Submit Technical Report
Your TR # will be assigned by an administrator after your submission is made. If a TR # is needed prior to submission, please email your request to tr-request@cs.purdue.edu. You will be notified by email as soon as your TR has been added to the site.

Submissions from 2007

PDF

Supporting Views in Data Stream Management System, Thanaa M. Ghanem, Walid G. Aref, Ahmed K. Elmagarmid, and Per-Ake Larson (07-024)

PDF

Aspects and Exception Handling: The Case of Explicit Join Points, Kevin Hoffman and Patrick Eugster (07-017)

PDF

A Survey of attacks on Reputation Systems, Kevin Hoffman, David Zage, and Cristina Nita-Rotaru (07-013)

PDF

Compact Real-Time Modeling of Seated Humans by Video Sprite Sequence Quantization, Chun Jia and Voicu Popescu (07-002)

PDF

Matching and Fairness in Threat-based Mobile Sensor Coverage, Chris Y. T. Ma, Jren-chit Chin, David K.Y. Yau, Nageswara S. Rao, and Mallikarjun Shankar (07-026)

PDF

Reliability of Krylov Subspace Methods - A Practical Perspective, M. Naumov, M. Manguoglu, C. C. Mikkelsen, A. Arsenieva, and Ahmed Sameh (07-021)

PDF

Reliability of Krylov Subspace Methods - A Practical Perspective II, M. Naumov, M. Manguoglu, C. C. Mikkelsen, and Ahmed Sameh (07-022)

PDF

A High-Quality Physically-Accurate Visualization of the September 11 Attack on the World Trade Center, Paul Rosen, Voicu Popescu, Christoph Hoffmann, and Ayhan Irfanoglu (07-007)

PDF

Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application Perspective, Jeff Seibert, Davied Zae, Sonia Fahmy, and Cristina Nita-Rotaru (07-020)

PDF

Query Selectivity Estimation for Uncertain Database, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, and Susanne E. Hambrusch (07-016)

PDF

Database Support for Probabilistic Attributes and Tuples, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, Susanne E. Hambrusch, and Reynold Cheng (07-015)

PDF

Ensuring Correctness over Untrusted Private Database, Sarvjeet Singh and Sunil Prabhakar (07-014)

PDF

Passwords for Everyone: Secure Mnemonic-based Accessible Authentication, Umut Topkara, Mercan Topkara, and Mikhail J. Atallah (07-008)

PDF

Privacy-Preserving Updates to Confidential and Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi (07-023)

PDF

On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks, David Zage and Cristina Nita-Rotaru (07-012)

PDF

Cost Effective Forward Tracing Data Lineage, Mingwu Zhang, Xiangyu Zhang, and Sunil Prabhakar (07-004)

PDF

Tracing Lineage Beyond Relational Operators, Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, and Sunil Prabhakar (07-003)

PDF

Memoizing Communication, Lukasz Ziarek, Jeremy Orlow, and Suresh Jagannathan (07-019)

Submissions from 2006

PDF

Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov (06-017)

PDF

Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov, Voicu Popescu, and Mihai Mudure (06-007)

PDF

SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems, Ahmet Burak Can and Bharat Bhargava (06-016)

PDF

Compressed Text Indexing and Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-021)

PDF

SyncSQL: A Language to Express Views over Data Streams, Thanaa M. Ghanem, Per-Ake Larson, Walid G. Aref, and Ahmed K. Elmagarmid (06-012)

PDF

Dynamic Rank/Select Dictionaries with Applications to XML Indexing, Ankur Gupta, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-014)

PDF

Ordered Pattern Matching: Towards Full-Text Retrieval, Wing-Kail Hon, Rahul Shah, and Jeffrey S. Vitter (06-008)

PDF

AC-Framework for Privacy-Preserving Collaboration, Wei Jiang and Chris Clifton (06-015)

PDF

Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Attack Capture and Detention, Xuxian Jiang, Dongyan Xu, and Yi-Min Wang (06-001)

PDF

Energy-Efficient Distributed Consturctions of Minimum Spanning Tree for Wireless Ad-hoc Networks, Maleq Khan, Gopal Pandurangan, and V. S. Anil Kumar (06-019)

PDF

Robust Parameter Synthesis for Planar Higher Pair Mechanical Systems, Min-Ho Kyung and Elisha Sacks (06-005)

PDF

Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Laura-Silva and Walid G. Aref (06-022)

PDF

Path-Sensitive Inference of Function Precedence Protocols, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (06-018)

PDF

Enabling Autonomic Adaption of Virtual Computational Environments in a Shared Distributed Infrastructure, Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, and Sebastien Goasguen (06-004)

PDF

Analytic Framework for Calculating BRDFs of Randomly Rough Surfaces, Yinlong Sun (06-010)

PDF

Load Shedding in Stream Databases: A Control-Based Approach, Yi-Cheng Tu, Song Liu, Sunil Prabhakar, and Bin Yao (06-006)

PDF

Multi-Quality Data Replication in Multimedia Databases, Yi-Cheng Tu, Sunil Prabhakar, Jingfeng Yan, and Gang Shen (06-009)

PDF

First ACM SIGPLAN Workshop on Languages, compilers and Hardware Support for Transactional Computing, Jan Vitek and Suresh Jagannathan (06-011)

PDF

PLACE*: A Distributed Spatio-temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham G. Elmongui, Xiaoyong Chai, and Walid G. Aref (06-020)

PDF

From Physics to Illumination Models of Subsurface Scattering, Huiying Xu, Yi Ru, and Yinlong Sun (06-002)

PDF

Tracing Lineage in Multi-Version Scientific Databases, Mingwu Zhang, Daisuke Kihara, and Sunil Prabhakar (06-013)

PDF

Application of Spectral Analysis to DNA Sequences, Lan Zhao (06-003)

Submissions from 2005

PDF

Scalability via summaries: Stream Query Processing Using Promising Tuples, M. H. Ali, Walid G. Aref, and M. Y. IlTabakh (05-005)

PDF

Multi-way Joins for Sensor-Network Databases, M. H. Ali, Walid G. Aref, and Ibrahim Kamel (05-021)

PDF

Hippocratic Data Streams-Concepts, Architectures and Issues, M. H. Ali, M. Y. ElTabakh, and Elisa Bertino (05-025)

PDF

FT-RC4: A Robust Security Mechanism for Data Stream Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (05-024)

PDF

Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks, Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Josh Olsen, and David Zage (05-029)

PDF

Redundant-Reader Elimination in RFID Systems, Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Christoph M. Hoffmann, and Ananth Y. Grama (05-013)

PDF

Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance Technical Report, Reynold Cheng, Ben Kao, Sunil Prabhakar, Alan Kwan, and Yicheng Tu (05-003)

PDF

Efficient Join Processing over Uncertain Data Technical Report, Reynold Cheng, Yuni Xia, Sunil Prabhakar, Rahul Shah, and Jeffrey S. Vitter (05-004)

PDF

Querying Private Data in Moving-Object Environments, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar (05-015)

PDF

STAGGER: Periodicity Mining of Data Streams using Expanding Sliding Windows, Mohamed G. Elfeky, Walid G. Aref, and Ahmed K. Elmagarmid (05-010)

PDF

To Trie or Not to Trie? Realizing Space-partitioning Trees inside PostgreSQL: Challenges, Experiences and Performance, Mohamed Y. Eltabakh, Ramy Eltarras, and Walid G. Aref (05-008)

PDF

The SBC-Tree: An Index for Run-Length Compressed Sequences, Mohamed Y. Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter (05-030)

PDF

Exploiting Predicate-window Semantics over Data Streams, Thanaa M. Ghanem, Walid G. Aref, and Ahmed K. Elmagarmid (05-007)

PDF

Translation-Based Steganography, Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, and Mikhail J. Atallah (05-009)

PDF

High throughput Routing in Hybrid Cellular and Ad Hoc Networks, Ioannis Ioannidis, Bogdan Carbunar, and Cristina Nita-Rotaru (05-006)

PDF

Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms, Xuxian Jiang and Dongyan Xu (05-027)

PDF

Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach, Xuxian Kiang, Aaron Walters, Florian Buchholz, Dongyan Xu, and Yi-Min Wang (05-028)

PDF

An Approximate Arrangement Algorithm for Semi-Algebraic Curves, Victor Milenkovic and Elisha Sacks (05-012)

PDF

SOLE: Scalable On-Line Execution of Continuous Queries on Spatio-temporal Data Streams, Mohamed F. Mokbel and Walid G. Aref (05-016)

PDF

Sample-based Cameras for Fast Accurate Reflections, Voicu Popescu, Elisha Sacks, and Chunhui Mei (05-018)

PDF

Sieve: A Tool for Automatically Detecting Variations Across Program Versions, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (05-019)

PDF

An Analytical Study of Peer-to-Peer Media Streaming Systems, Yi-Cheng Tu, Jianzhong Sun, Mohamed Hefeeda, and Sunil Prabhakar (05-011)

PDF

Po2V: Network Layer Position Verification in Multi-Hopo Wireless Networks, Xizoxin Wu and Cristina Nita-Rotaru (05-017)

PDF

R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref (05-020)

PDF

LUGrid: Update-tolerant Grid-based Indexing for Moving Objects, Xiaopeng Xiong, Mohamed F. Mokbel, and Walid G. Aref (05-022)

PDF

Stabilizers: Safe Lightweight Check- pointing for Concurrent Programs, Lukasz Ziarek, Philip Schatz, and Suresh Jagannathan (05-023)

Submissions from 2004

PDF

Robust Security Mechnisms for Data Streams Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (04-019)

PDF

Distributed Uniform Sampling in Real- World Networks, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-029)

PDF

Unstructured Peer-to-Peer Networks for Sharing Processor Cycles, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-033)

PDF

Q-Pod: Deployable and Scalable End System Support for Enabling QoS in Legacy Enterprise Systems, Asad Khan Awan and Kihong Park (04-005)

PDF

JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, Bogdan Carbunar, Ioanis Ioannidis, and Cristina Nita-Rotaru (04-024)

PDF

DAISY: A Hybrid Architecture for Anonymity Systems, Chi-Bun Chan and Cristina Nita-Rotaru (04-018)

PDF

Change Tolerant Indexing for Constantly Evolving Data, Reynold Cheng, Yuni Xia, Sunil Prabhakar, and Rahul Shah (04-006)

PDF

Robust and Distributed Computation of Aggregates in Wireless Sensor Networks, Jen-Yeu Chen, Gopal Pandurangan, and Dongyan Xu (04-032)

PDF

Simulation Study of a Cellular Aided Mobile Ad-Hoc Network, Gang Ding, Xiaoxin Wu, Bharat Bhargava, and Shan Lei (04-010)

PDF

Characterizing Overlay Multicast Networks and their Costs, Sonia Fahmyl and Minseok Kwon (04-007)

PDF

Efficient Randomized Search Algorithms in Unstructured Peer-to-Peer Networks, Ronaldo A. Ferreira, Murali Krisna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (04-022)

PDF

Query Processing using Negative Tuples in Stream Query Engines, T. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-030)

PDF

Incremental Evaluation of Sliding- Window Queries over Data Streams, T. M. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-021)

PDF

Recycling Garbage Theory, Christian Grothoff (04-012)

PDF

Towards the Design of Robust Peer-to- Peer Communities, Ioannis Ioannidis and Ananth Y. Grama (04-016)

PDF

Anonymizing Web Services through a Club Mechanism with Economic Incentives, Mamata Jenamani, Leszek Lilien, and Bharat Bhargava (04-008)

PDF

Worm Meets Beehive, Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, and Jianzhong Sun (04-025)

PDF

Security Issues in Querying Encrypted Data, Murat Kantarioglu and Chris Clifton (04-013)

PDF

NP-Hardness of Cache Mapping, Zhiyuan Li and Rong Xu (04-001)

PDF

Reflection Morphing, Andrew Martin and Voicu Popescu (04-015)

PDF

An Inconsistency Sensitive Arrangement Algorithm for Algebraic Curves, Victor Milenkovic and Elisha Sacks (04-017)

PDF

Interactive Modeling from Dense Color and Sparse Depth, Voicu Popescu, Elisha Sacks, and Gleb Bahmotov (04-014)

PDF

Behavior-based System for Generation of Security Solutions, Shobha Potluri, Pranathi Venkatayogi, and Bharat Bhargava (04-011)

PDF

Randomized Leader Election, Murali Krishna Ramanathan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-028)

PDF

Quality-Aware Replication of Multimedia Data, Yi-Cheng Tu and Sunil Prabhakar (04-023)

PDF

AO2P: Ad-Hoc On-Demand Position-Based Private Routing Protocol, Xiaoxin Wu and Bharat Bhargava (04-027)

PDF

Improving Throughput by Link Distance Control in a Multi-Rate Ad Hoc Network, Xiaoxin Wu, Gang Ding, Bharat Bhargava, and Shan Lei (04-026)

PDF

A Credit-based Distributed Protocol for Long-term Fairness in IEEE 802.11 Single-Hop Networks, Yan Wu and Sonia Fahmy (04-036)

PDF

Energy-Efficient Routing and Data Aggregation in Sensor Networks: An Experimental Study, Ossama Younis and Sonia Fahmy (04-031)

PDF

On Time Synchronization in Multi-hop Sensor Networks, Ossama Younis and Sonia Fahmy (04-020)

Submissions from 2003

PDF

Understanding the Impact of Shill Bidding in Online English Auctions, Bharat Bhargava, Mamata Jenamani, and Yuhui Zhong (03-036)

PDF

Fraud Formalization and Detection, Bharat Bhargava, Yuhui Zhong, and Yuhua Lu (03-008)

PDF

An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems, Richard Cho, Chris Clifton, Ananth V. Ilyer, Wei Jiang, and Murat Kantarioglu (03-038)

PDF

Running Linux on Back-end Computers in The Xinu lab, Douglas E. Comer and Xuxian Jiang (03-012)