Research Output

Filter
Paper
2005

Cloth capture

White, R., Lobay, A. & Forsyth, D. A., Jul 31 2005. 1 p.

Research output: Contribution to conferencePaper

Co-design based approach to improve robustness in networked control systems

Kowshik, S., Baliga, G., Graham, S. & Sha, L., Nov 9 2005, p. 454-463. 10 p.

Research output: Contribution to conferencePaper

Conformance testing in the presence of multiple faults

Kumar, V. & Viswanathan, M., Jul 1 2005, p. 1136-1145. 10 p.

Research output: Contribution to conferencePaper

Cross-relational clustering with user's guidance

Yin, X., Han, J. & Yu, P. S., Dec 1 2005, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

Defeating memory corruption attacks via pointer taintedness detection

Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 378-387. 10 p.

Research output: Contribution to conferencePaper

Designing routing metrics for mesh networks

Yang, Y., Wang, J. & Kravets, R. H., Dec 1 2005.

Research output: Contribution to conferencePaper

Distributed optimal resource allocation for fading relay broadcast channels

Liang, Y. & Veeravalli, V. V., Dec 1 2005, p. 550-554. 5 p.

Research output: Contribution to conferencePaper

Exploring the energy-latency trade-off for broadcasts in energy-saving sensor networks

Miller, M. J., Sengul, C. & Gupta, I., Jan 1 2005, p. 17-26. 10 p.

Research output: Contribution to conferencePaper

Helping users avoid bugs in GUI applications

Michail, A. & Xie, T., 2005, p. 107-116. 10 p.

Research output: Contribution to conferencePaper

Learning to Move Autonomously in a Hostile World

Ikemoto, L., Arikan, O. & Forsyth, D., Jul 31 2005. 1 p.

Research output: Contribution to conferencePaper

Learning to verify branching time properties

Vardhan, A. & Viswanathan, M., Dec 1 2005, p. 325-328. 4 p.

Research output: Contribution to conferencePaper

Lumping matrix diagram representations of markov models

Derisavi, S., Kemper, P. & Sanders, W. H., Nov 9 2005, p. 742-751. 10 p.

Research output: Contribution to conferencePaper

Microprocessor sensitivity to failures: Control vs. execution and combinational vs. sequential logic

Saggese, G. P., Vetteth, A., Kalbarczyk, Z. T. & Iyer, R. K., Nov 9 2005, p. 760-769. 10 p.

Research output: Contribution to conferencePaper

Mining behavior graphs for "Backtrace" of noncrashing bugs

Liu, C., Yan, X., Yu, H., Han, J. & Yu, P. S., Dec 1 2005, p. 286-297. 12 p.

Research output: Contribution to conferencePaper

Mining closed relational graphs with connectivity constraints

Yan, X., Zhou, X. J. & Han, J., Dec 1 2005, p. 324-333. 10 p.

Research output: Contribution to conferencePaper

Modeling coordinated checkpointing for large-scale supercomputers

Wang, L., Pattabiraman, K., Kalbarczyk, Z., Iyer, R. K., Votta, L., Vick, C. & Wood, A., Nov 9 2005, p. 812-821. 10 p.

Research output: Contribution to conferencePaper

Neutralization of errors and attacks in wireless ad hoc networks

Basile, C., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 518-527. 10 p.

Research output: Contribution to conferencePaper

Non-control-data attacks are realistic threats

Chen, S., Xu, J., Sezer, E. C., Gauriar, P. & Iyer, R. K., Jan 1 2005, p. 177-191. 15 p.

Research output: Contribution to conferencePaper

Parallel mining of closed sequential patterns

Cong, S., Han, J. & Padua, D., Dec 1 2005, p. 562-567. 6 p.

Research output: Contribution to conferencePaper

Perturbation-resistant and overlay-independent resource discovery

Ko, S. Y. & Gupta, I., Nov 9 2005, p. 248-257. 10 p.

Research output: Contribution to conferencePaper

Power control for multicell CDMA wireless networks: A team optimization approach

Alpcan, T., Fan, X., Başar, T., Arcak, M. & Wen, J. T., Dec 1 2005, p. 379-388. 10 p.

Research output: Contribution to conferencePaper

Pushing people around

Arikan, O., Forsyth, D. A. & O'Brien, J. F., Dec 1 2005, p. 59-66. 8 p.

Research output: Contribution to conferencePaper

Resilient localization for sensor networks in outdoor environments

Kwon, Y., Mechitov, K., Sundresh, S., Kim, W. & Agha, G. A., Jan 1 2005, p. 643-652. 10 p.

Research output: Contribution to conferencePaper

ReStore: Symptom based soft error detection in microprocessors

Wang, N. J. & Patel, S. J., Nov 9 2005, p. 30-39. 10 p.

Research output: Contribution to conferencePaper

RINSE: The Real-time Immersive Network Simulation Environment for network security exercises

Liljenstam, M., Liu, J., Nicol, D., Yuan, Y., Yan, G. & Grier, C., Oct 24 2005, p. 119-128. 10 p.

Research output: Contribution to conferencePaper

SeqIndex: Indexing sequences by sequential pattern analysis

Cheng, H., Yan, X. & Han, J., Dec 1 2005, p. 601-605. 5 p.

Research output: Contribution to conferencePaper

Simulation of network traffic at coarse time-scales

Nicol, D. M. & Yan, G., Oct 24 2005, p. 141-150. 10 p.

Research output: Contribution to conferencePaper

SoftArch: An architecture-level tool for modeling and analyzing soft errors

Li, X., Adve, S. V., Bose, P. & Rivers, J. A., 2005, p. 496-505. 10 p.

Research output: Contribution to conferencePaper

Summarizing itemset patterns: A profile-based approach

Yan, X., Cheng, H., Han, J. & Xin, D., Dec 1 2005, p. 314-323. 10 p.

Research output: Contribution to conferencePaper

Tasking with out-of-order spawn in TLS chip multiprocessors: Microarchitecture and compilation

Renau, J., Tuck, J., Liu, W., Ceze, L., Strauss, K. & Torrellas, J., Dec 1 2005, p. 179-188. 10 p.

Research output: Contribution to conferencePaper

Thread-level speculation on a CMP can be energy efficient

Renau, J., Strauss, K., Ceze, L., Liu, W., Sarangi, S., Tuck, J. & Torrellas, J., Dec 1 2005, p. 219-228. 10 p.

Research output: Contribution to conferencePaper

Threat analysis of GNU software radio

Hill, R. L., Myagmar, S. & Campbell, R., Jun 27 2005, p. 383-388. 6 p.

Research output: Contribution to conferencePaper

2006

Operational security requirements for large collaborative compute infrastructures

Khurana, H., Basney, J., Von Welch, W. & Campbell, R., Dec 1 2006.

Research output: Contribution to conferencePaper

Privacy enhanced data pre-processing for HIPAA compliance

Li, J. & Shaw, M. J., Jan 1 2006. 1 p.

Research output: Contribution to conferencePaper

Process-technology fit: Extending tasktechnology fit to assess enterprise information technologies

Gribbins, M. L., Subramaniam, C. & Shaw, M. J., Dec 1 2006, p. 61-70. 10 p.

Research output: Contribution to conferencePaper

SATIRE: A software architecture for smart AtTIRE

Ganti, R. K., Abdelzaher, T., Jayachandran, P. & Stankovic, J. A., Sep 29 2006, p. 110-123. 14 p.

Research output: Contribution to conferencePaper

Vector LLVA: A virtual vector instruction set for media processing

Bocchino, R. L. & Adve, V. S., Jul 20 2006, p. 46-56. 11 p.

Research output: Contribution to conferencePaper

2007

An engineering economic evaluation of quick germ quick fiber process for dry-grind ethanol facilities

Li, C., Rodriguez, L. F., Khanna, M., Spaulding, A. D. & Eckhoff, S. R., Nov 7 2007.

Research output: Contribution to conferencePaper

Capturing and animating occluded cloth

White, R., Crane, K. & Forsyth, D. A., Dec 17 2007.

Research output: Contribution to conferencePaper

Cluster analyses of Lunar-Mars life support test project simulations

Goss, R. P., Jiang, H. & Rodriguez, L. F., Nov 7 2007.

Research output: Contribution to conferencePaper

Determination of constants of a Two-Leaf multi-scale photosynthesis model using a genetic algorithm

Menezes, G. K. & Rodriguez, L. F., Nov 7 2007.

Research output: Contribution to conferencePaper

Development of a STELLA framework to model microbial communities in humic lakes in Wisconsin

Appleford, J. M., Menezes, G. K., Rodriguez, L. F. & Kent, A. D., Nov 7 2007.

Research output: Contribution to conferencePaper

Fast and detailed approximate global illumination by irradiance decomposition

Arikan, O., Forsyth, D. A. & O'Brien, J. F., Dec 1 2007.

Research output: Contribution to conferencePaper

Graphstract: Minimal graphical help for computers

Huang, J. & Twidale, M. B., Dec 1 2007, p. 203-212. 10 p.

Research output: Contribution to conferencePaper

Semi-supervised discriminant analysis

Cai, D., He, X. & Han, J., Dec 1 2007.

Research output: Contribution to conferencePaper

Spectral regression for efficient regularized subspace learning

Cai, D., He, X. & Han, J., Dec 1 2007.

Research output: Contribution to conferencePaper

The systems engineering program at the University of Illinois at Urbana-Champaign

Yassine, A. & Beck, C., Dec 1 2007, p. 100-103. 4 p.

Research output: Contribution to conferencePaper

2008

Application acceleration with the explicitly parallel operations system - The EPOS processor

Papakonstantinou, A., Chen, D. & Hwu, W-M. W., Sep 29 2008, p. 20-25. 6 p.

Research output: Contribution to conferencePaper

A recurrence-relation-based reward model for performability evaluation of embedded systems

Tai, A. T., Tso, K. S. & Sanders, W. H., Oct 13 2008, p. 532-541. 10 p.

Research output: Contribution to conferencePaper

Automatic security assessment of critical cyber-infrastructures

Anwar, Z., Shankesi, R. & Campbell, R. H., Oct 13 2008, p. 366-375. 10 p.

Research output: Contribution to conferencePaper