The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2008

Link

Future directions in multimedia retrieval: impact of new technology, Aidong Zhang, Shih-Fu Chang, Arif Ghafoor, Thomas Huang, Ramesh Jain, and Rainer Lienhart

Gene expression in developing watermelon fruit, Pat Wechter, Amnon Levi, Karen Harris, Angela Davis, Zhangjun Fei, Nurit Katzir, James Giovannoni, Ayelet Salman-Minkov, Alvaro Hernandez, Jyothi Thimmapuram, Yaakov Tadmore, Vitaly Portnoy, and Tova Trebitsh

PDF

Genes controlling plant growth habit in Leymus (Triticeae): maize barren stalk1 (ba1), rice lax panicle, and wheat tiller inhibition (tin3) genes as possible candidates., Paraminder Kaur, Steven R. Larson, B.S. Bushman, Richard R. Wang, Ivan W. Mott, Jyothi Thimmapuram, George Gong, and Lei Liu

Link

Genetic and physiological basis of adaptive salt tolerance divergence between coastal and inland Mimulus guttatus, David Lowry, Megan Hall, David Salt, and John Willis

Link

Hierarchical Domains for Decentralized Administration of Spatially-Aware RBAC Systems, Maria Luisa Damiani, Claudio Silvestri, and Elisa Bertino

Link

High-Assurance Integrity Techniques for Databases, Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and Dan Lin

Link

Identity-based long running negotiations, Anna Squicciarini, Alberto Trombetta, Elisa Bertino, and Stefano Braghin

Link

Incorporation of OpenMP Memory Consistency into Conventional Dataflow Analysis, Ayon Basumallik and Rudolf Eigenmann

Link

Managing Biological Data using bdbms, Mohamed Eltabakh, Mourad Ouzzani, Walid G. Aref, Ahmed Elmagarmid, Yasin Silva, Mohamed Arshad, David Salt, and Ivan Baxter

Link

Minimal credential disclosure in trust negotiations, Federica Paci, David Bauer, Elisa Bertino, Douglas Blough, and Anna Squicciarini

Link

Mining roles with semantic meanings, Ian Molloy, Hong Chen, Tiancheng Li, Elisa Bertino, Seraphin Calo, and Jorge Lobo

Link

Multigranular spatio-temporal models: implementation challenges, Elena Camossi, Michela Bertolotto, and Elisa Bertino

Link

Object-Oriented Databases, Elisa Bertino and Giovanna Guerrini

Link

Optimizing irregular shared-memory applications for clusters, Seung-Jai Min and Rudolf Eigenmann

Link

P-CDN: Extending access control capabilities of P2P systems to provide CDN services, Fatih Turkmen, Pietro Mazzoleni, Bruno Crispo, and Elisa Bertino

Link

Phytoremediation of metals, David Salt and Alan Baker

Link

Policy decomposition for collaborative access control, Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, and Jorge Lobo

Link

Position transformation: a location privacy protection method for moving objects, Dan Lin, Elisa Bertino, Reynold Cheng, and Sunil Prabhakar

Link

Privately Updating Suppression and Generalization based k-Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi

PDF

Proactive Role Discovery in Mediator-Free Environments, Mohamed Shehab, Elisa Bertino, and Arif Ghafoor

Link

Protecting Databases from Query Flood Attacks, Anna Squicciarini, Ivan Paloscia, and Elisa Bertino

Link

Querying Multigranular Spatio-temporal Objects, Elena Camossi, Michela Bertolotto, and Elisa Bertino

Link

Responding to Anomalous Database Requests, Ashish Kamra, Elisa Bertino, and Rimma Nehme

Link

Secure Collaboration in a Mediator-Free Distributed Environment, Mohamed Shehab, Arif Ghafoor, and Elisa Bertino

Link

Secure Delta-Publishing of XML Content, Mohamed Nabeel and Elisa Bertino