The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2013

Link

FENCE: continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino

Link

Forcasting user visits for online display advertising, Suleyman Cetintas, Datong Chen, and Luo Si

Link

Introduction to the special issue on data quality, Mourad Ouzzani, Paolo Papotti, and Erhard Rahm

Link

Multi-route query processing and optimization, Rimma Nehme, Karen Works, Chuan Leib, Elke Rundensteiner, and Elisa Bertino

Link

NADEEF: a commodity data cleaning system, Michele Dallachiesa, Amr Ebaid, Ahmed Eldawy, Ahmed Elmagarmid, Mourad Ouzzani, Ihab Ilyas, and Nan Tang

Link

NADEEF: A Generalized Data Cleaning System, Amr Ebaid, Ahmed Elmagarmid, Ihab Ilyas, Mourad Ouzzani, Jorge-Arnulfo Quiane-Ruiz, Nan Tang, and Si Yin

Link

OpenMPC: extended OpenMP for efficient programming and tuning on GPUs, Seyong Lee and Rudolf Eigenmann

Link

Pegasus: Precision hunting for icebergs and anomalies in network flows, Sriharsha Gangam, P Sharma, and Sonia Fahmy

Link

PostgreSQL anomalous query detector, Bilal Shebaro, Asmaa Sallam, and Ashish Kamra

Link

Privacy preserving policy based content sharing in public clouds, Mohamed Nabeel, Ning Shang, and Elisa Bertino

Link

Quality Control in Crowdsourcing Systems: Issues and Directions, Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid Reza Motahari-Nezhad, Elisa Bertino, and Schahram Dustdar

RFID Security and privacy, Yingjiu Li, Robert H. Deng, and Elisa Bertino

Link

Scaling large-data computations on multi-GPU accelerators, Amit Sabne, Putt Sakdhnagool, and Rudolf Eigenmann

Link

Search result diversification in resource selection for federated search, Dzung Hong and Luo Si

Link

Semantic hashing using tags and topic modeling, Qifan Wang, Dan Zhang, and Luo Si

Link

Similarity queries: their conceptual evaluation, transformation and processing, Yasin Silva, Walid G. Aref, Per-Ake Larson, Spencer Pearson, and Mohamed Ali

Link

Single-Database Private Information Retrieval from Fully Homomorphic Encryption, Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino

Link

The Cetus Source-to-Source Compiler Infrastructure: Overview and Evaluation, Hansang Bae, Dheya Mustafa, Jaewoo Lee, Aurangzeb, Hao Lin, Chirag Dave, Rudolf Eigenmann, and Samuel Midkiff

PDF

The Palm-tree Index: Indexing with the crowd, Aamer Mahmood, Walid G. Aref, Eduard Dragut, and Saleh Basalamah

Submissions from 2012

Link

A Bayesian Approach toward Active Learning for Collaborative Filtering, Rong Jin and Luo Si

Link

A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino

Link

A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino

Link

Adaptive data management for self-protecting objects in cloud computing systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino

Link

A Discriminative Data-Dependent Mixture-Model Approach for Multiple Instance Learning in Image Classification, Qifan Wang, Luo Si, and Dan Zhang

Link

A Distributed Access Control Architecture for Cloud Computing, Abdulrahman Almutairi, Muhammed Sarfraz, Saleh Basalamah, Walid G. Aref, and Arif Ghafoor