Departmental Papers (CIS)

 

Follow


Papers from 2012

PDF

Declarative Networking, Boon Thau Loo and Wenchao Zhuo

PDF

An Axiomatic Memory Model for POWER Multiprocessors, Sela Mador-Haim, Luc Maranget, Susmit Sarkar, Kayvan Memarian, Jade Alglave, Scott Owens, Rajeev Alur, Milo Martin, Peter Sewell, and Derek Williams

PDF

MOSAIC: Declarative Platform for Dynamic Overlay Composition, Yun Mao, Boon Thau Loo, Zachary G. Ives, and Jonathan M. Smith

PDF

Why On-Chip Cache Coherence is Here to Stay, Milo Martin, Mark D. Hill, and Daniel J. Sorin

PDF

Multicore Acceleration for Priority Based Schedulers for Concurrency Bug Detection, Santosh Nagarakatte, Sebastian Burckhardt, Milo Martin, and Madan Musuvathi

PDF

Watchdog: Hardware for Safe and Secure Manual Memory Management and Full Memory Safety, Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic

PDF

PADS: An Approach to Modeling Resource Demand and Supply for the Formal Analysis of Hierarchical Scheduling, Anna Philippou, Insup Lee, and Oleg Sokolsky

PDF

Computational Sprinting, Arun Raghavan, Yixin Luo, Anuj Chandawalla, Marios Papaefthymiou, Kevin P. Pipe, Thomas F. Wenisch, and Milo Martin

PDF

Clinical Decision Support for Integrated Cyber-Physical Systems: A Mixed Methods Approach, Alex Roederer, Andrew R. Hicks, Enny Oyeniran, Insup Lee, and Soojin Park

PDF

Conducting Truthful Surveys, Cheaply, Aaron Roth and Grant Schoenebeck

PDF

Irrelevance, Heterogeneous Equity, and Call-by-value Dependent Type Systems, Vilhelm Sjoberg, Chris Casinghino, Nathan Collins, Ki Yung Ahn, Tim Sheard, Harley D. Eades III, Peng Fu, Garrin Kimmell, Aaron Stump, and Stephanie Weirich

PDF

Introduction to the Special Issue on Runtime Verification, Oleg Sokolsky and Grigore Roşu

PDF

Smart Alarms: Multivariate Medical Alarm Integration for Post CABG Surgery Patients, Nicholas Stevens, Ana Rosa Giannareas, Vanessa Kern, Adrian Viesca Trevino, Margaret Fortino-Mullen, Andrew King, and Insup Lee

PDF

Security and Interoperable Medical Device Systems, Part 2: Failures, Consequences and Classifications, Eugene Vasserman, Krishna Venkatasubramanian, Oleg Sokolsky, and Insup Lee

PDF

Security and Interoperable Medical Device Systems: Part 1, Krishna K. Venkatasubramanian, Eugene Vasserman, Oleg Sokolsky, and Insup Lee

PDF

Breif Announcement: A Calculus of Policy-Based Routing Systems, Anduo Wang, Carolyn Talcott, Alexander J. T. Gurney, Boon Thau Loo, and Andre Scedrov

PDF

Giving Haskell a Promotion, Stephanie Weirich, Brent A. Yorgey, Julien Cretin, Simon Peyton Jones, Dimitrios Vytiniotis, and Jose P. Magalhaes

PDF

Trust in Collaborative Web Applications, Andrew G. West, Jian Chang, Krishna Venkatasubramanian, and Insup Lee

PDF

Spamming for Science: Active Measurement in Web 2.0 Abuse Research, Andrew G. West, Pedram Hayati, Vidyasagar Potdar, and Insup Lee

PDF

Towards Content-Driven Reputation for Collaborative Code Repositories, Andrew G. West and Insup Lee

PDF

Monoids: Theme and Variations (Functional Pearl), Brent A. Yorgey

PDF

Formalizing the LLVM Intermediate Representation for Verified Program Transformations, Jianzhou Zhao, Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic

PDF

Formalizing the LLVM Intermediate Representation for Verified Program Transformations, Jianzhou Zhao, Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic

Papers from 2011

PDF

Wikipedia Vandalism Detection: Combining Natural Language, Metadata, and Reputation Features, B. Thomas Adler, Luca de Alfaro, Santiago M. Mola-Velasco, Paolo Rosso, and Andrew G. West

PDF

Nondeterministic Streaming String Transducers, Rajeev Alur and Jyotirmoy Deshmukh

PDF

Graphical Models for Bandit Problems, Kareem Amin, Michael J. Kearns, and Umar Syed

PDF

Putting Lipstick on Pig: Enabling Database-Style Workflow Provenance, Yael Amsterdamer, Susan B. Davidson, Daniel Deutch, Julia Stoyanovich, and Val Tannen

PDF

On Provenance Minimization, Yael Amsterdamer, Daniel Deutch, Tova Milo, and Val Tannen

PDF

On the Limitations of Provenance for Queries With Difference, Yael Amsterdamer, Daniel Deutch, and Val Tannen

PDF

Provenance for Aggregate Queries, Yael Amsterdamer, Daniel Deutch, and Val Tannen

PDF

Biomedical Devices and Systems Security, David Arney, Krishna Venkatasubramanian, Oleg Sokolsky, and Insup Lee

PDF

Challenges in Experimenting with Botnet Detection Systems, Adam J. Aviv and Andreas Haeberlen

PDF

Generative-Discriminitive Basis Learning for Medical Imaging, Nematollah K. Batmanghelich, Ben Taskar, and Christos Davatzikos

PDF

Optimal Lower Bounds for Universal and Differentially Private Steiner Trees and TSPs, Anand Bhalgat, Deeparnab Chakrabarty, and Sanjeev Khanna

PDF

Social Welfare in One-Sided Matching Markets Without Money, Anand Bhalgat, Deeparnab Chakrabarty, and Sanjeev Khanna

PDF

Improved Approximation Results for Stochastic Knapsack Problems, Anand Bhalgat, Ashish Goel, and Sanjeev Khanna

PDF

A Clustering Coefficient Network Formation Game, Michael Brautbar and Michael J. Kearns

PDF

Approximability of Capacitated Network Design, Deeparnab Chakraborty, Chandra Chekuri, Sanjeev Khanna, and Nitish Korula

PDF

Market Making and Mean Reversion, Tanmoy Chakraborty and Michael J. Kearns

PDF

AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP, Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, and Insup Lee

PDF

ToMaTo: A Trustworthy Code Mashup Development Tool, Jian Chang, Krishna Venkatasubramanian, Andrew G. West, Sampath Kannan, Oleg Sokolsky, Myuhng Joo Kim, and Insup Lee

PDF

Removing Abstraction Overhead in the Composition of Hierarchical Real-Time System, Sanjian Chen, Linh T.X. Phan, Jaewoo Lee, Insup Lee, and Oleg Sokolsky

PDF

Learning from Partial Labels, Timothee Cour, Benjamin Sapp, and Ben Taskar

PDF

Hiding Data and Structure in Workflow Provenance, Susan B. Davidson, Zhuowei Bao, and Sudeepa Roy

PDF

Provenance Views for Module Privacy, Susan B. Davidson, Sanjeev Khanna, Tova Milo, Debmalya Panigrahi, and Sudeepa Roy

PDF

On Provenance and Privacy, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Julia Stoyanovich, Val Tannen, and Yi Chen

PDF

Enabling Privacy in Provenance-Aware Workflow Systems, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, Julia Stoyanovich, Val Tannen, Yi Chen, and Tova Milo

PDF

Keyword Search in Workflow Repositories with Access Control, Susan B. Davidson, Soohyun Lee, and Julia Stoyanovich

PDF

Preliminary Design of the SAFE Platform, André DeHon, Ben Karel, Thomas F. Knight Jr., Gregory Malecha, Benoit Montagu, Robin Morrisett, Greg Morrisett, Benjamin C. Pierce, Randy Pollack, Sumit Ray, Olin Shivers, Johnathan Smith, and Gregory Sullivan

PDF

Multi-View Learning of Word Embeddings via CCA, Paramveer S. Dhillon, Dean Foster, and Lyle Ungar

PDF

On Some Quadratic Optimization Problems Arising in Computer Vision, Jean H. Gallier

PDF

Parametric Pseudo-Manifolds, Jean H. Gallier, Dianna Xu, and Marcelo Siqueira

PDF

Video Quality Driven Buffer Sizing via Frame Drops, Deepak Gangadharan, Linh T.X. Phan, Samarjit Chakraborty, Roger Zimmermann, and Insup Lee

PDF

Selling Privacy at Auction, Aripta Ghosh and Aaron Roth

PDF

Multi-hypothesis Motion Planning for Visual Object Tracking, Haefong Gong, Jack Sim, Maxim Likhachev, and Jianbo Shi

PDF

Controlling Complexity in Part-of-Speech Induction, João V. Graça, Kuzman Ganchev, Luísa Coheur, Fernando Pereira, and Ben Taskar

PDF

Ronciling Differences, Todd J. Green, Zachary G. Ives, and Val Tannen

PDF

Having Your Cake and Eating It Too: Routing Security with Privacy Protections, Alexander JT Gurney, Andreas Haeberlen, Wenchao Zhuo, Micah Sherr, and Boon Thau Loo

PDF

Partial Specification of Routing Configurations, Alexander JT Gurney, Limin Jia, Anduo Wang, and Boon Thau Loo

PDF

Fighting Cybercrime with Packet Attestation, Andreas Haeberlen, Pedro Fonseca, Rodrigo Rodrigues, and Peter Druschel

PDF

Differential Privacy Under Fire, Andreas Haeberlen, Benjamin C. Pierce, and Arjun Narayan

PDF

Datalog and Emerging Applications: An Interactive Turtorial, Shan Shan Huang, Todd J. Green, and Boon Thau Loo

PDF

Algorithms for the Generalized Sorting Problem, Zhiyi Huang, Sampath Kannan, and Sanjeev Khanna

PDF

Sharing Work in Keyword Search Over Databases, Marie Jacobs and Zachary G. Ives

PDF

Compression Without a Common Prior: An Information-Theoretic Justification for Ambiguity in Language, Brendan Juba, Adam T. Kalai, Sanjeev Khanna, and Madhu Sudan

PDF

Behavioral Conflict and Fairness in Social Networks, Stephen Judd, Michael J. Kearns, and Yevgeniy Vorobeychik

PDF

Delays and the Capacity of Continuous-Time Channels, Sanjeev Khanna and Madhu Sudan

PDF

A Data-Driven Appearance Model for Human Fatigue, Joseph T. Kider Jr., Kaitlin Pollock, and Alla Safonova

PDF

Fruit Senescence and Decay Simulation, Joseph T. Kider Jr., Samantha Raja, and Norman I. Badler

PDF

Safety-Assured Development of the GPCA Infusion Pump Software, BaekGyu Kim, Anaheed Ayoub, Oleg Sokolsky, Insup Lee, Paul Jones, Yi Zhang, and Raoul Jetley

PDF

Learning Determinantal Point Processes, Alex Kulesza and Ben Taskar

PDF

Declarative Policy-Based Adaptive Mobile Ad Hoc Networking, Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwish Basu, Boon Thau Loo, and Yun Mao

PDF

Declarative Automated Cloud Resource Orchestration, CHangbin Liu, Boon Thau Loo, and Yun Mao

PDF

Intelligent Camera Control Using Behavior Trees, Daniel Markowitz, Joseph T. Kider Jr., Alexander Shoulson, and Norman I. Badler

PDF

Lessons Learned from a PLTL-CS Program, Christian Murphy, Rita Powell, Kristen Parton, and Adam Cannon

PDF

On Effective Testing of Health Care Simulation Software, Christian Murphy, M. S. Raunak, Andrew King, Sanjian Chen, Christopher Imbriano, Gail Kaiser, Insup Lee, Oleg Sokolsky, Lori Clarke, and Leon Osterweil

PDF

Automatic Summarization, Ani Nenkova and Kathleen McKeown

PDF

Model-Driven Safety Analysis of Closed-Loop Medical Systems, Miroslav Pajic, Rahul Mangharam, Oleg Sokolsky, David Arney, Julian M. Goldman, and Insup Lee

PDF

Towards a Compositional Multi-Modal Framework for Adaptive Cyber-Physical Systems, Linh T.X. Phan and Insup Lee

PDF

Compositional Analysis of Real-Time Embedded Systems, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

A Semantic Framework for Mode Change Protocols, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

An Empirical Analysis of Scheduling Techniques for Real-Time Cloud-Based Data Processing, Linh T.X. Phan, Zhuoyao Zhang, Qi Zheng, Boon Thau Loo, and Insup Lee

PDF

Faster query answering in probalistic databases using read-once functions, Sudeepa Roy, Vittorio Perduca, and Val Tannen

PDF

Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries, Advaith Siddharthan, Ani Nenkova, and Kathleen McKeown

PDF

Human Model Reaching, Grasping, Looking and Sitting Using Smart Objects, D. Slonneger, Matthew Croop, J. Cytryn, Joseph T. Kider Jr., R. Rabbitz, E. Halpern, and Norman I. Badler

PDF

Challenges in the Regulatory Approval of Medical Cyber-Physical Systems, Oleg Sokolsky, Insup Lee, and Mats Heimdahl

CRAM It! A Comparison of Virtual, Live-Action and Written Training Systems for Preparing Personnel to Work in Hazardous Environments, Catherine Stocker, Benjamin Sunshine-Hill, John Drake, Ian Perera, Joseph T. Kider Jr., and Norman I. Badler

PDF

Deriving Probabilistic Databases with Inference Ensembles, Julia Stoyanovich, Susan B. Davidson, Tova Milo, and Val Tannen

PDF

Reputation-Based Networked Control With Data-Corrupting Channels, Shreyas Sundaram, Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Insup Lee, and George Pappas

PDF

Shape-based Object Detection via Boundary Structure, Alexander Toshev, Ben Taskar, and Kostas Daniilidis

PDF

Runtime Verification of Traces Under Recording Uncertainty, Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky, and Insup Lee

PDF

Generative Type Abstraction and Type-level Computation, Stephanie Weirich, Dimitrios Vytiniotis, Simon Peyton Jones, and Stephan A. Zdancewic

PDF

Binders Unbound, Stephanie Weirich, Brent A. Yorgey, and Tim Sheard

PDF

Autonomous Link Spam Detection in Purely Collaborative Environments, Andrew G. West, Avantika Agrawal, Phillip Baker, Brittney Exline, and Insup Lee

PDF

Link Spamming Wikipedia for Profit, Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, and Insup Lee

PDF

Multilingual Vandalism Detection Using Language-Independent & Ex Post Facto Evidence, Andrew G. West and Insup Lee

PDF

Towards the Effective Temporal Association Mining of Spam Blacklists, Andrew G. West and Insup Lee

PDF

What Wikipedia Deletes: Characterizing Dangerous Collaborative Content, Andrew G. West and Insup Lee

PDF

Discrimintive Image Warping with Attribute Flow, Weiyu Zhang, Praveen Srinivasan, and Jianbo Shi

PDF

Towards Self-Explaining Networks, Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr