Departmental Papers (CIS)

Departmental Papers (CIS)

 

Our faculty have research activities across many areas of computer science and are from schools throughout Penn, including Penn Engineering and the School of Arts and Sciences. For more information about CIS research, visit our research areas page.

Follow


Papers from 2011

CRAM It! A Comparison of Virtual, Live-Action and Written Training Systems for Preparing Personnel to Work in Hazardous Environments, Catherine Stocker, Benjamin Sunshine-Hill, John Drake, Ian Perera, Joseph T. Kider Jr., and Norman I. Badler

PDF

Deriving Probabilistic Databases with Inference Ensembles, Julia Stoyanovich, Susan B. Davidson, Tova Milo, and Val Tannen

PDF

Reputation-Based Networked Control With Data-Corrupting Channels, Shreyas Sundaram, Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Insup Lee, and George Pappas

PDF

Shape-based Object Detection via Boundary Structure, Alexander Toshev, Ben Taskar, and Kostas Daniilidis

PDF

Runtime Verification of Traces Under Recording Uncertainty, Shaohui Wang, Anaheed Ayoub, Oleg Sokolsky, and Insup Lee

PDF

Generative Type Abstraction and Type-level Computation, Stephanie Weirich, Dimitrios Vytiniotis, Simon Peyton Jones, and Stephan A. Zdancewic

PDF

Binders Unbound, Stephanie Weirich, Brent A. Yorgey, and Tim Sheard

PDF

Autonomous Link Spam Detection in Purely Collaborative Environments, Andrew G. West, Avantika Agrawal, Phillip Baker, Brittney Exline, and Insup Lee

PDF

Link Spamming Wikipedia for Profit, Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, and Insup Lee

PDF

Multilingual Vandalism Detection Using Language-Independent & Ex Post Facto Evidence, Andrew G. West and Insup Lee

PDF

Towards the Effective Temporal Association Mining of Spam Blacklists, Andrew G. West and Insup Lee

PDF

What Wikipedia Deletes: Characterizing Dangerous Collaborative Content, Andrew G. West and Insup Lee

PDF

Discrimintive Image Warping with Attribute Flow, Weiyu Zhang, Praveen Srinivasan, and Jianbo Shi

PDF

Towards Self-Explaining Networks, Wenchao Zhou, Qiong Fei, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

Secure Network Provenance, Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

TAP: Time-Aware Provenance for Distributed Systems, Wenchao Zhuo, Ling Ding, Andreas Haeberlen, Zachary G. Ives, and Boon Thau Loo

PDF

Secure Network Provenance, Wenchao Zhuo, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

Secure Network Provenance, Wenchao Zhuo, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

NetTrails: A Declarative Platform for Maintaining and Querying Provenance in Distributed Systems, Wenchao Zhuo, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary G. Ives, Boon Thau Loo, and Micah Sherr

Papers from 2010

PDF

Simulating Human Activities for Synthetic Inputs to Sensor Systems, Jan Allbeck and Norman I. Badler

PDF

Expressiveness of Streaming String Transducers, Rajeev Alur

PDF

Temporal Reasoning for Procedural Programs, Rajeev Alur and Swarat Chaudhuri

PDF

Generating Reliable Code from Hybrid-Systems Models, Madhukar Anand, Sebastian Fischmeister, Yerang Hur, Jesung Kim, and Insup Lee

PDF

Model-Based Programming of Modular Robots, David Arney, Sebastian Fischmeister, Insup Lee, Yoshihito Takashima, and Mark Yim

PDF

Toward Patient Safety in Closed-Loop Medical Device Systems, David Arney, Miroslav Pajic, Julian M. Goldman, Insup Lee, Rahul Mangharam, and Oleg Sokolsky

PDF

Approximating Pure Nash Equilibrium in Cut, Party Affiliation, and Satisfying Games, Anand Bhalgat, Tanmoy Chakraborty, and Sanjeev Khanna

PDF

Class-Level Spectral Features for Emotion Recognition, Dmitri Bitouk, Ragini Verma, and Ani Nenkova

PDF

Local Algorithms for Finding Interesting Individuals in Large Networks, Michael Brautbar and Michael J. Kearns

PDF

Private and Third-Party Randomization in Risk-Sensitive Equilibrium Concepts, Michael Brautbar, Michael J. Kearns, and Umar Syed

PDF

Improved Hardness of Approximation for Stackelberg Shortest-Path Pricing, Patrick Briest, Parinya Chalermsook, Sanjeev Khanna, Bundit Laekhanukit, and Danupon Nanongkai

PDF

Model Checking of Linearizability of Concurrent List Implementations, Pavol Cerný, Arjun Radhakrishnan, Damien Zufferey, Swarat Chaudhuri, and Rajeev Alur

PDF

A Behavioral Study of Bargaining in Social Networks, Tanmoy Chakraborty, Stephen Judd, Michael J. Kearns, and Jinsong Tan

PDF

A Bi-Labeling Based XPath Processing System, Yi Chen, Susan B. Davidson, and Yifei Zheng

Talking Pictures: Temporal Grouping and Dialog-Supervised Person Recognition, Timothee Cour, Benjamin Sapp, Akash Nagle, and Ben Taskar

PDF

Privacy Issues in Scientific Workflow Provenance, Susan B. Davidson, Sanjeev Khanna, Sudeepa Roy, and Sarah Cohen Boulakia

PDF

Permission to Speak: A Logic for Access Control and Conformance, Nikhil Dinesh, Aravind Joshi, Insup Lee, and Oleg Sokolsky

PDF

Notes on RSA, Jean H. Gallier

PDF

Notes on the Schur Complement, Jean H. Gallier

PDF

Posterior Regularization for Structured Latent Varaible Models, Kuzman Ganchev, João Graça, Jennifer Gillenwater, and Ben Taskar

PDF

Censored Exploration and the Dark Pool Problem, Kuzman Ganchev, Michael J. Kearns, Yuriy Nevmyvaka, and Jennifer Wortman Vaughn

PDF

Sparsity in Dependency Grammar Induction, Jennifer Gillenwater, Kuzman Ganchev, Joao V. Graca, Fernando Pereira, and Ben Taskar

PDF

Perfect Matchings in O(n log n) Time in Regular Bipartite Graphs, Ashish Goel, Michael Kapralov, and Sanjeev Khanna

PDF

Contracts Made Manifest, Michael Greenberg, Benjamin C. Pierce, and Stephanie Weirich

PDF

Provenance in ORCHESTRA, Todd J. Green, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen

PDF

Accountable Virtual Machines, Andreas Haeberlen, Paarijaat Aditya, Rodrigo Rodrigues, and Peter Druschel

PDF

Overcoming and Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically, Matthew Hicks, Murph Finnicum, Samuel T. King, Milo Martin, and Jonathan M. Smith

PDF

Symmetric Lenses, Martin Hoffmann, Benjamin C. Pierce, and Daniel Wagner

PDF

Automated Test Coverage Measurement for Reactor Protection System Software implemented in Function Block Diagram, Eunkyoung Jee, Suin Kim, Sungdeok Cha, and Insup Lee

PDF

Assurance Cases in Model-Driven Development of the Pacemaker Software, Eunkyoung Jee, Insup Lee, and Oleg Sokolsky

PDF

A Safety-Assured Development Approach for Real-Time Software, Eunkyoung Jee, Shaohui Wang, Jeong Ki Kim, Jaewoo Lee, Oleg Sokolsky, and Insup Lee

PDF

Dependent types and Program Equivalence, Limin Jia, Jianzhou Zhao, Vilhelm Sjoberg, and Stephanie Weirich

PDF

Behavioral Dynamics and Influence in Networked Coloring and Consensus, Stephen Judd, Michael J. Kearns, and Yevgeniy Vorobeychik

PDF

Representation Dependence Testing Using Program Inversion, Aditya Kanade, Rajeev Alur, Sriram Rajamani, and Ganesan Ramalingam

PDF

Querying Data Provenance, Grigoris Karvounarakis, Zachary G. Ives, and Val Tannen

PDF

Empirical Limitations on High Frequency Trading Profitability, Michael J. Kearns, Alex Kulesza, and Yuriy Nevmyvaka

PDF

Prototyping Closed Loop Physiologic Control With the Medical Device Coordination Framework, Andrew King, Dave Arney, Insup Lee, Oleg Sokolsky, John Hatcliff, and Sam Procter

PDF

GSA: A Framework for Rapid Prototyping of Smart Alarm Systems, Andrew King, Alex Roederer, David Arney, Sanjian Chen, Margaret Fortino-Mullen, Ana Giannareas, C. William Hanson III, Vanessa Kern, Nicholas Stevens, Jonathan Tannen, Adrian Viesca Trevino, Soojin Park, Oleg Sokolsky, and Insup Lee

PDF

Structured Determinantal Point Processes, Alex Kulesza and Ben Taskar

PDF

Medical Cyber Physical Systems, Insup Lee and Oleg Sokolsky

PDF

Improving Resource Utilization for Compositional Scheduling Using DPRM Interfaces, Jaewoo Lee, Linh T.X. Phan, Sanjian Chen, Oleg Sokolsky, and Insup Lee

PDF

A Policy-Based Constraint-Solving Platform Towards Extensible Wireless Channel Selection and Routing, Changbin Liu, Xiaozhou Li, Shiv Muthukumar, Harjot Gill, Taher Saeed, Boon Thau Loo, and Prithwish Basu

PDF

SmartCIS: Integrating Digital and Physical Environments, Mengmeng Liu, Svilen Mihaylov, Zhuowei Bao, Marie Jacob, Zachary G. Ives, Boon Thau Loo, and Sudipto Guha

PDF

Maintaining Recursive Views of Regions and Connectivity in Networks, Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, and Boon Thau Loo

PDF

Discourse Indicators for Content Selection in Summaization, Annie Louis, Aravind K. Joshi, and Ani Nenkova

PDF

Using Entity Features to Classify Implicit Discourse Relations, Annie Louis, Aravind K. Joshi, Rashmi Prasad, and Ani Nenkova

PDF

Creating Local Coherence: An Empirical Assessment, Annie Louis and Ani Nenkova

PDF

SecureBlox: Customizable Secure Distributed Data Processing, William R. Marczak, Shan Shan Huang, Martin Bravenboer, Micah Sherr, Boon Thau Loo, and Molham Aref

PDF

Lolliproc: to Concurrency from Classical Linear Logic via Curry-Howard and Control, Karl Mazurak and Stephan A. Zdancewic

PDF

Lightweight linear types in System F°, Karl Mazurak, Jianzhou Zhao, and Stephan A. Zdancewic

PDF

Dynamic Join Optimization in Multi-Hop Wireless Sensor Networks, Svilen Mihaylov, Marie Jacob, Zachary G. Ives, and Sudipto Guha

PDF

CETS: Compiler Enforced Temporal Safety for C, Santosh Nagarakatte, Jianzhou Zhao, Milo Martin, and Stephan A. Zdancewic

PDF

CETS: Compiler-Enforced Temporal Safety for C, Santosh Nagarakatte, Jianzhou Zhao, Milo Martin, and Stephan A. Zdancewic

PDF

Structural Features for Predicting the Linguistic Quality of Text: Applications to Machine Translation, Automatic Summarization and Human-Authored Text, Ani Nenkova, Jieun Chae, Annie Louis, and Emily Pitler

PDF

Ontologies for Distributed Command and Control Messaging, Duc N. Nguyen, Joseph B. Kopena, Boon Thau Loo, and William C. Regli

PDF

Compositional Analysis of Multi-Mode Systems, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

CARTS: A Tool for Compositional Analysis of Real-Time Systems, Linh T.X. Phan, Jaewoo Lee, Arvind Easwaran, Vinay Ramaswamy, Sanjian Chen, Insup Lee, and Oleg Sokolsky

PDF

Modeling Buffers With Data Refresh Semantics in Automotive Architectures, Linh T.X. Phan, Reinhard Schneider, Samarjit Chakraborty, and Insup Lee

PDF

A Process Algebraic Framework for Modeling Resource Demand and Supply, Anna Philippou, Insup Lee, Oleg Sokolsky, and Jin-Young Choi

PDF

Automatic Evaluation of Linguistic Quality in Multi-Document Summarization, Emily Pitler, Annie Louis, and Ani Nenkova

PDF

Token Tenure and PATCH: A Predictive/Adaptive Token-Counting Hybrid, Arun Raghavan, Colin Blundell, and Milo Martin

PDF

Differential Privacy for Collaborative Security, Jason Reed, Adam Aviv, Daniel Wagner, Andreas Haeberlen, Benjamin C. Pierce, and Jonathan M. Smith

PDF

Distance Makes the Types Grow Stronger: A Calculus for Differential Privacy, Jason Reed and Benjamin C. Pierce

PDF

Cascaded Models for Articulated Pose Estimation, Benjamin Sapp, Alexander Toshev, and Ben Taskar

PDF

Language-Based Verification Will Change The World, Tim Sheard, Aaron Stump, and Stephanie Weirich

PDF

A³: An Extensible Platform for Application-Aware Anonymity, Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, and Matthew A. Blaze

PDF

Many-to-one Contour Matching for Describing and Discriminating Object Shape, Praveen Srinivasan, Qihui Zhu, and Jianbo Shi

PDF

Semi-Supervised Learning with Adversarially Missing Label Information, Umar Syed and Ben Taskar

PDF

Automatically Incorporating New Sources in Keyword Search-Based Data Integration, Partha Talukdar, Zachary G. Ives, and Fernando Pereira

PDF

Graph-Based Weakly-Supervised Methods for Information Extraction & Integration, Partha P. Talukdar

PDF

Adaptive Pose Priors for Pictorial Structures, Ben Taskar, Benjamin Sapp, and Chris Jordan

PDF

Reliable Storage and Querying for Collaborative Data Sharing Systems, Nicolas Taylor and Zachary G. Ives

PDF

Detecting and Parsing Architecture at City Scale from Range Data, Alexander Toshev, Philippos Mordohai, and Ben Taskar

PDF

Object Detection via Boundary Structure Segmentation, Alexander Toshev, Ben Taskar, and Kostas Daniilidis

PDF

Parametricity, Type Equality and Higher-order Polymorphism, Dimitrios Vytiniotis and Stephanie Weirich

PDF

Arity-Generic Datatype-Generic Programming, Stephanie Weirich and Chris Casinghino

PDF

Sidestepping Intractable Inference with Structured Ensemble Cascades, David Weiss, Benjamin Sapp, and Ben Taskar

PDF

Stuctured Predictions Cascades, David Weiss and Ben Taskar

PDF

Spam Mitigation Using Spatio-Temporal Reputations From Blacklist History, Andrew G. West, Adam J. Aviv, Jian Chang, and Insup Lee

PDF

Spatio-Temporal Analysis of Wikipedia Metadata and the STiki Anti-Vandalism Tool, Andrew G. West, Sampath Kannan, and Insup Lee

PDF

STiki: An Anti-Vandalism Tool for Wikipedia Using Spatio-Temporal Analysis of Revision Metadata, Andrew G. West, Sampath Kannan, and Insup Lee