Technical Reports (CIS)
Papers from 2018
Towards Overhead-Free Interface Theory for Compositional Hierarchical Real-Time Systems, Jin Hyun Kim, Kygong Hoon Kim, Arvind Easwaran, and Insup Lee
Papers from 2017
DStress: Efficient Differentially Private Computations on Distributed Data, Antonis Papadimitriou, Andreas Haeberlen, and Arjun Narayan
Automated Bug Removal for Software-Defined Networks, Yang Wu, Andreas Haeberlen, Wenchao Zhou, Boon T. Loo, and Ang Chen
Papers from 2016
ORCA: Ordering-free Regions for Consistency and Atomicity, Christian DeLozier, Yuanfeng Peng, Ariel Eizenberg, Brandon Lucia, and Joe Devietti
Loopy: Programmable and Formally Verified Loop Transformations, Kedar S. Namjoshi and Nimit Singhania
Big Data Analytics over Encrypted Datasets with Seabed, Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haberlen, Harmeet Singh, Abhishek Modi, and Saikrishna Badrinarayanan
Papers from 2015
An Empirical Study of Off-by-one Loop Mutation, M. S. Raunak, Christian Murphy, and Bryan O'Haver
MAGICCARPET: Verified Detection and Recovery for Hardware-based Exploits, Cynthia Sturton, Matthew Hicks, Samuel T. King, and Jonathan M. Smith
Papers from 2014
Maximization of Non-Monotone Submodular Functions, Jennifer Gillenwater
Improving the Estimation of Word Importance for News Multi-Document Summarization - Extended Technical Report, Kai Hong and Ani Nenkova
A Linear/Producer/Consumer Model of Classical Linear Logic, Jennifer Paykin and Stephan A. Zdancewic
Programming Up to Congruence (Extended version), Vilhelm Sjoberg and Stephanie Weirich
Papers from 2013
Ironclad C++: A Library-Augmented Type-Safe Subset of C++, Christian DeLozier, Richard A. Eisenberg, Santosh Nagarakatte, Peter-Michael Osera, Milo Martin, and Stephan A. Zdancewic
Closed Type Families With Overlapping Equations (Extended Version), Richard A. Eisenberg, Dimitrios Vytiniotis, Simon Peyton Jones, and Stephanie Weirich
Clifford Algebras, Clifford Groups, and a Generalization of the Quaternions: The Pin and Spin Groups, Jean H. Gallier
Notes on Elementary Spectral Graph Theory Applications to Graph Clustering Using Normalized Cuts, Jean H. Gallier
Notes on Convex Sets, Polytopes, Polyhedra, Combinatorial Topology, Voronoi Diagrams and Delaunay Triangulations, Jean H. Gallier
A Modal Specification Theory for Timing Variability, Andrew King, Oleg Sokolsky, and Insup Lee
Network Intrusion Detection and Mitigation Against Denial of Service Attack, Dong Lin
Automatic Test Case Generation and Test Suite Reduction for Closed-Loop Controller Software, Christian Murphy, Zoher Zoomkawalla, and Koichiro Narita
Core Ironclad, Peter-Michael Osera, Richard A. Eisenberg, Christian DeLozier, Santosh Nagarakatte, Milo Martin, and Stephan A. Zdancewic
A Reduction-Based Approach Towards Scaling Up Formal Analysis of Internet Configurations, Anduo Wang, Alexander JT Gurney, Xianglong Han, Jinyan Cao, Boon T. Loo, Carolyn Talcott, and Andre Scedrov
Combining Proofs and Programs in a Dependently Typed Language, Stephanie Weirich, Vilhelm Sjoberg, and Chris Casinghino
Is a Rigorous Agile Methodology the Best Development Strategy for Small Scale Tech Startups?, Alex Yau and Christian Murphy
Papers from 2012
Experiences in Teaching an Educational User-Level Operating Systems Implementation Project, Adam J. Aviv, Vin Mannino, Thanat Owlarn, Seth Shannin, Kevin Xu, and Boon Thau Loo
Labeling Workflow Views With Fine-Grained Dependencies, Zhuowei Bao, Susan B. Davidson, and Tova Milo
Reduction-Based Security Analysis of Internet Routing Protocols, Chen Chen, Limin Jia, Boon Thau Loo, and Wenchao Zhou
Metric Learning for Graph-Based Domain Adaptation, Paramveer S. Dhillon, Partha Talukdar, and Koby Crammer
The Impact of an Agile Methodology on Software Development Costs, Kristin Fergis
Motion Primitive-Based Graph Planning for Mobile Manipulation With Closed-Chain Systems, Steven R. Gray, Christopher Clingerman, Vijay Kumar, and Maxim Likhachev
CleanURL: A Privacy Aware Link Shortener, Daniel Kim, Kevin Su, Andrew G. West, and Adam Aviv
Egress Online: Towards Leveraging Massively, Multiplayer Environments for Evacuation Studies, Aline Normoyle, John Drake, and Alla Safonova
Dependent Interoperability, Peter-Michael Osera, Vilhelm Sjoberg, and Stephan A. Zdancewic
Emerging Scholars Program—A PLTL-CS Program That Increases Recruitment and Retention of Women in the Major, Rita M. Powell, Christian Murphy, Adam Cannon, Joshua Gordon, and Arthi Ramachandran
Reduction-Based Formal Analysis of BGP Instances, Anduo Wang, Carolyn Talcott, Alexander JT Gurney, Boon Thau Loo, and Andre Scedrov
High-Level Model Extraction via Symbolic Execution, Shaohui Wang, Srinivasan Dwarakanathan, Oleg Sokolsky, and Insup Lee
Processing Data-Intensive Workflows in the Cloud, Zhuoyao Zhang
Secure Time-Aware Provenance for Distributed Systems, Wenchao Zhou
Papers from 2011
Steganographic Timing Channels, Adam Aviv, Guarav Shah, and Matt Blaze
Labeling Recursive Workflow Executions On-the-Fly, Zhuowei Bao, Susan B. Davidson, and Tova Milo
Rethinking Mobile Telephony With the IMP, M. DeYoung, N. Henke, G. Wai, and Jonathan M. Smith
Conditional Entropies as Over-Segmentation and Under-Segmentation Metrics for Multi-Part Image Segmentation, Haifeng Gong and Jianbo Shi
Tracking by Planning, Haifeng Gong, Jiwoong Sim, Maxim Likhachev, and Jianbo Shi
Dual Periodic Resource Model, Jaewoo Lee, Linh T.X. Phan, Sanjian Chen, Oleg Sokolsky, and Insup Lee
Realizing Compositional Scheduling Through Virtualization, Jaewoo Lee, Sisu Xi, Sanjian Chen, Linh T.X. Phan, Chris Gill, Insup Lee, Chenyang Lu, and Oleg Sokolsky
PUMA: Policy-Based Unified Multi-radio Architecture for Agile Mesh Networking, Changbin Liu, Ricardo Correa, Harjot Gill, Tanveer Gill, Xiaozhou Li, Shivkumar Muthukumar, Taher Saeed, Boon Thau Loo, and Prithwish Basu
Unsupervised Models of Text Structure, Annie Louis
General Versus Specific Sentences: Automatic Identification and Application to Analysis of News Summaries, Annie Louis and Ani Nenkova
Litmus Tests for Comparing Memory Consistency Models: How Long Do They Need to Be?, Sela Mador-Haim, Rajeev Alur, and Milo Martin
On Effective Testing of Health Care Simulation Software, Christian Murphy, M. S. Raunak, Andrew King, Sanjian Chen, Christopher Imbraino, Gail Kaiser, Insup Lee, Oleg Sokolsky, Lori Clarke, and Leon Osterweil
Structure From Motion With Directional Correspondence for Visual Odometry, Oleg Naroditsky, Xun S. Zhou, Jean H. Gallier, Stergios I. Roumeliotis, and Kostas Daniilidis
Maintaining Distributed Recursive Views Incrementally, Vivek Nigam, Limin Jia, Boon Thau Loo, and Andre Scedrov
An Open-Source and Declarative Approach Towards Teaching Large-Scale Networked Systems Programming, Taher Saeed, Harjot Gill, Qiong Fei, Zhuoyao Zhang, and Boon Thau Loo
FSR: Formal Analysis and Implementation Toolkit for Safe Inter-Domain Routing, Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, and Carolyn Talcott
Analyzing BGP Instances in Maude, Anduo Wang, Carolyn Talcott, Limin Jia, Boon Thau Loo, and Andre Scedrov
Papers from 2010
Lessons Learned From a PLTL-CS Program
Disinformation: A Taxonomy, James M. Alexander and Jonathan M. Smith
Moving Targets: Geographically Routed Human Movement Networks, Adam J. Aviv, Micah Sherr, Matt Blaze, and Jonathan M. Smith
LNgen: Tool Support for Locally Nameless Representations, Brian Aydemir and Stephanie Weirich
An Optimal Labeling Scheme for Workflow Provenance Using Skeleton Labels, Zhuowei Bao, Susan B. Davidson, Sanjeev Khanna, and Sudeepa Roy
AS-CRED: Reputation Service for Trustworthy Inter-Domain Routing, Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, and Oleg Sokolsky
AS-TRUST: A Trust Characterization Scheme for Autonomous Systems in BGP, Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, and Insup Lee
Security Weaknesses in the APCO Project 25 Two-Way Radio System, Sandy Clark, Perry Metzger, Zachary Wasserman, Kevin Xu, and Matthew A. Blaze
Notes on Theoretical Limitations and Practical Vulnerabilities of Internet Surveillance Capture, Eric C. Cronin and Matthew A. Blaze
Matching Lenses: Alignment and View Update, Barbosa M.J. Davi, Cretin Julien, Foster Nate, Greenberg Michael, and Benjamin C. Pierce
Preserving Module Privacy in Workflow Provenance, Susan B. Davidson, Sanjeev Khanna, Debmalya Panigrahi, and Sudeepa Roy
Inference Driven Metric Learning (IDML) for Graph Construction, Paramveer S. Dhillon, Partha Pratim Talukdar, and Koby Crammer
Bidirectional Programming Languages, John Nathan Foster
Posterior Sparsity in Unsupervised Dependency Parsing, Jennifer Gillenwater, Kuzman Ganchev, João Graça, Fernando Pereira, and Ben Taskar
Generating Litmus Tests for Contrasting Memory Consistency Models - Extended Version, Sela Mador-Haim, Rajeev Alur, and Milo M.K. Martin
Maintaining Distributed Recursive Views Incrementally, Vivek Nigam, Limin Jia, Boon Thau Loo, and Andre Scedrov
An Operational Semantics for Network Datalog, Vivek Nigam, Limin Jia, Anduo Wang, Boon Thau Loo, and Andre Scedrov
Cost-Based Dynamic Job Rescheduling: A Case Study of the Intel Distributed Computing Platform, Linh T.X. Phan, Zhuoyao Zhang, Saumya Jain, Godfrey Tan, Boon Thau Loo, and Insup Lee
Real-Time MapReduce Scheduling, Linh T.X. Phan, Zhuoyao Zhang, Boon Thau Loo, and Insup Lee
Methods for Sentence Compression, Emily Pitler
Periodic Resource Model for Compositional Real-Time Guarantees, Insik Shin and Insup Lee
Termination Casts: A Flexible Approach to Termination With General Recursion (Technical Appendix), Aaron Stump, Vilhelm Sjoberg, and Stephanie Weirich
XenITH: Xen in the Hand, Kyle Super and Jonathan M. Smith
Formal Analysis of Network Protocols, Anduo Wang
Calculating and Presenting Trust in Collaborative Content, Andrew G. West
Mitigating Spam Using Spatio-Temporal Reputation, Andrew G. West, Adam J. Aviv, Jian Chang, and Insup Lee
Detecting Wikipedia Vandalism via Spatio-Temporal Analysis of Revision Metadata, Andrew G. West, Sampath Kannan, and Insup Lee
Fault Management in Distributed Systems, Wenchao Zhou
Tracking Adversarial Behavior in Distributed Systems With Secure Network Provenance, Wenchao Zhou, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr
Towards Secure Cloud Data Management, Wenchao Zhou, William R. Marczak, Tao Tao, Zhuoyao Zhang, Micah Sherr, Boon Thau Loo, and Insup Lee
Efficient Querying and Maintenance of Network Provenance at Internet-Scale, Wenchao Zhou, Micah Sherr, Tao T, Xiaozhou Li, Boon Thau Loo, and Yun Mao
Papers from 2009
Generic Infusion Pump Hazard Analysis and Safety Requirements Version 1.0, David E. Arney, Raoul Jetley, Paul Jones, Insup Lee, Arnab Ray, Oleg Sokolsky, and Yi Zhang
Abstracting Syntax, Brian Aydemir, Stephan A. Zdancewic, and Stephanie Weirich
RETCON: Transactional Repair Without Replay, Colin Blundell, Arun Raghavan, and Milo Martin
Online Learning a Binary Labeling of a Graph, Mickey Brautbar
Learning From Ambiguously Labeled Images, Timothee Cour, Benjamin Sapp, Chris Jordan, and Ben Taskar
AAAI 2008 Workshop Reports, Mark Dredze
A Compositional Framework for Avionics (ARINC-653) Systems, Arvind Easwaran, Insup Lee, Oleg Sokolsky, and Steve Vestal
Quotient Lenses, J. Nathan Foster, Alexandre Pilkiewicz, and Benjamin C. Pierce
Posterior Regularization for Structured Latent Variable Models, Kuzman Ganchev, João Graça, Jennifer Gillenwater, and Ben Taskar
Encoding Information Flow in AURA, Technical Appendix, Limin Jia and Stephan A. Zdancewic
Spectrum Sharing in Dynamic Spectrum Access Networks: WPE-II Written Report, Changbin Liu
Strong and Weak Policy Relations, Michael J. May, Carl A. Gunter, Insup Lee, and Stephan A. Zdancewic
SoftBound: Highly Compatible and Complete Spatial Memory Safety for C, Santosh Nagarakatte, Jianzhou Zhao, Milo Martin, and Stephan A. Zdancewic
Compositional Analysis of Multi-Mode Systems, Linh T.X. Phan, Insup Lee, and Oleg Sokolsky