Technical Reports
Select a year from the drop down menu:
 
   TR-2025-1
Xinning Hui, Yuanchao Xu, Xipeng Shen
    Efficient Serverless Support for Multi-Instance GPUs Through Pipelining
    January 7, 2025
 
   TR-2024-2
Liu, Jiesong;
Guan, Jiawei;
Zhang, Feng;
Shen, Xipeng
    UQ-Guided Hyperparameter Optimization
    May 7, 2024
 
   TR-2024-1
Wang, Xiangwei;
Hui, Xinning;
Liao, Chunhua;
Shen, Xipeng
    A Study of Using LLM to Clear Barriers for Input-Centric Program Optimizations
    May 3, 2024
 
   TR-2023-1
Prasad, Sathvik;
Reaves, Bradley
    Robocall Audio from the FTC's Project Point of No Entry
    November 14, 2023
 
   TR-2021-3
Schatz, K.;
Melo-Filho, C.;
Chirkova, R.;
Tropsha, A.
    Explaining Drug Discovery Hypotheses Using Knowledge Graph Patterns
    September 7, 2021
 
   TR-2021-2
Daniel, Shen S.;
Chi, Min
    TC-DTW: Accelerating Multivariate Dynamic Time Warping Through Triangle Inequality and Point Clustering
    January 18, 2021
 
   TR-2021-1
Wright, D.;
Norris, D.;
Tropsha, A.;
Chirkova, R.;
Korn, D. ;
Quinones, J.;
Parrish, S.
    The Rare Disease InfoHub Portal: Actionable Knowledge Appropriately Delivered
    January 8, 2021
 
   TR-2020-4
Hou, P.-Y.;
Chirkova, R.;
Wright, D,
    Noise Removal with Regular Expressions in Knowledge Graphs
    August 28, 2020
 
   TR-2020-3
Ao, J.;
Cheng, Z.;
Chirkova, R.;
Kolaitis, P.
    Temporal Enrichment and Querying of Ontology-Compliant Data
    May 27, 2020
 
   TR-2020-2
Zhao, Yue;
Shen, Xipeng;
Liao, Chunhua
    OpenK: An Open Infrastructure for the Accumulation, Sharing and Reuse 
of High Performance Computing Knowledge
    May 2, 2020
 
   TR-2020-1
Zhang, Guoqiang;
Shen, Xipeng
    Best-Effort Lazy Evaluation for Python Software Built On APIs
    April 4, 2020
 
   TR-2019-9
Fisk, Susan;
Stolee, Kathryn T.;
Battestilli, Lina
    A Lightweight Intervention to Decrease Gender Bias in Student Evaluations of Teaching (Full Version)
    December 9, 2019
 
   TR-2019-8
Elder, Sarah;
Williams, Laurie 
    A Systematic Analysis of Debated Vulnerabilities in
the National Vulnerability Database
    November 19, 2019
 
   TR-2019-7
Hou, P;
Ao, J;
Chirkova, R
    Building a Data-Analytics Workflow for Antimicrobial-Resistance Studies: An Experience Report
    September 17, 2019
 
   TR-2019-6
Ao, J.;
Chirkova, R.
    Temporal Rules and Queries in the Antimicrobial-Resistance Domain: Collection of Examples
    September 17, 2019
 
   TR-2019-5
Xia, Tianpei;
Chen, Jianfeng ;
Shu, Rui ;
Menzies, Tim
    Sequential Model Optimization for Software Process Control
    August 26, 2019
 
   TR-2019-4
Agrawal, Amritanshu;
Menzies, Tim
    Is AI different for SE?
    August 26, 2019
 
   TR-2019-3
Chen, Jianfeng;
Menzies, Tim
    On the Value of Backdoors for Software Engineering: a Case Study with Test Suite Generation
    August 26, 2019
 
   TR-2019-2
Rahman, Akond;
Elder, Sarah;
Shezan, Faysal H.;
Frost, Vanessa;
Stallings, Jonathan;
Williams, Laurie
    Categorizing Defects in Infrastructure as Code
    May 21, 2019
 
   TR-2019-1
Pan, Xing;
Mueller, Frank
    The Colored Refresh Server for DRAM
    March 27, 2019
 
   TR-2018-4
Ghatpande, Rushikesh
    HPCC Benchmarking
    May 29, 2018
 
   TR-2018-3
Guan, Hui;
Ning, Lin;
Shen, Xipeng;
Lim, Seung-Hwan;
Menzies, Tim
    Generalization of Teacher-Student Network and CNN Pruning
    October 28, 2018
 
   TR-2018-2
Lin, Ning;
Shen, Xipeng
    Similarities in Neuron Vectors and The Implications to CNN Inferences
    October 15, 2018
 
   TR-2018-1
Naresh, Lakshman C.A.;
Shen, Xipeng;
Starly, Binil
    A Just-In-Time Compiler for Intelligent Manufacturing
    July 17, 2018
 
   TR-2017-5
Oudjit, Aissa;
Stallmann, Matthias F.
    Efficient Algorithms for Finding 2-Medians of a Tree
    December 5, 2017
 
   TR-2017-4
Zhang, Feng;
Zhai, Jidong;
Shen, Xipeng;
Mutlu, Onur;
    Potential of A Method for Text Analytics Directly on Compressed Data
    November 13, 2017
 
   TR-2017-3
Awasthi, A. and Battestilli, L.
    Two-Stage Programming Projects: Individual Work Followed by Peer Collaboration
    August 2, 2017
 
   TR-2017-2
Hsu, Chin-Jung;
Freeh, Vincent W.;
Villanustre, Flavio
    Workload-Aware Data Placement for Cloud Computing
    June 5, 2017
 
   TR-2017-1
N/A
    N/A
    May 1, 2017
 
   TR-2016-10
Fogues, Ricard L.;
Murukannaiah, Pradeep K.;
Such, Jose M.;
Singh, Munindar P.
    Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making
    November 27, 2016
 
   TR-2016-9
Hsu, Chin-Jung;
Panta, Rajesh K.;
Ra, Moo-Ryong;
Freeh, Vincent W.
    Inside-Out: Reliable Performance Prediction for  Distributed Storage Systems in the Cloud
    October 25, 2016
 
   TR-2016-8
Matthias Stallmann;
Jason Cockrell;
Tynan Devries;
Weijia Li;
Alexander McCabe;
Yuang Ni;
Michael Owoc;
Kai Pressler-Marshall;
    Galant: A Graph Algorithm Animation Tool
    August 10, 2016
 
   TR-2016-7
Fiala, David;
Mueller, Frank;
Ferreira, Kurt B.
    FlipSphere: A Software-based DRAM Error Detection and Correction Library for HPC
    July 9, 2016
 
   TR-2016-6
Matthias F, Stallmann
    Edge Offset in Drawings of Layered Graphs With Evenly-Spaced Nodes on Each Layer
    June 12, 2016
 
   TR-2016-5
Zhao, Yue;
Liao, Chunhua;
Shen, Xipeng
    Towards Ontology-Based Program Analysis
    April 28, 2016
 
   TR-2016-4
Stallmann, Matthias F
    A Gentle Introduction to Matroid Algorithmics
    April 14, 2016
 
   TR-2016-3
Ning, Lin;
Shen, Xipeng
    LCD: A Fast Contrastive Divergence Based Training Algorithm for Restricted Boltzmann Machine
    April 8, 2016
 
   TR-2016-2
Gholkar, Neha;
Mueller, Frank;
Rountree, Barry
    Power Tuning for HPC Jobs under Manufacturing Variations
    February 5, 2016
 
   TR-2016-1
Chen, Guoyang;
Shen, Xipeng;
Zhou, Huiyang
    A Software Framework for Efficient Preemptive Scheduling on GPU
    January 19, 2016
 
   TR-2015-10
Theisen, Christopher;
Krishna, Rahul;
Williams, Laurie
    Strengthening the Evidence that Attack Surfaces Can Be Approximated with Stack Traces
    November 3, 2015
 
   TR-2015-9
Elliotta, James;
Hoemmen, Mark;
Mueller, Frank
    Model Driven Analysis of Faulty IEEE-754 Scalars
    November 2, 2015
 
   TR-2015-8
Alborzi, Farid;
Chaudhuri, Surajit;
Chirkova, Rada;
Deo, Pallavi;
Healey, Christopher;
Pingale, Gargi;
Reutter, Juan;
Selvakani, Vaira
    DataSlicer: Enabling Data Selection for Visual Data Exploration
    October 16, 2015
 
   TR-2015-7
Murphy-Hill, Emerson;
Lee, Da Young ;
Murphy, Gail C.;
McGrenere, Joanna
    Appendix to How Do Users Discover New Tools in Software Development and Beyond?
    June 1, 2015
 
   TR-2015-6
Alborzi, F;
Chirkova, R;
Doyle, J;
Fathi, Y
    Determining Query Readiness for Structured Data
    March 26, 2015
 
   TR-2015-5
Kc, Kamal;
Freeh, Vincent W.
    Dynamically controlling node-level parallelism in Hadoop
    February 21, 2015
 
   TR-2015-4
Kc, Kamal;
Hsu, Chin-Jung;
Freeh, Vincent W.
    Evaluation of MapReduce in a large cluster
    February 21, 2015
 
   TR-2015-3
Ding, Yufei;
Shen, Xipeng;
Musuvathi, Madanlal;
Mytkowicz, Todd
    TOP: A Framework for Enabling Algorithmic Optimizations for Distance-Related Problems
    January 10, 2015
 
   TR-2015-2
Ding, Yufei;
Shen, Xipeng;
Musuvathi, Madanlal;
Mytkowicz, Todd
    Yinyang K-Means: A Drop-In Replacement of the Classic K-Means with Consistent Speedup
    January 10, 2015
 
   TR-2015-1
Heckman, Sarah;
Al-Zubidy, Ahmed;
Carver, Jeffrey C.;
Sherriff, Mark
    A (Updated) Review of Empiricism at the SIGCSE Technical Symposium
    January 5, 2015
 
   TR-2014-14
Morrison, Patrick;
Moye, David;
Williams, Laurie
    Mapping the Field of Software Security Metrics
    October 23, 2014
 
   TR-2014-13
Kc, Kamal;
Freeh, Vincent W.
    Dynamic performance tuning of Hadoop
    September 23, 2014
 
   TR-2014-12
Poosamani, Nithyananthan  ;
Rhee, Injong
    A Practical and Energy-efficient System to Discover Wi-Fi Hotspots Using Cellular Signals
    September 12, 2014
 
   TR-2014-11
Chen, L;
Yu, T;
Chirkova, R
    WaveCluster with Differential Privacy
    September 10, 2014
 
   TR-2014-10
Nadkarni, A.;
Sheth, A.;
Weinsberg, U.;
Taft, N.;
Enck, W.
    GraphAudit: Privacy Auditing for Massive Graph Mining
    August 4, 2014
 
   TR-2014-9
Telang, Pankaj R.;
Singh, Munindar P.;
Yorke-Smith, Neil
    Maintenance Commitments and Goals
    July 22, 2014
 
   TR-2014-8
Shekhar, Mayank;
Ramaprasad, Harini;
Mueller, Frank
    Semi-Partitioned Scheduling for Resource-Sharing Hard-Real-Time Tasks
    July 1, 2014
 
   TR-2014-7
Rezaei, Arash ;
Mueller, Frank
    DINO: Divergent Node Cloning for Sustained Redundancy in HPC
    June 24, 2014
 
   TR-2014-6
Matthias Stallmann;
Jason Cockrell;
Tynan Devries;
Alexander McCabe;
Michael Owoc
    Galant: A Graph Algorithm Animation Tool
    June 13, 2014
 
   TR-2014-5
Adam Marrs, Benjamin Watson, Chris Healey 
    Fast Multi-View Soft Shadowing via Fragment Reprojection
    May 13, 2014
 
   TR-2014-4
St. Amant, Robert
    The Use of Tools
    May 24, 2001
 
   TR-2014-3
Loftin, Robert;
MacGlashan, James;
Littman, Michael L.;
Taylor, Matthew E.;
Roberts, David L.
    A Strategy-Aware Technique for Learning Behaviors from Discrete Human Feedback
    February 25, 2014
 
   TR-2014-2
Murukannaiah, Pradeep K.;
Singh, Munindar P.
    Platys: An Active Learning Framework for Place-Aware Application Development and Its Evaluation
    September 28, 2014
 
   TR-2014-1
Hsu, Chin-Jung;
Freeh, Vincent W.
    Flow Scheduling: An Ef?cient Scheduling Method for  MapReduce Framework in the Decoupled Architecture
    January 17, 2014
 
   TR-2013-11
Balik, S.;
Mealin, S.;
Stallmann, M.;
Rodman, R.;
Glatz, M.;
Sigler, V.
    Including Blind Students in Computer Science Through Access to Graphs
    November 20, 2013
 
   TR-2013-10
KC, Kamal;
Freeh, Vincent W
    Tuning Hadoop map slot value using CPU and IO metrics
    November 6, 2013
 
   TR-2013-9
Slankas, John;
Riaz, Maria;
King, Jason;
Williams, Laurie
    Discovering Security Requirements from Natural Language Project Artifacts
    October 15, 2013
 
   TR-2013-8
Chirkova, R.;
Yu, T.
    Obtaining Information about Queries behind Views and Dependencies 
    September 30, 2013
 
   TR-2013-7
Balachander, D.;
Chirkova, R.;
Salo, T.
    The Problem of Coherence of a Distributed Hash Table
    June 19, 2013
 
   TR-2013-6
Bae, JuHee;
Setlur, Vidya;
Watson, Benjamin
    GraphTiles: Visualizing Graphs on Mobile Devices
    April 23, 2013
 
   TR-2013-5
Christensen, Johanne;
Cusick, Mark;
Villanes, Andrea;
Veryovka, Oleg;
Watson, Ben;
Rappa, Michael
    Win, Lose or Cheat: The Analytics of Player Behaviors in Online Games
    April 22, 2013
 
   TR-2013-4
Clay, Benjamin;
Shen, Zhiming;
Ma, Xiaosong
    Building and Scaling Virtual Clusters with Residual Resources from Interactive Clouds
    April 17, 2013
 
   TR-2013-3
Li, Sihan;
Xie, Tao;
Tillmann, Nikolai
    A Comprehensive Field Study of End-User Programming on Mobile Devices
    March 20, 2013
 
   TR-2013-2
Elliott, James;
Mueller, Frank;
Stoyanov, Miroslav;
Webster, Clayton
    Quantifying the Impact of Single Bit Flips on Floating Point Arithmetic
    March 12, 2013
 
   TR-2013-1
Chirkova, R.;
Yu, T.
    Detecting information leakage in database access control with help from data exchange
    February 19, 2013
 
   TR-2012-16
Halladay, J.;
Williams, Laurie;
Voud, Mladen
    On the Affordable Use, Administration, and Maintenance of Open Source Health Care IT Applications by Rural/Small-Practice Health Professionals
    December 28, 2012
 
   TR-2012-15
Chirkova, R.
    Combined-Semantics Equivalence Is Decidable for a Practical Class of Conjunctive Queries
    December 19, 2012
 
   TR-2012-14
Slankas, John;
Williams, Laurie
    Extracting Database Role Based Access Control from Unconstrained Natural Language Text
    November 2, 2012
 
   TR-2012-13
Morrison, Patrick;
Holmgreen, Casper;
Massey, Aaron;
Williams, Laurie
    Building Regulatory-Driven Automated Test Suites
    October 22, 2012
 
   TR-2012-12
Tsung-Hsuan Ho, Daniel J. Dean, Xiaohui Gu, William Enck
    Less is More: Selective Behavior Learning for Efficient Android Root Exploit Detection
    September 21, 2012
 
   TR-2012-11
Chung, Seungeun;
Lee, Kyunghan;
Wang, Shuiqing;
Rhee, Injong
    CloudBridge: A Cloud-Powered System Enabling Mobile Devices to Control Peripherals Without Drivers
    July 24, 2012
 
   TR-2012-10
Yoon, Sungro;
Jung, Bang Chul;
Lee, Kyunghan ;
Rhee, Injong
    ADOPT: Practical Add-On MIMO Receiver for Concurrent Transmissions
    July 24, 2012
 
   TR-2012-9
Riaz, Maria;
Breaux, Travis;
Williams, Laurie
    On the Design of Empirical Studies to Evaluate Software Patterns:  A Survey Study
    June 14, 2012
 
   TR-2012-8
Clay, Benjamin;
Shen, Zhiming;
Ma, Xiaosong;
Gu, Xiaohui
    Adaptive Cluster Sizing for Residual Resource Harvesting in Interactive Clouds
    May 25, 2012
 
   TR-2012-7
Carter, M.;
Fornaro, R.;
Heckman, S.;
Heil, M.
    Developing a Learning Progression that Integrates Communication in an Undergraduate CS/SE Curriculum
    May 25, 2012
 
   TR-2012-6
Jiang, Haiqing;
Wang, Yaogong;
Lee, Kyunghan;
Rhee, Injong
    Tackling Bufferbloat in 3G/4G Mobile Networks
    March 9, 2012
 
   TR-2012-5
Fiala, David;
Mueller, Frank;
Engelmann, Christian;
Ferreira, Kurt;
Brightwell, Ron;
Riesen, Rolf;
    Detection and Correction of Silent Data Corruption for Large-Scale High-Performance Computing
    May 1, 2012
 
   TR-2012-4
Balik, Suzanne P.;
Mealin, Sean P.;
Stallmann, Matthias F.;
Rodman, Robert D.
    GSK: Universally Accessible Graph SKetching
    April 26, 2012
 
   TR-2012-3
Jiang, Haiqing;
Wang, Yaogong;
Lee, Kyunghan;
Rhee, Injong
    Improving TCP Performance in Buffer-bloated Cellular Networks via Dynamic Receive Window Adjustment
    January 20, 2012
 
   TR-2012-2
Huang, R. ;
Chirkova, R.;
Fathi, Y.
    Deterministic View Selection For Data-Analysis Queries: Properties and Algorithms
    April 3, 2012
 
   TR-2012-1
Bahram, Sina
    Touch It, Key It, Speak It for Maps
    December 1, 2011
 
   TR-2011-22
Huang, R.;
Chirkova, R.;
Fathi, Y.
    Two-stage stochastic view selection for data analysis
    December 1, 2011
 
   TR-2011-21
Yavua, A.;
Ning, P.;
Reiter, M.
    Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging
    September 12, 2011
 
   TR-2011-20
Pensyl, T. ;
Huang, R.
    Generation of Non-Symmetric Synthetic Datasets
    August 12, 2011
 
   TR-2011-19
Miller, Sam A.;
Smith, Andy;
St. Amant, Robert
    A glove for rubbing and touch gestures
    July 12, 2011
 
   TR-2011-18
Liu, Y.;
Ning, P.
    BitTrickle: Defending against Broadband and High-power Reactive Jamming Attacks
    July 11, 2011
 
   TR-2011-17
Liu, Y.;
Ning, P.
    Mimicry Attacks against Wireless Link Signature and Defense using Time-Synched Link Signature
    July 11, 2011
 
   TR-2011-16
Tran M.;
Etheridge M. ;
Bletsch T.;
Jiang X.;
Freeh V.;
Ning P.
    On the Expressiveness of Return-into-libc Attacks
    June 21, 2011
 
   TR-2011-15
Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
    Detecting Capability Leaks in Android-based Smartphones
    June 21, 2011
 
   TR-2011-14
Kharbas, Kishor;
Kim, Donghoon;
KC, Kamal;
Hoefler, Torsten;
Mueller, Frank
    Failure Detection within MPI Jobs: Periodic Outperforms Sporadic
    June 15, 2011
 
   TR-2011-13
Zimmer, Christopher;
Mueller, Frank
    A Fault Observant Real-Time Embedded Design for Network-on-Chip Control Systems
    June 15, 2011
 
   TR-2011-12
Zhang, Linghao;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Jonathan;
Ma, Xiaoxing;
lv, Jian
    Automated Testing of Cloud Applications
    June 1, 2011
 
   TR-2011-11
Sarkar, Abhik ;
Mueller, Frank;
Ramaprasad, Harini
    Static Task Partitioning for Locked Caches in Multi-Core Real-Time Systems
    April 23, 2011
 
   TR-2011-10
Huang, R.;
Chirkova, R.;
Fathi, Y.
    Synthetic datasets 
    April 7, 2011
 
   TR-2011-9
Meneely, Andrew;
Rotella, Pete;
Williams, Laurie
    Does Adding Manpower Also Affect Quality? An Empirical, Longitudinal Analysis 
    April 3, 2011
 
   TR-2011-8
Huang, R.;
Chirkova, R. ;
Fathi, Y. 
    A Two-stage Stochastic View Selection Problem in Database Management Systems
    March 19, 2011
 
   TR-2011-7
Xiao, X;
Paradkar, A;
Xie, T
    Automated Extraction and Validation of Security Policies from Natural-Language Documents
    March 15, 2011
 
   TR-2011-6
Wu, Xing;
Vijayakumar, Karthik;
Mueller, Frank;
Ma, Xiaosong;
Roth, Philip
    Probabilistic Communication and I/O Tracing with Deterministic Replay at Scale
    March 15, 2011
 
   TR-2011-5
Smith, Ben;
Williams, Laurie
    On the Development of A Black Box Security Test Pattern Catalog Based on Empirical Data
    March 7, 2011
 
   TR-2011-4
Maxwell, Jeremy C.;
Anton, Annie I.;
Swire, Peter
    A Legal Cross-References Taxonomy for Identifying Conflicting Software Requirements 
    February 23, 2011
 
   TR-2011-3
Boloor, K;
Chirkova, R;
Viniotis, Y
    Management of SOA based context-aware applications hosted in a distributed cloud subject to percentile constraints
    February 22, 2011
 
   TR-2011-2
Singh, Munindar P.
    LoST: Local State Transfer---An Architectural Style for the Distributed Enactment of Business Protocols
    February 21, 2011
 
   TR-2011-1
Balik, Suzanne P
    Combinatorial Graph Creation and Navigation for Blind People
    February 4, 2011
 
   TR-2010-25
Srinivasan, D. ;
Jiang, X.
    Time-traveling Analysis of VM-based High-interaction Honeypots
    October 15, 2010
 
   TR-2010-24
Chirkova, R.
    Equivalence and Minimization of Conjunctive Queries under Combined Semantics
    December 7, 2010
 
   TR-2010-23
Horton, Thomas E.;
St. Amant, Robert;
Daughtry, John M.;
Butler, Colin G.
    Tool-based direct manipulation environments
    November 1, 2010
 
   TR-2010-22
Massey, Aaron;
Anton, Annie I.
    Triage for Legal Requirements
    October 11, 2010
 
   TR-2010-21
Thummalapenta, Suresh;
Xie, Tao
    Alattin: Mining Alternative Patterns for Defect Detection
    September 23, 2010
 
   TR-2010-20
Doyle, Jon
    Toward a quantitative theory of belief change: Structure, difficulty, and likelihood (A progress report)
    September 7, 2010
 
   TR-2010-19
Murphy-Hill, Emerson;
Murphy, Gail C
    Peer Interaction Effectively, yet Infrequently, Enables Programmers to Discover New Tools
    September 6, 2010
 
   TR-2010-18
Gerard, Scott N.;
Singh, Munindar P.
    Formalizing and Verifying Protocol Refinement
    August 27, 2010
 
   TR-2010-17
Heckman, Sarah;
Williams, Laurie
    A Systematic Literature Review of Actionable Alert Identification Techniques for Automated Static Code Analysis
    July 23, 2010
 
   TR-2010-16
Chirkova, R.;
Libkin, L.;
Reutter, J.
    Tractable XML Data Exchange via Relations
    July 19, 2010
 
   TR-2010-15
Smith, Ben;
Austin, Andrew;
Brown, Matt ;
King, Jason;
Lankford,Jerrod;
Meneely, Andrew ;
Williams, Laurie
    Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected
    June 30, 2010
 
   TR-2010-14
Stallmann, Matthias;
Brglez, Franc
    High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
    June 24, 2010
 
   TR-2010-13
Stallmann, Matthias F.;
Gupta, Saurabh 
    Bottleneck Crossing Minimization in Layered Graphs
    June 24, 2010
 
   TR-2010-12
Telang, Pankaj R.;
Singh, Munindar P.
    Specifying and Verifying Cross-Organizational Business Models: An Agent-Oriented Approach
    May 30, 2010
 
   TR-2010-11
Singh, Munindar P.;
Farcas, Emilia;
Tadanki, Kartik;
Krueger, Ingolf;
Arrott, Matthew;
Meisinger, Michael
    Governance in Sociotechnical Systems
    April 30, 2010
 
   TR-2010-10
Zhang, Lingming;
Xie, Tao;
Zhang, Lu;
Tillmann, Nikolai;
de Halleux, Jonathan;
Mei, Hong
    Test Generation via Dynamic Symbolic Execution for Mutation Testing
    May 14, 2010
 
   TR-2010-9
Marri, Madhuri;
Thummalapenta, Suresh;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Jonathan
    Retrofitting Unit Tests for Parameterized Unit Testing
    May 14, 2010
 
   TR-2010-8
Bletsch, T;
Jiang, X;
Freeh, V
    Jump-Oriented Programming: A New Class of Code-Reuse Attack
    April 16, 2010
 
   TR-2010-7
Xiao, Xusheng;
Xie, Tao;
Tillmann, Nikolai;
de Halleux, Peli
    Issue Analysis for Residual Structural Coverage in Dynamic Symbolic Execution
    March 23, 2010
 
   TR-2010-6
Shin, Yonghee;
Williams, Laurie
    Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction?
    March 7, 2010
 
   TR-2010-5
Boloor, K;
Viniotis, Y;
Chirkova, R;
Salo, T
    Online request scheduling subject to a percentile response time SLA in a distributed cloud computing system
    March 4, 2010
 
   TR-2010-4
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, and Dongyan Xu
    DKSM: Subverting Virtual Machine Introspection for Fun and Profit
    February 28, 2010
 
   TR-2010-3
Maxwell, Jeremy C.;
Anton, Annie I.
    A Refined Production Rule Model for Aiding in Regulatory Compliance
    February 5, 2010
 
   TR-2010-2
Meneely, Andrew;
Smith, Ben;
Williams, Laurie
    Software Metrics Validation Criteria: A Systematic Literature Review
    February 2, 2010
 
   TR-2010-1
Austin, Andrew;
Smith, Ben;
Williams, Laurie
    Towards Improved Security Criteria for Certification of Electronic Health Record Systems
    January 24, 2010
 
   TR-2009-23
Hyun, Sangwon;
Ning, Peng;
Liu, An;
    IR-Seluge: Interference-Resilient Code Dissemination in   Wireless Sensor Networks
    December 18, 2009
 
   TR-2009-22
Wang, Yonghong;
Singh, Munindar P.;
    Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems
    December 10, 2009
 
   TR-2009-21
Singh, Munindar P.
    Formalizing Trust as an Architectural Abstraction
    December 9, 2009
 
   TR-2009-20
Chopra, Amit K.  ;
Singh, Munindar P.;
    Commitment Alignment as a Basis for Interoperability in Service Engagements
    December 9, 2009
 
   TR-2009-19
Hazard, Christopher J.;
Singh, Munindar P.;
    Reputation Dynamics and Convergence: A Basis for Evaluating Reputation Systems
    November 23, 2009
 
   TR-2009-18
Hang, Chung-Wei;
Singh, Munindar P.
    Trustworthy Service Selection and Composition
    July 15, 2009
 
   TR-2009-17
Gegick, Michael;
Rotella, Pete;
Xie, Tao
    Identifying Security Fault Reports via Text Mining
    September 2, 2009
 
   TR-2009-16
Anton, Annie I.;
Earp, Julia B.;
Young, Jessica D.
    How Internet Users’ Privacy Concerns Have Evolved Since 2002
    July 29, 2009
 
   TR-2009-15
Wang, Chao;
Mueller, Frank;
Engelmann, Christian;
Scott, Stephen L.
    Proactive Process-Level Live Migration and Back Migration in HPC Environments
    June 5, 2009
 
   TR-2009-14
Wang, Chao;
Mueller,Frank ;
Engelmann, Christian;
Scott, Stephen L.;
    Hybrid Full/Incremental Checkpoint/Restart for MPI Jobs in HPC Environments
    June 2, 2009
 
   TR-2009-13
Amit Awekar, ;
Nagiza F. Samatova,;
Paul Breimyer
    Incremental All Pairs Similarity Search for Varying Similarity Thresholds
    May 26, 2009
 
   TR-2009-12
Amit Awekar;
Nagiza F. Samatova
    Fast Matching for All Pairs Similarity Search
    May 26, 2009
 
   TR-2009-11
Chirkova, R.;
Fletcher, George H.L.
    Towards Well-Behaved Schema Evolution
    April 28, 2009
 
   TR-2009-10
Shin, Yonghee;
Meneely, Andrew;
Williams, L.
    Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
    April 19, 2009
 
   TR-2009-9
Jadeep Marathe;
Vivek Thakkar;
Frank Mueller
    Feedback-Directed Page Placement for ccNUMA via Hardware-generated Memory Traces
    March 10, 2009
 
   TR-2009-8
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
    Systematic Exploration of Efficient Query Plans for Automated Database Restructuring
    March 4, 2009
 
   TR-2009-7
Afrati, F.;
Chandrachud, M.;
Chirkova, R.;
Mitra, P.
    Approximate Rewriting of Queries Using Views
    March 4, 2009
 
   TR-2009-6
Xie, Tao
    Improving Automation in Developer Testing: State of the Practice
    February 20, 2009
 
   TR-2009-5
Liu, Y;
Ning, P;
Reiter, M
    False Data Injection Attacks against State Estimation in Electronic Power Grids
    February 16, 2009
 
   TR-2009-4
Maxwell, Jeremey C;
Anton, Annie I
    Validating Existing Requirements for Compliance with Law Using a Production Rule Model
    February 12, 2009
 
   TR-2009-3
Michael Gegick;
Tao Xie;
Laurie Williams;
Pete Rotella
    Which Faults are Security Faults?
    February 2, 2009
 
   TR-2009-2
Shin, Kyuyong;
Reeves, Douglas S.;
Rhee, Injong;
Song, Yoonki
    Winnowing: Protecting P2P Systems Against Pollution By Cooperative Index Filtering
    January 29, 2009
 
   TR-2009-1
Gegick, Michael;
Rotella, Pete;
Williams, Laurie
    Predicting Attack-prone Components
    January 23, 2009
 
   TR-2008-29
Hang, Chung-Wei;
Wang, Yonghong;
Singh, Munindar P.
    Operators for Propagating Trust and their Evaluation in Social Networks 
    December 13, 2008
 
   TR-2008-28
Meneely, Andrew;
Williams, Laurie
    Evaluating a Suite of Developer Activity Metrics as Measures of Security Vulnerabilities
    December 11, 2008
 
   TR-2008-27
Chirkova, R.;
Genesereth, M.
    Equivalence of SQL Queries In Presence of Embedded Dependencies
    December 11, 2008
 
   TR-2008-26
Wang, Zhi;
Jiang, Xuxian;
Cui, Weidong;
Wang, Xinyuan;
    ReFormat: Automatic Reverse Engineering of Encrypted Messages
    December 10, 2008
 
   TR-2008-25
Maxwell, Jeremy C.;
Anton, Annie I.
    Using Production Rules to Aid Security Requirements Acquisition from Legal Texts
    November 29, 2008
 
   TR-2008-24
Young, Jessica D.;
Anton, Annie I.
    Analyzing Policy Commitments for Privacy and Security Requirements
    November 12, 2008
 
   TR-2008-23
Heckman, Sarah;
Williams, Laurie
    A Measurement Framework of Alert Characteristics for False Positive Mitigation Models
    October 28, 2008
 
   TR-2008-22
Smith, Ben;
Williams, Laurie
    A Survey on Code Coverage as a Stopping Criterion for Unit Testing
    September 28, 2008
 
   TR-2008-21
Williams, Laurie;
Gegick, Michael;
Meneely, Andrew
    Protection Poker:  Structuring Software Security Risk Assessment and Knowledge Transfer
    September 25, 2008
 
   TR-2008-20
Prasanth Anbalagan;
Mladen Vouk
    Reliability and Security Analysis of Open Source Software
    September 19, 2008
 
   TR-2008-19
Chen, D.;
Chirkova, R.;
Sadri, F.;
Salo, T.
    Efficient Query Processing in XML-Based Information Integration
    July 31, 2008
 
   TR-2008-18
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
    Plan-based View and Index Selection for Query-Performance Improvement
    July 31, 2008
 
   TR-2008-17
Watson, Benjamin;
Brink, David;
Stallmann, Matthias;
Devajaran, Ravinder;
Rakow, Matt,;
Rhyne, Theresa-Marie;
Patel, Himesh
    Matrix depictions for large layered graphs
    July 16, 2008
 
   TR-2008-16
Injong Rhee;
Minsu Shin;
Seongik Hong;
Kyunghan Lee;
Song Chong
    On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
    May 23, 2008
 
   TR-2008-15
Kyunghan Lee;
Seongik Hong;
Seong Joon Kim;
Injong Rhee;
Song Chong;
    Demystifying Levy Walk Patterns in Human Walks
    May 23, 2008
 
   TR-2008-14
Ajiw Warrier;
Injong Rhee
    DiffQ: Differential Backlog Congestion Control for Wireless Multi-Hop Networks
    May 23, 2008
 
   TR-2008-13
Mohan, Sibin;
Mueller, Frank
    Preserving Timing Anomalies in Pipelines of High-End Processors
    May 19, 2008
 
   TR-2008-11
Heckman, Sarah Smith;
Williams, Laurie
    On Establishing a Benchmark for Evaluating Static Analysis Alert Prioritization and Classification Techniques
    April 24, 2008
 
   TR-2006-36
Bonto-Kane, Marivic A. 
    Engineering Models of Human Performance on the Design of Mobile Device Interfaces 
    November 29, 2006
 
   TR-2008-10
Watson, B.;
Brink, D.;
Stallman, M.;
Devajaran, D.;
Rhyne, T.-M.;
Patel, H.
    Visualizing very large layered graphs with quilts
    April 8, 2008
 
   TR-2008-9
Smith, Ben;
Williams, Laurie
    On Guiding the Augmentation of an Automated Test Suite via Mutation Analysis
    February 28, 2008
 
   TR-2008-8
Michael Gegick;
Laurie Williams;
Jason Osborne
    Predicting Attack-prone Components with Internal Metrics
    February 25, 2008
 
   TR-2008-7
Gegick, Michael;
Williams, Laurie;
Vouk, Mladen
    Predictive Models for Identifying Software Components Prone to Failure During Security Attacks
    February 25, 2008
 
   TR-2008-6
Travis Breaux, Jonathan Lewis, Paul Otto, Annie I. Anton
    Identifying Vulnerabilities and Critical Requirements Using Criminal Court Proceedings
    February 12, 2008
 
   TR-2008-5
Breaux, Travis D.;
Anton, Annie I.;
Boucher, Kent;
Dorfman, Merlin
    Legal Requirements, Compliance and Practice: An Industry Case Study  in Accessibility
    February 11, 2008
 
   TR-2008-4
Shin, Yonghee;
Williams, Laurie
    Towards a Taxonomy of Techniques to Detect Cross-Site Scripting and SQL Injection Vulnerabilities
    February 2, 2008
 
   TR-2008-3
Udupi, Yathiraj B.;
Singh, Munindar P.
    Design Patterns for Policy-Based Service Engagements
    January 20, 2008
 
   TR-2008-2
Desai, Nirmit;
Chopra, Amit K. ;
Singh, Munindar P.
    Amoeba: A Methodology for Modeling and Evolution of Cross-Organizational Business Processes
    May 4, 2008
 
   TR-2008-1
Hu, Vincent C.;
Kuhn, D. Richard;
Xie, Tao;
    Property Verification for Access Control Models via Model Checking
    January 4, 2008
 
   TR-2007-36
Liu, An;
Ning, Peng
    TinyECC: A Configurable Library for Elliptic Curve Cryptography  in Wireless Sensor Networks
    November 2, 2007
 
   TR-2007-35
Acharya, Mithun;
Xie, Tao
    Static Detection of API Error-Handling Bugs via Mining Source Code
    October 15, 2007
 
   TR-2007-34
Thummalapenta, Suresh;
Xie, Tao
    SpotWeb: Characterizing Framework API Usages Through a Code Search Engine
    October 15, 2007
 
   TR-2007-33
Lechner, Tom;
Watson, Benjamin;
Wilensky, Uri;
Tisue, Seth;
Felsen, Martin;
Moddrell, Andy;
Ren, Pin;
Brozefsky, Craig
    Procedural Modeling of Urban Land Use
    October 4, 2007
 
   TR-2007-32
Kormilitsin, M.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
    View and Index Selection for Query-Performance Improvement: Algorithms, Heuristics and Complexity
    October 2, 2007
 
   TR-2007-31
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.;
Stallmann, M.
    Exact and Inexact Methods for Selecting Views and Indexes for OLAP Performance Improvement.
    October 2, 2007
 
   TR-2007-30
Chirkova, R.;
Chen, D.;
Sadri, F.;
Salo, T.J.
    Pay-As-You-Go Information Integration: The Semantic Model Approach
    October 2, 2007
 
   TR-2007-29
Warrier, A;
Rhee, I
    Rethinking Wireless MAC Architecture for Quality of Service Support – Design and Implementation
    September 21, 2007
 
   TR-2007-28
Rhee, I;
Shin, M;
Hong, S;
Lee, K;
Chong, S
    On the Levy-walk Nature of Human Mobility: Do Humans Walk like Monkeys?
    September 21, 2007
 
   TR-2007-27
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
    Exact and Inexact Methods for Solving the Problem Of View Selection for Aggregate Queries
    September 20, 2007
 
   TR-2007-26
Breaux,Travis D.;
Antón, Annie I. 
    Managing Ambiguity and Traceability in Regulatory Requirements: A Tool-supported Frame-based Approach
    September 14, 2007
 
   TR-2007-25
Martin, E;
Xie, T;
Hu, V
    Assessing Quality of Policy Properties in Verification of Access Control Policies
    September 16, 2007
 
   TR-2007-24
Thummalapenta, S;
Xie, T
    NEGWeb: Static Defect Detection via Searching Billions of Lines of Open Source Code
    September 16, 2007
 
   TR-2007-23
Lin, Heshan;
Ma, Xiaosong;
Li, Jiangtian;
Samatova, Nagiza;
Yu, Ting
    Processor and Data Scheduling for Online Parallel Sequence Database Servers
    August 20, 2007
 
   TR-2007-22
Ramaprasad, Harini;
Mueller, Frank
    Bounding Worst-Case Response Time for Tasks With Non-Preemptive Regions
    August 8, 2007
 
   TR-2007-21
Hyun, Sangwon;
Ning, Peng;
Liu, An;
Du, Wenliang;
;
    Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks
    August 5, 2007
 
   TR-2007-20
Williams, Laurie
    Lessons Learned from Seven Years of Pair Programming at North Carolina State University
    August 3, 2007
 
   TR-2007-19
Singh, Munindar P.;
Chopra, Amit K.;
Desai, Nirmit
    Commitment-Based SOA
    July 18, 2007
 
   TR-2007-18
Zheng, Jiang;
Williams, Laurie;
Robinson, Brian
    Pallino: Automation to Support Regression Test Selection for COTS-based Applications
    June 26, 2007
 
   TR-2007-17
Park, Young Hee;
Reeves, Douglas S.
    Adaptive TIming-Based Active Watermarking for Attack Attribution Through Stepping Stones
    June 26, 2007
 
   TR-2007-16
St. Amant, Robert;
Horton, Thomas E.
    Revisiting the Definition of Animal Tool Use
    June 1, 2007
 
   TR-2007-15
Wang, C;
Liu, A;
Ning, P
    Cluster-Based Minimum Mean Square Estimation for Secure and Resilient Localization in Wireless Sensor Networks
    June 4, 2007
 
   TR-2007-14
Stallmann, Matthias F;
Brglez, Franc
    High-Contrast Algorithm Behavior: Observation, Conjecture, and Experimental Design
    May 3, 2007
 
   TR-2007-13
Sherriff, Mark;
Lake, Michael;
Williams, Laurie
    Empirical Software Change Impact Analysis using Singular Value Decomposition
    April 29, 2007
 
   TR-2007-12
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
    A study of a formal model for view selection for aggregate queries
    March 27, 2007
 
   TR-2007-11
Desai, Nirmit;
Chopra, Amit K.;
Arrott, Matthew;
Specht, Bill;
Singh, Munindar P.
    Engineering Foreign Exchange Processes via Commitment Protocols
    March 1, 2007
 
   TR-2007-10
M. Latif and R. Ramaseshan and F. Mueller
    Soft Error Protection via Fault-Resilient Data Representations
    March 12, 2007
 
   TR-2007-9
Breaux,Travis D. ;
Anton, Annie I.;
    Analyzing Regulatory Rules for Privacy and Security Requirements
    February 23, 2007
 
   TR-2007-8
Martin, Evan;
Xie, Tao
    Automated Test Generation for Access Control Policies via Change-Impact Analysis
    February 19, 2007
 
   TR-2007-7
Otto, Paul N.  ;
Antón, Annie I. ;
    The Role of Law in Requirements Engineering
    February 12, 2007
 
   TR-2007-6
Breaux, Travis D.;
Anton, Annie I.;
    Impalpable Constraints: Framing Requirements for Formal Methods
    February 12, 2007
 
   TR-2007-5
Min Yeol Lim;
Vincent W. Freeh
    Determining the Minimum Energy Consumption using Dynamic Voltage and Frequency Scaling
    January 23, 2007
 
   TR-2007-4
Vincent W. Freeh;
Tyler K. Bletsch;
Freeman L. Rawson, III
    Scaling and Packing on a Chip Multiprocessor
    January 22, 2007
 
   TR-2007-3
Li, Jiangtian;
Ma, Xiaosong;
Yoginath, Srikanth;
Kora, Guruprasad;
Samatova, Nagiza
    Automatic, Transparent Runtime Parallelization of the R Scripting Language
    January 19, 2007
 
   TR-2007-2
Layman, Lucas Layman;
Williams, Laurie;
St. Amant, Robert
    Toward Reducing Fault Fix Time: Understanding Developer Behavior for the Design of Automated Fault Detection Tools, the Full Report
    January 15, 2007
 
   TR-2007-1
Nagarajan, Arun ;
Mueller, Frank
    Proactive Fault Tolerance for HPC with Xen Virtualization
    January 4, 2007
 
   TR-2006-34
Nachiappan Nagappan;
Laurie Williams;
Mladen Vouk;
Jason Osborne 
    Using In-Process Testing Metrics to Estimate Post-Release Field Quality of Java Programs
    December 29, 2006
 
   TR-2006-33
Mu, Wei
    Towards a Computational Model of Image Schema Theory
    November 29, 2006
 
   TR-2006-32
Williams, Lloyd
    Survey of Tool Use and Analysis of its Implications for the Design of Robotic Tool Users
    November 29, 2006
 
   TR-2006-31
Horton, Thomas E
    Behavior-based approaches to vision in habile robotics
    November 29, 2006
 
   TR-2006-30
Ho, Chih wei;
Williams, Laurie
    Deriving Performance Requirements and Test Cases with the Performance Refinement and Evolution Model
    November 20, 2006
 
   TR-2006-29
Chen, D. ;
Chirkova, R.;
Sadri, F.
    designing an information integration and interoperability system - first steps
    October 19, 2006
 
   TR-2006-28
Ho, Chih-wei;
Williams, Laurie
    Managing Software Performance Engineering Activities with the Performance Refinement and Evolution Model (PREM)
    September 26, 2006
 
   TR-2006-27
Breaux, Travis D,;
Anton, Annie I.
    Acquiring Software Compliance Artifacts from Policies and Regulations
    September 8, 2006
 
   TR-2006-26
Irwin, Keith;
Yu, Ting;
William H. Winsborough
    On the Modeling and Analysis of Obligations
    August 25, 2006
 
   TR-2006-25
Ho, Chih-wei;
Williams, Laurie
    An Introduction to Performance Testing
    August 20, 2006
 
   TR-2006-24
Miller, Randy;
Williams, Laurie
    Personas:  Moving Beyond Role-Based Requirements Engineering
    August 19, 2006
 
   TR-2006-23
Gegick, Michae;
Isakson, Eric;
Williams, Laurie
    An Early Testing and Defense Web Application Framework for Malicous Input Attacks
    August 19, 2006
 
   TR-2006-22
Janvi Badlaney;
Rohit Ghatol;
Romit Jadhwani
    An Introduction to Data-Flow Testing
    August 9, 2006
 
   TR-2006-21
Shin, Yonghee;
Williams, Laurie;
Xie, Tao
    SQLUnitGen: Test Case Generation for SQL Injection Detection
    August 6, 2006
 
   TR-2006-20
Ma, Xiaosong ;
Vazhkudai, Sudharshan S. ;
Freeh, Vincent W. ;
Yang, Tao ;
Simon, Tyler A.  ;
Scott, Stephen L. 
    Coupling Prefix Caching and Collective Downloads for Remote Dataset Access
    July 25, 2006
 
   TR-2006-19
Lim, Min Yeol;
Freeh, Vincent W.;
Lowenthal, David K
    Adaptive, Transparent Frequency and Voltage Scaling of Communication Phases in MPI Programs
    July 25, 2006
 
   TR-2006-18
Otto, Paul N.;
Anton, Annie I.;
Baumer, David L.
    The ChoicePoint Dilemma: How Data Brokers Should Handle the Privacy of Personal Information
    July 1, 2006
 
   TR-2006-17
Kailasam, Gayathri Tambaram ;
Kang, Jaewoo
    Efficient SKYCUBE Computation using Bitmaps
    July 12, 2006
 
   TR-2006-16
Koudas, Nick;
Srivastava, Divesh;
Yu, Ting;
Zhang, Qing
    Aggregate Query Answering on Anonymized Tables
    July 10, 2006
 
   TR-2006-15
Huang,S.;
Dutta,R.
    Dynamic Traffic Grooming: The Changing Role of Traffic Grooming
    July 7, 2006
 
   TR-2006-14
Breaux, Travis;
Anton, Annie I.;
Spafford, Eugene H.
    A Distributed Requirements Management Framework for Compliance 
    June 15, 2006
 
   TR-2006-13
Smith, Daniel M.;
Freeh, Vincent W.;
Mueller, Frank
    Asymmetric Multiprocessing for Simultaneous Multithreading Processors
    June 20, 2006
 
   TR-2006-12
Evan Martin;
Tao Xie
    Automated Mutation Testing of Access Control Policies
    May 6, 2006
 
   TR-2006-11
Wang, Yonghong;
Singh, Munindar P. 
    Trust via Evidence Combination: A Mathematical Approach Based on Certainty
    May 1, 2006
 
   TR-2006-10
Dev, K.;
Chirkova, R.
    Concurrency control in distributed caching
    April 13, 2006
 
   TR-2006-9
Breaux, Travis D. ;
Anton, Annie I.;
    An Algorithm to Generate Compliance Monitors from Regulations
    March 3, 2006
 
   TR-2006-8
Martin, E;
Xie, T;
Yu, T
    Defining and Measuring Policy Coverage in Testing Access Control Policies
    March 1, 2006
 
   TR-2006-7
Freeh, Vincent W.;
Ma, Xiaosong;
Vazhkudai, Sudharshan S.;
Strickland, Jonathan W.
    {Controlling Impact while Aggressively Scavenging Idle Resources
    February 20, 2006
 
   TR-2006-6
Breaux, Travis D.;
Anton, Annie I. ;
Vail, Matthew W.
    Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations 
    February 13, 2006
 
   TR-2006-5
Gou, G.;
Kormilitsin, M.;
Chirkova, R.
    Query evaluation using overlapping views: completeness and efficiency
    February 12, 2006
 
   TR-2006-4
Gegick, Michael;
Williams, Laurie
    Launching Automated Security Attacks through Unit-level Penetration Testing
    February 7, 2006
 
   TR-2006-3
Springer IV, Robert C.;
Lowenthal, David K.;
Rountree, Barry ;
Freeh, Vincent W.
    {Minimizing Execution Time in MPI Programs on an Energy-Constrained, Power-Scalable Cluster
    February 2, 2006
 
   TR-2006-2
Zohreh Asgharzadeh Talebi;
Rada Chirkova;
Yahya Fathi
    A Study of a Formal Model For View Selection for Aggregate Queries
    January 5, 2006
 
   TR-2006-1
Jetley, Raoul;
Iyer, Purush;
Jones, Paul
    An Approach to Revieiwng Software in Medical Devices 
    January 1, 2006
 
   TR-2005-49
Sbeity, Ihab;
Brenner, Leonardo;
Plateau, Brigitte;
Stewart, William J.
    Phase-Type Distributions in Stochastic Automata Networks
    December 20, 2005
 
   TR-2005-48
Ramaprasad, Harini;
Mueller, Frank
    Tightening the Bounds on Feasible Preemption Points
    December 19, 2005
 
   TR-2005-47
Breaux, Travis D.  ;
Anton, Annie I.  ;
Karat, Clare-Marie;
Karat, John
    Enforceability vs. Accountability in Electronic Policies
    December 10, 2005
 
   TR-2005-46
Krebs, Williams;
Ho, Chih-wei;
Williams, Laurie;
Layman, Lucas
    Rational Unified Process Evaluation Framework Version 1.0
    December 1, 2005
 
   TR-2005-45
Sherriff, Mark;
Boehm, Barry;
Williams, Laurie;
Nagappan, Nachiappan
    An Empirical Process for Building and Validating Software Engineering Parametric Models
    October 19, 2005
 
   TR-2005-44
Srikanth, Hema;
Williams, Laurie;
Osborne, Jason
    Towards the Prioritization of System Test Cases
    October 11, 2005
 
   TR-2005-43
Zhang, Q;
Yu, T
    A Frameworkfor Identifying Compromised Nodes in Sensor Networks
    September 25, 2005
 
   TR-2005-42
He, Qingfeng;
Antón, Annie I.
    Integrating Access Control Policy Specification into the Software Development Process 
    September 9, 2005
 
   TR-2005-41
Dennis, Brent M.;
Healey, Christopher G.
    A Survery of Preference Elicitation
    September 5, 2005
 
   TR-2005-40
Layman, Lucas;
Cornwell, Travis;
Williams, Laurie;
Osborne, Jason
    Personality Profiles and Learning Styles of Advanced Undergraduate Computer Science Students
    August 29, 2005
 
   TR-2005-39
Ning, P.;
Liu, A.;
Du, W.;
    Mitigating DoS Attacks against Signature-Based Broadcast Authentication in Wireless Sensor Networks
    August 23, 2005
 
   TR-2005-38
Zheng, Jiang;
Robinson, Brian;
Williams, Laurie;
Smiley, Karen
    A Lightweight Process for Change Identification and Regression Test Selection in Using COTS Components
    July 28, 2005
 
   TR-2005-37
Vazhkudai, Sudharshan S. ;
Ma, Xiaosong ;
Freeh, Vincent W. ;
Strickland, Jonathan W. ;
Tammineedi, Nandan ;
Stephen L. Scott
    FreeLoader: Scavenging Desktop Storage Resources for Scientific Data
    July 27, 2005
 
   TR-2005-36
Kappiah, Nandini;
Freeh, Vincent W.;
Lowenthal, David K.
    {Just In Time Dynamic Voltage Scaling: Exploiting Inter-Node Slack to Save Energy in MPI Programs
    July 27, 2005
 
   TR-2005-35
Kocherlakota, Sarat M.;
Healey, Christopher G.
    Summarization Techniques for Visualization of Large, Multidimensional Datasets
    July 21, 2005
 
   TR-2005-34
Asgharzadeh Talebi, Z.;
Chirkova, R.;
Fathi, Y.
    Experimental Study of an IP Model for the View Selection Problem
    July 20, 2005
 
   TR-2005-33
Seo, Sungbo;
Kang, Jaewoo;
Lee, Dongwon;
Ryu, Keun H.
    Adaptive Framework for Multivariate Stream Data Processing in Data-Centric Sensor Applications
    July 20, 2005
 
   TR-2005-32
Sawant, Amit P.;
Healey, Christopher G.
    A Survey of Display Device Properties and Visual Acuity for Visualization
    July 19, 2005
 
   TR-2005-31
Breaux, Travis D. ;
Anton, Annie I.
    Mining Rule Semantics to Understand Legislative Compliance
    June 23, 2005
 
   TR-2005-30
Kang, Jaewoo
    Data Models for Exploratory Analysis of Heterogeneous Microarray Data
    July 16, 2005
 
   TR-2005-29
Kang, Jaewoo;
Han, Tae S;
Lee, Dongwon;
Mitra, Prasenjit;
    Establishing Value Mappings Using Statistical Models and User Feedback
    July 16, 2005
 
   TR-2005-28
Kang, Jaewoo;
Lee, Dongwon;
Mitra, Prasenjit
    Identifying Value Mappings for Data Integration: An Unsupervised Approach
    July 16, 2005
 
   TR-2005-27
Zhai, Yan;
Ning, Peng;
Xu, Jun
    Integrating IDS Alert Correlation and OS-Level Dependency Tracking
    June 30, 2005
 
   TR-2005-26
Zheng, Jiang;
Williams, Laurie;
Nagappan, Nachiappan;
Snipes, Will;
Hudepohl, John;
Vouk, Mladen
    A Study of Static Analysis for Fault Detection in Software 
    June 19, 2005
 
   TR-2005-25
Shaker, Ayman;
Reeves, Douglas S.
    Self-Stabilizing Structured Ring Topology P2P Systems
    June 17, 2005
 
   TR-2005-24
Bilgin, A.;
Chirkova, R.;
Singh, M.;
Salo, T.
    Deterministic Prefetching for Container-Managed Persistence
    June 1, 2005
 
   TR-2005-23
Donggang Liu;
Peng Ning;
Wenliang Du;
    Group-Based Key Pre-Distribution in Wireless Sensor Networks
    May 26, 2005
 
   TR-2005-22
Gou, Gang;
Chirkova, Rada
    XML Query Processing: A Survey
    May 11, 2005
 
   TR-2005-21
Injong Rhee
    Randomized Dining Philosophers to TDMA Scheduling
    February 28, 2005
 
   TR-2005-20
Femal, Mark E.;
Freeh, Vincent W.
    Boosting Data Center Performance Through Non-Uniform Power Allocation
    April 20, 2005
 
   TR-2005-19
Strickland, Jonathan W. ;
Freeh, Vincent W. ;
Ma, Xiaosong ;
Vazhkudai, Sudharshan S. 
    Governor: Autonomic Throttling for Aggressive Idle Resource Scavenging
    April 20, 2005
 
   TR-2005-18
Freeh, Vincent W. ;
Lowenthal, David K. ;
Pan, Feng ;
Kappiah, Nandani 
    Using Multiple Energy Gears in MPI Programs on a Power-Scalable Cluster
    April 20, 2005
 
   TR-2005-17
Breaux, Travis;
Niehaus, James
    Requirements for a Policy-enforceable Agent Architecture
    May 14, 2005
 
   TR-2005-16
Yang, Tao;
Ma, Xiaosong;
Mueller, Frank
    Predicting Parallel Applications' Performance Across Platforms Using Partial Execution
    March 21, 2005
 
   TR-2005-15
St. Amant, Robert;
Wood, Alexander
    Tool Use for Autonomous Agents
    March 19, 2005
 
   TR-2005-14
Afrati, F;
Chirkova, R;
Mitra, P
    Information about Queries Obtained by a Set of Views
    February 28, 2005
 
   TR-2005-13
Layman, Lucas;
Williams, Laurie;
Damian, Daniela;
Buresc, Hynek
    Conjectures of Informal Communication-Centric Practices Observed in a Distributed Software Development Team
    February 28, 2005
 
   TR-2005-12
Li, J.;
Chirkova, R.;
Fathi, Y.
    An IP Model for the View Selection Problem
    February 26, 2005
 
   TR-2005-11
Pai Peng, Peng Ning, Douglas S. Reeves, and Xinyuan Wang
    Active Timing-Based Correlation of Perturbed Traffic Flows with Chaff Packets
    February 25, 2005
 
   TR-2005-10
Xinyuan Wang, Douglas S. Reeves, Peng Ning, and Fang Feng
    Robust Network-Based Attack Attribution through Probabilistic Watermarking of Packet Flows
    February 25, 2005
 
   TR-2005-9
He, Qingfeng;
Antón, Annie I.
    Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
    February 16, 2005
 
   TR-2005-8
Breaux, Travis ;
Anton, Annie
    Analyzing Goal Semantics for Rights, Permissions, and Obligations
    February 15, 2005
 
   TR-2005-7
Kohli, Pooja;
Chirkova, Rada Y.
    Cache Invalidation and Propagation in Distributed Caching
    February 15, 2005
 
   TR-2005-6
Pan, Feng;
Freeh, Vincent W.;
Smith, Daniel M.
    Exploring the Energy-Time Tradeoff in High-Performance Computing
    February 1, 2005
 
   TR-2005-5
Femal, Mark E. ;
Freeh, Vincent W. 
     Safe Overprovisioning:  Using Power Limits to Increase Aggregate Throughput
    February 1, 2005
 
   TR-2005-4
Freeh, Vincent W.;
Lowenthal, David K.;
Pan, Feng;
Kappiah, Nandini;
Springer, Rob;
    Exploring the Energy-Time Tradeoff in MPI Programs  on a Power-Scalable Cluster
    February 1, 2005
 
   TR-2005-3
Kim, K.;
Chirkova, R.
    View-Size Estimation in Self-Organizing Databases
    January 24, 2005
 
   TR-2005-2
Jiang Zheng;
Laurie Williams;
Nachiappan Nagappan;
Will Snipes;
John Hudepohl ;
Mladen Vouk1;
Kiem Ngo;
    On the Effectiveness of Static Analysis Tools for Fault-Detection
    January 11, 2005
 
   TR-2005-1
Evan Martin;
Karen Smiley
    Experiment and Comparison of Automated Static Code Analyzers and Automated Dynamic Tests
    January 11, 2005
 
   TR-2004-35
Zhu, Yifan;
Mueller, Frank
    Feedback EDF Scheduling Exploiting Hardware-Assisted Asynchronous Dynamic Voltage Scaling
    December 15, 2004
 
   TR-2004-34
Desai, Nirmit ;
Mallya, Ashok U. ;
Chopra, Amit K. ;
Singh, Munindar P. 
    Processes = Protocols + Policies
    November 15, 2004
 
   TR-2004-33
Lobo, Ruben;
Bitzer, Donald;
Vouk, Mladen
    Locally Invertible m-Dimensional Convolutional Codes
    November 23, 2004
 
   TR-2004-32
Lobo, Ruben;
Bitzer, Donald;
Voul, Mladen
    Inverses of Multivariate Polynomial Matrices using Discrete Convolution
    November 23, 2004
 
   TR-2004-31
Berenson, Sarah;
Slaten, Kelli;
Williams, Laurie;
Ho, Chih wei
    Voices of Women in a Software Engineering Course:  Reflections on Collaboration 
    November 18, 2004
 
   TR-2004-30
Breaux, Travis 
    Policy-Parametric Software
    November 17, 2004
 
   TR-2004-29
Liu, Donggang;
Ning, Peng;
Du, Wenliang
    Attack-Resistant Location Estimation in Sensor Networks
    March 15, 2004
 
   TR-2004-28
Chirkova, R.;
Afrati, F.;
Gergatsoulis, M.;
Pavlaki, V.
    Designing Views to Answer Queries under Set, Bag, and Bag-Set Semantics
    October 20, 2004
 
   TR-2004-27
Wu, Kehang;
Reeves, Douglas S.
    Capacity Planning of Survivable MPLS Networks Supporting DiffServ
    April 1, 2004
 
   TR-2004-26
Afrati, F.;
Chirkova, R.;
Gupta, S.;
Loftis, C.
    Designing and Using Views to Improve Performance of Aggregate Queries
    September 9, 2004
 
   TR-2004-25
Zhai, Yan;
Ning, Peng;
Iyer, Purush;
Reeves, Douglas
    Reasoning about Complementary Intrusion Evidence
    September 8, 2004
 
   TR-2004-24
Qingfeng He, Annie Antón
    Deriving Access Control Policies from Requirements Specifications and 
    September 2, 2004
 
   TR-2004-23
Layman, Lucas;
Williams, Laurie;
Cunningham, Lucas
    Motivations and Measurements in an Agile Case Study 
    August 26, 2004
 
   TR-2004-22
Qingfeng He, Annie I. Antón
    A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering
    August 3, 2004
 
   TR-2004-21
Anton, Annie I.;
Earp, Julia B.;
Vail, Matthew W.;
Jain, Neha;
Gheen, Carrie;
Frink, Jack
    An Analysis of Web Site Privacy Policy Evolution in the Presence of HIPAA
    July 24, 2004
 
   TR-2004-20
Chih-wei Ho;
Kelli Slaten;
Laurie Williams;
Sarah Berenson  
    Examining the Impact of Pair Programming on Female Students
    June 17, 2004
 
   TR-2004-19
William Stufflebeam, Annie I. Antón, Qingfeng He, and Neha Jain
    Specifying Privacy Policies with P3P and EPAL: Lessons Learned
    June 17, 2004
 
   TR-2004-18
Williams, Laurie A.;
Layman, Lucas;
Krebs, William
    Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.4
    June 17, 2004
 
   TR-2004-17
Tateosian, Laura G.;
Healey, Christopher G.
    NPR: Art Enhancing Computer Graphics
    May 27, 2004
 
   TR-2004-16
Chen, Bensong;
Dutta, Rudra;
Rouskas, George N
    Traffic Grooming in Star Networks
    May 24, 2004
 
   TR-2004-15
Anantaraman, Aravindh;
Seth, Kiran;
Patil, Kaustubh;
Rotenberg, Eric;
Mueller, Frank
    Exploiting VISA for Higher Concurrency in Safe Real-Time Systems
    May 3, 2004
 
   TR-2004-14
Rhee, Injong;
Lee, Jangwon
    Distributed Scalable TDMA Scheduling Algorithm}
    April 26, 2004
 
   TR-2004-13
Rhee, Injong;
Lee, Jangwon
    Energy-efficient Route-aware MAC protocols for Diffusion-based Sensor Networks
    April 26, 2004
 
   TR-2004-12
Sarah Berenson;
Kelli M. Slaten;
Laurie Williams;
    Collaboration through Agile Software Development Practices:  Student Interviews and Lab Observations
    April 26, 2004
 
   TR-2004-11
Williams, Laurie;
Krebs, William;
Layman, Lucas
    Extreme Programming Evaluation Framework for Object-Oriented Languages Version 1.3
    April 6, 2004
 
   TR-2004-10
Jackson, Laura E.;
Stallmann, Matthias F.
    Directional p-Median in Two Dimensions is NP-Complete
    March 16, 2004
 
   TR-2004-9
Nagarajan, Anita;
Marathe, Jaydeep;
Mueller, Frank
    Detailed Cache Coherence Characterization for OpenMP Benchmarks
    March 2, 2004
 
   TR-2004-8
Layman, Lucas;
Williams, Laurie;
Cunningham, Lynn
    Exploring Extreme Programming in Context:  An Industrial Case Study
    February 29, 2004
 
   TR-2004-7
Jain, Neha ;
Antón, Annie I. ;
Stufflebeam, William H. ;
He, Qingfeng
    Privacy Goal Management Tool (PGMT) Software Requirements Specification
    February 24, 2004
 
   TR-2004-6
Su, Jie;
Reeves, Douglas S
    Replica Placement with Latency Constraints in Content Distribution Networks
    February 9, 2004
 
   TR-2004-5
Nagappan, Nachiappan;
Williams, Laurie;
Vouk, Mladen;
Osborne, Jason
    Initial Results of Using In-Process Testing Metrics to Estimate Software Reliability
    January 25, 2004
 
   TR-2004-4
Jiang, Qinglin;
Reeves, Douglas S.;
Ning, Peng
    Certificate Recommendations to Improve Robustness of Webs of Trust
    January 21, 2004
 
   TR-2004-3
Williams, Laurie;
Layman, Lucas;
Krebs, William;
Antón, Annie
    Exploring the Use of a “Safe Subset” of Extreme Programming:  An Industrial Case Study
    January 20, 2004
 
   TR-2004-2
Williams, Laurie;
Krebs, William;
Layman, Lucas;
Anton, Annie
    Toward a Framework for Evaluating Extreme Programming
    January 15, 2004
 
   TR-2004-1
Williams, Laurie;
Krebs, William;
Layman, Lucas
    Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.2  
    January 5, 2004
 
   TR-2003-22
Bicici, Ergun;
St. Amant, Robert
    Reasoning about the functionality of tools and physical artifacts
    April 14, 2003
 
   TR-2003-21
Antón, Annie I.;
He, Qingfeng
    The Complexity Underlying JetBlue’s Privacy Policy Violations
    October 23, 2003
 
   TR-2003-20
Williams, Laurie A.;
Krebs, William;
Layman, Lucas
    Extreme Programming Evaluation Framework for Object-Oriented Languages -- Version 1.1  
    October 8, 2003
 
   TR-2003-19
Jiang, Q;
Reeves, D;
Ning, P;
    Improving Robustness of PGP Keyrings by Conflict Detection
    October 2, 2003
 
   TR-2003-18
William, Laurie;
Krebs, William;
Layman, Lucas;
Antón, Annie I.
    Toward an XP Evaluation Framework
    September 22, 2003
 
   TR-2003-17
Antón, Annie I.;
Bolchini, Davide;
He, Qingfeng
    The Use of Goals to Extract Privacy and Security Requirements from Policy Statements
    September 23, 2003
 
   TR-2003-16
Ning, P.;
Xu, D.
    Learning Attack Strategies from Intrusion Alerts
    August 19, 2003
 
   TR-2003-15
Nagappan, Nachiappan;
Sherriff, Mark;
Williams, Laurie
    On the Feasibility of Using Operational Profiles to Determine Software Reliability in Extreme Programming
    August 19, 2003
 
   TR-2003-14
Anton, Annie I.;
Earp, Julia B.;
Bolchini, Davide;
He, Qingfeng;
Jensen, Carlos;
Stufflebeam, William
    The Lack of Clarity in Financial Privacy Policies and the Need for Standardization 
    August 1, 2003
 
   TR-2003-13
Zhu, Yifan;
Mueller, Frank
    Feedback Dynamic Voltage Scaling DVS-EDF Scheduling:
Feedback Dynamic Voltage Scaling DVS-EDF Scheduling: Correctness and PID-Feedback
    June 25, 2003
 
   TR-2003-12
Singh, Munindar P.
    Distributed Enactment of Multiagent Flows
    May 6, 2003
 
   TR-2003-11
Srikanth,Hema;
Anton, Annie;
    Towards Achieving a Balance between Planning and Agility in Software Developm
    April 5, 2003
 
   TR-2003-10
Ning, P;
Peng, P;
Hu, Y;
Xu, D
    TIAA: A Visual Toolkit for Intrusion Alert Analysis
    March 31, 2003
 
   TR-2003-09
He, Q
    Privacy Enforcement with an Extended Role-Based Access Control Model
    February 28, 2003
 
   TR-2003-08
Liu, D; Ning, P
    Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
    March 1, 2003
 
   TR-2003-07
Ning, P; Sun, K
    How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
    February 12, 2003
 
   TR-2003-06
He, Qingfeng; Anton, Annie I.
    A Privacy Protection Comparison of Popular Web Browsers
    July 1, 2002
 
   TR-2003-05
Haygood, Hal; He, Qingfeng; Smith, Shane; Snare, Jodi
    A Privacy-Aware Database Interface
    December 10, 2002
 
   TR-2003-04
Williams, Laurie A.; Shukla, Anuja; Anton, Annie
    Pair Programming and the Factors Affecting Brooks' Law
    January 31, 2003
 
   TR-2003-03
Liu, D.; Ning, P.; Sun, K.
    Efficient and Self-Healing Group Key Distribution with Revocation Capability
    January 28, 2003
 
   TR-2003-02
Nagappan, Nachiappan; Baheti, Prashant; Williams, Laurie; Gehringer, Edward; Stotts, David
    Virtual Collaboration through Distributed Pair Programming
    January 10, 2003
 
   TR-2003-01
Weibe, Eric; Williams, Laurie; Yang, Kai; Miller, Carol
    Computer Science Attitude Survey
    January 10, 2003