| Author |
Title |
Date Publ. |
| Mohammed Al-Saleh |
Fine-grained Reasoning About the Security and Usability Trade-off in
Modern Security Tools |
07/2011 |
| Charles Donour Sizemore |
Parallel Network Protocol Stacks Using Replication |
07/2011 |
| Kenneth Letendre |
Simulating the Evolution of Recruitment Behavior in Foraging Ants |
12/2010 |
| Roshan Ram Rammohan |
Three Algorithms for Casual Learning |
12/2010 |
| Mark Fleharty |
Molecular Simulations of Dendritic Molecules: A Study of PAMAM and
Phenyl-Acetylene |
07/2010 |
| Navin Rustagi |
Security in Network Games |
07/2010 |
| Kshanti A. Greene |
Collective Belief Models for Representing Consensus and Divergence in
Communities of Bayesian Decision- Makers |
05/2010 |
| Manjunath Gorentla Venkata |
A Protocol Reconfiguration and Optimization System for MPI |
05/2010 |
| Nicholas Dylan Pattengale |
Efficient Algorithms for Phylogenetic Post-Analysis |
05/2010 |
| Amitabh Trehan |
Algorithms for Self-Healing Networks |
05/2010 |
| Jun Zhang |
Markov Random Field Modeling of the Spatial Distribution of Proteins on
Cell Membranes |
05/2010 |
| Sean Brennan |
Reconfigurable Middleware Architectures for Large Scale Sensor Networks |
12/2009 |
| Stephan Falke |
Term Rewriting with Built-In Numbers and Collection Data Structures |
12/2009 |
| Sushmita Roy |
Learning Condition-specific Networks |
12/2009 |
| Guanyu Wang |
Supervised Manifold Distance Segmentation |
12/2009 |
| Anthony Campisi |
An Emotion Model for Non Player Characters in Computer Games |
05/2009 |
| Josh Karlin |
Distributed Internet Security and Measurement |
05/2009 |
| Edgar Leon Borja |
Improving the Performance of Parallel Scientific Applications Using
Cache Injections |
05/2009 |
| James Horey |
A Hierarchical Group Model for Programming Sensor Networks |
12/2008 |
| Mark Marron |
Modeling the Heap: A Practical Approach |
12/2008 |
| Mario Mendez-Lojo |
A Generic Approach to Bytecode Analysis |
12/2008 |
| Jorge Navas Laserna |
Analysis and Inference of Resource Usage Information |
12/2008 |
| Martha O. Perrez-Arriaga |
Evolving Neural Network Architectures: Simulated Evolution of Brains |
12/2008 |
| Eric Delarosa Trias |
Leveraging Positive and Negative Representations of Information |
12/2008 |
| Nathan Fabian |
Machine Learning of Human Behavior in Interactive Games |
07/2008 |
| Nikita Sakhanenko |
Cosmos: A Context-Sensitive Probabilistic Modeling System |
07/2008 |
| Todd Kaplan |
Evolving Software Traders and Detecting Community Structure in Financial
Markets |
05/2008 |
| Tiffany Pierce |
Inference of Large-Scale Structure in Networks |
05/2008 |
| Nathan Swanson |
Computer-Assisted Dynamic Gamma Knife Radiosurgery |
05/2008 |
| Mark Waligora |
Virtual Windows: Designing and implementing a system for ad-hoc
positional based rendering |
05/2008 |
| Ahmad Douglas |
A scalable Experiment Management System |
12/2007 |
| Vickrant Gaur |
Leaf Sequencing Algorithm for Reducing the Number of MLC Apertures for
Step-and Shoot IMRT |
12/2007 |
| Warren Lee Hunt |
Scale Invariant Raster Image Representation Through Topological Encoding |
12/2007 |
| Haixia Jia |
Hard Instances with Hidden Solutions |
12/2007 |
| Monique Morin |
Phylogenetic networks: Simulation, Characterization, and Reconstruction |
12/2007 |
| Michael Ritthaler |
Bayesian Belief Networks for Astronomical Object Recognition and
Classification in CTI-II |
12/2007 |
| Wenbin Zhu |
Lightweight Online Performance Monitoring and Running with Embedded
Gossip |
12/2007 |
| John Berge |
Learning Bayesian Networks from Hierarchically Related Data with a
Neuroimaging Application |
07/2007 |
| Eric Gottlieb |
A Unifying Framework for Computing the Robinsons-Foulds Metric |
07/2007 |
| Robert Abbott |
Automated Tactics Modeling: Techniques and Applications |
05/2007 |
| Kenneth L. Ingham III |
Anomaly Detection for HTTP Intrusion Detection: Algorithm Comparisons and the Effect of Generalization on Accuracy |
05/2007 |
| Sergy M. Plis |
Improving the Information Derived from Human Brain Mapping Experiments |
05/2007 |
| Torsten A. Staab |
Residual Information on Sanitized Magnetic Media |
05/2007 |
| Rory McGuire |
Automated Quality Assurance of Plain Radiographs |
05/2007 |
| Soraya Abad Mota |
Document Interrogation: Architecture, Information Extraction, Approximate Answers |
12/2006 |
| Aaron Julian Clauset |
Structural Inference and the Statistics of Networks |
12/2006 |
| Keith Wiley |
Druid: representation of Interwoven Surfaces in 2 1/2D Drawing |
7/2006 |
| Carlos Fernando Esponda |
Negative Representations of Information |
12/2005 |
| Hajime Inoue |
Anomaly Detection in Dynamic Execution Environments |
12/2005 |
| Patricia Gilfeather |
Splintering Commodity Network Protocols in High-Performance Computing |
7/2005 |
| Vishal Sanwalani |
Application of the Probabilistic Method to Random Graphs |
7/2005 |
| Michael Collins |
Two Studies in Combinatorial Optimization: Contact-Map Overlap and Minimum-Bends TSP |
5/2005 |
| Elena Gabriela Barrantes Sliesarieva |
Automated Methods for Creating Diversity in Computer Science |
5/2005 |
| Dennis Chao |
Modeling the cytotoxic T-cell response |
12/2004 |
| Theodore Van Belle |
Modularity and the Evolution of Software Evolvability |
12/2004 |
| Christina Warrender |
Modeling Intercellular Interactions in the Peripheral Immune System |
12/2004 |
| Kenneth Moreland |
Fast High Accuracy Volume Rendering |
7/2004 |
| Jijun Tang |
Large-scale Phylogenetic Reconstruction from Arbitrary Gene-order Data |
7/2004 |
| Jared Dreicer |
High Performance Computing Spare Replacement Hardware Fault Tolerance |
5/2004 |
| Daniel Pless |
First-Order Stochastic Modeling |
8/2003 |
| Arthur Chtcherba |
A new Sylvester-type Resultant Method based on the Dixon-Bezout Formulation |
7/2003 |
| Stephen Verzi |
Extensions to Fuzzy ARTMAP Based on Structural Risk |
5/2003 |
| Kenneth Summers |
Visualization of Programs Using Proximity to Trigger Continuous Semantic
Zooming: An Experimental Study |
12/2002 |
| Rolf Riesen |
Message-Based, Error-Correcting Protocols for Scalable High-Performance
Networks |
5/2002 |
| Anil Somayaji |
Operating System Stability and Security through Process Homeostasis |
5/2002 |
| Chu Jong |
A Framework for Scalable Performance Tools |
8/2001 |
| Joseph Lewis |
Self-Organizing Adaptive Representation in a Behavior - Based Robot |
5/2001 |
| Lisa Maynes |
A Software Framework for Engineering Analysis Process Management |
5/2001 |
| Patrik D'Haeseleer |
Reconstructing Gene Networks from Large Scale Gene Expression Data |
12/2000 |
| Srinivas Doddi |
Approximation Algorithms for Geometric Packing and Covering Problems |
12/2000 |
| Willem Hordijk |
Dynamics, Emergent Computation, and Evolution in Cellular Automata |
12/1999 |
| Jonathan Helfman |
Image Representations for Access and Similarity-Based Organization of Web
Information |
12/1999 |
| Steven A. Hofmeyr |
An Immunological Model of Distributed Detection and its Application to
Network Security |
5/1999 |
| Mihaela L. Oprea |
Optimizing the Antibody Repertoire for Pathogen Recognition |
5/1999 |
| Jason E. Stewart |
Single Display Groupware |
5/1999 |
| Patricia J. Crossno |
IsoSurface Extraction from Volume Data Using Particle Systems |
12/1998 |
| William B. Klein |
A Software Architecture for Intelligent Control |
12/1997 |
| Derek Smith |
The Cross-Reactive Immune Response: Analysis, Modeling, and Application
to Vaccine Design |
12/1997 |
| Timothy Harold Kaiser |
Dynamic Load Distributions for Adaptive Computations on MIMD Machines using
hybrid Genetic Algorithms |
5/1997 |
| Philip L. Campbell |
Using Execution Discipline to Accelerate Computer Programs |
5/1997 |
| Ron R. Hightower |
Computational Aspects of Antibody Gene Families |
12/1996 |
| Francisco Reverbel |
Persistence in Distributed Object Systems: ORB/ODBMS Integration |
5/1996 |
| Carl R. Stern |
An Architecture for Diagnosis Employing Schema-Based Abduction |
5/1996 |
| Terry Jones |
Evolutionary Algorithms, Fitness Landscapes and Search |
5/1995 |
| Ksheerabdhi Krishna |
Representing and Extracting Program Dependences |
12/1994 |
| Victor Winter |
Proving the Correctness of Program Transformations |
8/1994 |
| Anne M. Cable |
Data Updates and Integrity Checking in Transformed Deductive Databases |
5/1993 |
| Ali Asghar Kooshesh |
Structuring Techniques For Path And Visibility Problems |
12/1992 |
| Stephen Randolph Wheat |
A Fine Grained Data Migration Approach To Application Load Balancing on
MP MIMD Machines |
12/1992 |
| Long Chyr Chang |
Parallel Algorithms For Surface Intersection For Free-Form Solid Modeling
System |
5/1991 |
| Mark Hoover |
Complexity, Structure, and Algorithms for Edge-Partition Problems |
12/1990 |
| Hsin-Cheng Tsen |
Computer Network Topology and Distributed Database System Design: Exploring
the P/NPC Boundary |
12/1990 |
| Craig Allen Morgenstern |
Algorithms For General Graph Coloring |
12/1990 |
| Author |
Title |
Date Publ. |
| Ron Hospelhorn |
Implementation of Steerable Pyramids with Hexagonal Sampling |
12/2006 |
| Jim Xiong |
Real-Time Applications in Fulldome Theater Systems |
12/2006 |
| Ryan Custer |
Identifying Necessary Rights: Expression Language Elements For Digital Protection of Classified Information |
7/2006 |
| Ravi Kiran Gorrepati |
Design and Implementation of a Baseline Port of the Jikes Research |
7/2006 |
| Anuj Gupta |
Inference in Semi-Makov Dynamic Baysesian Networks |
7/2006 |
| Erik Lee |
Incremental Program Data Type Discovery in Binary Executables |
7/2006 |
| Sheela Vats |
Framework for Client Anonymity in Location Aware Wireless Services |
7/2006 |
| Maxwell Young |
Making Chord robust to Byzantine Attack |
7/2006 |
| Santosh Bangera |
Computational Peridynamic Modeling of Concrete Structures |
5/2006 |
| I-Ching Bowman |
Self-healing Networks |
5/2006 |
| Moulik Kothari |
Phylogeny reconstruction using transpositions |
5/2006 |
| Sirisha Muppavarapu |
Analysis of Unified Parallel C (UPS) Using a Sequence Alignment Problem |
5/2006 |
| Sreejith Vijayan |
Computational Approaches to Determine Structure ActivityRelationship (SAR) of Small Peptides and Non-Petides |
5/2006 |
| William Jake Proctor |
A New Algorithm for Reducing Delivery Time of Radiation Therapy |
5/2006 |
| Ben Andrews |
Games, Strategies, and Boolean Formula Manipulation |
12/2005 |
| Christopher Davis |
Graphics Processing Unit Computation of Neural Networks |
12/2005 |
| Anshul Shekhon |
A New Tool for Option Valuation and Analysis |
12/2005 |
| Galen Shipman |
Infiniband Scalability in Open MPI |
12/2005 |
| James Tanzola |
An Implementation of the Doddi/Marathe/Moret K-Position Map Labeling Algorithm |
12/2005 |
| Sahar Abubucker |
Machine Learning Approaches to siRNA Efficacy Prediction |
7/2005 |
| John Alphonse |
Reduced Latency Searches for Unstructured Peer-to-Peer Networks |
7/2005 |
| Meenakshi Balasubramanian |
Design and Implementation of Scalable Synthetic Compact Application (SSCA) Graph Theoretic Benchmark using Unified Parallel C (UPC) |
7/2005 |
| Justin Balthrop |
RIOT: A Responsive System for Mitigating Computer Network Epidemics and Attacks |
7/2005 |
| Vikas Hamine |
Evaluating Augmented Bayesian Classifiers on Gene Expression Data |
7/2005 |
| Vamsikrishna Kalapala |
A Compilation of Results on Phase Transitions, Scale-Invariance |
7/2005 |
| Sunghee Lee |
Approximate Bottom Line Dee (Dead End Elimination): Hybrid Bottom Line DEE and Split DEE |
7/2005 |
| Joel Castellanos |
Automatic Synthesis of Isotropic Textures on Surfaces from Sample Images |
5/2005 |
| Chunai Cai |
Parameterized Phase Screen Modeling for Very Large Array |
5/2005 |
| Chayan Chakrabarti |
First-Order Stochastic Systems for Diagnosis and Prognosis |
5/2005 |
| Sheldon Dealy |
Modeling Pathways of Cell Differentiation in Genetic Regulatory Networks with Random Boolean Networks |
5/2005 |
| Pramod Jamkhedkar |
A Framework for DRM as a Layered System |
5/2005 |
| Haixia Jia |
Generating hard satisfiable 3-SAT instances |
5/2005 |
| Mahesh Madhav Kulkarni |
Consensus Methods Using Phylogenetic Databases |
5/2005 |
| Nicholas Pattengale |
Tools for Phylogenetic Postprocessing |
5/2005 |
| Sushmita Roy |
A Machine Learning Approach for Biological Information Extraction |
5/2005 |
| Zak Von Betz |
A New Optimization Criterion for Constructing Phylogenies from Pairwise
Distances |
12/2004 |
| Mihaela Florina Cazacu |
Towards Reducing the Communication Overhead in Byzantine Agreement |
12/2004 |
| Lozanne Chavez |
Identifying Documents for Summarization Using N-Grams |
12/2004 |
| Tao Liu |
Phylogeny Reconstruction from Gene Order Data: Inversion/Deletion Distances
Computation and Quartet-based Method |
12/2004 |
| Ying Ning |
Rolling on Loops: the Stochastic Modeling Engine |
12/2004 |
| Kavin Puranik |
A Protocol for Secure Communication and PKI for Narrowband PCS Wireless
Networks |
12/2004 |
| Joel Visser Earnest-DeYoung |
Reversing Gene Erosion: Reconstructing Ancestral Bacterial Gene Orders |
7/2004 |
| Jinhui Ding |
An Analysis of Binning Heuristics Using Bayesian Metric and Minimal Description
Length |
5/2004 |
| Mykola Dudar |
Design of a Scientific Data Warehouse for Research in Genomics and Bioinformatics |
5/2004 |
| Sangh Gautam |
Modeling Orientation Preference Structure by Minimizing Wirelength in a
Cortical Circuit |
5/2004 |
| Satish Sambasivan |
Design of Trouble Ticketing System |
5/2004 |
| Sean Brennan |
Distributed Sensor Network Software Development Testing Through Simulation |
12/2003 |
| Sergiy Kyrylkov |
Jikes Research Virtual Machine Design and Implementation Of a 64-bit PowerPC
Port |
12/2003 |
| Qian Liang |
The Evolution of Mulan: Some Studies in Game-Tree Pruning and Evaluation
Functions in the Game of Amazons |
12/2003 |
| Trek Palmer |
Design and Implementation of Sind, a Dynamic Binary Translator |
12/2003 |
| Prasanna Sridhar |
A Framework for Multi-agent Discrete Event Simulation: V-LAB® |
11/2003 |
| Anna Tholse |
Phylogenetic Networks |
8/2003 |
| Qingfeng Duan |
A Tool for Monitoring and Recording Heap-Allocated Object Behavior |
6/2003 |
| Cong, Ye |
The Effects of the Network on Parallel Rendering |
5/2004 |
| Zhou, Cheng |
Development of Three Dimensional Visualizations of Extreme-Scale Supercomputer
Switch Traffic Simulations |
5/2004 |
| Tang, Peng |
Application of Non-Parametric Texture Synthesis to Image Inpainting |
5/2004 |
| Boocha, Vinay Kumar Reddy |
Parallel and Serial Techniques for Speeding Up Beam Interaction Codes |
7/2003 |
| Fricke, George Matthew |
Phylogenetic Reconstruction with Competitive Neural Networks |
7/2003 |
| Guo, Dongshan |
Predictive Head Tracking in the Flatland Virtual Environment |
07/2003 |
| Duan, Qingfeng |
A Tool for Monitoring and Recording Heap-Allocated Object Behavior |
12/2003 |
| Harrison, Carol |
Data Mining Using Web Spiders |
12/2003 |
| Jingkun Yu |
Solving the Box Containing Problem with Different Data Structures |
5/2002 |
| Li Zhang |
MEG Event Display Tool: TDNN Show |
5/2002 |
| Mahin Mahmoodi |
A Study of Blocked, Recursive Algorithms and Blocked Data Structures for
Gaussian Elimination Executing on Modern Cache-Based Computers |
5/2002 |
| Wenbin Zhu |
OS - Bypass, Investigation and Experimenting |
5/2002 |
| Christopher Lamb |
Evolutionary Defenses to Denial of Service Attacks |
12/2001 |
| Dennis Lucero |
Transient Cplant |
12/2001 |
| Ge Li |
Parallel Rendering for High Resolution Displays |
12/2001 |
| Jiaye Zhou |
Constructing Regulatory Networks from Gene Expression Data Using Association
Rule Mining |
12/2001 |
| Jijun Tang |
A Study of Bounding Methods for Reconstructing Pylogeny by Gene-Order Data |
12/2001 |
| Kim Edlund |
Quantitative Evaluation of Feature-Based Multi-Resolution Volume |
12/2001 |
| Robert Abbott |
Cancer Sim-A Computer Based Model for the Hallmarks of Cancer |
12/2001 |
| Adam Siepel |
Exact Algorithms for the Reversal Median Problem |
8/2001 |
| Yan Xu |
Convex Hull Algorithm Experiments |
8/2001 |
| Chengyi Gao |
Mining Association Rules with Item Constraints |
5/2001 |
| Gerald Mayer |
Probablistic Modeling of Technology Hierarchies Using Bayesian Networks |
5/2001 |
| Daniel Small |
Real - Time Shape From - Silhouette |
5/2001 |
| Jun Zhang |
Object-oriented Particle Systems for Visualization |
5/2001 |
| Curtis Sirl-Moore |
Automatic Synthesis of Isotropic Textures on the Sphere from Sample Images
Using the Laplacian Pyramid Transform |
12/2000 |
| Elena Settani |
Improving Dorm Room Assignments Using Simulated Annealing |
12/2000 |
| Junli Zhang |
Parallel Inference Algorithms for Stochastic Models |
12/2000 |
| Rongkun Zhao |
Comparison Between Inference Algorithms for Bayesian Networks |
12/2000 |
| Steve Johnson |
Scaleable and Expandable Architectures for Distributed Military Simulation
And the Virtual Interactive Environment Worldspace
|
5/2000 |
| Torsten Albert Staab |
The Laboratory Equipment Control Interface Specification (LECIS) |
12/1998 |
| Jason S. Smith |
An Automated Hierarchical Graphical User Interface and Report Generator |
8/1998 |
| Edward Joseph Campbell |
Information Prioritization Under the Independent Attribute Fields Hypothesis |
5/1996 |