Submit Technical Report
Your TR # will be assigned by an administrator after your submission is made. If a TR # is needed prior to submission, please email your request to tr-request@cs.purdue.edu. You will be notified by email as soon as your TR has been added to the site.
Submissions from 2007
Supporting Views in Data Stream Management System, Thanaa M. Ghanem, Walid G. Aref, Ahmed K. Elmagarmid, and Per-Ake Larson (07-024)
Aspects and Exception Handling: The Case of Explicit Join Points, Kevin Hoffman and Patrick Eugster (07-017)
A Survey of attacks on Reputation Systems, Kevin Hoffman, David Zage, and Cristina Nita-Rotaru (07-013)
Compact Real-Time Modeling of Seated Humans by Video Sprite Sequence Quantization, Chun Jia and Voicu Popescu (07-002)
Matching and Fairness in Threat-based Mobile Sensor Coverage, Chris Y. T. Ma, Jren-chit Chin, David K.Y. Yau, Nageswara S. Rao, and Mallikarjun Shankar (07-026)
Reliability of Krylov Subspace Methods - A Practical Perspective, M. Naumov, M. Manguoglu, C. C. Mikkelsen, A. Arsenieva, and Ahmed Sameh (07-021)
Reliability of Krylov Subspace Methods - A Practical Perspective II, M. Naumov, M. Manguoglu, C. C. Mikkelsen, and Ahmed Sameh (07-022)
A High-Quality Physically-Accurate Visualization of the September 11 Attack on the World Trade Center, Paul Rosen, Voicu Popescu, Christoph Hoffmann, and Ayhan Irfanoglu (07-007)
Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application Perspective, Jeff Seibert, Davied Zae, Sonia Fahmy, and Cristina Nita-Rotaru (07-020)
Query Selectivity Estimation for Uncertain Database, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, and Susanne E. Hambrusch (07-016)
Database Support for Probabilistic Attributes and Tuples, Sarvjeet Singh, Chris Mayfield, Rahul Shah, Sunil Prabhakar, Susanne E. Hambrusch, and Reynold Cheng (07-015)
Ensuring Correctness over Untrusted Private Database, Sarvjeet Singh and Sunil Prabhakar (07-014)
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication, Umut Topkara, Mercan Topkara, and Mikhail J. Atallah (07-008)
Privacy-Preserving Updates to Confidential and Anonymous Databases, Alberto Trombetta, Wei Jiang, Elisa Bertino, and Lorenzo Bossi (07-023)
On the Accuracy of Decentralized Virtual Coordinate Systems in Adversarial Networks, David Zage and Cristina Nita-Rotaru (07-012)
Cost Effective Forward Tracing Data Lineage, Mingwu Zhang, Xiangyu Zhang, and Sunil Prabhakar (07-004)
Tracing Lineage Beyond Relational Operators, Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, and Sunil Prabhakar (07-003)
Memoizing Communication, Lukasz Ziarek, Jeremy Orlow, and Suresh Jagannathan (07-019)
Submissions from 2006
Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov (06-017)
Efficient Large Scale Acquisition of Building Interiors, Gleb Bahmutov, Voicu Popescu, and Mihai Mudure (06-007)
SORT: A Self-Organizing Trust Model for Peer-to-Peer Systems, Ahmet Burak Can and Bharat Bhargava (06-016)
Compressed Text Indexing and Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-021)
SyncSQL: A Language to Express Views over Data Streams, Thanaa M. Ghanem, Per-Ake Larson, Walid G. Aref, and Ahmed K. Elmagarmid (06-012)
Dynamic Rank/Select Dictionaries with Applications to XML Indexing, Ankur Gupta, Wing-Kai Hon, Rahul Shah, and Jeffrey S. Vitter (06-014)
Ordered Pattern Matching: Towards Full-Text Retrieval, Wing-Kail Hon, Rahul Shah, and Jeffrey S. Vitter (06-008)
AC-Framework for Privacy-Preserving Collaboration, Wei Jiang and Chris Clifton (06-015)
Collapsar: A VM-Based Honeyfarm and Reverse Honeyfarm Architecture for Network Attack Capture and Detention, Xuxian Jiang, Dongyan Xu, and Yi-Min Wang (06-001)
Energy-Efficient Distributed Consturctions of Minimum Spanning Tree for Wireless Ad-hoc Networks, Maleq Khan, Gopal Pandurangan, and V. S. Anil Kumar (06-019)
Robust Parameter Synthesis for Planar Higher Pair Mechanical Systems, Min-Ho Kyung and Elisha Sacks (06-005)
Realizing Privacy-Preserving Features in Hippocratic Databases, Yasin Laura-Silva and Walid G. Aref (06-022)
Path-Sensitive Inference of Function Precedence Protocols, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (06-018)
Enabling Autonomic Adaption of Virtual Computational Environments in a Shared Distributed Infrastructure, Paul Ruth, Junghwan Rhee, Dongyan Xu, Rick Kennell, and Sebastien Goasguen (06-004)
Analytic Framework for Calculating BRDFs of Randomly Rough Surfaces, Yinlong Sun (06-010)
Load Shedding in Stream Databases: A Control-Based Approach, Yi-Cheng Tu, Song Liu, Sunil Prabhakar, and Bin Yao (06-006)
Multi-Quality Data Replication in Multimedia Databases, Yi-Cheng Tu, Sunil Prabhakar, Jingfeng Yan, and Gang Shen (06-009)
First ACM SIGPLAN Workshop on Languages, compilers and Hardware Support for Transactional Computing, Jan Vitek and Suresh Jagannathan (06-011)
PLACE*: A Distributed Spatio-temporal Data Stream Management System for Moving Objects, Xiaopeng Xiong, Hicham G. Elmongui, Xiaoyong Chai, and Walid G. Aref (06-020)
From Physics to Illumination Models of Subsurface Scattering, Huiying Xu, Yi Ru, and Yinlong Sun (06-002)
Tracing Lineage in Multi-Version Scientific Databases, Mingwu Zhang, Daisuke Kihara, and Sunil Prabhakar (06-013)
Application of Spectral Analysis to DNA Sequences, Lan Zhao (06-003)
Submissions from 2005
Scalability via summaries: Stream Query Processing Using Promising Tuples, M. H. Ali, Walid G. Aref, and M. Y. IlTabakh (05-005)
Multi-way Joins for Sensor-Network Databases, M. H. Ali, Walid G. Aref, and Ibrahim Kamel (05-021)
Hippocratic Data Streams-Concepts, Architectures and Issues, M. H. Ali, M. Y. ElTabakh, and Elisa Bertino (05-025)
FT-RC4: A Robust Security Mechanism for Data Stream Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (05-024)
Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks, Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Josh Olsen, and David Zage (05-029)
Redundant-Reader Elimination in RFID Systems, Bogdan Carbunar, Murali Krishna Ramanathan, Mehmet Koyuturk, Christoph M. Hoffmann, and Ananth Y. Grama (05-013)
Adaptive Stream Filters for Entity-based Queries with Non-Value Tolerance Technical Report, Reynold Cheng, Ben Kao, Sunil Prabhakar, Alan Kwan, and Yicheng Tu (05-003)
Efficient Join Processing over Uncertain Data Technical Report, Reynold Cheng, Yuni Xia, Sunil Prabhakar, Rahul Shah, and Jeffrey S. Vitter (05-004)
Querying Private Data in Moving-Object Environments, Reynold Cheng, Yu Zhang, Elisa Bertino, and Sunil Prabhakar (05-015)
STAGGER: Periodicity Mining of Data Streams using Expanding Sliding Windows, Mohamed G. Elfeky, Walid G. Aref, and Ahmed K. Elmagarmid (05-010)
To Trie or Not to Trie? Realizing Space-partitioning Trees inside PostgreSQL: Challenges, Experiences and Performance, Mohamed Y. Eltabakh, Ramy Eltarras, and Walid G. Aref (05-008)
The SBC-Tree: An Index for Run-Length Compressed Sequences, Mohamed Y. Eltabakh, Wing-Kai Hon, Rahul Shah, Walid G. Aref, and Jeffrey S. Vitter (05-030)
Exploiting Predicate-window Semantics over Data Streams, Thanaa M. Ghanem, Walid G. Aref, and Ahmed K. Elmagarmid (05-007)
Translation-Based Steganography, Christian Grothoff, Krista Grothoff, Ludmila Alkhutova, Ryan Stutsman, and Mikhail J. Atallah (05-009)
High throughput Routing in Hybrid Cellular and Ad Hoc Networks, Ioannis Ioannidis, Bogdan Carbunar, and Cristina Nita-Rotaru (05-006)
Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms, Xuxian Jiang and Dongyan Xu (05-027)
Provenance-Aware Tracing of Worm Break-in and Contaminations: A Process Coloring Approach, Xuxian Kiang, Aaron Walters, Florian Buchholz, Dongyan Xu, and Yi-Min Wang (05-028)
An Approximate Arrangement Algorithm for Semi-Algebraic Curves, Victor Milenkovic and Elisha Sacks (05-012)
SOLE: Scalable On-Line Execution of Continuous Queries on Spatio-temporal Data Streams, Mohamed F. Mokbel and Walid G. Aref (05-016)
Sample-based Cameras for Fast Accurate Reflections, Voicu Popescu, Elisha Sacks, and Chunhui Mei (05-018)
Sieve: A Tool for Automatically Detecting Variations Across Program Versions, Murali Krishna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (05-019)
An Analytical Study of Peer-to-Peer Media Streaming Systems, Yi-Cheng Tu, Jianzhong Sun, Mohamed Hefeeda, and Sunil Prabhakar (05-011)
Po2V: Network Layer Position Verification in Multi-Hopo Wireless Networks, Xizoxin Wu and Cristina Nita-Rotaru (05-017)
R-trees with Update Memos, Xiaopeng Xiong and Walid G. Aref (05-020)
LUGrid: Update-tolerant Grid-based Indexing for Moving Objects, Xiaopeng Xiong, Mohamed F. Mokbel, and Walid G. Aref (05-022)
Stabilizers: Safe Lightweight Check- pointing for Concurrent Programs, Lukasz Ziarek, Philip Schatz, and Suresh Jagannathan (05-023)
Submissions from 2004
Robust Security Mechnisms for Data Streams Systems, Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru (04-019)
Distributed Uniform Sampling in Real- World Networks, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-029)
Unstructured Peer-to-Peer Networks for Sharing Processor Cycles, Asad Awan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-033)
Q-Pod: Deployable and Scalable End System Support for Enabling QoS in Legacy Enterprise Systems, Asad Khan Awan and Kihong Park (04-005)
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks, Bogdan Carbunar, Ioanis Ioannidis, and Cristina Nita-Rotaru (04-024)
DAISY: A Hybrid Architecture for Anonymity Systems, Chi-Bun Chan and Cristina Nita-Rotaru (04-018)
Change Tolerant Indexing for Constantly Evolving Data, Reynold Cheng, Yuni Xia, Sunil Prabhakar, and Rahul Shah (04-006)
Robust and Distributed Computation of Aggregates in Wireless Sensor Networks, Jen-Yeu Chen, Gopal Pandurangan, and Dongyan Xu (04-032)
Simulation Study of a Cellular Aided Mobile Ad-Hoc Network, Gang Ding, Xiaoxin Wu, Bharat Bhargava, and Shan Lei (04-010)
Characterizing Overlay Multicast Networks and their Costs, Sonia Fahmyl and Minseok Kwon (04-007)
Efficient Randomized Search Algorithms in Unstructured Peer-to-Peer Networks, Ronaldo A. Ferreira, Murali Krisna Ramanathan, Ananth Y. Grama, and Suresh Jagannathan (04-022)
Query Processing using Negative Tuples in Stream Query Engines, T. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-030)
Incremental Evaluation of Sliding- Window Queries over Data Streams, T. M. Ghanem, M. Hammad, M. Mokbel, Walid G. Aref, and Ahmed K. Elmagarmid (04-021)
Recycling Garbage Theory, Christian Grothoff (04-012)
Towards the Design of Robust Peer-to- Peer Communities, Ioannis Ioannidis and Ananth Y. Grama (04-016)
Anonymizing Web Services through a Club Mechanism with Economic Incentives, Mamata Jenamani, Leszek Lilien, and Bharat Bhargava (04-008)
Worm Meets Beehive, Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, and Jianzhong Sun (04-025)
Security Issues in Querying Encrypted Data, Murat Kantarioglu and Chris Clifton (04-013)
NP-Hardness of Cache Mapping, Zhiyuan Li and Rong Xu (04-001)
Reflection Morphing, Andrew Martin and Voicu Popescu (04-015)
An Inconsistency Sensitive Arrangement Algorithm for Algebraic Curves, Victor Milenkovic and Elisha Sacks (04-017)
Interactive Modeling from Dense Color and Sparse Depth, Voicu Popescu, Elisha Sacks, and Gleb Bahmotov (04-014)
Behavior-based System for Generation of Security Solutions, Shobha Potluri, Pranathi Venkatayogi, and Bharat Bhargava (04-011)
Randomized Leader Election, Murali Krishna Ramanathan, Ronaldo A. Ferreira, Suresh Jagannathan, and Ananth Y. Grama (04-028)
Quality-Aware Replication of Multimedia Data, Yi-Cheng Tu and Sunil Prabhakar (04-023)
AO2P: Ad-Hoc On-Demand Position-Based Private Routing Protocol, Xiaoxin Wu and Bharat Bhargava (04-027)
Improving Throughput by Link Distance Control in a Multi-Rate Ad Hoc Network, Xiaoxin Wu, Gang Ding, Bharat Bhargava, and Shan Lei (04-026)
A Credit-based Distributed Protocol for Long-term Fairness in IEEE 802.11 Single-Hop Networks, Yan Wu and Sonia Fahmy (04-036)
Energy-Efficient Routing and Data Aggregation in Sensor Networks: An Experimental Study, Ossama Younis and Sonia Fahmy (04-031)
On Time Synchronization in Multi-hop Sensor Networks, Ossama Younis and Sonia Fahmy (04-020)
Submissions from 2003
Understanding the Impact of Shill Bidding in Online English Auctions, Bharat Bhargava, Mamata Jenamani, and Yuhui Zhong (03-036)
Fraud Formalization and Detection, Bharat Bhargava, Yuhui Zhong, and Yuhua Lu (03-008)
An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems, Richard Cho, Chris Clifton, Ananth V. Ilyer, Wei Jiang, and Murat Kantarioglu (03-038)
Running Linux on Back-end Computers in The Xinu lab, Douglas E. Comer and Xuxian Jiang (03-012)