The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2010

Link

Controlling data disclosure in computational PIR protocols, Ning Shang, Gabriel Ghinita, Yongbin Zhou, and Elisa Bertino

Link

Credibility-enhanced curated database: Improving the value of curated databases, Qun Ni and Elisa Bertino

Link

Detecting Students’ Off-Task Behavior in Intelligent Tutoring Systems with Machine Learning Techniques, Suleyman Cetintas, Luo Si, Yan Ping Xin, and Casey Hord

Link

Discriminative Graphical Models for Joint Faculty Homepage Discovery, Yi Fang, Luo Si, and Aditya P. Mathur

Link

Efficient and privacy-preserving enforcement of attribute-based access control, Ning Shang, Federica Paci, and Elisa Bertino

Link

Efficient Privacy-Preserving Similar Document Detection, Mummoorthy Murugesan, Wei Jiang, Chris W. Clifton, Luo Si, and Jiadeep Vaidya

Link

Enabling search services on outsourced private spatial data, Man Lung Yiu, Gabriel Ghinita, Christian Jensen, and Panos Kalnis

PDF

Endogenous siRNAs and noncoding RNA-derived small RNAs are expressed in adult mouse hippocampus and are up-regulated in olfactory discrimination training., Neil Smalheiser, G Lugli, Jyothi Thimmapuram, E.H. Cook, and J Larson

Link

Enforcing spatial constraints for mobile RBAC systems, Michael Kirkpatrick and Elisa Bertino

Link

EXAM: a comprehensive environment for the analysis of access control policies, Dan Lin, Prathima Rao, Elisa Bertino, and Ninghui Li

Link

FENCE: Continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino

Link

GDR: a system for guided data repair, Mohamed Yakout, Ahmed Elmagarmid, Jennifer Neville, and Mourad Ouzzani

Link

Group-Based Negotiations in P2P Systems, Anna Squicciarini, Federica Paci, Elisa Bertino, and Alberto Trombetta

Link

Guest Editors' Introduction: Data Quality in the Internet Era, Elisa Bertino, Andrea Maurino, and Monica Scannapieco

Link

How to authenticate graphs without leaking, Ashish Kundu and Elisa Bertino

Link

Learning to Identify Students’ Relevant and Irrelevant Questions in a Micro-blogging Supported Classroom, Suleyman Cetintas, Luo Si, Sugato Chakravarty, Hans Aagard, and Kyle Bowen

Link

Mask: a system for privacy-preserving policy-based access to published content, Mohamed Nabeel, Ning Shang, John Zage, and Elisa Bertino

Link

Micro-Blogging in Classroom: Classifying Students’ Relevant and Irrelevant Questions in a Micro-Blogging Supported Classroom, Suleyman Cetintas, Luo Si, Hans Aagard, Kyle Bowen, and M Cordova-Sanchez

Link

OpenMPC: Extended OpenMP Programming and Tuning for GPUs, Seyong Lee and Rudolf Eigenmann

Link

Policy-Driven Service Composition with Information Flow Control, Wei She, I-Ling Yen, Bhavani Thuraisingham, and Elisa Bertino

Link

Predicting Correctness of Problem Solving in ITS with a Temporal Collaborative Filtering Approach, Suleyman Cetintas, Luo Si, Yan Ping Xin, and Casey Hord

Link

Preserving privacy and fairness in peer-to-peer data integration, Hazem Elmeleegy, Mourad Ouzzani, Ahmed Elmagarmid, and Ahmad Abusalah

Link

Privacy-Aware Location-Aided Routing in Mobile Ad Hoc Networks, Gabriel Ghinita, Mehdi Azarmi, and Elisa Bertino

Link

Privacy-aware role-based access control, Qun Ni, Elisa Bertino, Jorge Lobo, and Carolyn Brodie

Link

Private record matching using differential privacy, Ali Inan, Murat Kantarcioglu, Gabriel Ghinita, and Elisa Bertino