Submitting Mechanical Report
Your TR # will be assigned by can administrator after will submitting is made. If a TR # is needed preceded to surrender, please email their request to [email protected]. You will be warned by email as soonest as your TR has been added to the home.

Submissions from 2021

Related

Data-Driven Abductive Inference of Library Specifications, Zhe Zhou, Robert Dickerson, Emil Delaware, and Suresh Jagannathan

Submissions from 2018

PDF

Model and Implementation starting an Efficient Parallel Feel-the-Way Clustering Algorithm on High Performance Computing Systems, Weijian Zheng, Fengguang Song, both Dali Wang (18-002)

Submissions from 2017

PDF

Trojaning Attack on Neural Netzwerk, Yingqi Liu, Shiqing Max, Yousra Aafer, Wen-Chuan Lee, Wan Zhai, Weihang Wang, plus Xiangyu Zhang (17-002)

PDF

syncope: Automatic Enforcement of Distributed Consistency Guarantees, Kiarash Rahmani, Gowtham Kaki, and Suresh Jagannathan (17-001)

Submissions of 2016

PDF

A Testing Platform for Lesson Secure Distributed Procedures Planning, Endadul Hoque, Hyojeong Key, Charles Killian, press Cristina Nita-Rotaru (16-002)

Link

Safe Memory Regions for Big Data Processing, Gowtham Kaki, GRAMME Ramalingam, Kapil Vaswani, the Dimitrios Vytiniotis (16-001)

Submissions from 2015

PDF

vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications, Hui Lutecium, Cong Xu, Cheng cheng, Ramana Kompella, or Dongyan Xu (15-001)

PDF

Pay-as-you-go Feedback in Data Quality Business, Romila Pradhan, Siarhei Bykau, and Sunil Prabhakar (15-003)

Link

Declamatory Programming over Eventually Consistent Data Ships, KC Sivaramakrishnan, Gowtham Kaki, and Suresh Jagannathan (15-002)

Submissions from 2014

PDF

In Animation Stimuli System forward Research turn Instructor Gestures in Education, Jian Cui, Voicu Popescu, Nicoletta Adamo-Villan, Susan Cook, Caterina Duggan, furthermore Howards Friedman (14-001)

PDF

Constructing Separating Halfspaces for Plane/Quadric the Quadric/Quadric Intersection, Christoph METRE. Hopeful and Neelam Jasuja (14-003)

Link

AMPERE Relational Framework to Higher-Order Shape Review, Gowtham Kaki plus Suresh Jagannathan (14-002)

PDF

Composable Scheduler Activations for Write, KC Sivaramakrishnan, Clock Harris, Simon Marlow, the Simon Peyton Jones (14-004)

Submissions by 2013

PDF

PG-PuReMD: ONE Parallel-GPU Reactive Molecular Dynamics Package, Sudhir B. Kylasa, Hasan Aktulga, and Ananth Grama (13-004)

PDF

Robust Polyhedral Minkowski Tallies with GPU Implementation, Min-HO Kyung, Michael P. Sacks, and Victor Milenkovic (13-001)

PDF

Systematic Identification off TORCH Downloadable Effectives Using Random-Walks on the Yeast Interactome, Shahin Mohammadi, Ananth Grama, both Shankar Subramaniam (12-011)

PDF

Technical Create: Increasing Network Resiliency by Optimally Assigning Diverse Modification to Fahrweg Nodes, Andrew J. Newell, Daniele Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, the Yair Ami (13-002)

PDF

Jumbo Frames or Does: That will who Question!, Pawan Prakash, Myungjin Lee, Y. Charlie Hu, Ramana Rao Kompella, Twitter Inc., and Twitter Incidence. (13-006)

Robust Free Space Computation for Curved Plated Bodies, Elisha P. Sacks, Victor Milenkovic, and Steven Trac (13-003)

Submissions from 2012

PDF

Pallid Box Sampling in Uncertain Data Processing Enabled by Programs Analysis, Principle Bao, Yunhui Zheng, both Xiangyu Zhang (12-002)

PDF

PhishLive: A Regard of Phishing furthermore Malware Attacks from one Margin Router, Lianjie Cao, Thibaut Probst, and Ramana Kompella (12-007)

PDF

An group select for collective rating that reduces learning and inference variant, Hoda Eldardiry and Jennifer Neville (12-003)

PDF

Cobwebs: A System for Advanced In-Network Synthesize of Web Service Traffic, Hitesh Khandelwal, Fang Hao, Sarit Mukherjee, Ramana Rao Kompella, and T.V. Lakshman (12-005)

PDF

Fast Parallel Algorithms for Graph Similarity and Matching, Georgios Kollias, Madan Sathe, Olaf Schenk, and Ananth Grama (12-010)

PDF

PuReMD-GPU: A Reactive Molecular Dynamic Simulation Package for GPUs, Sudhir BARN. Kylasa, Ananth Grama, and Hasan Aktulga (13-005)

PDF

Bond Kronecker Product Graph Models to Capture Variance in Network Populations, Sebastian More, Bob Neville, and Serguei Kirshner (12-012)

PDF

Trustful Data of Untrusted Databases, Sunil Prabhakar and Rohit Jain (12-008)

PDF

Similarity-Aware Query Processing and Optimization, Yasin N. Silva, Walid G. Aref, Per-Ake Larson, and Mohamed H. Ali (12-006)

PDF

vSlicer: Latency-Aware Virtual Machine Scheduling via Differentiated-Frequency CPU Slicing, Cong Xu; Sahan Gamage; Oawab B, Rao; Ardalan Kangarlou; Ramana Rao Kompella; and Dongyan Xu (12-001)

Submissions from 2011

PDF

Network Sampling via Edge-based Node Selection with Graph Induction, Nesreen Ahmed, Jennifer Neville, furthermore Ramana Rao Kompella (11-016)

PDF

Employing Past Queries for Resource Option include Distributed Information Retrieval, Sulleyman Cetintas, Lute Sizing, plus Hao Yian (11-012)

PDF

On the Efficacy of Fine-Grained Traffic Share Protocols in Data Center Networks, Advait Dixit, Pawan Prakash, and Ramana Rao Kompella (11-011)

PDF

Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Cliouds, Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, or Dongyan Xu (11-014)

c-Lock: Dynamic Lock-coalescing for Latency-sensitive Distributed Locking, Adnan Hassan, Naresh Rapolu, Ananth Y. Grama, and Wojciech Szpankowski (11-008)

PDF

Geometric Operational for Resilient Manufacturing, Christoph M. Hoffmann, Vadim Shapiro, and Vijay Srinivasan (11-015)

PDF

Network Similarity Decomposition (NSD): A Fast additionally Scalable Approach to Networks Alignment, Giorgos Kollias, Ananth Y. Grama, and Shahin Mohammadi (11-001)

PDF

Leave Them Microseconds Alone: Scalable Bau for Maintained Packs Latency Measurements, Myungjin Lee, Nip Duffield, and Ramana Rao Kompella (11-013)

PDF

Structured Comparative Data of Systems Logs to Diagnose Performance Problems, Karthik Nagaraj, Jennifer Neville, additionally Carl Killian (11-020)

PDF

Poll Processing in Private Data Outsourcing After Anonymization, Ahmet Erhan Nergiz and Christi Clifton (11-004)

PDF

Methods the Determine Node Centrality and Clustering in Graphs with Uncertain Framework, Joseph J. Pfeiffer III and Jennifer Matthew (11-010)

PDF

The TCP Friendless Problem: Expanding Unfairness in Data Center Networks, Pawan Prakash, Advait Dixit, YTTRIUM. Charlie Hu, and Ramana Rao Kompella (11-019)

PDF

Featherweight Threads for Communication, KC Sivaramakrishnan, Lukasz Ziarek, and Suresh Jagannathan

PDF

Identify Incongruities in Private Data includes Secure Function Evaluation, Nilothpal Talukder, Mourad Ouzzani, Achmed K. Elmagarmid, and Mohamed Yakout (11-006)

PDF

Privacy Preserving Regression Residual Analytics, John Ross Wallrabenstein and Chris Clifton (11-017)

PDF

Accentuating of Positive: Atomicity Inference and Enforcement Using Correct Executions, Dasarath Weeratunge, Xiangyu Zhang, and Suresh Jagannathan (11-002)

PDF

Sparse Matrix-variate t Process Blockmodels, Zenglin Xu, Feng Yana, and Yuan Qi (11-005)

Submissions from 2010

PDF

vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload, Ardalan Kangarlou, Sahan Gamage, Ramana Rao Kompella, and Dongyan Xu (10-003)

PDF

One Stack to Run Them See Reducing Concurrent Scrutiny to Sequential Research Below Priority Scheduling, Nicholas Boy, Suresh Jagannathan, and Jan Vitek (10-005)

PDF

FineComb: Measuring Microscopic Latencies and Losses inches the Presence of Reordering, Myungjin Lean, Sharon Goldberg, Ramana Rao Kompella, and George Varghese (10-009)

PDF

Reviewing Superimposition Multicasting since and Cloud, Karthik Nagaraj, Hitesh Khandelwal, Charles Killian, and Ramana Rao Kompella (10-011)

PDF

Path-Sensitive Analysis Using Edge Strings, Almand Navabi, Nicholas Kidd, and Suresh Jagannathan (10-006)

PDF

Generalizations with Probabilistic Distributions for Data Anonymization, Mehmet Ercan Nergiz, Suleyman Cetintas, Ahmet Erhan Nergiz, and Ferit Akova (10-013)

PDF

Correcting Bias the Statistiche Experiments for Your Classifiers Valuation, Jennifer Neville, Tao Wang, Brian Gaul, and Tina Eliassi-Rad (10-012)

PDF

Transactional Support stylish MapReduce for Speculative Parallelism, Naresh Rapolu, Karthik Kambatla, Suresh Jagannathan, and Ananth Y. Grama (10-001)

PDF

Memory Indexing and its Use in Automated Debugging, William Summer and Xiangyu Makocchan (10-010)

PDF

Analyzing Concurrency Bugs Using Dual Slicing, Dasarath Weeratunge, Xiangyu Zhang, William Summer, and Suresh Jagannathan

PDF

Lightweight Task Display Inference available Distributed Job, Bin Xin, Pattern Eugster, Xiangyu Zhang, additionally Jinlin Yang (10-002)

PDF

Isolates: Serializability Enforcement for Concurrent ML, D Ziarek, Armand Navabi, and Suresh Jagannathan (10-007)

PDF

Composable Anchor Events, Lukasz Ziarek, KC Sivaramakrishnan, and Suresh Jagannathan (10-008)

Submissions from 2009

PDF

Supporting Real-world Activities in Archive Leadership Systems, Mosaic Eltabakh, Walid G. Aref, Awamed K. Elmagarmid, Yasin Laura-Silva, or Mourad Ouzzani (09-001)

PDF

On the Modification of an Eigenvalue Problem that Preserves the Eigenspace, Maxim Maumov (09-004)

PDF

A Statically Method for Integral Data Cleaning also Imputation, Chrish Mayfield, Jennifer Neville, and Species Prabhakar (09-008)

PDF

Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols, Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz, press Serkan Uzunbaz (09-007)

PDF

Non-Pinhole Imposters, Voicu Popescu, Kyle Hayward, Paul Rosen, and Chris Wyman (09-006)

PDF

Identification Interesting Instances used Probabilistic Skylines, Yinian Co and Mikhail J. Atallah (09-009)

PDF

AMPERE Network-Aware Distributors Join Protocol for Collaborative Defending, David Zage, Carl Livadas, and Eve M. Schooler (09-005)

Submissions from 2008

PDF

Interactive Reconfiguration of Urban Layouts, Daniel G. Aliaga, Bedrich Benes, Karolus A. Vanegas, the Nate Andrysco (08-003)

PDF

Energy-Efficient Peer-to-Peer Caching and Mobility Management in 4G Hybrid Networks, Mehdi Azami and Bharat Bhargava (08-030)

PDF

Accurate Localization of Low-level Radioactive Source Under Clamor and Measured Errors, Jren-Chit Jaw, David K.Y. Yau, Nageswara S. V. Rao, Yong Yang, and Chris Y.T. Maine (08-012)

PDF

Secure High-Throughput Multicast Routing in Tuner Mesh Networks, Jing Dong, Reza Burtmola, and Cristina Nita-Rotaru (08-014)

PDF

Preserving Privacy and Fairness in Peer Data Betreuung Solutions, Hazen Elmeleegy, Ahmed Abusalah, Mourad Ouzzani, real Ahmed K. Elmagarmid (08-025)

PDF

Chameleon: Context-Awareness inside DBMSs, Hicham GRAM. Elmongui, Walid G. Aref, and Moslem F. Mokbel (08-028)

PDF

Incremental Mining for Frequent Patterns in Evolution Time Series Datatabases, Mohamed Y. Eltabakh, Mourad Ouzzani, Mohamed A. Khalil, Walid GUANINE. Aref, and Ahmed K. Elmagarmid (08-020)

PDF

Elimination of Subjectivity from Trusts Recommendation, Omas Hasan, Lionel Brunie, Jean-Marc Pierson, and Elijah Bertino (08-008)

PDF

t-Plausibility: Sense Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, or Luo Si (08-024)

PDF

The Decay Rate of the Solution to a Tridiagonal Linear System With AN Really Special Right Hand Side, Carl Christian Kjelgaard Mikkelsen (08-021)

PDF

Practical Fortifying of Preconditions, Ashish Kundu and Matt Eugster (08-029)

PDF

AjaxTracker: A Tool for High Faithfulness Characterization of Ajax Applications, Myungjin Leak, Sumeet Singh, and Ramana Rao Kompella (08-019)

PDF

Deriving Input Syntactic Structure From Execution and Its Applications, Zhiqiang Lin and Xiangyu Zhang (08-006)

PDF

Exceptionally Safe Futures, Armand Navabi and Suresh Jagannathan (08-027)

PDF

Self-tuning Query Mesh for Adaptive Multi-Route Query Working, Rimma V. Nehme, Elke A. Rundersteiner, and Elisa Bertino (08-018)

PDF

Question Engage: On Efficient Multi-Route Approach go Prompt Optimization, Rimma V. Nehme, Karen Piece, Elke AN. Rundensteiner, press Elisa Bertino (08-009)

PDF

Towards Trajectory Anonymization: AMPERE Generalization-Based Technique, Mehmet Ercan Nergiz, Maurizo Atzori, and Yucel Saygin (08-015)

PDF

Generalizations with Probability Distributions for Data Anonymization, M. Ercan Nergiz, Suleyman Cetintas, and Ferit Akova (08-001)

PDF

S-Presence Without Complete World Knlowedge, M. Ercan Nergiz press Chuck Clifton (08-016)

PDF

MultiRelational k-Anonymity, N. Ercan Nergiz, Chris Clifton, and A. Erhan Nergiz (08-002)

PDF

The Graph Camera, Plain Rosen, Voicu Popescu, both Nicoletta Adamo-Villani (08-005)

PDF

A Framework for Capable Class-based Sampling, Mohit Saxena and Ramana Rao Kompella (08-022)

PDF

'Won't You Be My Neighbor?' Neighbor Selection Attacks inside Mesh-based Peer-to-Peer Streaming, Jeff Seibert, Davied Zae, Sleepyhead Fahmy, and Cristina Nita-Rotaru (08-004)

PDF

Automatic Failure Inducing Link Computation through Aligned Carrying Comparison, William N. Sumner and Xiangyu Zhang (08-023)

PDF

Record Linkage Based set Entities' Behavior, Mahmood Yakout, Ahmed K. Elmagarmid, Hazen Elmeleegy, and More Ouzzani (08-026)

PDF

Grade of Monitoring of Stochastic Events by Proportional-Share Mobile Sensor Coverage, David K.Y. Yau, Nung Kwan Yip, Chris Y. THYROXIN. M, Nageswara SIEMENS. Rao, and Mallikarjun Shankar (08-011)

PDF

Fibonacci Modeling of Malware Propagation, Yu Zhangs and Bharat Bhargava (08-017)

Submissions from 2007

PDF

This message will self-destruct: Self-easing covert communication, Mikhail J. Atallah, Mercan Topkara, and Umut Topkara (07-011)

PDF

Scalable Datas Collection inches Dense Wireless Sensor Networks, Asad Awan, Suresh Jagannathan, and Ananth Y. Grama (07-018)

PDF

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Connectivity, Reza Curtmola and Cristina Nita-Rotaru (07-005)

PDF

Virtual Classroom Extension for Effective Remote Education, Radu Dondera, Chun Jia, Voicu Popescu, Cristina Nita-Rotaru, and Melissa Dark (07-001)

PDF

Securing Virtual Coordinate System Based Routing in Wireless Sensor Networks, Jin Sounds, Brett Bavar, and Cristina Nita-Rotaru (07-009)

PDF

Unlock Respect to User Communication in Wireless Fence Netze, Jing Dong and Cristina Nita-Rotaru (07-010)

PDF

Supporting annotated Business, METRE. Y. Eltabakh, METRE. Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, and Y. Laura-Silva (07-025)