Tech Reports

Report ID Title Report authors Report date
2010-09 Live Database Migration for Elasticity in a Multitenant Database for Cloud Platforms Sudipto Das, Shoji Nishimura, Divyakant Agrawal, Amr El Abbadi June, 2010
2010-08 Silverline: Toward Data Confidentiality in Third-party Clouds Krishna P. N. Puttaswamy, Christopher Kruegel, and Ben Y. Zhao April, 2010
2010-07 Active Cloud DB: A Database-Agnostic HTTP API to Key-Value Datastores Chris Bunch, Jonathon Kupferman, Chandra Krintz April, 2010
2010-06 Dataset and Evaluation of Interest Point Detectors for Visual Tracking Steffen Gauglitz, Tobias Höllerer, Matthew Turk April, 2010
2010-05 Who’s Driving this Cloud? Towards Efficient Migration for Elastic and Autonomic Multitenant Databases Aaron Elmore, Sudipto Das, Divyakant Agrawal, Amr El Abbadi April, 2010
2010-04 ElasTraS: An Elastic, Scalable, and Self Managing Transactional Database for the Cloud Sudipto Das, Shashank Agarwal, Divyakant Agrawal, Amr El Abbadi March, 2010
2010-03 Key-Value Datastores Comparison in AppScale Chris Bunch, Navraj Chohan, Chandra Krintz, Jovan Chohan, Jonathan Kupferman, Puneet Lakhina, Yiming Li, Yoshihide Nomura February, 2010
2010-02 Limiting the Spread of Misinformation in Social Networks Ceren Budak, Divyakant Agrawal, Amr El Abbadi February, 2010
2010-01 Evaluation of four methods for real time panorama acquisition. Christopher Coffin, Sehwan Kim, and Tobias Hollerer January, 2010
2009-16 Generalizing PIR for Practical Private Retrieval of Public Data Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi October, 2009
2009-15 Vshmem: Shared-Memory OS-Support for Multicore-based HPC systems Lamia Youseff and Rich Wolski October, 2009
2009-14 Verification of String Manipulating Programs Using Multi-Track Automata Fang Yu, Tevfik Bultan, Oscar H. Ibarra August, 2009
2009-13 Tackling Bidder Collusion in Dynamic Spectrum Auctions (Extended) Xia Zhou, Alessandra Sala, and Haitao Zheng August, 2009
2009-12 Mining the Network Behavior of Bots Lorenzo Cavallaro, Christopher Kruegel, and Giovanni Vigna July, 2009
2009-11 Generating Vulnerability Signatures for String Manipulating Programs Using Automata-based Forward and Backward Symbolic Analyses Fang Yu, Muath Alkhalaf, Tevfik Bultan June, 2009
2009-10 Spectrum Allocation for Frequency-Agile Radio Networks under Physical Interference Models Lili Cao, Lei Yang, Heather Zheng June, 2009
2009-09 Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez June, 2009
2009-08 In-Depth Evaluation of Popular Interest Point Detectors on Video Streams Steffen Gauglitz and Tobias Höllerer May, 2009
2009-07 TRUST:A General Framework for Truthful Double Spectrum Auctions (Extended) Xia Zhou and Heather Zheng April, 2009
2009-06 Strongly Regular Grammars and Regular Approximation of Context-Free Languages Omer Egecioglu April, 2009