The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.

This series contains publications published through The Cyber Center at Purdue University.

Follow

Submissions from 2007

Link

Knowledge Modeling for High Content Screening of Multimedia Biological Data, Arif Ghafoor and J. Paul Robinson

Link

LAHVA: Linked Animal-Human Health Visual Analytics, Ross Maciejewski, Benjamin Tyner, Yun Jang, Cheng Zheng, Rimma Nehme, David S. Ebert, William S. Cleveland, Mourad Ouzzani, Shaun Grannis, and Lawrence Glickman

Link

Location-Aware Query Processing and Optimization, Mohamed Mokbel and Walid G. Aref

Link

Managing Risks in RBAC Employed Distributed Environments, Ebru Celikel, Murat Kantarcioglu, Bhavani Thuraisingham, and Elisa Bertino

Link

Modeling and language support for the management of pattern-bases, Panos Vassiliadis, Spiros Skiadopoulos, Elisa Bertino, Barbara Catania, Anna Maddalena, and Stefano Rizzi

Link

Open Internet-based Sharing for Desktop Grids in iShare, Xiaojuan Ren, Ayon Basumallik, Zhelong Pan, and Rudolf Eigenmann

Link

Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino

Link

Password policy simulation and analysis, Richard Shay, Abhilasha Bhargav-Spantzel, and Elisa Bertino

Link

Phenomenon-Aware Stream Query Processing, Mohamed Ali, Mohamed Mokbel, and Walid G. Aref

Link

Pipelined spatial join processing for quadtree-based indexes, Walid G. Aref

Link

Place: A Distributed Spatio-Temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham Elmongui, Xiaoyong Chai, and Walid G. Aref

Link

PP-trust-X: A system for privacy preserving trust negotiations, Anna Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, and Bhavani Thuraisingham

Link

Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation, Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, and Saurabh Bagchi

Link

Privacy-aware role based access control, Qun Ni, Alberto Trombetta, Elisa Bertino, and Jorge Lobo

Link

Privacy preserving schema and data matching, Monica Scannapieco, Ilya Figotin, Elisa Bertino, and Ahmed Elmagarmid

Link

Privacy Requirements in Identity Management Solutions, Abhilasha Bhargav-Spantzel, Anna Squicciarini, Matthew Young, and Elisa Bertino

Link

Profiling Database Application to Detect SQL Injection Attacks, Elisa Bertino, Ashish Kamra, and James Early

Link

Programming Distributed Memory Sytems Using OpenMP, Ayon Basumallik, Seung-Jai Min, and Rudolf Eigenmann

Link

Quality-of-Service Routing in Heterogeneous Networks with Optimal Buffer and Bandwidth Allocation, Waseem Sheikh and Arif Ghafoor

Link

Quantitative Analysis of Inter-object Spatial Relationships in Biological Images, Wamiq Manzoor Ahmed, Magdalena Jonczyk, Ali Shamsaie, Arif Ghafoor, and J. Paul Robinson

Link

Query processing of multi-way stream window joins, Moustafa Hammad, Walid G. Aref, and Ahmed Elmagarmid

Link

Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Silva and Walid G. Aref

Link

Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino

Link

Receipt management- transaction history based trust establishment, Abhilasha Bhargav-Spantzel, Jungha Woo, and Elisa Bertino

Link

Replacing Lost or Stolen E-Passports, Jianming Yong and Elisa Bertino