Tech Reports

Report ID Title Report authors Report date
2008-16 Bidirectional interface grammars Graham Hughes and Tevfik Bultan October, 2008
2008-15 Gaussian Elimination Based Algorithms on the GPU Aydin Buluc, John R. Gilbert, Ceren Budak November, 2008
2008-14 Hardware Assisted Compression in Wireless Sensor Networks Navraj Chohan June, 2007
2008-13 Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao September, 2008
2008-12 Protecting Anonymity in Dynamic Peer-to-Peer Networks Krishna Puttaswamy, Alessandra Sala, Christo Wilson, Ben Y. Zhao September, 2008
2008-11 Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao September, 2008
2008-10 Eucalyptus : A Technical Report on an Elastic Utility Computing Archietcture Linking Your Programs to Useful Systems Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil Soman, Lamia Youseff, Dmitrii Zagorodnov August, 2008
2008-09 CycleNet: Empirical Analysis of 802.15.4 in Mobile Scenarios Navraj Chohan and Camilla Fiorese July, 2008
2008-08 CoTS: A Scalable Framework for Parallelizing Frequency Counting over Data Streams Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi June, 2008
2008-07 Memory Management for Multi-Application Managed Runtime Environments Sunil Soman June, 2008
2008-06 Efficient Algorithms and Routing Protocols for Handling Transient Single Node Failures Amit M. Bhosle, Teofilo F. Gonzalez May, 2008
2008-05 Analysis, Detection, and Exploitation of Phase Behavior in Java Programs Priya Nagpurkar April, 2008
2008-04 Efficient Skyline Computation over Ad-hoc Aggregations Shyam Antony, Ping Wu, Divyakant Agrawal, Amr El Abbadi April, 2008
2008-03 Green WLANs: On-demand WLAN Infrastructures Amit P. Jardosh, Konstantina Papagiannaki, Elizabeth M. Belding, Kevin C. Almeroth, Gianluca Iannaccone, Bapi Vinnakota March, 2008
2008-02 Exploiting Adaptation in a Java Virtual Machine to Enable Both Programmer Productivity and Performance for Heterogeneous Devices Lingli Zhang February, 2008
2008-01 Securing Structured Overlays Against Identity Attacks Krishna P. N. Puttaswamy, Ben Y. Zhao and Haitao Zheng January, 2008
2007-12 Searching for Rare Objects Using Index Replication Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao December, 2007
2007-11 Environmental Tomography: Modeling the Environment with Mobile Phones Stacy Patterson, Bassam Bamieh, and Amr El Abbadi November, 2007
2007-10 QUIP: Querying Significant Patterns from Image Databases Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Singh, Chris Banna, Geoffrey P. Lewis, Steven K. Fisher September, 2007
2007-09 VARQ: Implementing Probabilistic Advanced Reservations for Batch-scheduled Parallel Machines Dan Nurmi, John Brevik, and Rich Wolski August, 2007