Departmental Papers (CIS)

 

Follow

Papers from 2011

PDF

Provenance Views for Module Privacy, Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debmalya Panigrahi, and Sudeepa Roy

PDF

On Provenance and Privacy, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Julia Stoyanovich, Val Tannen, and Yi Chen

PDF

Enabling Privacy in Provenance-Aware Workflow Systems, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Julia Stoyanovich, Val Tannen, Yi Chen, and Tova Milo

PDF

Keyword Search in Workflow Repositories with Access Control, Susan B. Davidson, Soohyun Lee, and Julia Stoyanovich

PDF

Preliminary Design of the SAFE Platform, André DeHon, Ben Karel, Thomas F. Knight Jr., Gregory Malecha, Benoit Montagu, Robin Morrisett, Greg Morrisett, Benjamin C. Pierce, Randy Pollack, Sumit Ray, Olin Shivers, Johnathan Smith, and Gregory Sullivan

PDF

Multi-View Learning of Word Embeddings via CCA, Paramveer S. Dhillon, Dean Foster, and Lyle Ungar

PDF

On Some Quadratic Optimization Problems Arising in Computer Vision, Jean H. Gallier

PDF

Parametric Pseudo-Manifolds, Jean H. Gallier, Dianna Xu, and Marcelo Siqueira

PDF

Video Quality Driven Buffer Sizing via Frame Drops, Deepak Gangadharan, Linh T.X. Phan, Samarjit Chakraborty, Roger Zimmermann, and Insup Lee

PDF

Selling Privacy at Auction, Aripta Ghosh and Aaron Roth

PDF

Multi-hypothesis Motion Planning for Visual Object Tracking, Haefong Gong, Jack Sim, Maxim Likhachev, and Jianbo Shi

PDF

Controlling Complexity in Part-of-Speech Induction, João V. Graça, Kuzman Ganchev, Luísa Coheur, Fernando Pereira, and Ben Taskar

PDF

Ronciling Differences, Todd J. Green, Zachary G. Ives, and Val Tannen

PDF

Having Your Cake and Eating It Too: Routing Security with Privacy Protections, Alexander JT Gurney, Andreas Haeberlen, Wenchao Zhuo, Micah Sherr, and Boon Thau Loo

PDF

Partial Specification of Routing Configurations, Alexander JT Gurney, Limin Jia, Anduo Wang, and Boon Thau Loo

PDF

Fighting Cybercrime with Packet Attestation, Andreas Haeberlen, Pedro Fonseca, Rodrigo Rodrigues, and Peter Druschel

PDF

Differential Privacy Under Fire, Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan

PDF

Datalog and Emerging Applications: An Interactive Turtorial, Shan Shan Huang, Todd J. Green, and Boon Thau Loo

PDF

Algorithms for the Generalized Sorting Problem, Zhiyi Huang, Sampath Kannan, and Sanjeev Khanna

PDF

Sharing Work in Keyword Search Over Databases, Marie Jacobs and Zachary G. Ives

PDF

Compression Without a Common Prior: An Information-Theoretic Justification for Ambiguity in Language, Brendan Juba, Adam T. Kalai, Sanjeev Khanna, and Madhu Sudan

PDF

Behavioral Conflict and Fairness in Social Networks, Stephen Judd, Michael J. Kearns, and Yevgeniy Vorobeychik

PDF

Delays and the Capacity of Continuous-Time Channels, Sanjeev Khanna and Madhu Sudan

PDF

A Data-Driven Appearance Model for Human Fatigue, Joseph T. Kider Jr., Kaitlin Pollock, and Alla Safonova

PDF

Fruit Senescence and Decay Simulation, Joseph T. Kider Jr., Samantha Raja, and Norman I. Badler

PDF

Safety-Assured Development of the GPCA Infusion Pump Software, BaekGyu Kim, Anaheed Ayoub, Oleg Sokolsky, Insup Lee, Paul Jones, Yi Zhang, and Raoul Jetley

PDF

Learning Determinantal Point Processes, Alex Kulesza and Ben Taskar

PDF

Declarative Policy-Based Adaptive Mobile Ad Hoc Networking, Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo, and Yun Mao

PDF

Declarative Automated Cloud Resource Orchestration, CHangbin Liu, Boon Thau Loo, and Yun Mao

PDF

Intelligent Camera Control Using Behavior Trees, Daniel Markowitz, Joseph T. Kider Jr., Alexander Shoulson, and Norman I. Badler

PDF

Lessons Learned from a PLTL-CS Program, Christian Murphy, Rita Powell, Kristen Parton, and Adam Cannon

PDF

On Effective Testing of Health Care Simulation Software, Christian Murphy, M. S. Raunak, Andrew King, Sanjian Chen, Christopher Imbriano, Gail Kaiser, Insup Lee, Oleg Sokolsky, Lori Clarke, and Leon Osterweil

PDF

Automatic Summarization, Ani Nenkova and Kathleen McKeown

PDF

Model-Driven Safety Analysis of Closed-Loop Medical Systems, Miroslav Pajic, Rahul Mangharam, Oleg Sokolsky, David Arney, Julian M. Goldman, and Insup Lee

PDF

Towards a Compositional Multi-Modal Framework for Adaptive Cyber-Physical Systems, Linh T.X. Phan and Insup Lee

PDF

Compositional Analysis of Real-Time Embedded Systems, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

A Semantic Framework for Mode Change Protocols, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

An Empirical Analysis of Scheduling Techniques for Real-Time Cloud-Based Data Processing, Linh T.X. Phan, Zhuoyao Zhang, Qi Zheng, Boon Thau Loo, and Insup Lee

PDF

Faster query answering in probalistic databases using read-once functions, Sudeepa Roy, Vittorio Perduca, and Val Tannen

PDF

Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries, Advaith Siddharthan, Ani Nenkova, and Kathleen McKeown

PDF

Human Model Reaching, Grasping, Looking and Sitting Using Smart Objects, D. Slonneger, Matthew Croop, J. Cytryn, Joseph T. Kider Jr., R. Rabbitz, E. Halpern, and Norman I. Badler

PDF

Challenges in the Regulatory Approval of Medical Cyber-Physical Systems, Oleg Sokolsky, Insup Lee, and Mats Heimdahl

CRAM It! A Comparison of Virtual, Live-Action and Written Training Systems for Preparing Personnel to Work in Hazardous Environments, Catherine Stocker, Benjamin Sunshine-Hill, John Drake, Ian Perera, Joseph T. Kider Jr., and Norman I. Badler

PDF

Deriving Probabilistic Databases with Inference Ensembles, Julia Stoyanovich, Susan B. Davidson, Tova Milo, and Val Tannen

PDF

Reputation-based Networked Control with Data-Corrupting Channels, Shreyas Sundaram, Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Insup Lee, and George Pappas

PDF

Shape-based Object Detection via Boundary Structure, Alexander Toshev, Ben Taskar, and Kostas Daniilidis

PDF

Runtime Verification of Traces under Recording Uncertainty, Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky, and Insup Lee

PDF

Generative Type Abstraction and Type-level Computation, Stephanie Weirich, Dimitrios Vytiniotis, Simon Peyton Jones, and Stephan A. Zdancewic

PDF

Binders Unbound, Stephanie Weirich, Brent A. Yorgey, and Tim Sheard

PDF

Autonomous Link Spam Detection in Purely Collaborative Environments, Andrew G. West, Avantika Agrawal, Phillip Baker, Brittney Exline, and Insup Lee

PDF

Link Spamming Wikipedia for Profit, Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, and Insup Lee

PDF

Multilingual Vandalism Detection using Language-Independent & Ex Post Facto Evidence, Andrew G. West and Insup Lee

PDF

Towards the Effective Temporal Association Mining of Spam Blacklists, Andrew G. West and Insup Lee

PDF

What Wikipedia Deletes: Characterizing Dangerous Collaborative Content, Andrew G. West and Insup Lee

PDF

Discrimintive Image Warping with Attribute Flow, Weiyu Zhang, Praveen Srinivasan, and Jianbo Shi

PDF

Towards Self-Explaining Networks, Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

Secure Network Provenance, Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

TAP: Time-Aware Provenance for Distributed Systems, Wenchao Zhuo, Ling Ding, Andreas Haeberlen, Zachary G. Ives, and Boon Thau Loo

PDF

Secure Network Provenance, Wenchao Zhuo, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

Secure Network Provenance, Wenchao Zhuo, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

NetTrails: A Declarative Platform for Maintaining and Querying Provenance in Distributed Systems, Wenchao Zhuo, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, and Micah Sherr

Papers from 2010

PDF

Simulating Human Activities for Synthetic Inputs to Sensor Systems, Jan Allbeck and Norman I. Badler

PDF

Temporal Reasoning for Procedural Programs, Rajeev Alur and Swarat Chaudhuri

PDF

Generating Reliable Code from Hybrid-Systems Models, Madhukar Anand, Sebastian Fischmeister, Yerang Hur, Jesung Kim, and Insup Lee

PDF

Model-based Programming of Modular Robots, David Arney, Sebastian Fischmeister, Insup Lee, Yoshihito Takashima, and Mark Yim

PDF

Toward Patient Safety in Closed-Loop Medical Device Systems, David Arney, Miroslav Pajic, Julian M. Goldman, Insup Lee, Rahul Mangharam, and Oleg Sokolsky

PDF

Approximating Pure Nash Equilibrium in Cut, Party Affiliation, and Satisfying Games, Anand Bhalgat, Tanmoy Chakraborty, and Sanjeev Khanna

PDF

Class-Level Spectral Features for Emotion Recognition, Dmitri Bitouk, Ragini Verma, and Ani Nenkova

PDF

Local Algorithms for Finding Interesting Individuals in Large Networks, Michael Brautbar and Michael J. Kearns

PDF

Private and Third-Party Randomization in Risk-Sensitive Equilibrium Concepts, Michael Brautbar, Michael J. Kearns, and Umar Syed

PDF

Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing, Patrick Briest, Parinya Chalermsook, Sanjeev Khanna, Bundit Laekhanukit, and Danupon Nanongkai

PDF

Model Checking of Linearizability of Concurrent List Implementations, Pavol Cerný, Arjun Radhakrishnan, Damien Zufferey, Swarat Chaudhuri, and Rajeev Alur

PDF

A Behavioral Study of Bargaining in Social Networks, Tanmoy Chakraborty, Stephen Judd, Michael J. Kearns, and Jinsong Tan

PDF

A Bi-Labeling Based XPath Processing System, Yi Chen, Susan B. Davidson, and Yifei Zheng

Talking Pictures: Temporal Grouping and Dialog-Supervised Person Recognition, Timothee Cour, Benjamin Sapp, Akash Nagle, and Ben Taskar

PDF

Privacy Issues in Scientific Workflow Provenance, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, and Sarah Cohen Boulakia

PDF

Permission to Speak: A Logic for Access Control and Conformance, Nikhil Dinesh, Aravind Joshi, Insup Lee, and Oleg Sokolsky

PDF

Notes on RSA, Jean H. Gallier

PDF

Notes on the Schur Complement, Jean H. Gallier

PDF

Posterior Regularization for Structured Latent Varaible Models, Kuzman Ganchev, João Graça, Jennifer Gillenwater, and Ben Taskar

PDF

Censored Exploration and the Dark Pool Problem, Kuzman Ganchev, Michael J. Kearns, Yuriy Nevmyvaka, and Jennifer Wortman Vaughn

PDF

Sparsity in Dependency Grammar Induction, Jennifer Gillenwater, Kuzman Ganchev, Joao V. Graca, Fernando Pereira, and Ben Taskar

PDF

Perfect Matchings in O(n log n) Time in Regular Bipartite Graphs, Ashish Goel, Michael Kapralov, and Sanjeev Khanna

PDF

Contracts Made Manifest, Michael Greenberg, Benjamin C. Pierce, and Stephanie Weirich

PDF

Provenance in ORCHESTRA, Todd J. Green, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen

PDF

Accountable Virtual Machines, Andreas Haeberlen, Paarijaat Aditya, Rodrigo Rodrigues, and Peter Druschel

PDF

Overcoming and Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically, Matthew Hicks, Murph Finnicum, Samuel T. King, Milo Martin, and Jonathan M. Smith

PDF

Symmetric Lenses, Martin Hoffmann, Benjamin C. Pierce, and Daniel Wagner

PDF

Automated Test Coverage Measurement for Reactor Protection System Software implemented in Function Block Diagram, Eunkyoung Jee, Suin Kim, Sungdeok Cha, and Insup Lee

PDF

Assurance Cases in Model-Driven Development of the Pacemaker Software, Eunkyoung Jee, Insup Lee, and Oleg Sokolsky

PDF

A Safety-Assured Development Approach for Real-Time Software, Eunkyoung Jee, Shaohui Wang, Jeong Ki Kim, Jaewoo Lee, Oleg Sokolsky, and Insup Lee

PDF

Dependent types and Program Equivalence, Limin Jia, Jianzhou Zhao, Vilhelm Sjoberg, and Stephanie Weirich

PDF

Behavioral Dynamics and Influence in Networked Coloring and Consensus, Stephen Judd, Michael J. Kearns, and Yevgeniy Vorobeychik

PDF

Representation Dependence Testing Using Program Inversion, Aditya Kanade, Rajeev Alur, Sriram Rajamani, and Ganesan Ramalingam

PDF

Querying Data Provenance, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen

PDF

Empirical Limitations on High Frequency Trading Profitability, Michael J. Kearns, Alex Kulesza, and Yuriy Nevmyvaka

PDF

Prototyping Closed Loop Physiologic Control with the Medical Device Coordination Framework, Andrew King, Dave Arney, Insup Lee, Oleg Sokolsky, John Hatcliff, and Sam Procter

PDF

GSA: A Framework for Rapid Prototyping of Smart Alarm Systems, Andrew King, Alex Roederer, David Arney, Sanjian Chen, Margaret Fortino-Mullen, Ana Giannareas, C. William Hanson III, Vanessa Kern, Nicholas Stevens, Jonathan Tannen, Adrian Viesca Trevino, Soojin Park, Oleg Sokolsky, and Insup Lee

PDF

Structured Determinantal Point Processes, Alex Kulesza and Ben Taskar

PDF

Medical Cyber Physical Systems, Insup Lee and Oleg Sokolsky