Follow

Submissions from 2017

Conveying Sense of Force Explicitly: Designing Future E-Reading Systems to Support Subjective Knowledge Sharing, Chunming Gao

Effects of Quizzes in Marking Supported E-Learning, Noriyuki Iwane, Chunming Gao, and Makoto Yoshida

Submissions from 2016

Preface, M. Bishop and Anderson C. A. Nascimento

Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra, B. David, R. Dowsley, J. van Graaf, D. Marques, A. C. Nascimento, and A. C. Pinto

Solving Stable Matching Problems Using Answer Set Programming, S. De Clercq, S. Schockaert, Martine De Cock, and A. Nowe

A Minimally Invasive Model Data Passing Interface for Integrating Legacy Environmental System Models, A. Q. Dozier, O. David, M. Arabi, W. Lloyd, and Y. Zhang

Developing a Prototype for Evaluations of Healthcare Appointment and Registration Smart Assistant, C. Gao and N. Iwane

A Study on Haptic Media to Support Verbal Explanations, Noriyuki Iwane, Chunming Gao, Makoto Yoshida, and Hajime Kishida

Demystifying the Clouds: Harnessing Resource Utilization Models for Cost Effective Infrastructure Alternatives, Wes Lloyd, Shrideep Pallickara, Olaf David, Mazdak Arabi, Tyler Wible, and Jeffrey Ditty

Discourse/s In/Of CSCW, W.-M. Roth, J. Tenenberg, and D. Socha

From I-Awareness to We-Awareness in CSCW, J. Tenenberg, W.-M. Roth, and D. Socha

Seeing Design Stances, J. Tenenberg, D. Socha, and W.-M. Roth

Submissions from 2015

Link

A Social Network Model With Privacy Preserving and Reliability Assurance and Its Applications in Health Care, Chunming Gao and Noriyuki Iwane

A Social Network Model for Big Data Privacy Preserving and Accountability Assurance, C. Gao and N. Iwane

PDF

Building a Computer Network Immune System, DC Grant

MedTrust: Towards Trust-Assured Social Networking for Healthcare, J. Li, N. Zanman, and Y. Bai

QC-MDPC McEliece: An Optimized Implementation of a New McEliece Variant, H. Oliveira Martins and A. C. Nascimento

Public-Key Encryption Schemes With Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions, Mayana Pereira, Rafael Dowsley, Anderson C. Nascimento, and Goichiro Hanaoka

Submissions from 2014

Computing Fuzzy Rough Approximations in Large Scale Information Systems, Hasan Asfoor, Rajagopalan Srinivasan, Gayathri Vasudevan, Nele Verbiest, Chris Cornells, Matthew Tolentino, Ankur Teredesai, and Martine De Cock

PDF

Data Provisioning for the Object Modeling System (OMS), Jack R. Carlson, Olaf David, Wes J. Lloyd, George H. Leavesley, Ken W. Rojas, Timothy R. Green, Mazdak Arabi, Lucas Yaege, and Hom Kipka

PDF

Model-As-A-Service (MaaS) Using the Cloud Services Innovation Platform (CSIP), O. David, W. Lloyd, K. Rojas, M. Arabi, F. Geter, James C. Ascough II, T. Green, G. Leavesley, and J. Carlson

Application of a Blended Active Learning Model in Teaching Computer Programming to Non-Majors (Abstract Only), Chunming Gao and Noriyuki Iwane

Developing a Multi-Trust Model for Multi-Purpose Healthcare Social Networks, C. Gao and N. Iwane

Energy Northwest Columbia Generating Station Proposed Enhancements: Transformation of Mothballed Nuclear Facilities Into Hydrogen Oxygen Energy Storage and Electrical Generation Facilities, DC Grant

A Study of Using Handwritten Annotations on Digital Textbooks, N. Iwane and C. Gao

An Effective Message Forwarding Algorithm for Delay Tolerant Network With Cyclic Probabilistic Influences, Y. Li, L. Ding, J. Sheng, C. Liu, and A.M. Teredesai

PDF

The Virtual Machine (VM) Scaler: An Infrastructure Manager Supporting Environmental Modeling on IaaS Clouds, Wes J. Lloyd, Olaf David, Mazdak Arabi, James C. Ascough II, Timothy R. Green, Jack R. Carlson, and Ken W. Rojas

PDF

Dynamic Scaling for Service Oriented Applications: Implications of Virtual Machine Placement on IaaS Clouds, Wes Lloyd, Shrideep Pallickara, Olaf David, Mazdak Arabi, and Ken Rojas

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model, Rafael Tonicelli, Anderson C. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, and Akira Otsuka

PDF

Cyberinfrastructure for Scalable Access to Stream Flow Analysis, Tyler Wible, Wes Lloyd, Olaf David, and Mazdak Arabi

Submissions from 2013

A Software Engineering Perspective on Environmental Modeling Framework Design: The Object Modeling System, O. David, J. C. Ascough II, W. Lloyd, T. R. Green, K. W. Rojas, G. H. Leavesley, and L. R. Ahuja

On the Composability of Statistically Secure Bit Commitments, Rafael Dowsley, Jeroen van Graaf, Jörn Müller-Quade, and Anderson C. Nascimento

An Experimental Study of a New Channel for Data Input on Small Mobile Devices, Chunming Gao, Robert Pastel, and Jindong Tan

PDF

Short and Long Term Energy Storage for Enhanced Resilience of Electric Infrastructures Storage of Compressed Hydrogen and Oxygen Gasses Derived From Electrolysis to Provide Grid Connected Mechanical and Electrochemical Electrical Power Generation on Demand, DC Grant

CloudHealth: Developing a Reliable Cloud Platform for Healthcare Applications, E. Hendrick, B. Schooley, and Chunming Gao

Question Generation for Learner Centered Learning, N. Iwane, C. Gao, and M. Yoshida

A Method for Knowledge Acquisition From Handwritten Mark on Digital Text, N. Iwane, C. Gao, and Makoto Yoshida

Compressive Sensing Based Data Collection in VANETs, C. Liu, C. Chigan, and Chunming Gao

STCP2: Short-Time Certificate-Based Privacy Protection for Vehicular Ad Hoc Networks, Z. Li, C. Chigan, and Chunming Gao

PDF

Service Isolation vs. Consolidation: Implications for Iaas Cloud Application Deployment, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

Performance Implications of Multi-Tier Application Deployments on Infrastructure-As-A-Service Clouds: Towards Performance Modeling, W. Lloyd, S. Pallickara, O. David, J. Lyon, M. Arabi, and K. Rojas

HcBench: Methodology, Development, and Characterization of a Customer Usage Representative Big Data/Hadoop Benchmark, V. A. Saletore, K. Krishnan, V. Viswanathan, and M. E. Tolentino

Submissions from 2012

A CCA2 Secure Variant of the McEliece Cryptosystem, N. Dottling, R. Dowsley, J. Muller-Quade, and A. C. Nascimento

IND-CCA Secure Cryptography Based on a Variant of the LPN Problem, Nico Döttling, Jörn Müller-Quade, and Anderson C. Nascimento

Implications of Modified Waterfall Model to the Roles and Education of Health IT Professionals, C. Gao and G. Hembroff

Tilt-Click: One-Handed Eyes-Free Numeric and Symbol Input for Calculator Applications, C. Gao, R. Pastel, and J. Tan

Research in Hands-Free Control of Digital Photogrammetric 3D Measurements, E. Levin, Chunming Gao, and J. Carter

PDF

The Cloud Services Innovation Platform-Enabling Service-Based Environmental Modelling Using Infrastructure-As-A-Service Cloud Computing, W. Lloyd, O. David, James C. Ascough II, T. R. Green, J. R. Carlson, J. Lyon, and K. W. Rojas

PDF

Performance Modeling to Support Multi-Tier Application Deployment to Infrastructure-As-A-Service Clouds, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

The Optimist, the Pessimist, and the Global Race to Exascale in 20 Megawatts, Matthew Tolentino and K. W. Cameron

Submissions from 2011

A Fault Analytic Method Against HB+, José Carrijo, Rafael Tonicelli, and Anderson C.A. Nascimento

A Parallel Approach to PCA Based Malicious Activity Detection in Distributed Honeypot Data, Bernardo David, João Paulo Costa, Anderson Nascimento, Marcelo Holtz, Dino Amaral, and Rafael Sousa Júnior

Efficient Fully Simulatable Oblivious Transfer From the McEliece Assumptions, B. M. David and A. C. Nascimento

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data, Rafael Dowsley, Jörn MüLler-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, and Anderson C.A. Nascimento

Study of Accelerometer Assisted Single Key Positioning User Input Systems, Chunming Gao

Environmental Modeling Framework Invasiveness: Analysis and Implications, W. Lloyd, O. David, J. C. Ascough II, K. W. Rojas, J. R. Carlson, G. H. Leavesley, P. Krause, T. R. Green, and L. R. Ahuja

PDF

Migration of Multi-Tier Applications to Infrastructure-As-A-Service Clouds: An Investigation Using Kernel-Based Virtual Machines, Wes Lloyd, Shrideep Pallickara, Olaf David, Jim Lyon, Mazdak Arabi, and Ken Rojas

Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model, A. C. Pinto, R. Dowsley, K. Morozov, and A. C. Nascimento

Submissions from 2010

Yet Another User Input Method: Accelerometer Assisted Single Key Input, Chunming Gao, R. Pastel, and Jindong Tan

PDF

Environmental Modeling Framework Invasiveness: Analysis and Implications, Wes J. Lloyd, Olaf David, James C. Ascough II, Ken W. Rojas, Jack R. Carlson, George H. Leavesley, Peter Krause, Timothy R. Green, and Lajpat R. Ahuja

Submissions from 2009

A Novel Probabilistic Passive Attack on the Protocols HB and HB, José Carrijo, Rafael Tonicelli, Hideki Imai, and Anderson C. Nascimento

HealthAware: Tackling Obesity With Health Aware Smart Phone Systems, C. Gao, F. Kong, and J. Tan

PDF

An Exploratory Investigation on the Invasiveness of Environmental Modeling Frameworks, Wes Lloyd, Olaf David, James C. Ascough II, Ken W. Rojas, Jack R. Carlson, George H. Leavesley, Peter Krause, Timothy R. Green, and Lajpat R. Ahuja

Memory MISER: Improving Main Memory Energy Efficiency in Servers, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Detection of Conjunctive Stable Predicates in Dynamic Systems, X. Wang, J. Mayo, G. Hembroff, and C. Gao

Submissions from 2008

Oblivious Transfer Based on the McEliece Assumptions, Rafael Dowsley, Jeroen van Graaf, Jörn Müller-Quade, and Anderson C. Nascimento

The Commitment Capacity of the Gaussian Channel Is Infinite, A. C.A. Nascimento, J. Barros, S. Skludarek, and H. Imai

On the Oblivious-Transfer Capacity of Noisy Resources, A. C. Nascimento and A. Winter

Submissions from 2007

An Implementation of Page Allocation Shaping for Energy Efficiency, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Memory-Miser: A Performance-Constrained Runtime System for Power-Scalable Clusters, Matthew E. Tolentino, Joseph Turner, and Kirk W. Cameron

Submissions from 2005

An Information Theoretical Model for Quantum Secret Sharing, Hideki Imai, Jörn Müller-Quade, Anderson C. Nascimento, Pim Tuyls, and Andreas Winter

Hotplug Memory Redux, Joel Schopp, Dave Hansen, Mike Kravetz, Hirokazu Takahashi, Toshihiro Iwamoto, Yasunori Goto, Hiroyuki Kamezawa, Matt Tolentino, and Bob Picco

Improving the Energy Efficiency of High-Performance Server Systems, Matthew E. Tolentino and Kirk W. Cameron

Submissions from 2004

Hotplug Memory and the Linux VM, Dave Hansen, Mike Kravetz, Bradley Christiansen, and Matt Tolentino

Submissions from 2003

Linux in a Brave New Firmware Environment, Matthew Tolentino

Submissions from 2002

PDF

Effectiveness of Elicitation Techniques in Distributed Requirements Engineering, Wesley James Lloyd, Mary Beth Rosson, and James D. Arthur

Submissions from 2001

PDF

Improving Quantum Secret-Sharing Schemes, Anderson C. Nascimento, Joern Mueller-Quade, and Hideki Imai

Quantum Identification Protocol With Technologically Bounded Parties, Anderson C. Nascimento, Joern Mueller-Quade, and Hideki Imai

Software Development Teams Evaluation, P. Schoenhoff, Stuart Henry, and Wesley James Lloyd