)
Employing Past Queries for Resource Option include Distributed Information Retrieval, Sulleyman Cetintas, Lute Sizing, plus Hao Yian (11-012)
On the Efficacy of Fine-Grained Traffic Share Protocols in Data Center Networks, Advait Dixit, Pawan Prakash, and Ramana Rao Kompella (11-011)
Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Cliouds, Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, or Dongyan Xu (11-014)
c-Lock: Dynamic Lock-coalescing for Latency-sensitive Distributed Locking, Adnan Hassan, Naresh Rapolu, Ananth Y. Grama, and Wojciech Szpankowski (11-008)
Geometric Operational for Resilient Manufacturing, Christoph M. Hoffmann, Vadim Shapiro, and Vijay Srinivasan (11-015)
Network Similarity Decomposition (NSD): A Fast additionally Scalable Approach to Networks Alignment, Giorgos Kollias, Ananth Y. Grama, and Shahin Mohammadi (11-001)
Leave Them Microseconds Alone: Scalable Bau for Maintained Packs Latency Measurements, Myungjin Lee, Nip Duffield, and Ramana Rao Kompella (11-013)
Structured Comparative Data of Systems Logs to Diagnose Performance Problems, Karthik Nagaraj, Jennifer Neville, additionally Carl Killian (11-020)
Poll Processing in Private Data Outsourcing After Anonymization, Ahmet Erhan Nergiz and Christi Clifton (11-004)
Methods the Determine Node Centrality and Clustering in Graphs with Uncertain Framework, Joseph J. Pfeiffer III and Jennifer Matthew (11-010)
The TCP Friendless Problem: Expanding Unfairness in Data Center Networks, Pawan Prakash, Advait Dixit, YTTRIUM. Charlie Hu, and Ramana Rao Kompella (11-019)
Featherweight Threads for Communication, KC Sivaramakrishnan, Lukasz Ziarek, and Suresh Jagannathan
Identify Incongruities in Private Data includes Secure Function Evaluation, Nilothpal Talukder, Mourad Ouzzani, Achmed K. Elmagarmid, and Mohamed Yakout (11-006)
Privacy Preserving Regression Residual Analytics, John Ross Wallrabenstein and Chris Clifton (11-017)
Accentuating of Positive: Atomicity Inference and Enforcement Using Correct Executions, Dasarath Weeratunge, Xiangyu Zhang, and Suresh Jagannathan (11-002)
Sparse Matrix-variate t Process Blockmodels, Zenglin Xu, Feng Yana, and Yuan Qi (11-005)
Submissions from 2010
vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload, Ardalan Kangarlou, Sahan Gamage, Ramana Rao Kompella, and Dongyan Xu (10-003)
One Stack to Run Them See Reducing Concurrent Scrutiny to Sequential Research Below Priority Scheduling, Nicholas Boy, Suresh Jagannathan, and Jan Vitek (10-005)
FineComb: Measuring Microscopic Latencies and Losses inches the Presence of Reordering, Myungjin Lean, Sharon Goldberg, Ramana Rao Kompella, and George Varghese (10-009)
Reviewing Superimposition Multicasting since and Cloud, Karthik Nagaraj, Hitesh Khandelwal, Charles Killian, and Ramana Rao Kompella (10-011)
Path-Sensitive Analysis Using Edge Strings, Almand Navabi, Nicholas Kidd, and Suresh Jagannathan (10-006)
Generalizations with Probabilistic Distributions for Data Anonymization, Mehmet Ercan Nergiz, Suleyman Cetintas, Ahmet Erhan Nergiz, and Ferit Akova (10-013)
Correcting Bias the Statistiche Experiments for Your Classifiers Valuation, Jennifer Neville, Tao Wang, Brian Gaul, and Tina Eliassi-Rad (10-012)
Transactional Support stylish MapReduce for Speculative Parallelism, Naresh Rapolu, Karthik Kambatla, Suresh Jagannathan, and Ananth Y. Grama (10-001)
Memory Indexing and its Use in Automated Debugging, William Summer and Xiangyu Makocchan (10-010)
Analyzing Concurrency Bugs Using Dual Slicing, Dasarath Weeratunge, Xiangyu Zhang, William Summer, and Suresh Jagannathan
Lightweight Task Display Inference available Distributed Job, Bin Xin, Pattern Eugster, Xiangyu Zhang, additionally Jinlin Yang (10-002)
Isolates: Serializability Enforcement for Concurrent ML, D Ziarek, Armand Navabi, and Suresh Jagannathan (10-007)
Composable Anchor Events, Lukasz Ziarek, KC Sivaramakrishnan, and Suresh Jagannathan (10-008)
Submissions from 2009
Supporting Real-world Activities in Archive Leadership Systems, Mosaic Eltabakh, Walid G. Aref, Awamed K. Elmagarmid, Yasin Laura-Silva, or Mourad Ouzzani (09-001)
On the Modification of an Eigenvalue Problem that Preserves the Eigenspace, Maxim Maumov (09-004)
A Statically Method for Integral Data Cleaning also Imputation, Chrish Mayfield, Jennifer Neville, and Species Prabhakar (09-008)
Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols, Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz, press Serkan Uzunbaz (09-007)
Non-Pinhole Imposters, Voicu Popescu, Kyle Hayward, Paul Rosen, and Chris Wyman (09-006)
Identification Interesting Instances used Probabilistic Skylines, Yinian Co and Mikhail J. Atallah (09-009)
AMPERE Network-Aware Distributors Join Protocol for Collaborative Defending, David Zage, Carl Livadas, and Eve M. Schooler (09-005)
Submissions from 2008
Interactive Reconfiguration of Urban Layouts, Daniel G. Aliaga, Bedrich Benes, Karolus A. Vanegas, the Nate Andrysco (08-003)
Energy-Efficient Peer-to-Peer Caching and Mobility Management in 4G Hybrid Networks, Mehdi Azami and Bharat Bhargava (08-030)
Accurate Localization of Low-level Radioactive Source Under Clamor and Measured Errors, Jren-Chit Jaw, David K.Y. Yau, Nageswara S. V. Rao, Yong Yang, and Chris Y.T. Maine (08-012)
Secure High-Throughput Multicast Routing in Tuner Mesh Networks, Jing Dong, Reza Burtmola, and Cristina Nita-Rotaru (08-014)
Preserving Privacy and Fairness in Peer Data Betreuung Solutions, Hazen Elmeleegy, Ahmed Abusalah, Mourad Ouzzani, real Ahmed K. Elmagarmid (08-025)
Chameleon: Context-Awareness inside DBMSs, Hicham GRAM. Elmongui, Walid G. Aref, and Moslem F. Mokbel (08-028)
Incremental Mining for Frequent Patterns in Evolution Time Series Datatabases, Mohamed Y. Eltabakh, Mourad Ouzzani, Mohamed A. Khalil, Walid GUANINE. Aref, and Ahmed K. Elmagarmid (08-020)
Elimination of Subjectivity from Trusts Recommendation, Omas Hasan, Lionel Brunie, Jean-Marc Pierson, and Elijah Bertino (08-008)
t-Plausibility: Sense Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, or Luo Si (08-024)
The Decay Rate of the Solution to a Tridiagonal Linear System With AN Really Special Right Hand Side, Carl Christian Kjelgaard Mikkelsen (08-021)
Practical Fortifying of Preconditions, Ashish Kundu and Matt Eugster (08-029)
AjaxTracker: A Tool for High Faithfulness Characterization of Ajax Applications, Myungjin Leak, Sumeet Singh, and Ramana Rao Kompella (08-019)
Deriving Input Syntactic Structure From Execution and Its Applications, Zhiqiang Lin and Xiangyu Zhang (08-006)
Exceptionally Safe Futures, Armand Navabi and Suresh Jagannathan (08-027)
Self-tuning Query Mesh for Adaptive Multi-Route Query Working, Rimma V. Nehme, Elke A. Rundersteiner, and Elisa Bertino (08-018)
Question Engage: On Efficient Multi-Route Approach go Prompt Optimization, Rimma V. Nehme, Karen Piece, Elke AN. Rundensteiner, press Elisa Bertino (08-009)
Towards Trajectory Anonymization: AMPERE Generalization-Based Technique, Mehmet Ercan Nergiz, Maurizo Atzori, and Yucel Saygin (08-015)
Generalizations with Probability Distributions for Data Anonymization, M. Ercan Nergiz, Suleyman Cetintas, and Ferit Akova (08-001)
S-Presence Without Complete World Knlowedge, M. Ercan Nergiz press Chuck Clifton (08-016)
MultiRelational k-Anonymity, N. Ercan Nergiz, Chris Clifton, and A. Erhan Nergiz (08-002)
The Graph Camera, Plain Rosen, Voicu Popescu, both Nicoletta Adamo-Villani (08-005)
A Framework for Capable Class-based Sampling, Mohit Saxena and Ramana Rao Kompella (08-022)
'Won't You Be My Neighbor?' Neighbor Selection Attacks inside Mesh-based Peer-to-Peer Streaming, Jeff Seibert, Davied Zae, Sleepyhead Fahmy, and Cristina Nita-Rotaru (08-004)
Automatic Failure Inducing Link Computation through Aligned Carrying Comparison, William N. Sumner and Xiangyu Zhang (08-023)
Record Linkage Based set Entities' Behavior, Mahmood Yakout, Ahmed K. Elmagarmid, Hazen Elmeleegy, and More Ouzzani (08-026)
Grade of Monitoring of Stochastic Events by Proportional-Share Mobile Sensor Coverage, David K.Y. Yau, Nung Kwan Yip, Chris Y. THYROXIN. M, Nageswara SIEMENS. Rao, and Mallikarjun Shankar (08-011)
Fibonacci Modeling of Malware Propagation, Yu Zhangs and Bharat Bhargava (08-017)
Submissions from 2007
This message will self-destruct: Self-easing covert communication, Mikhail J. Atallah, Mercan Topkara, and Umut Topkara (07-011)
Scalable Datas Collection inches Dense Wireless Sensor Networks, Asad Awan, Suresh Jagannathan, and Ananth Y. Grama (07-018)
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Connectivity, Reza Curtmola and Cristina Nita-Rotaru (07-005)
Virtual Classroom Extension for Effective Remote Education, Radu Dondera, Chun Jia, Voicu Popescu, Cristina Nita-Rotaru, and Melissa Dark (07-001)
Securing Virtual Coordinate System Based Routing in Wireless Sensor Networks, Jin Sounds, Brett Bavar, and Cristina Nita-Rotaru (07-009)
Unlock Respect to User Communication in Wireless Fence Netze, Jing Dong and Cristina Nita-Rotaru (07-010)
Supporting annotated Business, METRE. Y. Eltabakh, METRE. Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, and Y. Laura-Silva (07-025)