Submit Technical Report
Your TR # will be assigned by an administrator after your submission is made. If a TR # is needed prior to submission, please email your request to tr-requests@cs.purdu.edu. You will be notified by email as soon as your TR has been added to the site.

Submissions from 2007

PDF

Privacy-Preserving Updates to Confidential and Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi (07-023)

PDF

On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks, David Zage and Cristina Nita-Rotaru (07-012)

PDF

Cost Effective Forward Tracing Data Lineage, Mingwu Zhang, Xiangyu Zhang, and Sunil Prabhakar (07-004)

PDF

Tracing Lineage Beyond Relational Operators, Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, and Sunil Prabhakar (07-003)

PDF

Memoizing Communication, Lukasz Ziarek, Jeremy Orlow, and Suresh Jagannathan (07-019)

Submissions from 2006

PDF

Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov (06-017)

PDF

Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov, Voicu Popescu, and Mihai Mudure (06-007)

PDF

SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems, Ahmet Burak Can and Bharat Bhargava (06-016)

PDF

Compressed Text Indexing and Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-021)

PDF

SyncSQL: A Language to Express Views over Data Streams, Thanaa M. Ghanem, Per-Ake Larson, Walid G. Aref, and Ahmed K. Elmagarmid (06-012)

PDF

Dynamic Rank/Select Dictionaries with Applications to XML Indexing, Ankur Gupta, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-014)

PDF

Ordered Pattern Matching: Towards Full-Text Retrieval, Wing-Kail Hon, Rahul Shah, and Jeffrey S. Vitter (06-008)

PDF

AC-Framework for Privacy-Preserving Collaboration, Wei Jiang and Chris Clifton (06-015)

PDF

Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Attack Capture and Detention, Xuxian Jiang, Dongyan Xu, and Yi-Min Wang (06-001)

PDF

Energy-Efficient Distributed Consturctions of Minimum Spanning Tree for Wireless Ad-hoc Networks, Maleq Khan, Gopal Pandurangan, and V. S. Anil Kumar (06-019)

PDF

Robust Parameter Synthesis for Planar Higher Pair Mechanical Systems, Min-Ho Kyung and Elisha Sacks (06-005)

PDF

Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Laura-Silva and Walid G. Aref (06-022)

PDF

Path-Sensitive Inference of Function Precedence Protocols, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (06-018)

PDF

Enabling Autonomic Adaption of Virtual Computational Environments in a Shared Distributed Infrastructure, Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, and Sebastien Goasguen (06-004)

PDF

Analytic Framework for Calculating BRDFs of Randomly Rough Surfaces, Yinlong Sun (06-010)

PDF

Load Shedding in Stream Databases: A Control-Based Approach, Yi-Cheng Tu, Song Liu, Sunil Prabhakar, and Bin Yao (06-006)

PDF

Multi-Quality Data Replication in Multimedia Databases, Yi-Cheng Tu, Sunil Prabhakar, Jingfeng Yan, and Gang Shen (06-009)

PDF

First ACM SIGPLAN Workshop on Languages, compilers and Hardware Support for Transactional Computing, Jan Vitek and Suresh Jagannathan (06-011)

PDF

PLACE*: A Distributed Spatio-temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham G. Elmongui, Xiaoyong Chai, and Walid G. Aref (06-020)

PDF

From Physics to Illumination Models of Subsurface Scattering, Huiying Xu, Yi Ru, and Yinlong Sun (06-002)

PDF

Tracing Lineage in Multi-Version Scientific Databases, Mingwu Zhang, Daisuke Kihara, and Sunil Prabhakar (06-013)

PDF

Application of Spectral Analysis to DNA Sequences, Lan Zhao (06-003)

Submissions from 2005

PDF

Scalability via summaries: Stream Query Processing Using Promising Tuples, M. H. Ali, Walid G. Aref, and M. Y. IlTabakh (05-005)

PDF

Multi-way Joins for Sensor-Network Databases, M. H. Ali, Walid G. Aref, and Ibrahim Kamel (05-021)

PDF

Hippocratic Data Streams-Concepts, Architectures and Issues, M. H. Ali, M. Y. ElTabakh, and Elisa Bertino (05-025)

PDF

FT-RC4: A Robust Security Mechanism for Data Stream Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (05-024)

PDF

Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks, Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Josh Olsen, and David Zage (05-029)

PDF

Redundant-Reader Elimination in RFID Systems, Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Christoph M. Hoffmann, and Ananth Y. Grama (05-013)

PDF

Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance Technical Report, Reynold Cheng, Ben Kao, Sunil Prabhakar, Alan Kwan, and Yicheng Tu (05-003)

PDF

Efficient Join Processing over Uncertain Data Technical Report, Reynold Cheng, Yuni Xia, Sunil Prabhakar, Rahul Shah, and Jeffrey S. Vitter (05-004)

PDF

Querying Private Data in Moving-Object Environments, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar (05-015)

PDF

STAGGER: Periodicity Mining of Data Streams using Expanding Sliding Windows, Mohamed G. Elfeky, Walid G. Aref, and Ahmed K. Elmagarmid (05-010)

PDF

To Trie or Not to Trie? Realizing Space-partitioning Trees inside PostgreSQL: Challenges, Experiences and Performance, Mohamed Y. Eltabakh, Ramy Eltarras, and Walid G. Aref (05-008)

PDF

The SBC-Tree: An Index for Run-Length Compressed Sequences, Mohamed Y. Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter (05-030)

PDF

Exploiting Predicate-window Semantics over Data Streams, Thanaa M. Ghanem, Walid G. Aref, and Ahmed K. Elmagarmid (05-007)

PDF

Translation-Based Steganography, Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, and Mikhail J. Atallah (05-009)

PDF

High throughput Routing in Hybrid Cellular and Ad Hoc Networks, Ioannis Ioannidis, Bogdan Carbunar, and Cristina Nita-Rotaru (05-006)

PDF

Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms, Xuxian Jiang and Dongyan Xu (05-027)

PDF

Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach, Xuxian Kiang, Aaron Walters, Florian Buchholz, Dongyan Xu, and Yi-Min Wang (05-028)

PDF

An Approximate Arrangement Algorithm for Semi-Algebraic Curves, Victor Milenkovic and Elisha Sacks (05-012)

PDF

SOLE: Scalable On-Line Execution of Continuous Queries on Spatio-temporal Data Streams, Mohamed F. Mokbel and Walid G. Aref (05-016)

PDF

Sample-based Cameras for Fast Accurate Reflections, Voicu Popescu, Elisha Sacks, and Chunhui Mei (05-018)

PDF

Sieve: A Tool for Automatically Detecting Variations Across Program Versions, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (05-019)

PDF

An Analytical Study of Peer-to-Peer Media Streaming Systems, Yi-Cheng Tu, Jianzhong Sun, Mohamed Hefeeda, and Sunil Prabhakar (05-011)

PDF

Po2V: Network Layer Position Verification in Multi-Hopo Wireless Networks, Xizoxin Wu and Cristina Nita-Rotaru (05-017)

PDF

R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref (05-020)

PDF

LUGrid: Update-tolerant Grid-based Indexing for Moving Objects, Xiaopeng Xiong, Mohamed F. Mokbel, and Walid G. Aref (05-022)

PDF

Stabilizers: Safe Lightweight Check- pointing for Concurrent Programs, Lukasz Ziarek, Philip Schatz, and Suresh Jagannathan (05-023)

Submissions from 2004

PDF

Robust Security Mechnisms for Data Streams Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (04-019)

PDF

Distributed Uniform Sampling in Real- World Networks, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-029)

PDF

Unstructured Peer-to-Peer Networks for Sharing Processor Cycles, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-033)

PDF

Q-Pod: Deployable and Scalable End System Support for Enabling QoS in Legacy Enterprise Systems, Asad Khan Awan and Kihong Park (04-005)

PDF

JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, Bogdan Carbunar, Ioanis Ioannidis, and Cristina Nita-Rotaru (04-024)

PDF

DAISY: A Hybrid Architecture for Anonymity Systems, Chi-Bun Chan and Cristina Nita-Rotaru (04-018)

PDF

Change Tolerant Indexing for Constantly Evolving Data, Reynold Cheng, Yuni Xia, Sunil Prabhakar, and Rahul Shah (04-006)

PDF

Robust and Distributed Computation of Aggregates in Wireless Sensor Networks, Jen-Yeu Chen, Gopal Pandurangan, and Dongyan Xu (04-032)

PDF

Simulation Study of a Cellular Aided Mobile Ad-Hoc Network, Gang Ding, Xiaoxin Wu, Bharat Bhargava, and Shan Lei (04-010)

PDF

Characterizing Overlay Multicast Networks and their Costs, Sonia Fahmyl and Minseok Kwon (04-007)

PDF

Efficient Randomized Search Algorithms in Unstructured Peer-to-Peer Networks, Ronaldo A. Ferreira, Murali Krisna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (04-022)

PDF

Query Processing using Negative Tuples in Stream Query Engines, T. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-030)

PDF

Incremental Evaluation of Sliding- Window Queries over Data Streams, T. M. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-021)

PDF

Recycling Garbage Theory, Christian Grothoff (04-012)

PDF

Towards the Design of Robust Peer-to- Peer Communities, Ioannis Ioannidis and Ananth Y. Grama (04-016)

PDF

Anonymizing Web Services through a Club Mechanism with Economic Incentives, Mamata Jenamani, Leszek Lilien, and Bharat Bhargava (04-008)

PDF

Worm Meets Beehive, Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, and Jianzhong Sun (04-025)

PDF

Security Issues in Querying Encrypted Data, Murat Kantarioglu and Chris Clifton (04-013)

PDF

NP-Hardness of Cache Mapping, Zhiyuan Li and Rong Xu (04-001)

PDF

Reflection Morphing, Andrew Martin and Voicu Popescu (04-015)

PDF

An Inconsistency Sensitive Arrangement Algorithm for Algebraic Curves, Victor Milenkovic and Elisha Sacks (04-017)

PDF

Interactive Modeling from Dense Color and Sparse Depth, Voicu Popescu, Elisha Sacks, and Gleb Bahmotov (04-014)

PDF

Behavior-based System for Generation of Security Solutions, Shobha Potluri, Pranathi Venkatayogi, and Bharat Bhargava (04-011)

PDF

Randomized Leader Election, Murali Krishna Ramanathan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-028)

PDF

Quality-Aware Replication of Multimedia Data, Yi-Cheng Tu and Sunil Prabhakar (04-023)

PDF

AO2P: Ad-Hoc On-Demand Position-Based Private Routing Protocol, Xiaoxin Wu and Bharat Bhargava (04-027)

PDF

Improving Throughput by Link Distance Control in a Multi-Rate Ad Hoc Network, Xiaoxin Wu, Gang Ding, Bharat Bhargava, and Shan Lei (04-026)

PDF

A Credit-based Distributed Protocol for Long-term Fairness in IEEE 802.11 Single-Hop Networks, Yan Wu and Sonia Fahmy (04-036)

PDF

Energy-Efficient Routing and Data Aggregation in Sensor Networks: An Experimental Study, Ossama Younis and Sonia Fahmy (04-031)

PDF

On Time Synchronization in Multi-hop Sensor Networks, Ossama Younis and Sonia Fahmy (04-020)

Submissions from 2003

PDF

Understanding the Impact of Shill Bidding in Online English Auctions, Bharat Bhargava, Mamata Jenamani, and Yuhui Zhong (03-036)

PDF

Fraud Formalization and Detection, Bharat Bhargava, Yuhui Zhong, and Yuhua Lu (03-008)

PDF

An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems, Richard Cho, Chris Clifton, Ananth V. Ilyer, Wei Jiang, and Murat Kantarioglu (03-038)

PDF

Running Linux on Back-end Computers in The Xinu lab, Douglas E. Comer and Xuxian Jiang (03-012)

PDF

Record Linkage: A Machine Learning Approach, A Toolbox, and a Digital Government Web Service, Mohamed G. Elfeky, Vassilios S. Verykios, Ahmed K. Elmagarmid, Thanaa M. Ghanem, and Ahmed R. Huwait (03-024)

PDF

On Detecting Bandwidth Theft Attacks and SLA Violations in QoS Networks, Sonia Fahmy, Srinivas R. Avasarala, and Venkatesh Prabhakar (03-021)

PDF

Vulnerabilities and Safe-guards in Networks with QoS Support, Sonia Fahmy, Srinivas R. Avasarala, and Venkatesh Prabhakar (03-020)

PDF

Recovery Performance of PGM with Redundancy Estimation for Proactive FEC, Sonia Fahmy and Renin M. Jegadeesan (03-019)

PDF

TCP over Wireless Links: Mechanisms and Implications, Sonia Fahmy, Venkatesh Prabhakar, Srinivas R. Avasarafa, and Ossama M. Younis (03-004)

PDF

Deployment Considerations for the TCP Vegas Congestion Control Algorithm, Sonia Fahmy and Mridul Sharma (03-022)

PDF

Idioms in Ovm, C. Flack, Antony L. Hosking, and Jan Vitek (03-017)

PDF

On Monitoring and Controlling QoS Network Domains, Ahsan Habib, Sonia Fahmy, and Bharat Bhargava (03-028)

PDF

Efficient Execution of Sliding-Window Queries Over Data Streams, Moustafa A. Hammad, Walid G. Aref, Michael J. Franklin, Mohammed P. Mokbel, and Ahmed K. Elmagarmid (03-035)

PDF

Scheduling for Shared Window Joins Over Data Streams, Moustafa A. Hammad, Michael J. Franklin, Walid G. Aref, and Ahmed K. Elmagarmid (03-001)

PDF

CollectCast: A Peer-to-Peer Service for Media Streaming, Mohamed Hefedda, Ahsam Habib, Dongyan Xu, Bharat Bhargava, and Boyan Botev (03-016)

PDF

Economics of a Collaborative Peer-to- Peer Infrastructure for Content Distribution, Mohamed Hefeeda, Philipp Afeche, and Bharat Bhargava (03-015)

PDF

Rank-aware Query Optimization, Ihab F. Ilyas, Rahul Shah, Walid G. Aref, Jeffrey S. Vitter, and Ahmed K. Almagarmid (03-037)