Submit Technical Report
Your TR # will be assigned by an administrator after your submission is made. If a TR # is needed prior to submission, please email your request to tr-request@cs.purdue.edu. You will be notified by email as soon as your TR has been added to the site.
Submissions from 2021
Data-Driven Abductive Inference of Library Specifications, Zhe Zhou, Robert Dickerson, Benjamin Delaware, and Suresh Jagannathan
Submissions from 2018
Design and Implementation of an Efficient Parallel Feel-the-Way Clustering Algorithm on High Performance Computing Systems, Weijian Zheng, Fengguang Song, and Dali Wang (18-002)
Submissions from 2017
Trojaning Attack on Neural Networks, Yingqi Liu, Shiqing Ma, Yousra Aafer, Wen-Chuan Lee, Juan Zhai, Weihang Wang, and Xiangyu Zhang (17-002)
syncope: Automatic Enforcement of Distributed Consistency Guarantees, Kiarash Rahmani, Gowtham Kaki, and Suresh Jagannathan (17-001)
Submissions from 2016
A Testing Platform for Teaching Secure Distributed Systems Programming, Endadul Hoque, Hyojeong Lee, Charles Killian, and Cristina Nita-Rotaru (16-002)
Safe Memory Regions for Big Data Processing, Gowtham Kaki, G Ramalingam, Kapil Vaswani, and Dimitrios Vytiniotis (16-001)
Submissions from 2015
vHaul: Towards Optimal Scheduling of Live Multi-VM Migration for Multi-tier Applications, Hui Lu, Cong Xu, Cheng cheng, Ramana Kompella, and Dongyan Xu (15-001)
Pay-as-you-go Feedback in Data Quality Systems, Romila Pradhan, Siarhei Bykau, and Sunil Prabhakar (15-003)
Declarative Programming over Eventually Consistent Data Stores, KC Sivaramakrishnan, Gowtham Kaki, and Suresh Jagannathan (15-002)
Submissions from 2014
An Animation Stimuli System for Research on Instructor Gestures in Education, Jian Cui, Voicu Popescu, Nicoletta Adamo-Villan, Susan Cook, Katherine Duggan, and Howard Friedman (14-001)
Constructing Separating Halfspaces for Plane/Quadric and Quadric/Quadric Intersection, Christoph M. Hoffmann and Neelam Jasuja (14-003)
A Relational Framework for Higher-Order Shape Analysis, Gowtham Kaki and Suresh Jagannathan (14-002)
Composable Scheduler Activations for Haskell, KC Sivaramakrishnan, Tim Harris, Simon Marlow, and Simon Peyton Jones (14-004)
Submissions from 2013
PG-PuReMD: A Parallel-GPU Reactive Molecular Dynamics Package, Sudhir B. Kylasa, Hasan Aktulga, and Ananth Grama (13-004)
Robust Polyhedral Minkowski Sums with GPU Implementation, Min-HO Kyung, Elisha P. Sacks, and Victor Milenkovic (13-001)
Systematic Identification of TOR Downstream Effectors Using Random-Walks on the Yeast Interactome, Shahin Mohammadi, Ananth Grama, and Shankar Subramaniam (12-011)
Technical Report: Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes, Andrew J. Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, and Yair Amir (13-002)
Jumbo Frames or Not: That is the Question!, Pawan Prakash, Myungjin Lee, Y. Charlie Hu, Ramana Rao Kompella, Twitter Inc., and Twitter Inc. (13-006)
Robust Free Space Computation for Curved Planar Bodies, Elisha P. Sacks, Victor Milenkovic, and Steven Trac (13-003)
Submissions from 2012
White Box Sampling in Uncertain Data Processing Enabled by Program Analysis, Tao Bao, Yunhui Zheng, and Xiangyu Zhang (12-002)
PhishLive: A View of Phishing and Malware Attacks from an Edge Router, Lianjie Cao, Thibaut Probst, and Ramana Kompella (12-007)
An ensemble model for collective classification that reduces learning and inference variance, Hoda Eldardiry and Jennifer Neville (12-003)
CobWeb: A System for Automated In-Network Cobbling of Web Service Traffic, Hitesh Khandelwal, Fang Hao, Sarit Mukherjee, Ramana Rao Kompella, and T.V. Lakshman (12-005)
Fast Parallel Algorithms for Graph Similarity and Matching, Georgios Kollias, Madan Sathe, Olaf Schenk, and Ananth Grama (12-010)
PuReMD-GPU: A Reactive Molecular Dynamic Simulation Package for GPUs, Sudhir B. Kylasa, Ananth Grama, and Hasan Aktulga (13-005)
Tied Kronecker Product Graph Models to Capture Variance in Network Populations, Sebastian Moreno, Jennifer Neville, and Sergey Kirshner (12-012)
Trustworthy Data from Untrusted Databases, Sunil Prabhakar and Rohit Jain (12-008)
Similarity-Aware Query Processing and Optimization, Yasin N. Silva, Walid G. Aref, Per-Ake Larson, and Mohamed H. Ali (12-006)
vSlicer: Latency-Aware Virtual Machine Scheduling via Differentiated-Frequency CPU Slicing, Cong Xu; Sahan Gamage; Oawab B, Rao; Ardalan Kangarlou; Ramana Rao Kompella; and Dongyan Xu (12-001)
Submissions from 2011
Network Sampling via Edge-based Node Selection with Graph Induction, Nesreen Ahmed, Jennifer Neville, and Ramana Rao Kompella (11-016)
Using Past Queries for Resource Selection in Distributed Information Retrieval, Sulleyman Cetintas, Luo Si, and Hao Yuan (11-012)
On the Efficacy of Fine-Grained Traffic Splitting Protocols in Data Center Networks, Advait Dixit, Pawan Prakash, and Ramana Rao Kompella (11-011)
Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Clouds, Sahan Gamage, Ardalan Kangarlou, Ramana Rao Kompella, and Dongyan Xu (11-014)
c-Lock: Dynamic Lock-coalescing for Latency-sensitive Distributed Locking, Adnan Hassan, Naresh Rapolu, Ananth Y. Grama, and Wojciech Szpankowski (11-008)
Geometric Interoperability for Resilient Manufacturing, Christoph M. Hoffmann, Vadim Shapiro, and Vijay Srinivasan (11-015)
Network Similarity Decomposition (NSD): A Fast and Scalable Approach to Network Alignment, Giorgos Kollias, Ananth Y. Grama, and Shahin Mohammadi (11-001)
Leave Them Microseconds Alone: Scalable Architecture for Maintaining Packet Latency Measurements, Myungjin Lee, Nick Duffield, and Ramana Rao Kompella (11-013)
Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems, Karthik Nagaraj, Jennifer Neville, and Charles Killian (11-020)
Query Processing in Private Data Outsourcing Using Anonymization, Ahmet Erhan Nergiz and Chris Clifton (11-004)
Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure, Joseph J. Pfeiffer III and Jennifer Neville (11-010)
The TCP Outcast Problem: Exposing Unfairness in Data Center Networks, Pawan Prakash, Advait Dixit, Y. Charlie Hu, and Ramana Rao Kompella (11-019)
Featherweight Threads for Communication, KC Sivaramakrishnan, Lukasz Ziarek, and Suresh Jagannathan
Detecting Inconsistencies in Private Data with Secure Function Evaluation, Nilothpal Talukder, Mourad Ouzzani, Ahmed K. Elmagarmid, and Mohamed Yakout (11-006)
Privacy Preserving Regression Residual Analysis, John Ross Wallrabenstein and Chris Clifton (11-017)
Accentuating the Positive: Atomicity Inference and Enforcement Using Correct Executions, Dasarath Weeratunge, Xiangyu Zhang, and Suresh Jagannathan (11-002)
Sparse Matrix-variate t Process Blockmodels, Zenglin Xu, Feng Yan, and Yuan Qi (11-005)
Submissions from 2010
vSnoop: Improving TCP Throughput in Virtualized Environments via Acknowledgement Offload, Ardalan Kangarlou, Sahan Gamage, Ramana Rao Kompella, and Dongyan Xu (10-003)
One Stack to Run Them All Reducing Concurrent Analysis to Sequential Analysis Under Priority Scheduling, Nicholas Kidd, Suresh Jagannathan, and Jan Vitek (10-005)
FineComb: Measuring Microscopic Latencies and Losses in the Presence of Reordering, Myungjin Lee, Sharon Goldberg, Ramana Rao Kompella, and George Varghese (10-009)
Revisiting Overlay Multicasting for the Cloud, Karthik Nagaraj, Hitesh Khandelwal, Charles Killian, and Ramana Rao Kompella (10-011)
Path-Sensitive Analysis Using Edge Strings, Armand Navabi, Nicholas Kidd, and Suresh Jagannathan (10-006)
Generalizations with Probability Distributions for Data Anonymization, Mehmet Ercan Nergiz, Suleyman Cetintas, Ahmet Erhan Nergiz, and Ferit Akova (10-013)
Correcting Bias in Statistical Tests for Network Classifier Evaluation, Jennifer Neville, Tao Wang, Brian Gallagher, and Tina Eliassi-Rad (10-012)
Transactional Support in MapReduce for Speculative Parallelism, Naresh Rapolu, Karthik Kambatla, Suresh Jagannathan, and Ananth Y. Grama (10-001)
Memory Indexing and its Use in Automated Debugging, William Summer and Xiangyu Zhang (10-010)
Analyzing Concurrency Bugs Using Dual Slicing, Dasarath Weeratunge, Xiangyu Zhang, William Summer, and Suresh Jagannathan
Lightweight Task Graph Inference for Distributed Applications, Bin Xin, Patrick Eugster, Xiangyu Zhang, and Jinlin Yang (10-002)
Isolates: Serializability Enforcement for Concurrent ML, Lukasz Ziarek, Armand Navabi, and Suresh Jagannathan (10-007)
Composable Asynchronous Events, Lukasz Ziarek, KC Sivaramakrishnan, and Suresh Jagannathan (10-008)
Submissions from 2009
Supporting Real-world Activities in Database Management Systems, Mohamed Eltabakh, Walid G. Aref, Ahmed K. Elmagarmid, Yasin Laura-Silva, and Mourad Ouzzani (09-001)
On the Modification of an Eigenvalue Problem that Preserves an Eigenspace, Maxim Maumov (09-004)
A Statistical Method for Integrated Data Cleaning and Imputation, Chris Mayfield, Jennifer Neville, and Sunil Prabhakar (09-008)
Homomorphic Encryption based k-out-of-n Oblivious Transfer Protocols, Mummoorthy Murugesan, Wei Jiang, Erhan Nergiz, and Serkan Uzunbaz (09-007)
Non-Pinhole Imposters, Voicu Popescu, Kyle Hayward, Paul Rosen, and Chris Wyman (09-006)
Identifying Interesting Instances for Probabilistic Skylines, Yinian Qi and Mikhail J. Atallah (09-009)
A Network-Aware Distributed Membership Protocol for Collaborative Defense, David Zage, Carl Livadas, and Eve M. Schooler (09-005)
Submissions from 2008
Interactive Reconfiguration of Urban Layouts, Daniel G. Aliaga, Bedrich Benes, Carlos A. Vanegas, and Nathan Andrysco (08-003)
Energy-Efficient Peer-to-Peer Caching and Mobility Management in 4G Hybrid Networks, Mehdi Azami and Bharat Bhargava (08-030)
Accurate Localization of Low-level Radioactive Source Under Noise and Measurement Errors, Jren-Chit Chin, David K.Y. Yau, Nageswara S. V. Rao, Yong Yang, and Chris Y.T. Ma (08-012)
Secure High-Throughput Multicast Routing in Wireless Mesh Networks, Jing Dong, Reza Burtmola, and Cristina Nita-Rotaru (08-014)
Preserving Privacy and Fairness in Peer Data Management Systems, Hazen Elmeleegy, Ahmed Abusalah, Mourad Ouzzani, and Ahmed K. Elmagarmid (08-025)
Chameleon: Context-Awareness inside DBMSs, Hicham G. Elmongui, Walid G. Aref, and Mohamed F. Mokbel (08-028)
Incremental Mining for Frequent Patterns in Evolving Time Series Datatabases, Mohamed Y. Eltabakh, Mourad Ouzzani, Mohamed A. Khalil, Walid G. Aref, and Ahmed K. Elmagarmid (08-020)
Elimination of Subjectivity from Trust Recommendation, Omas Hasan, Lionel Brunie, Jean-Marc Pierson, and Elisa Bertino (08-008)
t-Plausibility: Semantic Preserving Text Sanitization, Wei Jiang, Mummoorthy Murugesan, Chris Clifton, and Luo Si (08-024)
The Decay Rate of the Solution to a Tridiagonal Linear System With A Very Special Right Hand Side, Carl Christian Kjelgaard Mikkelsen (08-021)
Practical Strengthening of Preconditions, Ashish Kundu and Patrick Eugster (08-029)
AjaxTracker: A Tool for High Fidelity Characterization of Ajax Applications, Myungjin Lee, Sumeet Singh, and Ramana Rao Kompella (08-019)
Deriving Input Syntactic Structure From Execution and Its Applications, Zhiqiang Lin and Xiangyu Zhang (08-006)
Exceptionally Safe Futures, Armand Navabi and Suresh Jagannathan (08-027)
Self-tuning Query Mesh for Adaptive Multi-Route Query Processing, Rimma V. Nehme, Elke A. Rundersteiner, and Elisa Bertino (08-018)
Query Mesh: An Efficient Multi-Route Approach to Query Optimization, Rimma V. Nehme, Karen Works, Elke A. Rundensteiner, and Elisa Bertino (08-009)
Towards Trajectory Anonymization: A Generalization-Based Approach, Mehmet Ercan Nergiz, Maurizo Atzori, and Yucel Saygin (08-015)
Generalizations with Probability Distributions for Data Anonymization, M. Ercan Nergiz, Suleyman Cetintas, and Ferit Akova (08-001)
S-Presence Without Complete World Knlowedge, M. Ercan Nergiz and Chris Clifton (08-016)
MultiRelational k-Anonymity, N. Ercan Nergiz, Chris Clifton, and A. Erhan Nergiz (08-002)
The Graph Camera, Paul Rosen, Voicu Popescu, and Nicoletta Adamo-Villani (08-005)
A Framework for Efficient Class-based Sampling, Mohit Saxena and Ramana Rao Kompella (08-022)
'Won't You Be My Neighbor?' Neighbor Selection Attacks in Mesh-based Peer-to-Peer Streaming, Jeff Seibert, Davied Zae, Sonia Fahmy, and Cristina Nita-Rotaru (08-004)
Automatic Failure Inducing Chain Computation through Aligned Execution Comparison, William N. Sumner and Xiangyu Zhang (08-023)
Record Linkage Based on Entities' Behavior, Mohamed Yakout, Ahmed K. Elmagarmid, Hazen Elmeleegy, and Mourad Ouzzani (08-026)
Quality of Monitoring of Stochastic Events by Proportional-Share Mobile Sensor Coverage, David K.Y. Yau, Nung Kwan Yip, Chris Y. T. Ma, Nageswara S. Rao, and Mallikarjun Shankar (08-011)
Fibonacci Modeling of Malware Propagation, Yu Zhang and Bharat Bhargava (08-017)
Submissions from 2007
This message will self-destruct: Self-easing covert communication, Mikhail J. Atallah, Mercan Topkara, and Umut Topkara (07-011)
Scalable Data Collection in Dense Wireless Sensor Networks, Asad Awan, Suresh Jagannathan, and Ananth Y. Grama (07-018)
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks, Reza Curtmola and Cristina Nita-Rotaru (07-005)
Virtual Classroom Extension for Effective Distance Education, Radu Dondera, Chun Jia, Voicu Popescu, Cristina Nita-Rotaru, and Melissa Dark (07-001)
Securing Virtual Coordinate System Based Routing in Wireless Sensor Networks, Jing Dong, Brett Bavar, and Cristina Nita-Rotaru (07-009)
Enabling Confidentiality for Group Communication in Wireless Mesh Networks, Jing Dong and Cristina Nita-Rotaru (07-010)
Supporting annotated Relations, M. Y. Eltabakh, M. Ouzzani, Walid G. Aref, Ahmed K. Elmagarmid, and Y. Laura-Silva (07-025)