Follow

Submissions from 2005

PDF

Publicly verifiable private credentials - a technique for privately signing citizen initiatives, Kishore R. Kattamuri and Marius C. Silaghi

PDF

Supporting Debates over Citizen Initiatives, Kishore R. Kattamuri and Marius C. Silaghi

PDF

Implicit indicators for interesting web pages, Hyoung-Rae Kim and Philip K. Chan

PDF

Personalized ranking of search results with implicitly learned user interest hierarchies, Hyoung-Rae Kim and Philip K. Chan

PDF

Adaptive Weighing of Context Models for Lossless Data Compression, Matthew V. Mahoney

PDF

Learning Rules for Time Series Anomaly Detection, Matthew V. Mahoney and Philip K. Chan

PDF

Trajectory boundary modeling of time series for anomaly detection, Matthew V. Mahoney and Philip K. Chan

PDF

Multilevel fusion using enhanced feature detection, Trond M. Ostrem and Samuel Peter Kozaitis

PDF

Product-based multiresolution image fusion, Trond M. Ostrem and Samuel Peter Kozaitis

PDF

Disparity determination using multilevel products, Michel Ouendeno and Samuel Peter Kozaitis

PDF

Iterative Segmentation in Keyword Spotting: relation to fractional programming, Marius C. Silaghi

PDF

Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal With Modular Homomorphism, Marius C. Silaghi

PDF

Secure Stochastic Multi-party Computation for Combinatorial Problems, Marius C. Silaghi and Gerhard Friedrich

PDF

Secure Combinatorial Optimization using DFS-based Variable Elimination, Marius C. Silaghi, Adrian Petcu, and Boi Faltings

PDF

An energy-efficient media access control protocol for chain-type wireless sensor networks, Yu Wang and Chang Wen Chen

PDF

Constant quality constrained bit allocation for leaky prediction based FGS video streaming, Jianhua Wu, Jianfei Cai, and Chang Wen Chen

PDF

Visualization of medical images over mobile wireless handheld devices, Min Wu, Khurana Ashish, Nadar Mariappan, and Chang Wen Chen

PDF

Multiple description distributed image coding with side information for mobile wireless transmission, Min Wu, Daewon Song, and Chang Wen Chen

PDF

A novel multiple description scalable coding scheme for mobile wireless video transmission, Haifeng Zheng, Lun Yu, and Chang Wen Chen

PDF

Robust video transmission based on multiple description scalable coding with EREC, Haifeng Zheng, Lun Yu, and Chang Wen Chen

Submissions from 2004

PDF

Using a reply path and handshaking protocol to allow for incentives with mix-net servers, Timothy J. Atkinson and Marius C. Silaghi

PDF

Ubiquitous map-image access through wireless overlay networks, Jianfei Cai, Haijie Huang, Zefeng Ni, and Chang Wen Chen

PDF

Layered unequal loss protection for image transmission over packet loss channels with delay constraints, Jianfei Cai, Xiangjun Li, and Chang Wen Chen

PDF

Layered unequal loss protection for progressive image transmission over packet loss channels, Jianfei Cai, Xiangjun Li, and Chang Wen Chen

PDF

Multiple wavelet-tree-based image coding and robust transmission, Lei Cao and Chang Wen Chen

PDF

Robust image transmission based on wavelet tree coding, error resilient entropy coding, and error concealment, Lei Cao and Chang Wen Chen

PDF

On the Implementation of SwarmLinda? A Linda System Based on Swarm Intelligence (Extended Version), Ahmed Charles, Ronaldo Menezes, and Robert Tolksdorf

PDF

A half D1 MPEG-4 encoder on the BSP-15 DSP, Lulin Chen, Zhihai He, Chang Wen Chen, and Michael A. Isnardi

PDF

Synthesis of electromagnetic devices with a novel neural network, Heriberto Jose Delgado, Michael Thursby, and Fredric M. Ham

PDF

Effective quality analysis for video streaming over wireless ad hoc network, Zhihai He and Chang Wen Chen

PDF

Identifying variable-length meaningful phrases with correlation functions, Hyoung-Rae Kim and Philip K. Chan

PDF

Speckle denoising using wavelet transforms and higher-order statistics, Samuel Peter Kozaitis and Anurat Ingun

PDF

Consistency restoration in point and interval Spatio-Temporal reasoning, Florent Launay and Debasis Mitra

PDF

A faster technique for distributed constraint satisfaction and optimization with privacy enforcement, Marius C. Silaghi

PDF

A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems, Marius C. Silaghi

PDF

Improving Arithmetic Circuits for Solving Constraint Satisfaction and Optimization Problems, Marius C. Silaghi

PDF

Incentive Auctions and Stable Marriages Problems Solved with bn=2c-Privacy of Human Preferences, Marius C. Silaghi

PDF

Multiple description coding based on multiple-bitstream wavelet zero-tree image compression, Daewon Song, Chang Wen Chen, and Lei Cao

PDF

MORPHEUS: Motif Oriented Representations to Purge Hostile Events from Unlabeled Sequences, Guarav Tandon, Debasis Mitra, and Philip K. Chan

PDF

Semi-automatic road extraction from aerial images, Somkait Udomhunsakul, Samuel Peter Kozaitis, and Uthai Thai Sritheeravirojana

PDF

Collaborative image transmission over wireless sensor networks, Min Wu and Chang Wen Chen

PDF

Multiple-description image coding with distributed source coding and side information, Min Wu, Anthony Vetro, and Chang Wen Chen

PDF

Joint source-channel decoding for MPEG-2 video transmission, Liuguo Yin, Weigang Chen, Jianhua Lu, and Chang Wen Chen

Submissions from 2003

PDF

HEAT: Runtime interception of Win32 functions, Michael M. Andrews

PDF

Identifying Outliers via Clustering for Anomaly Detection, Muhammad H. Arshad and Philip K. Chan

PDF

A machine learning approach to anomaly detection, Philip K. Chan, Matthew V. Mahoney, and Muhammad H. Arshad

PDF

Imagery chain assessment for feature extraction, Rufus H. Cofer and Samuel Peter Kozaitis

PDF

Extended Hough methodology for 3D feature detection, Rufus H. Cofer, Samuel Peter Kozaitis, and Jihun Cha

PDF

Extended Hough methodology in geo-spatial image exploitation, Rufus H. Cofer, Samuel Peter Kozaitis, and Jihun Cha

PDF

Wavelet-based image compression using perceptual distortion metric, Hemen Goswami and Samuel Peter Kozaitis

PDF

An artificial immune system for securing mobile ad hoc networks against intrusion attacks, William S. Hortos

PDF

Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks, William S. Hortos

PDF

Testing with Hostile Data Streams, Alan A. Jorgensen

PDF

Improving Learning Implicit User Interest Hierarchy with Variable Length Phrases, Hyoung-Rae Kim and Philip K. Chan

PDF

Linear feature detection of rural imagery using multiresolution filters, Samuel Peter Kozaitis and Rufus H. Cofer

PDF

Reduction of multiplicative noise using higher-order statistics, Samuel Peter Kozaitis, Anurat Ingun, and Rufus H. Cofer

PDF

Denoising using higher-order statistics, Samuel Peter Kozaitis and Sunghee Kim

PDF

An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Matthew V. Mahoney and Philip K. Chan

PDF

Learning Rules for Anomaly Detection of Hostile Network Traffic, Matthew V. Mahoney and Philip K. Chan

PDF

A New Approach to Scalable Lindasystems Based on Swarms, Ronaldo Menezes and Robert Tolksdorf

PDF

Determining the Number of Clusters/Segments in Hierarchical Clustering/Segmentation Algorithms, Stan Salvador and Philip K. Chan

PDF

Learning States and Rules for Time Series Anomaly Detection, Stan Salvador, Philip K. Chan, and John Brodie

PDF

HgCdTe focal plane array cost modeling, Thomas J. Sanders and Glenn T. Hess

PDF

Learning Rules from System Call Arguments and Sequences for Anomaly Detection, Guarav Tandon and Philip K. Chan

PDF

A Representation Scheme for Finite Length Strings, Guarav Tandon and Debasis Mitra

PDF

Line detection using wavelet filters, Somkait Udomhunsakul, Samuel Peter Kozaitis, Uthai Thai Sritheeravirojana, and A. Khempila

PDF

Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection, Rachna Vargiya and Philip K. Chan

PDF

A local search optimization algorithm based on natural principles of gravitation, Barry Webster and Philip J. Bernhard

Submissions from 2002

PDF

Learning Implicit User Interest Hierarchy for Context in Personalization, Philip K. Chan and Hyoung-Rae Kim

PDF

Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks, Philip K. Chan and Matthew V. Mahoney

PDF

Network Traffic Anomaly Detection Based on Packet Bytes, Philip K. Chan and Matthew V. Mahoney

PDF

Genetic routing algorithms to optimize availability in broadband wireless networks with load balancing, William S. Hortos

PDF

Probabilistic microcell prediction model, Song-Kyoo Kim

PDF

Linear feature detection using multiresolution wavelet filters, Samuel Peter Kozaitis, Somkait Udomhunsakul, Rufus H. Cofer, A. Agarawal, and Shuwu Song

PDF

An optimum greedy algorithm for choosing minimal set of conflicting constraints in the point sequencing problem, Florent Launay and Mitra Debasis

PDF

An algorithm applicable to clearing combinatorial exchanges, Marius Silaghi

PDF

Unicode Compression: Does Size Really Matter?, Ryan Stansifer and Steve Atkin

PDF

WebSpy: An Architecture for Monitoring Web Server Availability In a Multi-Platform Environment, Madhan M. Thirukonda

PDF

On the Use of Linda as a Framework for Distributed Database Systems, Madhan M. Thirukonda and Ronaldo Menezes

Submissions from 2001

PDF

Detecting Novel Attacks by Identifying Anomalous Network Packet Headers, Philip K. Chan and Matthew V. Mahoney

PDF

PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic, Philip K. Chan and Matthew V. Mahoney

PDF

A Generalized Framework for Reasoning with Angular Directions, Mitra Debasis

PDF

Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia, William S. Hortos

PDF

Optimization of real-time protocols for wireless packet-switched multimedia networks based on partially observed multivariate point processes, William S. Hortos

PDF

Adaptive threshold selection technique for denoising in dithered quantizers, Samuel Peter Kozaitis and Hemen Goswami

PDF

Modeling and test of pixel cross-talk in HgCdTe focal plane arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, and Theodore Fischer

PDF

Completeness of Propositional Logic as a Program, Ryan Stansifer

PDF

Testing Exception and Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, and Ibrahim K. El-Far

PDF

Survivable Mobile Operating System, James Whittaker and Mohommad Samarah

Submissions from 2000

PDF

Implementations of Bidirectional Reordering Algorithms, Steven Atkin and Ryan Stansifer

PDF

Pattern classification approach to underwater acoustic communications based on the Wigner-Ville distribution, Frank M. Caimi and Gamal A. Hassan

PDF

A Protocol Language Approach to Generating Client-Server Software, Philip K. Chan and Melvin A.L. Douglas

PDF

2DEG channel-dependent model for Hg1-xCdxTe based pseudomorphic HEMTs, Hang-Ming Dai and Thomas J. Sanders

PDF

Computation for crosstalk effects in p-on-n Hg1-xCdxTe heterojunction IRFPA radiated by using uniformly parallel light, Hang-Ming Dai and Thomas J. Sanders

PDF

Bit allocation considering mean absolute error for image compression, Hemen Goswami and Samuel Peter Kozaitis

PDF

Separation of infrasound signals using independent component analysis, Fredric M. Ham, Sungin Park, and Joseph C. Wheeler

PDF

Adaptive handoff algorithms based on self-organizing neural networks to enhance the quality of service of nonstationary traffic in hierarchical cellular networks, William S. Hortos

PDF

Real-time performance analysis of wireless multimedia networks based on partially observed multivariate point processes, William S. Hortos

PDF

Wavelet-based image compression using randomized quantization, Samuel Peter Kozaitis and Hemen Goswami

PDF

Circular optimal trade-off and distance-classifier correlation filters, Samuel Peter Kozaitis and Sila Thangwaritorn