Technical Reports (CIS)

 

Follow

Papers from 2014

PDF

Maximization of Non-Monotone Submodular Functions, Jennifer Gillenwater

PDF

Improving the Estimation of Word Importance for News Multi-Document Summarization - Extended Technical Report, Kai Hong and Ani Nenkova

PDF

A Linear/Producer/Consumer Model of Classical Linear Logic, Jennifer Paykin and Stephan A. Zdancewic

Papers from 2013

PDF

Ironclad C++: A Library-Augmented Type-Safe Subset of C++, Christian DeLozier, Richard A. Eisenberg, Santosh Nagarakatte, Peter-Michael Osera, Milo Martin, and Stephan A. Zdancewic

PDF

Closed Type Families With Overlapping Equations (Extended Version), Richard A. Eisenberg, Dimitrios Vytiniotis, Simon Peyton Jones, and Stephanie Weirich

PDF

Clifford Algebras, Clifford Groups, and a Generalization of the Quaternions: The Pin and Spin Groups, Jean H. Gallier

PDF

Notes on Elementary Spectral Graph Theory Applications to Graph Clustering Using Normalized Cuts, Jean H. Gallier

PDF

Notes on Convex Sets, Polytopes, Polyhedra, Combinatorial Topology, Voronoi Diagrams and Delaunay Triangulations, Jean H. Gallier

PDF

A Modal Specification Theory for Timing Variability, Andrew King, Oleg Sokolsky, and Insup Lee

PDF

Network Intrusion Detection and Mitigation against Denial of Service Attack, Dong Lin

PDF

Automatic Test Case Generation and Test Suite Reduction for Closed-Loop Controller Software, Christian Murphy, Zoher Zoomkawalla, and Koichiro Narita

PDF

Core Ironclad, Peter-Michael Osera, Richard A. Eisenberg, Christian DeLozier, Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic

PDF

A Reduction-based Approach Towards Scaling Up Formal Analysis of Internet Configurations, Anduo Wang, Alexander JT Gurney, Xianglong Han, Jinyan Cao, Boon T. Loo, Carolyn Talcott, and Andre Scedrov

PDF

Combining Proofs and Programs in a Dependently Typed Language, Stephanie Weirich, Vilhelm Sjoberg, and Chris Casinghino

PDF

Is a Rigorous Agile Methodology the Best Development Strategy for Small Scale Tech Startups?, Alex Yau and Christian Murphy

Papers from 2012

PDF

Experiences in Teaching an Educational User-Level Operating Systems Implementation Project, Adam J. Aviv, Vin Mannino, Thanat Owlarn, Seth Shannin, Kevin Xu, and Boon Thau Loo

PDF

Labeling Workflow Views with FineGrained Dependencies, Zhuowei Bao, Susan B. Davidson, and Tova Milo

PDF

Reduction-based Security Analysis of Internet Routing Protocols, Chen Chen, Limin Jia, Boon Thau Loo, and Wenchao Zhou

PDF

Metric Learning for Graph-based Domain Adaptation, Paramveer S. Dhillon, Partha Talukdar, and Koby Crammer

PDF

The Impact of an Agile Methodology on Software Development Costs, Kristin Fergis

PDF

Motion Primitive-Based Graph Planning for Mobile Manipulation with Closed-Chain Systems, Steven R. Gray, Christopher Clingerman, Vijay Kumar, and Maxim Likhachev

PDF

CleanURL: A Privacy Aware Link Shortener, Daniel Kim, Kevin Su, Andrew G. West, and Adam Aviv

PDF

Egress Online: Towards leveraging massively, multiplayer environments for evacuation studies, Aline Normoyle, John Drake, and Alla Safonova

PDF

Dependent Interoperability, Peter-Michael Osera, Vilhelm Sjoberg, and Stephan A. Zdancewic

PDF

Emerging Scholars Program—a PLTL-CS Program that Increases Recruitment and Retention of Women in the Major, Rita M. Powell, Christian Murphy, Adam Cannon, Joshua Gordon, and Arthi Ramachandran

PDF

Reduction-based Formal Analysis of BGP Instances, Anduo Wang, Carolyn Talcott, Alexander JT Gurney, Boon Thau Loo, and Andre Scedrov

PDF

High-Level Model Extraction via Symbolic Execution, Shaohui Wang, Srinivasan Dwarakanathan, Oleg Sokolsky, and Insup Lee

PDF

Processing Data-intensive Workflows in the Cloud, Zhuoyao Zhang

PDF

Secure Time-Aware Provenance For Distributed Systems, Wenchao Zhou

Papers from 2011

PDF

Steganographic Timing Channels, Adam Aviv, Guarav Shah, and Matt Blaze

PDF

Labeling Recursive Workflow Executions On-the-Fly, Zhuowei Bao, Susan B. Davidson, and Tova Milo

PDF

Rethinking Mobile Telephony with the IMP, M. DeYoung, N. Henke, G. Wai, and Jonathan M. Smith

PDF

Conditional entropies as over-segmentation and under-segmentation metrics for multi-part image segmentation, Haifeng Gong and Jianbo Shi

PDF

Tracking by Planning, Haifeng Gong, Jiwoong Sim, Maxim Likhachev, and Jianbo Shi

PDF

Dual Periodic Resource Model, Jaewoo Lee, Linh T.X. Phan, Sanjian Chen, Oleg Sokolsky, and Insup Lee

PDF

Realizing Compositional Scheduling through Virtualization, Jaewoo Lee, Sisu Xi, Sanjian Chen, Linh T.X. Phan, Chris Gill, Insup Lee, Chenyang Lu, and Oleg Sokolsky

PDF

PUMA: Policy-based Unified Multi-radio Architecture for Agile Mesh Networking, Changbin Liu, Ricardo Correa, Harjot Gill, Tanveer Gill, Xiaozhou Li, Shivkumar Muthukumar, Taher Saeed, Boon Thau Loo, and Prithwish Basu

PDF

Unsupervised Models of Text Structure, Annie Louis

PDF

General versus specific sentences: automatic identification and application to analysis of news summaries, Annie Louis and Ani Nenkova

PDF

Litmus Tests for Comparing Memory Consistency Models: How Long Do They Need to Be?, Sela Mador-Haim, Rajeev Alur, and Milo Martin

PDF

On Effective Testing of Health Care Simulation Software, Christian Murphy, M. S. Raunak, Andrew King, Sanjian Chen, Christopher Imbraino, Gail Kaiser, Insup Lee, Oleg Sokolsky, Lori Clarke, and Leon Osterweil

PDF

Structure from Motion with Directional Correspondence for Visual Odometry, Oleg Naroditsky, Xun S. Zhou, Jean H. Gallier, Stergios I. Roumeliotis, and Kostas Daniilidis

PDF

Maintaining Distributed Recursive Views Incrementally, Vivek Nigam, Limin Jia, Boon Thau Loo, and Andre Scedrov

PDF

An Open-source and Declarative Approach Towards Teaching Large-scale Networked Systems Programming, Taher Saeed, Harjot Gill, Qiong Fei, Zhuoyao Zhang, and Boon Thau Loo

PDF

FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing, Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, and Carolyn Talcott

PDF

Analyzing BGP Instances in Maude, Anduo Wang, Carolyn Talcott, Limin Jia, Boon Thau Loo, and Andre Scedrov

Papers from 2010

PDF

Lessons Learned from a PLTL-CS Program

PDF

Disinformation: A Taxonomy, James M. Alexander and Jonathan M. Smith

PDF

Moving Targets: Geographically Routed Human Movement Networks, Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith

PDF

LNgen: Tool Support for Locally Nameless Representations, Brian Aydemir and Stephanie Weirich

PDF

An Optimal Labeling Scheme for Workflow Provenance Using Skeleton Labels, Zhuowei Bao, Susan B. Davidson, Sanjeev Khanna, and Sudeepa Roy

PDF

AS-CRED: Reputation Service for Trustworthy Inter-domain Routing, Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, and Oleg Sokolsky

PDF

AS-TRUST: A Trust Characterization Scheme for Autonomous Systems in BGP, Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, and Insup Lee

PDF

Security Weaknesses in the APCO Project 25 Two-Way Radio System, Sandy Clark, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matthew A. Blaze

PDF

Notes on Theoretical Limitations and Practical Vulnerabilities of Internet Surveillance Capture, Eric C. Cronin and Matthew A. Blaze

PDF

Matching Lenses: Alignment and View Update, Barbosa M.J. Davi, Cretin Julien, Foster Nate, Greenberg Michael, and Benjamin C. Pierce

PDF

Preserving Module Privacy in Workflow Provenance, Susan B. Davidson, Sanjeev Khanna, Debmalya Panigrahi, and Sudeepa Roy

PDF

Inference Driven Metric Learning (IDML) for Graph Construction, Paramveer S. Dhillon, Partha Pratim Talukdar, and Koby Crammer

PDF

Bidirectional Programming Languages, John Nathan Foster

PDF

Posterior Sparsity in Unsupervised Dependency Parsing, Jennifer Gillenwater, Kuzman Ganchev, João Graça, Fernando Pereira, and Ben Taskar

PDF

Plug and Play Components for the Exploration of Memory Consistency Models, Sela Mador-Haim, Rajeev Alur, and Milo Martin

PDF

Generating Litmus Tests for Contrasting Memory Consistency Models - Extended Version, Sela Mador-Haim, Rajeev Alur, and Milo M.K. Martin

PDF

Maintaining Distributed Recursive Views Incrementally, Vivek Nigam, Limin Jia, Boon Thau Loo, and Andre Scedrov

PDF

An Operational Semantics for Network Datalog, Vivek Nigam, Limin Jia, Anduo Wang, Boon Thau Loo, and Andre Scedrov

PDF

Cost-based Dynamic Job Rescheduling: A Case Study of the Intel Distributed Computing Platform, Linh T.X. Phan, Zhuoyao Zhang, Saumya Jain, Godfrey Tan, Boon Thau Loo, and Insup Lee

PDF

Real-time MapReduce Scheduling, Linh T.X. Phan, Zhuoyao Zhang, Boon Thau Loo, and Insup Lee

PDF

Methods for Sentence Compression, Emily Pitler

PDF

Periodic Resource Model for Compositional Real-Time Guarantees, Insik Shin and Insup Lee

PDF

Termination Casts: A Flexible Approach to Termination with General Recursion (Technical Appendix), Aaron Stump, Vilhelm Sjoberg, and Stephanie Weirich

PDF

XenITH: Xen In The Hand, Kyle Super and Jonathan M. Smith

PDF

Formal Analysis of Network Protocols, Anduo Wang

PDF

Calculating and Presenting Trust in Collaborative Content, Andrew G. West

PDF

Mitigating Spam Using Spatio-Temporal Reputation, Andrew G. West, Adam J. Aviv, Jian Chang, and Insup Lee

PDF

Detecting Wikipedia Vandalism via Spatio-Temporal Analysis of Revision Metadata, Andrew G. West, Sampath Kannan, and Insup Lee

PDF

Fault Management in Distributed Systems, Wenchao Zhou

PDF

Tracking Adversarial Behavior in Distributed Systems with Secure Network Provenance, Wenchao Zhou, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr

PDF

Towards Secure Cloud Data Management, Wenchao Zhou, William R. Marczak, Tao Tao, Zhuoyao Zhang, Micah Sherr, Boon Thau Loo, and Insup Lee

PDF

Efficient Querying and Maintenance of Network Provenance at Internet-Scale, Wenchao Zhou, Micah Sherr, Tao T, Xiaozhou Li, Boon Thau Loo, and Yun Mao

Papers from 2009

PDF

Generic Infusion Pump Hazard Analysis and Safety Requirements Version 1.0, David E. Arney, Raoul Jetley, Paul Jones, Insup Lee, Arnab Ray, Oleg Sokolsky, and Yi Zhang

PDF

Abstracting Syntax, Brian Aydemir, Stephan A. Zdancewic, and Stephanie Weirich

PDF

RETCON: Transactional Repair without Replay, Colin Blundell, Arun Raghavan, and Milo Martin

PDF

Online Learning a Binary Labeling of a Graph, Mickey Brautbar

PDF

Learning from Ambiguously Labeled Images, Timothee Cour, Benjamin Sapp, Chris Jordan, and Ben Taskar

PDF

AAAI 2008 Workshop Reports, Mark Dredze

PDF

A Compositional Framework for Avionics (ARINC-653) Systems, Arvind Easwaran, Insup Lee, Oleg Sokolsky, and Steve Vestal

PDF

Quotient Lenses, J. Nathan Foster, Alexandre Pilkiewicz, and Benjamin C. Pierce

PDF

Posterior Regularization for Structured Latent Variable Models, Kuzman Ganchev, João Graça, Jennifer Gillenwater, and Ben Taskar

PDF

Encoding Information Flow in AURA, Technical Appendix, Limin Jia and Stephan A. Zdancewic

PDF

Spectrum Sharing In Dynamic Spectrum Access Networks: WPE-II Written Report, Changbin Liu

PDF

Strong and Weak Policy Relations, Michael J. May, Carl A. Gunter, Insup Lee, and Stephan A. Zdancewic

PDF

SoftBound: Highly Compatible and Complete Spatial Memory Safety for C, Santosh Nagarakatte, Jianzhou Zhao, Milo Martin, and Stephan A. Zdancewic

Link

Compositional Analysis of Multi-Mode Systems, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky

PDF

Topics in Graph Construction for Semi-Supervised Learning, Partha Pratim Talukdar

PDF

Verifiable Policy-based Routing with DRIVER, Anduo Wang, Changbin Liu, Boon Thau Loo, Oleg Sokolsky, and Prithwash Basu

Papers from 2008

PDF

Algorithmic Analysis of Array-Accessing Programs, Rajeev Alur, Pavol Cerný, and Scott Weinstein

PDF

Differencing Provenance in Scientific Workflows, Zhuowei Bao, Sarah Cohen-Boulakia, Susan B. Davidson, Anat Eyal, and Sanjeev Khanna

PDF

Improved Sequence-based Speculation Techniques for Implementing Memory Consistency, Colin Blundell, Milo M.K. Martin, and Tom Wenisch

PDF

Encoding Mini-Graphs with Handle Prefix Outlining, Anne W. Bracy and Amir Roth

PDF

A Default Temporal Logic for Regulatory Conformance Checking, Nikhil Dinesh, Aravind K. Joshi, Insup Lee, and Oleg Sokolsky

PDF

Further Results and Analysis of Icelandic Part of Speech Tagging, Mark Dredze and Joel Wallenberg