Submit Technical Report
Your TR # will be assigned by an administrator after your submission is made. If a TR # is needed prior to submission, please email your request to tr-requests@cs.purdu.edu. You will be notified by email as soon as your TR has been added to the site.

Submissions from 2013

PDF

PG-PuReMD: A Parallel-GPU Reactive Molecular Dynamics Package, Sudhir B. Kylasa, Hasan Aktulga, and Ananth Grama (13-004)

PuReMD-GPU: A Reactive Molecular Dynamic Simulation Package for GPUs, Sudhir B. Kylasa, Ananth Grama, and Hasan Aktulga (13-005)

PDF

Systematic Identification of TOR Downstream Effectors Using Random-Walks on the Yeast Interactome, Shahin Mohammadi, Ananth Grama, and Shankar Subramaniam (12-011)

PDF

Technical Report: Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes, Andrew J. Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, and Yair Amir (13-002)

PDF

Jumbo Frames or Not: That is the Question!, Pawan Prakash, Myungjin Lee, Y. Charlie Hu, Ramana Rao Kompella, Twitter Inc., and Twitter Inc. (13-006)

PDF

Robust Minkowski Sum Computation on the GPU, Elisha P. Sacks, Min-HO Kyung, and Victor Milenkovic (13-001)

Robust Free Space Computation for Curved Planar Bodies, Elisha P. Sacks, Victor Milenkovic, and Steven Trac (13-003)

Submissions from 2012

PDF

White Box Sampling in Uncertain Data Processing Enabled by Program Analysis, Tao Bao, Yunhui Zheng, and Xiangyu Zhang (12-002)

PDF

PhishLive: A View of Phishing and Malware Attacks from an Edge Router, Lianjie Cao, Thibaut Probst, and Ramana Kompella (12-007)

PDF

An ensemble model for collective classification that reduces learning and inference variance, Hoda Eldardiry and Jennifer Neville (12-003)

PDF

CobWeb: A System for Automated In-Network Cobbling of Web Service Traffic, Hitesh Khandelwal, Fang Hao, Sarit Mukherjee, Ramana Rao Kompella, and T.V. Lakshman (12-005)

PDF

Fast Parallel Algorithms for Graph Similarity and Matching, Georgios Kollias, Madan Sathe, Olaf Schenk, and Ananth Grama (12-010)

PDF

Tied Kronecker Product Graph Models to Capture Variance in Network Populations, Sebastian Moreno, Jennifer Neville, and Sergey Kirshner (12-012)

PDF

Trustworthy Data from Untrusted Databases, Sunil Prabhakar and Rohit Jain (12-008)

PDF

Similarity-Aware Query Processing and Optimization, Yasin N. Silva, Walid G. Aref, Per-Ake Larson, and Mohamed H. Ali (12-006)

PDF

vSlicer: Latency-Aware Virtual Machine Scheduling via Differentiated-Frequency CPU Slicing, Cong Xu; Sahan Gamage; Oawab B, Rao; Ardalan Kangarlou; Ramana Rao Kompella; and Dongyan Xu (12-001)

Submissions from 2011

PDF

Network Sampling via Edge-based Node Selection with Graph Induction, Nesreen Ahmed, Jennifer Neville, and Ramana Rao Kompella (11-016)

PDF

Using Past Queries for Resource Selection in Distributed Information Retrieval, Sulleyman Cetintas, Luo Si, and Hao Yuan (11-012)

PDF

On the Efficacy of Fine-Grained Traffic Splitting Protocols in Data Center Networks, Advait Dixit, Pawan Prakash, and Ramana Rao Kompella (11-011)

PDF

Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Clouds, Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, and Dongyan Xu (11-014)

c-Lock: Dynamic Lock-coalescing for Latency-sensitive Distributed Locking, Adnan Hassan, Naresh Rapolu, Ananth Y. Grama, and Wojciech Szpankowski (11-008)

PDF

Geometric Interoperability for Resilient Manufacturing, Christoph M. Hoffmann, Vadim Shapiro, and Vijay Srinivasan (11-015)

PDF

Network Similarity Decomposition (NSD): A Fast and Scalable Approach to Network Alignment, Giorgos Kollias, Ananth Y. Grama, and Shahin Mohammadi (11-001)

PDF

Leave Them Microseconds Alone: Scalable Architecture for Maintaining Packet Latency Measurements, Myungjin Lee, Nick Duffield, and Ramana Rao Kompella (11-013)

PDF

Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems, Karthik Nagaraj, Jennifer Neville, and Charles Killian (11-020)

PDF

Query Processing in Private Data Outsourcing Using Anonymization, Ahmet Erhan Nergiz and Chris Clifton (11-004)

PDF

Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure, Joseph J. Pfeiffer III and Jennifer Neville (11-010)

PDF

The TCP Outcast Problem: Exposing Unfairness in Data Center Networks, Pawan Prakash, Advait Dixit, Y. Charlie Hu, and Ramana Rao Kompella (11-019)

PDF

Featherweight Threads for Communication, KC Sivaramakrishnan, Lukasz Ziarek, and Suresh Jagannathan

PDF

Detecting Inconsistencies in Private Data with Secure Function Evaluation, Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmagarmid, and Mohamed Yakout (11-006)

PDF

Privacy Preserving Regression Residual Analysis, John Ross Wallrabenstein and Chris Clifton (11-017)

PDF

Accentuating the Positive: Atomicity Inference and Enforcement Using Correct Executions, Dasarath Weeratunge, Xiangyu Zhang, and Suresh Jagannathan (11-002)

PDF

Sparse Matrix-variate t Process Blockmodels, Zenglin Xu, Feng Yan, and Yuan Qi (11-005)

Submissions from 2010

PDF

vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload, Ardalan Kangarlou, Sahan Gamage, Ramana Rao Kompella, and Dongyan Xu (10-003)

PDF

One Stack to Run Them All Reducing Concurrent Analysis to Sequential Analysis Under Priority Scheduling, Nicholas Kidd, Suresh Jagannathan, and Jan Vitek (10-005)

PDF

FineComb: Measuring Microscopic Latencies and Losses in the Presence of Reordering, Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, and George Varghese (10-009)

PDF

Revisiting Overlay Multicasting for the Cloud, Karthik Nagaraj, Hitesh Khandelwal, Charles Killian, and Ramana Rao Kompella (10-011)

PDF

Path-Sensitive Analysis Using Edge Strings, Armand Navabi, Nicholas Kidd, and Suresh Jagannathan (10-006)

PDF

Generalizations with Probability Distributions for Data Anonymization, Mehmet Ercan Nergiz, Suleyman Cetintas, Ahmet Erhan Nergiz, and Ferit Akova (10-013)

PDF

Correcting Bias in Statistical Tests for Network Classifier Evaluation, Jennifer Neville, Tao Wang, Brian Gallagher, and Tina Eliassi-Rad (10-012)

PDF

Transactional Support in MapReduce for Speculative Parallelism, Naresh Rapolu, Karthik Kambatla, Suresh Jagannathan, and Ananth Y. Grama (10-001)

PDF

Memory Indexing and its Use in Automated Debugging, William Summer and Xiangyu Zhang (10-010)

PDF

Analyzing Concurrency Bugs Using Dual Slicing, Dasarath Weeratunge, Xiangyu Zhang, William Summer, and Suresh Jagannathan

PDF

Lightweight Task Graph Inference for Distributed Applications, Bin Xin, Patrick Eugster, Xiangyu Zhang, and Jinlin Yang (10-002)

PDF

Isolates: Serializability Enforcement for Concurrent ML, Lukasz Ziarek, Armand Navabi, and Suresh Jagannathan (10-007)

PDF

Composable Asynchronous Events, Lukasz Ziarek, KC Sivaramakrishnan, and Suresh Jagannathan (10-008)

Submissions from 2009

PDF

Supporting Real-world Activities in Database Management Systems, Mohamed Eltabakh, Walid G. Aref, Ahmed K. Elmagarmid, Yasin Laura-Silva, and Mourad Ouzzani (09-001)

PDF

On the Modification of an Eigenvalue Problem that Preserves an Eigenspace, Maxim Maumov (09-004)

PDF

A Statistical Method for Integrated Data Cleaning and Imputation, Chris Mayfield, Jennifer Neville, and Sunil Prabhakar (09-008)

PDF

Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols, Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz, and Serkan Uzunbaz (09-007)

PDF

Non-Pinhole Imposters, Voicu Popescu, Kyle Hayward, Paul Rosen, and Chris Wyman (09-006)

PDF

Identifying Interesting Instances for Probabilistic Skylines, Yinian Qi and Mikhail J. Atallah (09-009)

PDF

A Network-Aware Distributed Membership Protocol for Collaborative Defense, David Zage, Carl Livadas, and Eve M. Schooler (09-005)

Submissions from 2008

PDF

Interactive Reconfiguration of Urban Layouts, Daniel G. Aliaga, Bedrich Benes, Carlos A. Vanegas, and Nathan Andrysco (08-003)

PDF

Energy-Efficient Peer-to-Peer Caching and Mobility Management in 4G Hybrid Networks, Mehdi Azami and Bharat Bhargava (08-030)

PDF

Accurate Localization of Low-level Radioactive Source Under Noise and Measurement Errors, Jren-Chit Chin, David K.Y. Yau, Nageswara S. V. Rao, Yong Yang, and Chris Y.T. Ma (08-012)

PDF

Secure High-Throughput Multicast Routing in Wireless Mesh Networks, Jing Dong, Reza Burtmola, and Cristina Nita-Rotaru (08-014)

PDF

Preserving Privacy and Fairness in Peer Data Management Systems, Hazen Elmeleegy, Ahmed Abusalah, Mourad Ouzzani, and Ahmed K. Elmagarmid (08-025)

PDF

Chameleon: Context-Awareness inside DBMSs, Hicham G. Elmongui, Walid G. Aref, and Mohamed F. Mokbel (08-028)

PDF

Incremental Mining for Frequent Patterns in Evolving Time Series Datatabases, Mohamed Y. Eltabakh, Mourad Ouzzani, Mohamed A. Khalil, Walid G. Aref, and Ahmed K. Elmagarmid (08-020)

PDF

Elimination of Subjectivity from Trust Recommendation, Omas Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino (08-008)

PDF

t-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, and Luo Si (08-024)

PDF

The Decay Rate of the Solution to a Tridiagonal Linear System With A Very Special Right Hand Side, Carl Christian Kjelgaard Mikkelsen (08-021)

PDF

Practical Strengthening of Preconditions, Ashish Kundu and Patrick Eugster (08-029)

PDF

AjaxTracker: A Tool for High Fidelity Characterization of Ajax Applications, Myungjin Lee, Sumeet Singh, and Ramana Rao Kompella (08-019)

PDF

Deriving Input Syntactic Structure From Execution and Its Applications, Zhiqiang Lin and Xiangyu Zhang (08-006)

PDF

Exceptionally Safe Futures, Armand Navabi and Suresh Jagannathan (08-027)

PDF

Self-tuning Query Mesh for Adaptive Multi-Route Query Processing, Rimma V. Nehme, Elke A. Rundersteiner, and Elisa Bertino (08-018)

PDF

Query Mesh: An Efficient Multi-Route Approach to Query Optimization, Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, and Elisa Bertino (08-009)

PDF

Towards Trajectory Anonymization: A Generalization-Based Approach, Mehmet Ercan Nergiz, Maurizo Atzori, and Yucel Saygin (08-015)

PDF

Generalizations with Probability Distributions for Data Anonymization, M. Ercan Nergiz, Suleyman Cetintas, and Ferit Akova (08-001)

PDF

S-Presence Without Complete World Knlowedge, M. Ercan Nergiz and Chris Clifton (08-016)

PDF

MultiRelational k-Anonymity, N. Ercan Nergiz, Chris Clifton, and A. Erhan Nergiz (08-002)

PDF

The Graph Camera, Paul Rosen, Voicu Popescu, and Nicoletta Adamo-Villani (08-005)

PDF

A Framework for Efficient Class-based Sampling, Mohit Saxena and Ramana Rao Kompella (08-022)

PDF

'Won't You Be My Neighbor?' Neighbor Selection Attacks in Mesh-based Peer-to-Peer Streaming, Jeff Seibert, Davied Zae, Sonia Fahmy, and Cristina Nita-Rotaru (08-004)

PDF

Automatic Failure Inducing Chain Computation through Aligned Execution Comparison, William N. Sumner and Xiangyu Zhang (08-023)

PDF

Record Linkage Based on Entities' Behavior, Mohamed Yakout, Ahmed K. Elmagarmid, Hazen Elmeleegy, and Mourad Ouzzani (08-026)

PDF

Quality of Monitoring of Stochastic Events by Proportional-Share Mobile Sensor Coverage, David K.Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. Rao, and Mallikarjun Shankar (08-011)

PDF

Fibonacci Modeling of Malware Propagation, Yu Zhang and Bharat Bhargava (08-017)

Submissions from 2007

PDF

This message will self-destruct: Self-easing covert communication, Mikhail J. Atallah, Mercan Topkara, and Umut Topkara (07-011)

PDF

Scalable Data Collection in Dense Wireless Sensor Networks, Asad Awan, Suresh Jagannathan, and Ananth Y. Grama (07-018)

PDF

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks, Reza Curtmola and Cristina Nita-Rotaru (07-005)

PDF

Virtual Classroom Extension for Effective Distance Education, Radu Dondera, Chun Jia, Voicu Popescu, Cristina Nita-Rotaru, and Melissa Dark (07-001)

PDF

Securing Virtual Coordinate System Based Routing in Wireless Sensor Networks, Jing Dong, Brett Bavar, and Cristina Nita-Rotaru (07-009)

PDF

Enabling Confidentiality for Group Communication in Wireless Mesh Networks, Jing Dong and Cristina Nita-Rotaru (07-010)

PDF

Supporting annotated Relations, M. Y. Eltabakh, M. Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, and Y. Laura-Silva (07-025)

PDF

Supporting Views in Data Stream Management System, Thanaa M. Ghanem, Walid G. Aref, Ahmed K. Elmagarmid, and Per-Ake Larson (07-024)

PDF

Aspects and Exception Handling: The Case of Explicit Join Points, Kevin Hoffman and Patrick Eugster (07-017)

PDF

A Survey of attacks on Reputation Systems, Kevin Hoffman, David Zage, and Cristina Nita-Rotaru (07-013)

PDF

Compact Real-Time Modeling of Seated Humans by Video Sprite Sequence Quantization, Chun Jia and Voicu Popescu (07-002)

PDF

Matching and Fairness in Threat-based Mobile Sensor Coverage, Chris Y. T. Ma, Jren-chit Chin, David K.Y. Yau, Nageswara S. Rao, and Mallikarjun Shankar (07-026)

PDF

Reliability of Krylov Subspace Methods - A Practical Perspective, M. Naumov, M. Manguoglu, C. C. Mikkelsen, A. Arsenieva, and Ahmed Sameh (07-021)

PDF

Reliability of Krylov Subspace Methods - A Practical Perspective II, M. Naumov, M. Manguoglu, C. C. Mikkelsen, and Ahmed Sameh (07-022)

PDF

A High-Quality Physically-Accurate Visualization of the September 11 Attack on the World Trade Center, Paul Rosen, Voicu Popescu, Christoph Hoffmann, and Ayhan Irfanoglu (07-007)

PDF

Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application Perspective, Jeff Seibert, Davied Zae, Sonia Fahmy, and Cristina Nita-Rotaru (07-020)

PDF

Query Selectivity Estimation for Uncertain Database, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, and Susanne E. Hambrusch (07-016)

PDF

Database Support for Probabilistic Attributes and Tuples, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, Susanne E. Hambrusch, and Reynold Cheng (07-015)

PDF

Ensuring Correctness over Untrusted Private Database, Sarvjeet Singh and Sunil Prabhakar (07-014)

PDF

Passwords for Everyone: Secure Mnemonic-based Accessible Authentication, Umut Topkara, Mercan Topkara, and Mikhail J. Atallah (07-008)