Submissions from 2005
Publicly verifiable private credentials - a technique for privately signing citizen initiatives, Kishore R. Kattamuri and Marius C. Silaghi
Supporting Debates over Citizen Initiatives, Kishore R. Kattamuri and Marius C. Silaghi
Implicit indicators for interesting web pages, Hyoung-Rae Kim and Philip K. Chan
Personalized ranking of search results with implicitly learned user interest hierarchies, Hyoung-Rae Kim and Philip K. Chan
Adaptive Weighing of Context Models for Lossless Data Compression, Matthew V. Mahoney
Learning Rules for Time Series Anomaly Detection, Matthew V. Mahoney and Philip K. Chan
Trajectory boundary modeling of time series for anomaly detection, Matthew V. Mahoney and Philip K. Chan
Multilevel fusion using enhanced feature detection, Trond M. Ostrem and Samuel Peter Kozaitis
Product-based multiresolution image fusion, Trond M. Ostrem and Samuel Peter Kozaitis
Disparity determination using multilevel products, Michel Ouendeno and Samuel Peter Kozaitis
Iterative Segmentation in Keyword Spotting: relation to fractional programming, Marius C. Silaghi
Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal With Modular Homomorphism, Marius C. Silaghi
Secure Stochastic Multi-party Computation for Combinatorial Problems, Marius C. Silaghi and Gerhard Friedrich
Secure Combinatorial Optimization using DFS-based Variable Elimination, Marius C. Silaghi, Adrian Petcu, and Boi Faltings
An energy-efficient media access control protocol for chain-type wireless sensor networks, Yu Wang and Chang Wen Chen
Constant quality constrained bit allocation for leaky prediction based FGS video streaming, Jianhua Wu, Jianfei Cai, and Chang Wen Chen
Visualization of medical images over mobile wireless handheld devices, Min Wu, Khurana Ashish, Nadar Mariappan, and Chang Wen Chen
Multiple description distributed image coding with side information for mobile wireless transmission, Min Wu, Daewon Song, and Chang Wen Chen
A novel multiple description scalable coding scheme for mobile wireless video transmission, Haifeng Zheng, Lun Yu, and Chang Wen Chen
Robust video transmission based on multiple description scalable coding with EREC, Haifeng Zheng, Lun Yu, and Chang Wen Chen
Submissions from 2004
Using a reply path and handshaking protocol to allow for incentives with mix-net servers, Timothy J. Atkinson and Marius C. Silaghi
Ubiquitous map-image access through wireless overlay networks, Jianfei Cai, Haijie Huang, Zefeng Ni, and Chang Wen Chen
Layered unequal loss protection for image transmission over packet loss channels with delay constraints, Jianfei Cai, Xiangjun Li, and Chang Wen Chen
Layered unequal loss protection for progressive image transmission over packet loss channels, Jianfei Cai, Xiangjun Li, and Chang Wen Chen
Multiple wavelet-tree-based image coding and robust transmission, Lei Cao and Chang Wen Chen
Robust image transmission based on wavelet tree coding, error resilient entropy coding, and error concealment, Lei Cao and Chang Wen Chen
On the Implementation of SwarmLinda? A Linda System Based on Swarm Intelligence (Extended Version), Ahmed Charles, Ronaldo Menezes, and Robert Tolksdorf
A half D1 MPEG-4 encoder on the BSP-15 DSP, Lulin Chen, Zhihai He, Chang Wen Chen, and Michael A. Isnardi
Synthesis of electromagnetic devices with a novel neural network, Heriberto Jose Delgado, Michael Thursby, and Fredric M. Ham
Effective quality analysis for video streaming over wireless ad hoc network, Zhihai He and Chang Wen Chen
Identifying variable-length meaningful phrases with correlation functions, Hyoung-Rae Kim and Philip K. Chan
Speckle denoising using wavelet transforms and higher-order statistics, Samuel Peter Kozaitis and Anurat Ingun
Consistency restoration in point and interval Spatio-Temporal reasoning, Florent Launay and Debasis Mitra
A faster technique for distributed constraint satisfaction and optimization with privacy enforcement, Marius C. Silaghi
A suite of secure multi-party computation algorithms for solving distributed constraint satisfaction and optimization problems, Marius C. Silaghi
Improving Arithmetic Circuits for Solving Constraint Satisfaction and Optimization Problems, Marius C. Silaghi
Incentive Auctions and Stable Marriages Problems Solved with bn=2c-Privacy of Human Preferences, Marius C. Silaghi
Multiple description coding based on multiple-bitstream wavelet zero-tree image compression, Daewon Song, Chang Wen Chen, and Lei Cao
MORPHEUS: Motif Oriented Representations to Purge Hostile Events from Unlabeled Sequences, Guarav Tandon, Debasis Mitra, and Philip K. Chan
Semi-automatic road extraction from aerial images, Somkait Udomhunsakul, Samuel Peter Kozaitis, and Uthai Thai Sritheeravirojana
Collaborative image transmission over wireless sensor networks, Min Wu and Chang Wen Chen
Multiple-description image coding with distributed source coding and side information, Min Wu, Anthony Vetro, and Chang Wen Chen
Joint source-channel decoding for MPEG-2 video transmission, Liuguo Yin, Weigang Chen, Jianhua Lu, and Chang Wen Chen
Submissions from 2003
HEAT: Runtime interception of Win32 functions, Michael M. Andrews
Identifying Outliers via Clustering for Anomaly Detection, Muhammad H. Arshad and Philip K. Chan
A machine learning approach to anomaly detection, Philip K. Chan, Matthew V. Mahoney, and Muhammad H. Arshad
Imagery chain assessment for feature extraction, Rufus H. Cofer and Samuel Peter Kozaitis
Extended Hough methodology for 3D feature detection, Rufus H. Cofer, Samuel Peter Kozaitis, and Jihun Cha
Extended Hough methodology in geo-spatial image exploitation, Rufus H. Cofer, Samuel Peter Kozaitis, and Jihun Cha
Wavelet-based image compression using perceptual distortion metric, Hemen Goswami and Samuel Peter Kozaitis
An artificial immune system for securing mobile ad hoc networks against intrusion attacks, William S. Hortos
Cross-layer protocols optimized for real-time multimedia services in energy-constrained mobile ad hoc networks, William S. Hortos
Testing with Hostile Data Streams, Alan A. Jorgensen
Improving Learning Implicit User Interest Hierarchy with Variable Length Phrases, Hyoung-Rae Kim and Philip K. Chan
Linear feature detection of rural imagery using multiresolution filters, Samuel Peter Kozaitis and Rufus H. Cofer
Reduction of multiplicative noise using higher-order statistics, Samuel Peter Kozaitis, Anurat Ingun, and Rufus H. Cofer
Denoising using higher-order statistics, Samuel Peter Kozaitis and Sunghee Kim
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Matthew V. Mahoney and Philip K. Chan
Learning Rules for Anomaly Detection of Hostile Network Traffic, Matthew V. Mahoney and Philip K. Chan
A New Approach to Scalable Lindasystems Based on Swarms, Ronaldo Menezes and Robert Tolksdorf
Determining the Number of Clusters/Segments in Hierarchical Clustering/Segmentation Algorithms, Stan Salvador and Philip K. Chan
Learning States and Rules for Time Series Anomaly Detection, Stan Salvador, Philip K. Chan, and John Brodie
HgCdTe focal plane array cost modeling, Thomas J. Sanders and Glenn T. Hess
Learning Rules from System Call Arguments and Sequences for Anomaly Detection, Guarav Tandon and Philip K. Chan
A Representation Scheme for Finite Length Strings, Guarav Tandon and Debasis Mitra
Line detection using wavelet filters, Somkait Udomhunsakul, Samuel Peter Kozaitis, Uthai Thai Sritheeravirojana, and A. Khempila
Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection, Rachna Vargiya and Philip K. Chan
A local search optimization algorithm based on natural principles of gravitation, Barry Webster and Philip J. Bernhard
Submissions from 2002
Learning Implicit User Interest Hierarchy for Context in Personalization, Philip K. Chan and Hyoung-Rae Kim
Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks, Philip K. Chan and Matthew V. Mahoney
Network Traffic Anomaly Detection Based on Packet Bytes, Philip K. Chan and Matthew V. Mahoney
Genetic routing algorithms to optimize availability in broadband wireless networks with load balancing, William S. Hortos
Probabilistic microcell prediction model, Song-Kyoo Kim
Linear feature detection using multiresolution wavelet filters, Samuel Peter Kozaitis, Somkait Udomhunsakul, Rufus H. Cofer, A. Agarawal, and Shuwu Song
An optimum greedy algorithm for choosing minimal set of conflicting constraints in the point sequencing problem, Florent Launay and Mitra Debasis
An algorithm applicable to clearing combinatorial exchanges, Marius Silaghi
Unicode Compression: Does Size Really Matter?, Ryan Stansifer and Steve Atkin
WebSpy: An Architecture for Monitoring Web Server Availability In a Multi-Platform Environment, Madhan M. Thirukonda
On the Use of Linda as a Framework for Distributed Database Systems, Madhan M. Thirukonda and Ronaldo Menezes
Submissions from 2001
Detecting Novel Attacks by Identifying Anomalous Network Packet Headers, Philip K. Chan and Matthew V. Mahoney
PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic, Philip K. Chan and Matthew V. Mahoney
A Generalized Framework for Reasoning with Angular Directions, Mitra Debasis
Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia, William S. Hortos
Optimization of real-time protocols for wireless packet-switched multimedia networks based on partially observed multivariate point processes, William S. Hortos
Adaptive threshold selection technique for denoising in dithered quantizers, Samuel Peter Kozaitis and Hemen Goswami
Modeling and test of pixel cross-talk in HgCdTe focal plane arrays, Thomas J. Sanders, E. Lee Caraway, Glenn T. Hess, Gwendolyn W. Newsome, and Theodore Fischer
Completeness of Propositional Logic as a Program, Ryan Stansifer
Testing Exception and Error Cases Using Runtime Fault Injection, James A. Whittaker, Florence E. Mottay, and Ibrahim K. El-Far
Survivable Mobile Operating System, James Whittaker and Mohommad Samarah
Submissions from 2000
Implementations of Bidirectional Reordering Algorithms, Steven Atkin and Ryan Stansifer
Pattern classification approach to underwater acoustic communications based on the Wigner-Ville distribution, Frank M. Caimi and Gamal A. Hassan
A Protocol Language Approach to Generating Client-Server Software, Philip K. Chan and Melvin A.L. Douglas
2DEG channel-dependent model for Hg1-xCdxTe based pseudomorphic HEMTs, Hang-Ming Dai and Thomas J. Sanders
Computation for crosstalk effects in p-on-n Hg1-xCdxTe heterojunction IRFPA radiated by using uniformly parallel light, Hang-Ming Dai and Thomas J. Sanders
Bit allocation considering mean absolute error for image compression, Hemen Goswami and Samuel Peter Kozaitis
Separation of infrasound signals using independent component analysis, Fredric M. Ham, Sungin Park, and Joseph C. Wheeler
Adaptive handoff algorithms based on self-organizing neural networks to enhance the quality of service of nonstationary traffic in hierarchical cellular networks, William S. Hortos
Real-time performance analysis of wireless multimedia networks based on partially observed multivariate point processes, William S. Hortos
Wavelet-based image compression using randomized quantization, Samuel Peter Kozaitis and Hemen Goswami
Circular optimal trade-off and distance-classifier correlation filters, Samuel Peter Kozaitis and Sila Thangwaritorn