The Cyber Center at Purdue provides a venue for all IT-related research, hardware, software, and staffing to come together in a single venue allowing new discoveries that can have immediate impact on discovery, learning, and engagement.
This series contains publications published through The Cyber Center at Purdue University.
Submissions from 2012
Panel: Using information re-use and integration principles in big data, Elisa Bertino, Stuart Rubin, Taghi Khoshgoftaar, Bhavani Thuraisingham, and James McCaffrey
Polarity Consistency Checking for Sentiment Dictionaries, Eduard Dragut, Hong Wang, Clement Yu, Prasad Sistla, and Weiyi Meng
Preserving privacy of feedback providers in decentralized reputation systems, Omar Hasan, Lionel Brunie, and Elisa Bertino
Privacy-Preserving and Content-Protecting Location Based Queries, Russell Paulet, Md. Golam Koasar, Xun Yi, and Elisa Bertino
Privacy preserving delegated access control in the storage as a service model, Mohamed Nabeel and Elisa Bertino
Privacy-Preserving Enforcement of Spatially Aware RBAC, Michael Kirkpatrick, Gabriel Ghinita, and Elisa Bertino
Reducing the complexity of BGP stability analysis with hybrid combinatorial-algebraic models, Debbie Perouli, Stefano Vissicchio, Alexander Gurney, Olaf Maennel, Timmothy Griffin, Iain Phillips, Sonia Fahmy, and Cristel Pelsser
Reliable, Flexible Cloud Computing, Storage, Backup, Disaster Recovery, Abdulrahman Almutairi, Muhammed Sarfraz, Saleh Basalamah, Walid G. Aref, and Arif Ghafoor
Resilient Authenticated Execution of Critical Applications in Untrusted Environments, Michael Kirkpatrick, Gabriel Ghinita, and Elisa Bertino
Robust Nonnegative Matrix Factorization via $L_1$ Norm Regularization, Bin Shen, Luo Si, Rong Ji, and Baodi Liu
Secure provenance transmission for streaming data, Salmin Sultana, Mohamed Shehab, and Elisa Bertino
Secure sensor network SUM aggregation with detection of malicious nodes, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino
Secure sensor network SUM aggregation with detection of malicious nodes, Sunoh Choi, Gabriel Ghinita, and Elisa Bertino
Sentiment detection with auxiliary data, Dan Zhang, Luo Si, and Vernon Rego
Spatial Queries with Two kNN Predicates, Ahmed Aly, Walid G. Aref, and Mourad Ouzzani
Spatial Queries with Two kNN Predicates, Ahmed Aly, Mourad Ouzzani, and Walid Aref
Special issue: best papers of VLDB 2010, Paolo Atzeni, Elisa Bertino, Masaru Kitsuregawa, and Kian-Lee Tan
SYSTEM ON CHIP AND METHOD FOR CRYPTOGRAPHY USING A PHYSICALLY UNCLONABLE FUNCTION, Michael Kirkpatrick, Sam Kerr, and Elisa Bertino
The bench scientist's guide to statistical analysis of RNA-Seq data, Craig R. Yendrek, Elizabeth A. Ainsworth, and Jyothi Thimmapuram
Topic 11: Multicore and Manycore Programming, Eduard Ayguade, Dionisios Pnevmatikatos, Rudolf Eigenmann, Mikel Lujan, and Sabri Pllana
Towards a theory for privacy preserving distributed OLAP, Alfredo Cuzzocrea, Elisa Bertino, and Domenico Sacca
Trusted Identities in Cyberspace, Elisa Bertino
Using automated individual white-list to protect web digital identities, Weili Han, Ye Cao, Elisa Bertino, and Jianming Yong
Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle., DM Larkin, HD Daetwyler, AG Hernandez, CL Wright, LA Hetrick, L Boucek, SL Bachman, MR Brand, TV Akraiko, M Cohen-Zinder, Jyothi Thimmapuram, IM Macleod, TT Harkin, JE McCaque, ME Goddard, BJ Hayes, and HA Lewin
Whole-genome resequencing of two elite sires for the detection of haplotypes under selection in dairy cattle., DM Larkin, HD Daetwyler, AG Hernandez, CL Wright, LA Hetrick, L Boucek, SL Bachman, MR Brand, TV Akraiko, M Cohen-Zinder, Jyothi Thimmapuram, IM Macleod, TT Harkin, JE McCaque, BJ Hayes, and HA Lewin