Tech Reports

Report IDxx Title Report authors Report date
2009-11 Generating Vulnerability Signatures for String Manipulating Programs Using Automata-based Forward and Backward Symbolic Analyses Fang Yu, Muath Alkhalaf, Tevfik Bultan June, 2009
2009-10 Spectrum Allocation for Frequency-Agile Radio Networks under Physical Interference Models Lili Cao, Lei Yang, Heather Zheng June, 2009
2009-09 Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez June, 2009
2009-08 In-Depth Evaluation of Popular Interest Point Detectors on Video Streams Steffen Gauglitz and Tobias Höllerer May, 2009
2009-07 TRUST:A General Framework for Truthful Double Spectrum Auctions (Extended) Xia Zhou and Heather Zheng April, 2009
2009-06 Strongly Regular Grammars and Regular Approximation of Context-Free Languages Omer Egecioglu April, 2009
2009-05 Interactive Manipulation of Large Graph Layouts Peterson Trethewey, Tobias Hollerer March, 2009
2009-04 Thread Cooperation in Multicore Architectures for Frequency Counting Over Multiple Data Streams Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi March, 2009
2009-03 Anonymizing Edge-Weighted Social Network Graphs Sudipto Das, Ömer Egecioglu, and Amr El Abbadi March, 2009
2009-02 AppScale: Scalable and Open AppEngine Application Development and Deployment Navraj Chohan, Chris Bunch, Sydney Pang, Chandra Krintz, Nagy Mostafa, Sunil Soman, Rich Wolski January, 2009
2009-01 On Stateless Multicounter Machines Omer Egecioglu and Oscar H. Ibarra January, 2009
2008-19 Offline Framework for Performance Comparison of Software Revisions Nagy Mostafa and Chandra Krintz November, 2008
2008-18 Clouded Data: Comprehending Scalable Data Management Systems Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi November, 2009
2008-17 Inter-OS Communication on Highly Parallel Multi-Core Architectures Lamia Youseff, Dmitrii Zagorodnov, and Rich Wolski October, 2008
2008-16 Bidirectional interface grammars Graham Hughes and Tevfik Bultan October, 2008
2008-15 Gaussian Elimination Based Algorithms on the GPU Aydin Buluc, John R. Gilbert, Ceren Budak November, 2008
2008-14 Hardware Assisted Compression in Wireless Sensor Networks Navraj Chohan June, 2007
2008-13 Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao September, 2008
2008-12 Protecting Anonymity in Dynamic Peer-to-Peer Networks Krishna Puttaswamy, Alessandra Sala, Christo Wilson, Ben Y. Zhao September, 2008
2008-11 Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao September, 2008

Pages