Research Output

Filter
Paper
2009

Detecting human actions in surveillance videos

Yang, M., Ji, S., Xu, W., Wang, J., Lv, F., Yu, K., Gong, Y., Dikmen, M., Lin, D. J. & Huang, T. S., Jan 1 2009.

Research output: Contribution to conferencePaper

PolyPack: An automated online packing service for optimal antivirus evasion

Oberheide, J., Bailey, M. & Jahanian, F., Jan 1 2009.

Research output: Contribution to conferencePaper

Remote job management in the Möbius modeling framework

Keefe, K., Mitchell, Q., Rozier, E. & Sanders, W. H., Dec 1 2009, p. 209-210. 2 p.

Research output: Contribution to conferencePaper

The virtual power system testbed and inter-testbed integration

Bergman, D. C., Jin, D., Nicol, D. M. & Yardley, T., Jan 1 2009.

Research output: Contribution to conferencePaper

2008

Application acceleration with the explicitly parallel operations system - The EPOS processor

Papakonstantinou, A., Chen, D. & Hwu, W-M. W., Sep 29 2008, p. 20-25. 6 p.

Research output: Contribution to conferencePaper

A recurrence-relation-based reward model for performability evaluation of embedded systems

Tai, A. T., Tso, K. S. & Sanders, W. H., Oct 13 2008, p. 532-541. 10 p.

Research output: Contribution to conferencePaper

Automatic security assessment of critical cyber-infrastructures

Anwar, Z., Shankesi, R. & Campbell, R. H., Oct 13 2008, p. 366-375. 10 p.

Research output: Contribution to conferencePaper

Conversation clusters: Human-computer dialog for topic extraction

Bergstrom, T. & Karahalios, K. G., Dec 8 2008, p. 2829-2834. 6 p.

Research output: Contribution to conferencePaper

Exact pareto-optimal coordination of two translating polygonal robots on a cyclic roadmap

Chitsaz, H., LaValle, S. M. & O'Kane, J. M., Dec 1 2008, p. 179-182. 4 p.

Research output: Contribution to conferencePaper

High resolution microplasma arrays fabricated in aluminum foil: Improved device performance in the microcavity and mi crochanne structure

Kim, K. S., Yoon, J. K., Heimberg, G. S., Park, S. J. & Eden, J. G., Dec 1 2008, p. 1889-1890. 2 p.

Research output: Contribution to conferencePaper

Multi-flow attacks against network flow watermarking schemes

Kiyavash, N., Houmansadr, A. & Borisov, N., Jan 1 2008, p. 307-320. 14 p.

Research output: Contribution to conferencePaper

Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices

Gaonkar, S., Rozier, E., Tong, A. & Sanders, W. H., Oct 13 2008, p. 386-391. 6 p.

Research output: Contribution to conferencePaper

Second workshop on dependable and secure nanocomputing

Arlat, J., Constantinescu, C., Iyer, R. K. & Nicolaïdis, M., Oct 13 2008, p. 546-547. 2 p.

Research output: Contribution to conferencePaper

Surveillance event detection

Dikmen, M., Ning, H., Lin, D. J., Cao, L., Le, V., Tsai, S. F., Lin, K. H., Li, Z., Yang, J., Huang, T. S., Lv, F., Xu, W., Yang, M., Yu, K., Zhao, Z., Zhu, G. & Gong, Y., Jan 1 2008.

Research output: Contribution to conferencePaper

SymPLFIED: Symbolic program-level fault injection and error detection framework

Pattabiraman, K., Nakka, N., Kalbarczyk, Z. T. & Iyer, R. K., Oct 13 2008, p. 472-481. 10 p.

Research output: Contribution to conferencePaper

Trace-based microarchitecture-level diagnosis of permanent hardware faults

Li, M. L., Ramachandran, P., Sahoo, S. K., Adve, S. V., Adve, V. S. & Zhou, Y., Oct 13 2008, p. 22-31. 10 p.

Research output: Contribution to conferencePaper

Using deception to facilitate intrusion detection in nuclear power plants

Rushi, J. & Campbell, R., Jan 1 2008, p. 315-324. 10 p.

Research output: Contribution to conferencePaper

Using likely program invariants to detect hardware errors

Sahoo, S. K., Li, M. L., Ramachandran, P., Adve, S. V., Adve, V. S. & Zhou, Y., Oct 13 2008, p. 70-79. 10 p.

Research output: Contribution to conferencePaper

VCode and VData: Illustrating a new framework for supporting the video annotation workflow

Hagedorn, J., Hailpern, J. & Karahalios, K. G., Dec 15 2008, p. 317-321. 5 p.

Research output: Contribution to conferencePaper

Visualizations: Speech, language & autistic spectrum disorder

Hailpern, J., Karahalios, K. G., Halle, J., DeThorne, L. & Coletto, M. K., Dec 8 2008, p. 3591-3596. 6 p.

Research output: Contribution to conferencePaper

Workshop on compiler and architectural techniques for application reliability and security (CATARS)

Pattabiraman, K., Shuo, C. & Kalbarczyk, Z., Oct 13 2008, p. 544-545. 2 p.

Research output: Contribution to conferencePaper

2007

Doing well by doing good: Pursuing commercial success by internalizing social good in subsistence markets

Viswanathan, M., Seth, A., Gau, R. & Chaturvedi, A., Dec 1 2007.

Research output: Contribution to conferencePaper

IBM research TRECVID-2007 video retrieval system

Natsev, A. P., Campbell, M., Haubold, A., Smith, J. R., Tesic, J., Xie, L., Yan, R., Liu, M., Yang, J., Hill, M., Nguyen, Q. B., Penz, C., Han, X., Xu, X. & Huang, T., Jan 1 2007.

Research output: Contribution to conferencePaper

Learning auto-structured regressor from uncertain nonnegative labels

Yan, S., Wang, H., Tang, X. & Huang, T. S., Dec 1 2007.

Research output: Contribution to conferencePaper

Optimizing image registration by mutually exclusive scale components

Chen, T. & Huang, T. S., Dec 1 2007.

Research output: Contribution to conferencePaper

Self-assembled electrodes for microcavity plasma arrays: Discharge properties of large scale arrays and device fabrication by wet chemical processing

Park, S. J., Kim, K. S., Price, A. J., Kim, T. L., Eden, J. G., Kang, K. D. & Yi, W. J., Dec 1 2007, p. 827-830. 4 p.

Research output: Contribution to conferencePaper

The systems engineering program at the University of Illinois at Urbana-Champaign

Yassine, A. & Beck, C., Dec 1 2007, p. 100-103. 4 p.

Research output: Contribution to conferencePaper

Transductive regression piloted by inter-manifold relations

Wang, H., Yan, S., Huang, T., Liu, J. & Tang, X., Aug 23 2007, p. 967-974. 8 p.

Research output: Contribution to conferencePaper

2006

Energy-aware routing in sensor networks: A large systems approach

Lin, L., Shroff, N. B. & Srikant, R., Jan 1 2006.

Research output: Contribution to conferencePaper

Operational security requirements for large collaborative compute infrastructures

Khurana, H., Basney, J., Von Welch, W. & Campbell, R., Dec 1 2006.

Research output: Contribution to conferencePaper

SATIRE: A software architecture for smart AtTIRE

Ganti, R. K., Abdelzaher, T., Jayachandran, P. & Stankovic, J. A., Sep 29 2006, p. 110-123. 14 p.

Research output: Contribution to conferencePaper

Vector LLVA: A virtual vector instruction set for media processing

Bocchino, R. L. & Adve, V. S., Jul 20 2006, p. 46-56. 11 p.

Research output: Contribution to conferencePaper

2005

A bandwidth management framework for wireless camera array

Yang, Z. & Nahrstedt, K., Dec 1 2005, p. 147-152. 6 p.

Research output: Contribution to conferencePaper

A performability-oriented software rejuvenation framework for distributed applications

Tai, A. T., Tso, K. S., Sanders, W. H. & Chau, S. N., Nov 9 2005, p. 570-579. 10 p.

Research output: Contribution to conferencePaper

Application-driven coordination-free distributed checkpointing

Agbaria, A. & Sanders, W. H., Jan 1 2005, p. 177-186. 10 p.

Research output: Contribution to conferencePaper

Arrays of microcavity plasma devices: Concepts for future plasma displays

Park, S. J., Chen, K. F., Sung, S. H., Spinka, T. M. & Eden, J. G., Dec 1 2005, p. 1495-1498. 4 p.

Research output: Contribution to conferencePaper

Automatic pool allocation: Improving performance by controlling data structure layout in the heap

Lattner, C. & Adve, V., Dec 1 2005, p. 129-142. 14 p.

Research output: Contribution to conferencePaper

Co-design based approach to improve robustness in networked control systems

Kowshik, S., Baliga, G., Graham, S. & Sha, L., Nov 9 2005, p. 454-463. 10 p.

Research output: Contribution to conferencePaper

Defeating memory corruption attacks via pointer taintedness detection

Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 378-387. 10 p.

Research output: Contribution to conferencePaper

Deuterium passivation in CMOS technology

Lyding, J. W., Lee, J., Cheng, K., Albrecht, P. M., Ruppalt, L. B. & Hess, K., Dec 1 2005, p. 135-143. 9 p.

Research output: Contribution to conferencePaper

Distinctive feature based SVM discriminant features for improvements to phone recognition on telephone band speech

Borys, S. & Hasegawa-Johnson, M., Dec 1 2005, p. 697-700. 4 p.

Research output: Contribution to conferencePaper

Distributed optimal resource allocation for fading relay broadcast channels

Liang, Y. & Veeravalli, V. V., Dec 1 2005, p. 550-554. 5 p.

Research output: Contribution to conferencePaper

Lumping matrix diagram representations of markov models

Derisavi, S., Kemper, P. & Sanders, W. H., Nov 9 2005, p. 742-751. 10 p.

Research output: Contribution to conferencePaper

Microprocessor sensitivity to failures: Control vs. execution and combinational vs. sequential logic

Saggese, G. P., Vetteth, A., Kalbarczyk, Z. T. & Iyer, R. K., Nov 9 2005, p. 760-769. 10 p.

Research output: Contribution to conferencePaper

Modeling coordinated checkpointing for large-scale supercomputers

Wang, L., Pattabiraman, K., Kalbarczyk, Z., Iyer, R. K., Votta, L., Vick, C. & Wood, A., Nov 9 2005, p. 812-821. 10 p.

Research output: Contribution to conferencePaper

Neutralization of errors and attacks in wireless ad hoc networks

Basile, C., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 518-527. 10 p.

Research output: Contribution to conferencePaper

Non-control-data attacks are realistic threats

Chen, S., Xu, J., Sezer, E. C., Gauriar, P. & Iyer, R. K., Jan 1 2005, p. 177-191. 15 p.

Research output: Contribution to conferencePaper

Power control for multicell CDMA wireless networks: A team optimization approach

Alpcan, T., Fan, X., Başar, T., Arcak, M. & Wen, J. T., Dec 1 2005, p. 379-388. 10 p.

Research output: Contribution to conferencePaper

Resilient localization for sensor networks in outdoor environments

Kwon, Y., Mechitov, K., Sundresh, S., Kim, W. & Agha, G. A., Jan 1 2005, p. 643-652. 10 p.

Research output: Contribution to conferencePaper

ReStore: Symptom based soft error detection in microprocessors

Wang, N. J. & Patel, S. J., Nov 9 2005, p. 30-39. 10 p.

Research output: Contribution to conferencePaper