Research Output 1972 2020

Filter
Paper
2006

Process-technology fit: Extending tasktechnology fit to assess enterprise information technologies

Gribbins, M. L., Subramaniam, C. & Shaw, M. J., Dec 1 2006, p. 61-70. 10 p.

Research output: Contribution to conferencePaper

Information technology
Industry

SATIRE: A software architecture for smart AtTIRE

Ganti, R. K., Abdelzaher, T., Jayachandran, P. & Stankovic, J. A., Sep 29 2006, p. 110-123. 14 p.

Research output: Contribution to conferencePaper

Software architecture
Monitoring

Vector LLVA: A virtual vector instruction set for media processing

Bocchino, R. L. & Adve, V. S., Jul 20 2006, p. 46-56. 11 p.

Research output: Contribution to conferencePaper

Processing
Hardware
Experiments
2005

A bandwidth management framework for wireless camera array

Yang, Z. & Nahrstedt, K., Dec 1 2005, p. 147-152. 6 p.

Research output: Contribution to conferencePaper

Cameras
Bandwidth
Frequency allocation
Wireless ad hoc networks
Quality of service

A framework for electricity market monitoring

Güler, T. & Gross, G., Jan 1 2005.

Research output: Contribution to conferencePaper

Electricity
Monitoring
Power markets
Defects

A framework for the analysis of transmission planning in the market environment

Contreras, J., Bósquez, V. & Gross, G., Jan 1 2005.

Research output: Contribution to conferencePaper

Planning
Economics

An integrated framework on mining logs files for computing system management

Li, T., Ma, S., Liang, F. & Peng, W., Dec 1 2005, p. 776-781. 6 p.

Research output: Contribution to conferencePaper

Knowledge acquisition
Visualization
Personnel

A performability-oriented software rejuvenation framework for distributed applications

Tai, A. T., Tso, K. S., Sanders, W. H. & Chau, S. N., Nov 9 2005, p. 570-579. 10 p.

Research output: Contribution to conferencePaper

Redundancy

Application-driven coordination-free distributed checkpointing

Agbaria, A. & Sanders, W. H., Jan 1 2005, p. 177-186. 10 p.

Research output: Contribution to conferencePaper

Stochastic models
Fault tolerance

Automatic pool allocation: Improving performance by controlling data structure layout in the heap

Lattner, C. & Adve, V. S., Dec 1 2005, p. 129-142. 14 p.

Research output: Contribution to conferencePaper

Data structures
Data storage equipment

Co-design based approach to improve robustness in networked control systems

Kowshik, S., Baliga, G., Graham, S. & Sha, L., Nov 9 2005, p. 454-463. 10 p.

Research output: Contribution to conferencePaper

Networked control systems
Robustness (control systems)
Testbeds
Traffic control
Fault tolerance

Conformance testing in the presence of multiple faults

Kumar, V. & Viswanathan, M., Jul 1 2005, p. 1136-1145. 10 p.

Research output: Contribution to conferencePaper

Conformance Testing
Fault
Specifications
Testing
Specification

Cross-relational clustering with user's guidance

Yin, X., Han, J. & Yu, P. S., Dec 1 2005, p. 344-353. 10 p.

Research output: Contribution to conferencePaper

Data mining
Scalability
Feature extraction
Semantics
Experiments

Data reduction for the scalable automated analysis of distributed darknet traffic

Bailey, M. D., Cooke, E., Jahanian, F., Provos, N., Rosaen, K. & Watson, D., Dec 1 2005, p. 239-252. 14 p.

Research output: Contribution to conferencePaper

Data reduction
Scanning
Hybrid systems
Monitoring
Availability

Defeating memory corruption attacks via pointer taintedness detection

Chen, S., Xu, J., Nakka, N., Kalbarczyk, Z. & Iyer, R. K., Nov 9 2005, p. 378-387. 10 p.

Research output: Contribution to conferencePaper

Data storage equipment
Security systems
Simulators

Designing routing metrics for mesh networks

Yang, Y., Wang, J. & Kravets, R. H., Dec 1 2005.

Research output: Contribution to conferencePaper

Routing protocols
Wireless mesh networks (WMN)
Wireless networks

Distributed optimal resource allocation for fading relay broadcast channels

Liang, Y. & Veeravalli, V. V., Dec 1 2005, p. 550-554. 5 p.

Research output: Contribution to conferencePaper

Resource allocation
Channel state information
Telecommunication links
Transmitters
Bandwidth

Exploring the energy-latency trade-off for broadcasts in energy-saving sensor networks

Miller, M. J., Sengul, C. & Gupta, I., Jan 1 2005, p. 17-26. 10 p.

Research output: Contribution to conferencePaper

Sensor networks
Energy conservation
Wireless sensor networks
Network protocols
Scheduling

Improved range-summable random variable construction algorithms

Calderbank, A. R., Gilbert, A., Levchenko, K. I., Muthukrishnan, S. & Strauss, M., Jul 1 2005, p. 840-849. 10 p.

Research output: Contribution to conferencePaper

Hash functions
Random variables
Random variable
Hash Function
Range of data

Learning to Move Autonomously in a Hostile World

Ikemoto, L., Arikan, O. & Forsyth, D., Jul 31 2005. 1 p.

Research output: Contribution to conferencePaper

Learning to verify branching time properties

Vardhan, A. & Viswanathan, M., Dec 1 2005, p. 325-328. 4 p.

Research output: Contribution to conferencePaper

Model checking
Trees (mathematics)

Lumping matrix diagram representations of markov models

Derisavi, S., Kemper, P. & Sanders, W. H., Nov 9 2005, p. 742-751. 10 p.

Research output: Contribution to conferencePaper

Markov processes
Resource allocation
Repair

Microprocessor sensitivity to failures: Control vs. execution and combinational vs. sequential logic

Saggese, G. P., Vetteth, A., Kalbarczyk, Z. T. & Iyer, R. K., Nov 9 2005, p. 760-769. 10 p.

Research output: Contribution to conferencePaper

Microprocessor chips
Flip flop circuits
Clocks

Mining behavior graphs for "Backtrace" of noncrashing bugs

Liu, C., Yan, X., Yu, H., Han, J. & Yu, P. S., Dec 1 2005, p. 286-297. 12 p.

Research output: Contribution to conferencePaper

Data mining
Data storage equipment
Experiments

Mining closed relational graphs with connectivity constraints

Yan, X., Zhou, X. J. & Han, J., Dec 1 2005, p. 324-333. 10 p.

Research output: Contribution to conferencePaper

Graph theory

Modeling coordinated checkpointing for large-scale supercomputers

Wang, L., Pattabiraman, K., Kalbarczyk, Z. T., Iyer, R. K., Votta, L., Vick, C. & Wood, A., Nov 9 2005, p. 812-821. 10 p.

Research output: Contribution to conferencePaper

Supercomputers
Scalability
Recovery

Neutralization of errors and attacks in wireless ad hoc networks

Basile, C., Kalbarczyk, Z. T. & Iyer, R. K., Nov 9 2005, p. 518-527. 10 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Target tracking
Cryptography
Wireless sensor networks
Simulators

Parallel mining of closed sequential patterns

Cong, S., Han, J. & Padua, D., Dec 1 2005, p. 562-567. 6 p.

Research output: Contribution to conferencePaper

Perturbation-resistant and overlay-independent resource discovery

Ko, S. Y. & Gupta, I., Nov 9 2005, p. 248-257. 10 p.

Research output: Contribution to conferencePaper

Pavement overlays

Power control for multicell CDMA wireless networks: A team optimization approach

Alpcan, T., Fan, X., Basar, M. T., Arcak, M. & Wen, J. T., Dec 1 2005, p. 379-388. 10 p.

Research output: Contribution to conferencePaper

Power control
Code division multiple access
Wireless networks
Congestion control (communication)

Resilient localization for sensor networks in outdoor environments

Kwon, Y., Mechitov, K., Sundresh, S., Kim, W. & Agha, G. A., Jan 1 2005, p. 643-652. 10 p.

Research output: Contribution to conferencePaper

Sensor networks
Wireless sensor networks
Measurement errors
Acoustics
Hardware

ReStore: Symptom based soft error detection in microprocessors

Wang, N. J. & Patel, S. J., Nov 9 2005, p. 30-39. 10 p.

Research output: Contribution to conferencePaper

Error detection
Microprocessor chips
Pipelines
Hardware
LSI circuits

RINSE: The Real-time Immersive Network Simulation Environment for network security exercises

Liljenstam, M., Liu, J., Nicol, D., Yuan, Y., Yan, G. & Grier, C., Oct 24 2005, p. 119-128. 10 p.

Research output: Contribution to conferencePaper

Network security
Simulators
Local area networks
Program processors
Scalability

SeqIndex: Indexing sequences by sequential pattern analysis

Cheng, H., Yan, X. & Han, J., Dec 1 2005, p. 601-605. 5 p.

Research output: Contribution to conferencePaper

Simulation of network traffic at coarse time-scales

Nicol, D. M. & Yan, G., Oct 24 2005, p. 141-150. 10 p.

Research output: Contribution to conferencePaper

Internet
Routers
Nonlinear systems
Throughput
Topology

SoftArch: An architecture-level tool for modeling and analyzing soft errors

Li, X., Adve, S. V., Bose, P. & Rivers, J. A., Nov 9 2005, p. 496-505. 10 p.

Research output: Contribution to conferencePaper

Masks
Statistical Models

Summarizing itemset patterns: A profile-based approach

Yan, X., Cheng, H., Han, J. & Xin, D., Dec 1 2005, p. 314-323. 10 p.

Research output: Contribution to conferencePaper

Restoration
Polynomials

Tasking with out-of-order spawn in TLS chip multiprocessors: Microarchitecture and compilation

Renau, J., Tuck, J., Liu, W., Ceze, L., Strauss, K. & Torrellas, J., Dec 1 2005, p. 179-188. 10 p.

Research output: Contribution to conferencePaper

Subroutines
Resource allocation
Hardware

Thread-level speculation on a CMP can be energy efficient

Renau, J., Strauss, K., Ceze, L., Liu, W., Sarangi, S., Tuck, J. & Torrellas, J., Dec 1 2005, p. 219-228. 10 p.

Research output: Contribution to conferencePaper

Energy utilization
Energy conservation
Costs

Threat analysis of GNU software radio

Hill, R. L., Myagmar, S. & Campbell, R. H., Jun 27 2005, p. 383-388. 6 p.

Research output: Contribution to conferencePaper

Software radio
Radio systems
2004

A case for resource heterogeneity in large sensor networks

Kandula, S., Hou, J. & Sha, L. R., Dec 1 2004, p. 502-509. 8 p.

Research output: Contribution to conferencePaper

Sensor networks
Throughput
Clustering algorithms
Data communication systems
Routing algorithms

Aircraft characterization in icing using flight test data

Whalen, E. A., Melody, J. W., Bragg, M. B. & Basar, M. T., Jul 1 2004, p. 8421-8435. 15 p.

Research output: Contribution to conferencePaper

Identification (control systems)
Aircraft
Atmospheric turbulence
Air
Linear regression

An analysis on quantization effects in H parameter identification

Ishii, H. & Basar, M. T., Dec 1 2004, p. 468-473. 6 p.

Research output: Contribution to conferencePaper

Identification (control systems)
Communication
Feedback

An architectural framework for providing reliability and security support

Nakka, N., Kalbarczyk, Z. T., Iyer, R. K. & Xu, J., Oct 1 2004, p. 585-594. 10 p.

Research output: Contribution to conferencePaper

Engines
Data storage equipment
Hardware
Error detection
Flow control

A networked and cooperative control testbed

Vladimerou, V., Stubbs, A., Fulford, A., Strick, J. & Dullerud, G. E., Dec 1 2004, p. 2595-2600. 6 p.

Research output: Contribution to conferencePaper

Testbeds
Air cushion vehicles
Decentralized control
Sensors

BIDE: Efficient mining of frequent closed sequences

Wang, J. & Han, J., Jun 1 2004, p. 79-90. 12 p.

Research output: Contribution to conferencePaper

Data storage equipment

Characterizing the effects of transient faults on a high-performance processor pipeline

Wang, N. J., Quek, J., Rafacz, T. M. & Patel, S. J., Oct 1 2004, p. 61-70. 10 p.

Research output: Contribution to conferencePaper

Microprocessor chips
Pipelines
Failure modes
Masks
Substrates

Checkpointing of control structures in main memory database systems

Wang, L., Kalbarczyk, Z. T., Iyer, R. K., Vora, H. & Chahande, T., Oct 1 2004, p. 687-692. 6 p.

Research output: Contribution to conferencePaper

Availability
Data storage equipment
Recovery

Cluster-based failure detection service for large-scale ad hoc wireless network applications

Tai, A. T., Tso, K. S. & Sanders, W. H., Oct 1 2004, p. 805-814. 10 p.

Research output: Contribution to conferencePaper

Wireless ad hoc networks
Communication
Fault tolerance
Redundancy

Coordinating adaptations in distributed systems

Ensink, B. & Adve, V. S., Jun 1 2004, p. 446-455. 10 p.

Research output: Contribution to conferencePaper

Communication
Quality of service
Synchronization