Research Output

Filter
Paper

Asynchronous wakeup for ad hoc networks

Zheng, R., Hou, J. C. & Sha, L., Nov 19 2003, p. 35-45. 11 p.

Research output: Contribution to conferencePaper

A trajectory-generation framework for time-critical cooperative missions

Choe, R., Cichella, V., Xargay, E., Hovakimyan, N., Trujillo, A. C. & Kaminer, I., Sep 16 2013.

Research output: Contribution to conferencePaper

Augmint multiprocessor simulation toolkit for Intel x86 architectures

Nguyen, A. T., Michael, M., Sharma, A. & Torrellas, J., Dec 1 1996, p. 486-490. 5 p.

Research output: Contribution to conferencePaper

Automatically mapping code on an intelligent memory architecture

Lee, J., Solihin, Y. & Torrellas, J., Jan 1 2001, p. 121-132. 12 p.

Research output: Contribution to conferencePaper

Automatic pool allocation: Improving performance by controlling data structure layout in the heap

Lattner, C. & Adve, V., Dec 1 2005, p. 129-142. 14 p.

Research output: Contribution to conferencePaper

Automatic security assessment of critical cyber-infrastructures

Anwar, Z., Shankesi, R. & Campbell, R. H., Oct 13 2008, p. 366-375. 10 p.

Research output: Contribution to conferencePaper

AVERAGING THEORY IN REDUCED-ORDER SYNCHRONOUS MACHINE MODELING.

Othman, H. A., Lesieutre, B. C. & Sauer, P. W., Dec 1 1987, p. 225-234. 10 p.

Research output: Contribution to conferencePaper

Behavior of a computer based interlocking system under transient hardware faults

Romano, L., Kalbarczyk, Z., Iyer, R. K., Mazzeo, A. & Mazzocca, N., Dec 1 1997, p. 174-179. 6 p.

Research output: Contribution to conferencePaper

BIDE: Efficient mining of frequent closed sequences

Wang, J. & Han, J., Jun 1 2004, p. 79-90. 12 p.

Research output: Contribution to conferencePaper

Biomass feedstock production and provision: A system level optimization approach

Shastri, Y., Hansen, A. C., Rodriguez, L. F. & Ting, K. C., Dec 1 2009.

Research output: Contribution to conferencePaper

Capacity-efficient restoration for optical networks

Medard, M., Lumetta, S. S. & Tseng, Y. C., Jan 1 2000, p. 207-209. 3 p.

Research output: Contribution to conferencePaper

Cerberus: A context-aware security scheme for smart spaces

Al-Muhtadi, J., Ranganathan, A., Campbell, R. H. & Mickunas, M. D., Dec 1 2003, p. 489-494. 6 p.

Research output: Contribution to conferencePaper

Channel quality based adaptation of TCP with loss discrimination

Yang, Y., Zhang, H. & Kravets, R., Dec 1 2002, p. 2026-2030. 5 p.

Research output: Contribution to conferencePaper

Characterization of Linux Kernel Behavior under Errors

Gu, W., Kalbarczyk, Z., Iyer, R. K. & Yang, Z., Dec 1 2003, p. 459-468. 10 p.

Research output: Contribution to conferencePaper

Characterizing the effects of transient faults on a high-performance processor pipeline

Wang, N. J., Quek, J., Rafacz, T. M. & Patel, S. J., Oct 1 2004, p. 61-70. 10 p.

Research output: Contribution to conferencePaper

Checkpointing of control structures in main memory database systems

Wang, L., Kalbarczyk, Z., Iyer, R. K., Vora, H. & Chahande, T., Oct 1 2004, p. 687-692. 6 p.

Research output: Contribution to conferencePaper

ClariSense: Clarifying sensor anomalies using social network feeds

Giridhar, P., Amin, M. T., Abdelzaher, T., Kaplan, L., George, J. & Ganti, R., Jan 1 2014, p. 395-400. 6 p.

Research output: Contribution to conferencePaper

Classification of two-link failures for all-optical networks

Lumetta, S. S. & Médard, M., Jan 1 2001, p. TuO3/1-TuO3/3.

Research output: Contribution to conferencePaper

Classifying large data sets using SVMs with hierarchical clusters

Yu, H., Yang, J. & Han, J., Dec 1 2003, p. 306-315. 10 p.

Research output: Contribution to conferencePaper

CloseGraph: Mining closed frequent graph patterns

Yan, X. & Han, J., Dec 1 2003, p. 286-295. 10 p.

Research output: Contribution to conferencePaper

CLOSET+: Searching for the best strategies for mining frequent closed itemsets

Wang, J., Han, J. & Pei, J., Dec 1 2003, p. 236-245. 10 p.

Research output: Contribution to conferencePaper

Cluster analyses of Lunar-Mars life support test project simulations

Goss, R. P., Jiang, H. & Rodriguez, L. F., Nov 7 2007.

Research output: Contribution to conferencePaper

Cluster-based failure detection service for large-scale ad hoc wireless network applications

Tai, A. T., Tso, K. S. & Sanders, W. H., Oct 1 2004, p. 805-814. 10 p.

Research output: Contribution to conferencePaper

Coalition Formation in Proportionally Fair Divisible Auctions

Maheswaran, R. T. & Başar, T., Dec 1 2003, p. 25-32. 8 p.

Research output: Contribution to conferencePaper

Code hunt: Gamifying teaching and learning of computer science at scale

Tillmann, N., De Halleux, J., Xie, T. & Bishop, J., Jan 1 2014, p. 221-222. 2 p.

Research output: Contribution to conferencePaper

Co-design based approach to improve robustness in networked control systems

Kowshik, S., Baliga, G., Graham, S. & Sha, L., Nov 9 2005, p. 454-463. 10 p.

Research output: Contribution to conferencePaper

COMPLETE CLASS OF MINIMAX AND MAXIMIN ENCODER-DECODER POLICIES FOR COMMUNICATION CHANNELS WITH INCOMPLETE STATISTICAL DESCRIPTION.

Basar, T. & Wu, Y. W., Dec 1 1984, p. 373-377. 5 p.

Research output: Contribution to conferencePaper

Complexity-regularized denoising of poisson-corrupted data

Liu, J. & Moulin, P., Dec 1 2000, p. [d]254-257.

Research output: Contribution to conferencePaper

Complexity-regularized image denoising

Liu, J. & Moulin, P., Dec 1 1997, p. 370-373. 4 p.

Research output: Contribution to conferencePaper

Complexity-regularized image restoration

Liu, J. & Moulin, P., Dec 1 1998, p. 555-559. 5 p.

Research output: Contribution to conferencePaper

Conformance testing in the presence of multiple faults

Kumar, V. & Viswanathan, M., Jul 1 2005, p. 1136-1145. 10 p.

Research output: Contribution to conferencePaper

Contact networking: A localized mobility system

Carter, C., Kravets, R. & Tourrilhes, J., May 5 2003, p. 145-158. 14 p.

Research output: Contribution to conferencePaper

Control of a class of nonlinear systems subject to periodic exogenous signals

Alleyne, A. G., Dec 1 1997, p. 563-570. 8 p.

Research output: Contribution to conferencePaper

ControlWare: A middleware architecture for feedback control of software performance

Zhang, R., Lu, C., Abdelzaher, T. F. & Stankovic, J. A., Jan 1 2002, p. 301-310. 10 p.

Research output: Contribution to conferencePaper

Conversation clusters: Human-computer dialog for topic extraction

Bergstrom, T. & Karahalios, K. G., Dec 8 2008, p. 2829-2834. 6 p.

Research output: Contribution to conferencePaper

Coordinating adaptations in distributed systems

Ensink, B. & Adve, V., Jun 1 2004, p. 446-455. 10 p.

Research output: Contribution to conferencePaper

Coping with errors: The importance of process data in robust sociotechnical systems

Twidale, M. B. & Marty, P. F., Dec 1 2000, p. 269-278. 10 p.

Research output: Contribution to conferencePaper

Cross-layer adaptive video coding to reduce energy on general-purpose processors

Sachs, D. G., Adve, S. V. & Jones, D. L., Dec 17 2003, p. 109-112. 4 p.

Research output: Contribution to conferencePaper

CrossMine: Efficient classification across multiple database relations

Yin, X., Han, J., Yang, J. & Yu, P. S., Jun 1 2004, p. 399-410. 12 p.

Research output: Contribution to conferencePaper

Cross-relational clustering with user's guidance

Yin, X., Han, J. & Yu, P. S., Dec 1 2005, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

Customization and composition of distributed objects: Middleware abstractions for policy management

Astley, M. & Agha, G. A., Dec 1 1998, p. 1-9. 9 p.

Research output: Contribution to conferencePaper

Decentralized design for integrated flight/propulsion control of aircraft

Chen, Z. & Voulgaris, P. G., Jan 1 1998, p. 1866-1872. 7 p.

Research output: Contribution to conferencePaper

Decorrelating (DECOR) transformations for low-power adaptive filters

Ramprasad, S., Shanbhag, N. R. & Hajj, I. N., Jan 1 1998.

Research output: Contribution to conferencePaper

Decorrelating (DECOR) transformations for low-power adaptive filters

Ramprasad, S., Shanbhag, N. R. & Hajj, I. N., Jan 1 1998, p. 250-255. 6 p.

Research output: Contribution to conferencePaper

Defeating memory corruption attacks via pointer taintedness detection

Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 378-387. 10 p.

Research output: Contribution to conferencePaper

DEFINE: a distributed fault injection and monitoring environment

Kao, W. L. & Iyer, R. K., Dec 1 1995, p. 252-259. 8 p.

Research output: Contribution to conferencePaper

DEPEND: A design environment for prediction and evaluation of system dependability

Goswami, K. K. & Iyer, R. K., Dec 1 1990, p. 87-92. 6 p.

Research output: Contribution to conferencePaper

DEPEND: a simulation environment for system dependability modeling and evaluation

Ries, G., Kalbarczyk, Z. T., Kraljevic, T., Hsueh, M. C. & Iyer, R. K., Jan 1 1996. 1 p.

Research output: Contribution to conferencePaper

Dependable system upgrade

Sha, L., Dec 1 1998, p. 440-448. 9 p.

Research output: Contribution to conferencePaper

Design and analysis of a forward-adaptive wavelet image coder

Mihçak, M. K., Docimo, A. F., Moulin, P. & Ramchandran, K., Dec 1 2000, p. 649-652. 4 p.

Research output: Contribution to conferencePaper