The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2013
FENCE: continuous access control enforcement in dynamic data stream environments, Rimma Nehme, Hyo-Sang Lim, and Elisa Bertino
Forcasting user visits for online display advertising, Suleyman Cetintas, Datong Chen, and Luo Si
Introduction to the special issue on data quality, Mourad Ouzzani, Paolo Papotti, and Erhard Rahm
Multi-route query processing and optimization, Rimma Nehme, Karen Works, Chuan Leib, Elke Rundensteiner, and Elisa Bertino
NADEEF: a commodity data cleaning system, Michele Dallachiesa, Amr Ebaid, Ahmed Eldawy, Ahmed Elmagarmid, Mourad Ouzzani, Ihab Ilyas, and Nan Tang
NADEEF: A Generalized Data Cleaning System, Amr Ebaid, Ahmed Elmagarmid, Ihab Ilyas, Mourad Ouzzani, Jorge-Arnulfo Quiane-Ruiz, Nan Tang, and Si Yin
OpenMPC: extended OpenMP for efficient programming and tuning on GPUs, Seyong Lee and Rudolf Eigenmann
Pegasus: Precision hunting for icebergs and anomalies in network flows, Sriharsha Gangam, P Sharma, and Sonia Fahmy
PostgreSQL anomalous query detector, Bilal Shebaro, Asmaa Sallam, and Ashish Kamra
Privacy preserving policy based content sharing in public clouds, Mohamed Nabeel, Ning Shang, and Elisa Bertino
Quality Control in Crowdsourcing Systems: Issues and Directions, Mohammad Allahbakhsh, Boualem Benatallah, Aleksandar Ignjatovic, Hamid Reza Motahari-Nezhad, Elisa Bertino, and Schahram Dustdar
RFID Security and privacy, Yingjiu Li, Robert H. Deng, and Elisa Bertino
Scaling large-data computations on multi-GPU accelerators, Amit Sabne, Putt Sakdhnagool, and Rudolf Eigenmann
Search result diversification in resource selection for federated search, Dzung Hong and Luo Si
Semantic hashing using tags and topic modeling, Qifan Wang, Dan Zhang, and Luo Si
Similarity queries: their conceptual evaluation, transformation and processing, Yasin Silva, Walid G. Aref, Per-Ake Larson, Spencer Pearson, and Mohamed Ali
Single-Database Private Information Retrieval from Fully Homomorphic Encryption, Xun Yi, Mohammed Golam Kaosar, Russell Paulet, and Elisa Bertino
The Cetus Source-to-Source Compiler Infrastructure: Overview and Evaluation, Hansang Bae, Dheya Mustafa, Jaewoo Lee, Aurangzeb, Hao Lin, Chirag Dave, Rudolf Eigenmann, and Samuel Midkiff
The Palm-tree Index: Indexing with the crowd, Aamer Mahmood, Walid G. Aref, Eduard Dragut, and Saleh Basalamah
Submissions from 2012
A Bayesian Approach toward Active Learning for Collaborative Filtering, Rong Jin and Luo Si
A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino
A Comprehensive Model for Provenance, Salmin Sultana and Elisa Bertino
Adaptive data management for self-protecting objects in cloud computing systems, Anna Squicciarini, Giuseppe Petracca, and Elisa Bertino
A Discriminative Data-Dependent Mixture-Model Approach for Multiple Instance Learning in Image Classification, Qifan Wang, Luo Si, and Dan Zhang
A Distributed Access Control Architecture for Cloud Computing, Abdulrahman Almutairi, Muhammed Sarfraz, Saleh Basalamah, Walid G. Aref, and Arif Ghafoor