Follow

Submissions from 2016

Preface, M. Bishop and Anderson C. A. Nascimento

Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra, B. David, R. Dowsley, J. van Graaf, D. Marques, A. C. Nascimento, and A. C. Pinto

Solving Stable Matching Problems Using Answer Set Programming, S. De Clercq, S. Schockaert, Martine De Cock, and A. Nowe

A Minimally Invasive Model Data Passing Interface for Integrating Legacy Environmental System Models, A. Q. Dozier, O. David, M. Arabi, W. Lloyd, and Y. Zhang

Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives, Wes Lloyd, Shrideep Pallickara, Olaf David, Mazdak Arabi, Tyler Wible, and Jeffrey Ditty

Discourse/s In/Of CSCW, W.-M. Roth, J. Tenenberg, and D. Socha

From I-Awareness to We-Awareness in CSCW, J. Tenenberg, W.-M. Roth, and D. Socha

Seeing Design Stances, J. Tenenberg, D. Socha, and W.-M. Roth

Submissions from 2015

Link

A Social Network Model With Privacy Preserving and Reliability Assurance and Its Applications in Health Care, Chunming Gao and Noriyuki Iwane

MedTrust: Towards Trust-Assured Social Networking for Healthcare, J. Li, N. Zanman, and Y. Bai

QC-MDPC McEliece: An Optimized Implementation of a New McEliece Variant, H. Oliveira Martins and A. C. Nascimento

Public-Key Encryption Schemes With Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions, Mayana Pereira, Rafael Dowsley, Anderson C. Nascimento, and Goichiro Hanaoka

Submissions from 2014

Computing Fuzzy Rough Approximations in Large Scale Information Systems, Hasan Asfoor, Rajagopalan Srinivasan, Gayathri Vasudevan, Nele Verbiest, Chris Cornells, Matthew Tolentino, Ankur Teredesai, and Martine De Cock

PDF

Data Provisioning for the Object Modeling System (OMS), Jack R. Carlson, Olaf David, Wes J. Lloyd, George H. Leavesley, Ken W. Rojas, Timothy R. Green, Mazdak Arabi, Lucas Yaege, and Hom Kipka

PDF

Model-As-A-Service (MaaS) Using the Cloud Services Innovation Platform (CSIP), O. David, W. Lloyd, K. Rojas, M. Arabi, F. Geter, James C. Ascough II, T. Green, G. Leavesley, and J. Carlson

An Effective Message Forwarding Algorithm for Delay Tolerant Network With Cyclic Probabilistic Influences, Y. Li, L. Ding, J. Sheng, C. Liu, and A.M. Teredesai

PDF

The Virtual Machine (VM) Scaler: An Infrastructure Manager Supporting Environmental Modeling on IaaS Clouds, Wes J. Lloyd, Olaf David, Mazdak Arabi, James C. Ascough II, Timothy R. Green, Jack R. Carlson, and Ken W. Rojas

PDF

Dynamic Scaling for Service Oriented Applications: Implications of Virtual Machine Placement on IaaS Clouds, Wes Lloyd, Shrideep Pallickara, Olaf David, Mazdak Arabi, and Ken Rojas

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model, Rafael Tonicelli, Anderson C. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, and Akira Otsuka

PDF

Cyberinfrastructure for Scalable Access to Stream Flow Analysis, Tyler Wible, Wes Lloyd, Olaf David, and Mazdak Arabi

Submissions from 2013

A Software Engineering Perspective on Environmental Modeling Framework Design: The Object Modeling System, O. David, J. C. Ascough II, W. Lloyd, T. R. Green, K. W. Rojas, G. H. Leavesley, and L. R. Ahuja

On the Composability of Statistically Secure Bit Commitments, Rafael Dowsley, Jeroen van Graaf, Jörn Müller-Quade, and Anderson C. Nascimento

An Experimental Study of a New Channel for Data Input on Small Mobile Devices, Chunming Gao, Robert Pastel, and Jindong Tan

PDF

Service Isolation vs. Consolidation: Implications for Iaas Cloud Application Deployment, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

Performance Implications of Multi-Tier Application Deployments on Infrastructure-As-A-Service Clouds: Towards Performance Modeling, W. Lloyd, S. Pallickara, O. David, J. Lyon, M. Arabi, and K. Rojas

HcBench: Methodology, Development, and Characterization of a Customer Usage Representative Big Data/Hadoop Benchmark, V. A. Saletore, K. Krishnan, V. Viswanathan, and M. E. Tolentino

Submissions from 2012

A CCA2 Secure Variant of the McEliece Cryptosystem, N. Dottling, R. Dowsley, J. Muller-Quade, and A. C. Nascimento

IND-CCA Secure Cryptography Based on a Variant of the LPN Problem, Nico Döttling, Jörn Müller-Quade, and Anderson C. Nascimento

PDF

The Cloud Services Innovation Platform-Enabling Service-Based Environmental Modelling Using Infrastructure-As-A-Service Cloud Computing, W. Lloyd, O. David, James C. Ascough II, T. R. Green, J. R. Carlson, J. Lyon, and K. W. Rojas

PDF

Performance Modeling to Support Multi-Tier Application Deployment to Infrastructure-As-A-Service Clouds, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts, Matthew Tolentino and K. W. Cameron

Submissions from 2011

A Fault Analytic Method Against HB+, José Carrijo, Rafael Tonicelli, and Anderson C.A. Nascimento

A Parallel Approach to PCA Based Malicious Activity Detection in Distributed Honeypot Data, Bernardo David, João Paulo Costa, Anderson Nascimento, Marcelo Holtz, Dino Amaral, and Rafael Sousa Júnior

Efficient Fully Simulatable Oblivious Transfer From the McEliece Assumptions, B. M. David and A. C. Nascimento

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data, Rafael Dowsley, Jörn MüLler-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, and Anderson C.A. Nascimento

Study of Accelerometer Assisted Single Key Positioning User Input Systems, Chunming Gao

Environmental Modeling Framework Invasiveness: Analysis and Implications, W. Lloyd, O. David, J. C. Ascough II, K. W. Rojas, J. R. Carlson, G. H. Leavesley, P. Krause, T. R. Green, and L. R. Ahuja

PDF

Migration of Multi-Tier Applications to Infrastructure-As-A-Service Clouds: An Investigation Using Kernel-Based Virtual Machines, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, A. C. Pinto, R. Dowsley, K. Morozov, and A. C. Nascimento

Submissions from 2010

PDF

Environmental Modeling Framework Invasiveness: Analysis and Implications, Wes J. Lloyd, Olaf David, James C. Ascough II, Ken W. Rojas, Jack R. Carlson, George H. Leavesley, Peter Krause, Timothy R. Green, and Lajpat R. Ahuja

Submissions from 2009

A Novel Probabilistic Passive Attack on the Protocols HB and HB, José Carrijo, Rafael Tonicelli, Hideki Imai, and Anderson C. Nascimento

PDF

An Exploratory Investigation on the Invasiveness of Environmental Modeling Frameworks, Wes Lloyd, Olaf David, James C. Ascough II, Ken W. Rojas, Jack R. Carlson, George H. Leavesley, Peter Krause, Timothy R. Green, and Lajpat R. Ahuja

Memory MISER: Improving Main Memory Energy Efficiency in Servers, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Submissions from 2008

Oblivious Transfer Based on the McEliece Assumptions, Rafael Dowsley, Jeroen van Graaf, Jörn Müller-Quade, and Anderson C. Nascimento

The Commitment Capacity of the Gaussian Channel Is Infinite, A. C.A. Nascimento, J. Barros, S. Skludarek, and H. Imai

On the Oblivious-Transfer Capacity of Noisy Resources, A. C. Nascimento and A. Winter

Submissions from 2007

An Implementation of Page Allocation Shaping for Energy Efficiency, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Memory-Miser: A Performance-Constrained Runtime System for Power-Scalable Clusters, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Submissions from 2005

An Information Theoretical Model for Quantum Secret Sharing, Hideki Imai, Jörn Müller-Quade, Anderson C. Nascimento, Pim Tuyls, and Andreas Winter

Hotplug Memory Redux, Joel Schopp, Dave Hansen, Mike Kravetz, Hirokazu Takahashi, Toshihiro Iwamoto, Yasunori Goto, Hiroyuki Kamezawa, Matt Tolentino, and Bob Picco

Improving the Energy Efficiency of High-Performance Server Systems, Matthew E. Tolentino and Kirk W. Cameron

Submissions from 2004

Hotplug Memory and the Linux VM, Dave Hansen, Mike Kravetz, Bradley Christiansen, and Matt Tolentino

Submissions from 2003

Linux in a Brave New Firmware Environment, Matthew Tolentino

Submissions from 2002

PDF

Effectiveness of Elicitation Techniques in Distributed Requirements Engineering, Wesley James Lloyd, Mary Beth Rosson, and James D. Arthur

Submissions from 2001

PDF

Improving Quantum Secret-Sharing Schemes, Anderson C. Nascimento, Joern Mueller-Quade, and Hideki Imai

Quantum Identification Protocol With Technologically Bounded Parties, Anderson C. Nascimento, Joern Mueller-Quade, and Hideki Imai

Software Development Teams Evaluation, P. Schoenhoff, Stuart Henry, and Wesley James Lloyd