Research Output

Paper

Non-control-data attacks are realistic threats

Chen, S., Xu, J., Sezer, E. C., Gauriar, P. & Iyer, R. K., Jan 1 2005, p. 177-191. 15 p.

Research output: Contribution to conferencePaper

Numerical evaluation of a group-oriented multicast protocol using stochastic activity networks

Malhis, L. M., Sanders, W. H. & Schlichting, R. D., Dec 1 1995, p. 63-72. 10 p.

Research output: Contribution to conferencePaper

Objective-based stochastic framework for manipulation planning

La Valle, S. M. & Hutchinson, S. A., Dec 1 1994, p. 1772-1779. 8 p.

Research output: Contribution to conferencePaper

Octopus: A secure and anonymous DHT lookup

Wang, Q. & Borisov, N., Oct 5 2012, p. 325-334. 10 p.

Research output: Contribution to conferencePaper

On a control policy that maintains indoor air quality in a variable-air-volume air-handling unit

Norris, W. R. & Sreenivas, R. S., Dec 1 1997, p. 886-891. 6 p.

Research output: Contribution to conferencePaper

On Integrating the Möbius and Modest Modeling Tools

Bohnenkamp, H., Courtney, T., Daly, D., Derisavi, S., Hermanns, H., Katoen, J. P., Klaren, R., Vi Lam, V. & Sanders, W. H., Dec 1 2003. 1 p.

Research output: Contribution to conferencePaper

Online learning versus blended learning: An exploratory study

Cross, A., Ashok, B., Bala, S., Cutrell, E., Datha, N., Kumar, R., Kumar, V., Parthasarathy, M., Prakash, S., Rajamani, S., Sangameswaran, S., Sharma, D. & Thies, W., Jan 1 2014, p. 179-180. 2 p.

Research output: Contribution to conferencePaper

On the application of system identification and model validation methods for constructing multivariable anesthesia response models

Beck, C. L., Smith, R., Lin, H. H. & Bloom, M., Dec 1 2000, p. 784-790. 7 p.

Research output: Contribution to conferencePaper

On the balanced truncation of LTV systems

Farhood, M. & Dullerud, G. E., Dec 1 2004, p. 2245-2249. 5 p.

Research output: Contribution to conferencePaper

On the cost of differential privacy in distributed control systems

Huang, Z., Wang, Y., Mitra, S. & Dullerud, G. E., Jan 1 2014, p. 105-114. 10 p.

Research output: Contribution to conferencePaper

On the design of distributed protocols from differential equations

Gupta, I., Dec 27 2004, p. 216-225. 10 p.

Research output: Contribution to conferencePaper

On the effectiveness of a message-driven confidence-driven protocol for guarded software upgrading

Tai, A. T., Tso, K. S., Alkalai, L., Chau, S. N. & Sanders, W. H., Jan 1 2000, p. 59-68. 10 p.

Research output: Contribution to conferencePaper

ON THE FORMULATION OF POWER DISTRIBUTION FACTORS FOR LINEAR LOAD FLOW METHODS.

Sauer, P. W., Jan 1 2017.

Research output: Contribution to conferencePaper

ON THE RELATIONSHIP BETWEEN POWER SYSTEM DYNAMIC EQUILIBRIUM AND LOAD FLOW EQUATIONS.

Sauer, P. W., Othman, H. A. & Lavin, R. C., Dec 1 1987, p. 303-307. 5 p.

Research output: Contribution to conferencePaper

On time-out driven power management policies in wireless networks

Zheng, R., Hou, J. C. & Sha, L. R., Dec 1 2004, p. 4097-4103. 7 p.

Research output: Contribution to conferencePaper

Open cirrusTM cloud computing testbed: Federated data centers for open source systems and services research

Campbell, R., Gupta, I., Heath, M., Ko, S. Y., Kozuch, M., Kunze, M., Kwan, T., Lai, K., Lee, H. Y., Lyons, M., Milojicic, D., O'Hallaron, D. & Soh, Y. C., Jan 1 2020.

Research output: Contribution to conferencePaper

Operational security requirements for large collaborative compute infrastructures

Khurana, H., Basney, J., Von Welch, W. & Campbell, R., Dec 1 2006.

Research output: Contribution to conferencePaper

Opinosis: A graph-based approach to abstractive summarization of highly redundant opinions

Ganesan, K., Zhai, C. X. & Han, J., Dec 1 2010, p. 340-348. 9 p.

Research output: Contribution to conferencePaper

Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study

Tai, A. T., Tso, K. S., Alkalai, L., Chau, S. N. & Sanders, W. H., Dec 1 2003, p. 655-664. 10 p.

Research output: Contribution to conferencePaper

OptiImal l1 estimation

Voulgaris, P. G., Jan 1 1993, p. 314-318. 5 p.

Research output: Contribution to conferencePaper

Optimal design of transform coders and quantizers for image classification

Jana, S. & Moulin, P., Dec 1 2000, p. [d]841-844.

Research output: Contribution to conferencePaper

Optimal QoS sampling frequency assignment for real-time wireless sensor networks

Liu, X., Wang, Q., Sha, L. & He, W., Dec 1 2003, p. 308-319. 12 p.

Research output: Contribution to conferencePaper

Optimizing robot motion strategies for assembly with stochastic models of the assembly process

Sharma, R., LaValle, S. M. & Hutchinson, S. A., Jan 1 1995, p. 341-346. 6 p.

Research output: Contribution to conferencePaper

Optimum visualization of vector fields and multi-sensor fusion

Bresler, Y., Jan 1 1994, p. 91-96. 6 p.

Research output: Contribution to conferencePaper

Oral discussions on session: 'Dynamics and Control' - Part i

Sauer, P. W., Jan 1 2013.

Research output: Contribution to conferencePaper

Oral discussions on session: 'Advanced Operations' - Part i

Gross, G., Jan 1 2013.

Research output: Contribution to conferencePaper

Oral discussions on session: 'Dynamics and Control' - Part II

Sauer, P. W., Jan 1 2013.

Research output: Contribution to conferencePaper

Oral discussions on session: 'Advanced Operations' - Part II

Gross, G., Jan 1 2013.

Research output: Contribution to conferencePaper

Parallel mining of closed sequential patterns

Cong, S., Han, J. & Padua, D., Dec 1 2005, p. 562-567. 6 p.

Research output: Contribution to conferencePaper

Parameter identification for systems with redundant actuators

Elgersma, M., Enns, D., Shald, S. & Voulgaris, P. G., Jan 1 1998, p. 109-117. 9 p.

Research output: Contribution to conferencePaper

PEBL: Positive example based learning for web page classification using SVM

Yu, H., Han, J. & Chang, K. C. C., Dec 1 2002, p. 239-248. 10 p.

Research output: Contribution to conferencePaper

Performance analysis of two time-based coordinated checkpointing protocols

Kavanaugh, G. P. & Sanders, W. H., Dec 1 1997, p. 194-201. 8 p.

Research output: Contribution to conferencePaper

Permacoin: Repurposing Bitcoin Work for Data Preservation

Miller, A., Juels, A., Shi, E., Parno, B. & Katz, J., May 2014, p. 475-490.

Research output: Contribution to conferencePaper

Per-tensor fixed-point quantization of the back-propagation algorithm

Sakr, C. & Shanbhag, N. R., Jan 1 2019.

Research output: Contribution to conferencePaper

Perturbation-resistant and overlay-independent resource discovery

Ko, S. Y. & Gupta, I., Nov 9 2005, p. 248-257. 10 p.

Research output: Contribution to conferencePaper

Pipelined strength-reduced adaptive filter: Finite precision analysis and application to 155.52 Mb/s ATM-LAN

Goel, M. & Shanbhag, N. R., Dec 1 1997, p. 790-793. 4 p.

Research output: Contribution to conferencePaper

Pluggable watchdog: Transparent failure detection for MPI programs

Yim, K. S., Kalbarczyk, Z. T. & Iyer, R. K., Oct 7 2013, p. 489-500. 12 p.

Research output: Contribution to conferencePaper

PolyPack: An automated online packing service for optimal antivirus evasion

Oberheide, J., Bailey, M. & Jahanian, F., Jan 1 2009.

Research output: Contribution to conferencePaper

Power control for multicell CDMA wireless networks: A team optimization approach

Alpcan, T., Fan, X., Başar, T., Arcak, M. & Wen, J. T., Dec 1 2005, p. 379-388. 10 p.

Research output: Contribution to conferencePaper

Powertrain optimization for an earthmoving vehicle

Gupta, P. & Alleyne, A., Jan 1 2004, p. 207-215. 9 p.

Research output: Contribution to conferencePaper

Predictive Dynamic Thermal Management for Multimedia Applications

Srinivasan, J. & Adve, S. V., Dec 1 2003, p. 109-120. 12 p.

Research output: Contribution to conferencePaper

Privacy enhanced data pre-processing for HIPAA compliance

Li, J. & Shaw, M. J., Jan 1 2006. 1 p.

Research output: Contribution to conferencePaper

Privacy-preserving audit for broker-based health information exchange

Oh, S. E., Chun, J. Y., Jia, L., Garg, D., Gunter, C. A. & Datta, A., Jan 1 2014, p. 313-320. 8 p.

Research output: Contribution to conferencePaper

Probabilistic Validation of an Intrusion-Tolerant Replication System

Singh, S., Cukier, M. & Sanders, W. H., Dec 1 2003, p. 615-624. 10 p.

Research output: Contribution to conferencePaper

Process-technology fit: Extending tasktechnology fit to assess enterprise information technologies

Gribbins, M. L., Subramaniam, C. & Shaw, M. J., Dec 1 2006, p. 61-70. 10 p.

Research output: Contribution to conferencePaper

Programming the FlexRAM parallel intelligent memory system

Fraguela, B. B., Renau, J., Feautrier, P., Padua, D. & Torrellas, J., Jul 28 2003, p. 49-60. 12 p.

Research output: Contribution to conferencePaper

Proofs from simulations and modular annotations

Huang, Z. & Mitra, S., Jan 1 2014, p. 183-192. 10 p.

Research output: Contribution to conferencePaper

Proving termination of membership equational programs

Durán, F., Lucas, S., Meseguer, J., Marché, C. & Urbain, X., Jan 1 2004, p. 147-158. 12 p.

Research output: Contribution to conferencePaper

Pushing aggregate constraints by divide-and-approximate

Wang, K., Jiang, Y., Yu, J. X., Dong, G. & Han, J., Dec 1 2003, p. 291-302. 12 p.

Research output: Contribution to conferencePaper