The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2008
Future directions in multimedia retrieval: impact of new technology, Aidong Zhang, Shih-Fu Chang, Arif Ghafoor, Thomas Huang, Ramesh Jain, and Rainer Lienhart
Gene expression in developing watermelon fruit, Pat Wechter, Amnon Levi, Karen Harris, Angela Davis, Zhangjun Fei, Nurit Katzir, James Giovannoni, Ayelet Salman-Minkov, Alvaro Hernandez, Jyothi Thimmapuram, Yaakov Tadmore, Vitaly Portnoy, and Tova Trebitsh
Genes controlling plant growth habit in Leymus (Triticeae): maize barren stalk1 (ba1), rice lax panicle, and wheat tiller inhibition (tin3) genes as possible candidates., Paraminder Kaur, Steven R. Larson, B.S. Bushman, Richard R. Wang, Ivan W. Mott, Jyothi Thimmapuram, George Gong, and Lei Liu
Genetic and physiological basis of adaptive salt tolerance divergence between coastal and inland Mimulus guttatus, David Lowry, Megan Hall, David Salt, and John Willis
Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino
High-Assurance Integrity Techniques for Databases, Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and Dan Lin
Identity-based long running negotiations, Anna Squicciarini, Alberto Trombetta, Elisa Bertino, and Stefano Braghin
Incorporation of OpenMP Memory Consistency into Conventional Dataflow Analysis, Ayon Basumallik and Rudolf Eigenmann
Managing Biological Data using bdbms, Mohamed Eltabakh, Mourad Ouzzani, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, Mohamed Arshad, David Salt, and Ivan Baxter
Minimal credential disclosure in trust negotiations, Federica Paci, David Bauer, Elisa Bertino, Douglas Blough, and Anna Squicciarini
Mining roles with semantic meanings, Ian Molloy, Hong Chen, Tiancheng Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo
Multigranular spatio-temporal models: implementation challenges, Elena Camossi, Michela Bertolotto, and Elisa Bertino
Object-Oriented Databases, Elisa Bertino and Giovanna Guerrini
Optimizing irregular shared-memory applications for clusters, Seung-Jai Min and Rudolf Eigenmann
P-CDN: Extending access control capabilities of P2P systems to provide CDN services, Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, and Elisa Bertino
Phytoremediation of metals, David Salt and Alan Baker
Policy decomposition for collaborative access control, Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo
Position transformation: a location privacy protection method for moving objects, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar
Privately Updating Suppression and Generalization based k-Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi
Proactive Role Discovery in Mediator-Free Environments, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor
Protecting Databases from Query Flood Attacks, Anna Squicciarini, Ivan Paloscia, and Elisa Bertino
Querying Multigranular Spatio-temporal Objects, Elena Camossi, Michela Bertolotto, and Elisa Bertino
Responding to Anomalous Database Requests, Ashish Kamra, Elisa Bertino, and Rimma Nehme
Secure Collaboration in a Mediator-Free Distributed Environment, Mohamed Shehab, Arif Ghafoor, and Elisa Bertino
Secure Delta-Publishing of XML Content, Mohamed Nabeel and Elisa Bertino