Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models

Tahmina Ahmed

November 2017


System Call Anomaly Detection in Mutli-Threaded Programs

Marcus Pendleton

November 2017


Performance and Accuracy Analysis of Programs Using Approximation Techniques

Riad Akram

November 2017


Anomaly-Based Debugging of Correctness and Performance Issues in Multithreaded Programs

Mohammad Alam

November 2017


Detecting Memory Model Bugs in Multi-Core and Many-Core Systems

Islam Mohammad Majharul

October 2017


Time Sensitive VM Provisioning for Resource-Constrained Clouds

Rehana Begam

July 2017


Applying Semantic Analysis for the Alignment of Natural Language Privacy Policies with Application Code

Rocky Slavin

July 2017


Time Sensitive VM Provisioning for Resource-Constrained Clouds

Prosunjit Biswas

April 2017


Approximating Application Performances in Data Centers and Simulated Machines

Mohammad S Islam

August 2017


Novel Algorithms and Metrics for Functional Discoveries From Networked Biological Data

Lu Liu

May 2017


A Holistic Approach Using Honey Communities for Cyber Event Detection and Protection in Communities and Large Distributed Organizations

James Rutherford

April 2017


Developing Tools and Algorithms in Digital Geometry

Iffat Chowdhury

July 2016


Understanding of Geometric Visibility in Polygons

Qing Wang

July 2016


Obfuscated Malware Detection and Classification

Moustafa Saleh

April 2016


Video Representation for Fine-Grained Action Recognition

Yang Zhou

April 2016


Authorization Federation in Multi-Tenant Multi-Cloud IaaS

Navid Pustchi

April 2016


Machine Learning Approaches Toward Genome-Wide CIS-Regulatory Element Discovery and Transcription Factor Binding Sites Modeling

Zhen Gao

August 2015


Towards Understanding and Improving Gait Rehabilitation in Virtual Environments Using Latency for Mobility Impaired Persons

Gayani Samaraweera

November 2015


An Elastic Mixed-Criticality Scheduling Framework for Cyber-Physical Systems

Hang Su

August 2015


Securing Multimedia Communication in Traditional and Emerging Architectures

Ali Tekeoglu

July 2015


Content-Based EEG Data Retrieval and Annotation for Time-Locked and Continuous EEG Data

Kyung Min Su

November 2015


Attribute-assisted Learning for Web Image Applications

Junjie Cai

September 2015


Algorithms for Map Construction and Comparison

Mahmuda Ahmed

July 2015


Machine Learning and Graph Theoretical Approaches Toward Precise Disease Classification, Prognosis and Treatment

Md. Jamiul Jahid

June 2015


The Relentless Execution Model for Task-uncoordinated Parallel Computation in Distributed Memory Environments

Lucas Wilson

May 2015


Hyper-Sequence-Graph Mining

Xinran Yu

April 2015


Constraints for Attribute Based Access Control with Application in Cloud IaaS

Khalid Zaman Bijon

April 2015


Task Allocation and Path Planning in Wireless Sensor and Robot Networks

Andrew Wichmann

April 2015


Understanding and Improving Motivation for Rehabilitation in Virtual Environments for Mobility Impaired Persons

Rongkai Guo

August 2014


Build and Reconstruction on Transcriptional Regulatory Network and Network-Based Disease Prediction

Chengwei Lei

July 2014


Multi-Tenant Access Control for Cloud Services

Bo Tang

July 2014


Provenance-Based Access Control Models

Dang Nguyen

July 2014


Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems

Lijie Zhang

April 2014


Verifiable Delegated Computation on Outsourced Data

Qingji Zheng

April 2014


Attribute Based Access Control Models and Implementation for Cloud Infrastructure as a Service

Xin Jin

April 2014


Detecting and Characterizing Malicious Websites

Li Xu

April 2014


Access Control for Online Social Networks Using Relationship Type Patterns

Yuan Cheng

April 2014


Hierarchical Distributed Loop Self-Scheduling Schemes on Cluster and Cloud Systems

Yiming Han

April 2014


A Statistical Framework for Analyzing Cyber Attacks

Zhenxin Zhan

April 2014


Consensus Reasoning for Intelligent Web Searches

Steven O'Hara

February 2014


A Framework for Composing Security-Typed Languages

Andreas Gampe

December 2013


Algorithms and Harness Results for Measuring Similarity Using Fréchet Distance Variants

Jessica (Jonathan) Sherette

December 2013


Formally Ensuring the Permissibility of Obligations in Security and Privacy Policies

Omar Chowdhury

December 2013


Mobile Assisted Security Framework for Wireless Sensor Networks

Baris Tas

December 2013


Energy-Efficient Fault Tolerance in Multiprocessor Real-Time Systems

Yifeng Guo

November 2013


Crosscutting Software Artifacts for Access Control

Mark Robinson

May 2013


Energy-Efficient Secure and Anonymous Communication Protocol for Wireless Sensor Networks

Pengjun Pan

May 2013


Improving Performance and Predictability of Storage Arrays

Nihat Altiparmak

April 2013


Robust Image Representation for Classification and Retrieval

Xia Li

April 2013


Image Understanding From Web Media Resource

Jie Xiao

April 2013


Scalable Detection of Community Cyber Incidents Utilizing Distributed and Anonymous Security Information Sharing

Keith Harrison

December 2012


Privacy-Preserving Data Mining Through Data Publishing and Knowledge Model Sharing

Hongwei Tian

December 2012


A Formal Framework For Analyzing Sequence Diagram

Hui Shen

December 2012


Botnets Analysis and Detection Methods Based On Network Behavior

Areej Al-Bataineh

November 2012


Privacy Preservation in Social Graphs

Lijie Zhang
April 2012


Intelligent Cache Management Techniques For Reducing Memory System Waste
Samira Khan
March 2012


Acceleration of Scientific Applications on Reconfigurable Computing Systems

Yi-Gang Tai

July 2011


Practical User Obligation Systems That Affect and Depend on Authorizations
Murillo Pontual
November 2011


Data-Driven Transforms for Exploration, Visualization and Classification of High-Dimensional Data
Dragana Veljkovic Perez
December 2010


Protecting Cryptographic Keys and Functions from Malware Attacks
Timothy Parker
December 2010


Parallelism and Error Reduction in a High Performance Environment
Anthony M. Castaldo
December 2010


Scheduling for Energy and Reliability Management on Multiprocessor Real-Time Systems

Xuan Qi

November 2010


Sidekick: Integrating Knowledge and User Belief to Enable Biological Discovery
Mark S. Doderer
August 2010


Obstacle-Avoiding Similarity Metrics and Shortest Path Problems

Atlas F. Cook IV
December 2009


Security Policy Analysis in A Trust Management Environment
Mark G. Reith
August 2009


Defending Against Malicious Nodes in closed Manets Through Packet Authentication and A Hybrid Trust Management System
Rehan Akbani
August 2009


A Sublexical Unit Based Hash Model Approach for Spam Detection
Like Zhang
August 2009


Protecting Critical Secrets on Commodity Hardware and Operating Systems

Timothy Paul Parker

April 2009


Statistical Learning for Multimedia Information Retrieval and Their Applications

Yijuan Lu
August 2008


New High Performance Computational Strategies for Inverse Problems with Application to Analytical Ultracentrifugation
Emre Brookes
May 2008


An in Silico Approach to Discover Transcriptional Regulatory Elements
Amitava Karmaker
May 2008


Integrated Prevention and Detection of Byzantine Attacks in Mobile Ad hoc Networks

Su (Kevin) Xu

January 2008


Game Theory Based Job Allocation/Load Balancing in Distributed Systems with Applications to Grid Computing
Satish Penmatsa
December 2007


Generalized Discriminant Analysis in Content-based Image Retrieval
Jie Yu
May 2007


Identification of Putative Functional Elements in Regulation of Gene Expression
Kihoon Yoon
May 2007


Advancing Data Dependence Analysis in Practice
Konstantinos Kyriakopoulos
May 2007


Java Memory Compression
Mayumi Kato
May 2007


The Automatic Generation and Testing of Signal Recognition Algorithms
Kenneth Holladay
May 2007


Financial Time Series Prediction and Evaluation By Genetic Programming with Trigonometric Functions and High-Order Statistics
Roy Schwaerzel
December 2006


Techniques to Mitigate Traffic Overload and Protocol Inefficiencies in Moble Ad Hoc Networks
Saman Amendra DeSilva
December 2004


Load Balancing in Distributed Systems: A Game Theoretic Approach
Daniel Grosu
May 2004


Design and Analysis of Adaptive Routing and Transport Protocols in Mobile Ad Hoc Networks
Thomas David Dyer
December 2002


Protocols For Mobile Ad Hoc Networking
Robert Castaneda
August 2000


Cooperative Web Caching: A Viability Study and Design Analysis
Sandra G. Dykes
August 2000