Data, Information, Knowledge, and Libraries
| Data, Information, Knowledge, and Libraries |
Ed Fox
Professor
| Office: | 2160G Torgersen |
|---|---|
| Email: | fox@vt.edu |
| Phone: | (540) 231-5113 |
| Website: | http://fox.cs.vt.edu |
| Office Hours: | T: 3:30 - 5:00; W: 12:30-2 |
|---|
Chang-Tien Lu Northern Virginia Center
Associate Professor
| Office: | 310 Northern Virginia Center |
|---|---|
| Email: | ctlu@vt.edu |
| Phone: | (703) 538-8373 |
| Website: | http://people.cs.vt.edu/~ctlu |
| Office Hours: | Tu 3-4PM, W 10-11AM |
|---|
T. M. Murali
Associate Professor
| Office: | 2160B Torgersen |
|---|---|
| Email: | tmurali@vt.edu |
| Phone: | (540) 231-8534 |
| Website: | https://bioinformatics.cs.vt.edu/~murali/ |
| Office Hours: | By appointment |
|---|
Naren Ramakrishnan
Thomas L. Phillips Professor of Engineering
| Office: | 2050B Torg |
|---|---|
| Email: | naren@vt.edu |
| Phone: | (540) 231-8451 |
| Website: | http://people.cs.vt.edu/~ramakris/ |
| Office Hours: | TR: 9:00 to 11:00 a.m. |
|---|
2013
Li, M., J. G. Shucheng Yu, W. Lou, and K. Ren,
"Secure ad-hoc trust initialization and key management in wireless body area networks",
ACM Transactions on Sensor Networks (ToSN), vol. 9, no. 2, pp. 18:1-18:35, 03/2013.
Abstract
McCrickard, D. S., S. Wahid, S. Branham, and S. Harrison,
"Achieving Both Creativity and Rationale: Reuse in Design with Images and Claims",
Creativity and Rationale: Enhancing Human Experience by Design, London, Springer-Verlag, pp. 105-120, 2013.
Polys, N. F., F. Bacim, M. Setareh, and B. Jones,
"Building novel Web3D user interfaces: a case study from architecture and structural engineering",
18th International Conference on 3D Web Technology (Web3D '13), San Sebastian, ES, ACM SIGGRAPH, 2013.
Bacim, F., E. Ragan, S. Serbo, M. Setareh, B. D. Jones, and N. Polys,
"The Effects of Display Fidelity, Visual Complexity, and Task Scope on Spatial Understanding of 3D Graphs",
Graphics Interface: CRC Press, 2013.
Sharakhov, N., N. Polys, and P. Sforza,
"SpeedSpy: a mobile Web3D platform for visualizing broadband data",
18th International Conference on 3D Web Technology (Web3D '13), San Sebastian, ES, ACM SIGGRAPH, 2013.
2012
Song, M., and E. Tilevich,
"Reusing Non-Functional Concerns Across Languages",
AOSD '12: Proceedings of the 11th International Conference on Aspect-Oriented Software Development, 2012.
Edwards, S. H., Z. Shams, M. Cogswell, and R. C. Senkbeil,
"Running students' software tests against each others' code: New life for an old "gimmick"",
Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, Raleigh, NC, ACM Press, New York, NY, 2012.
Allevato, A., and S. H. Edwards,
"RoboLIFT: Engaging CS2 students with testable, automatically evaluated Android applications",
Proceedings of the 43rd ACM Technical Symposium on Computer Science Education, Raleigh, NC, ACM Press, New York, NY, 2012.
Li, M., S. Yu, W. Lou, and Y. T. Hou,
"Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities",
Third International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC 2012), Macau, China, 06/2012.
Cao, N., Z. Y. Shucheng Yu, W. Lou, and Y. T. Hou,
"LT Codes-based Secure and Reliable Cloud Storage Service",
IEEE INFOCOM 2012, Orlando, FL, 03/2012.
Yan, Q., J. T. M. Li, W. Lou, and Y. T. Hou,
"Vulnerability and Protection for Distributed Consensus-based Spectrum Sensing in Cognitive Radio Networks",
IEEE INFOCOM 2012, Orlando, FL, 03/2012.
Yan, Q., Z. Y. Ming Li, W. Lou, and H. Zhai,
"Throughput analysis of cooperative mobile content distribution in vehicular networks using symbol level network coding",
IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, 02/2012.
L. Xie, Y. Shi, H. Y. T., W. Lou, H. Sherali, and S. F. Midkiff,
"On renewable sensor networks with wireless energy transfer: The multi-node case",
IEEE SECON 2012, Seoul, Korea, 06/2012.
C. Jiang, Y. Shi, H. Y. T., W. Lou, S. Kompella, and S. F. Midkiff,
"Toward Simple Criteria to Establish Capacity Scaling Laws for Wireless Networks",
IEEE INFOCOM 2012, Orlando, FL, 03/2012.
C. Jiang, Y. Shi, H. Y. T., W. Lou, S. Kompella, and S. F. Midkiff,
"Squeezing the Most Out of Interference: An Optimization Framework for Joint Interference Exploitation and Avoidance",
IEEE INFOCOM 2012, Orlando, FL, 03/2012.
Jiang, C., Y. Shi, Y. T. Hou, and W. Lou,
"Cherish Every Joule: Maximizing Throughput with An Eye on Network-wide Energy Consumption",
IEEE INFOCOM 2012, Orlando, FL, 03/2012.
Almohri, H., D. Yao, and D. Kafura,
"Identifying Native Applications With High Assurance",
CODASPY'12, San Antonio, TX, February, 2012.
Abstract
Lee, J. - S., S. Branham, D. Tatar, and S. Harrison,
"Processlessness: Staying Open to Interactional Possibilities",
Design of Interactive Systems (DIS 2012), Newcastle-upon-Tyne, UK, ACM, 06/2012.
Abstract
Branham, S., S. Harrison, and T. Hirsch,
"Expanding the Design Space for Intimacy: Supporting Mutual Reflection for Local Partners",
Design of Interactive Systems (DIS 2012), Newcastle-upon-Tyne, UK, ACM, 06/2012.
Abstract
Dickey-Kurdziolek, M., D. Tatar, and S. Harrison,
"Framespaces: Framing of Frameworks",
Design of Interactive Systems (DIS 2012), Newcastle-upon-Tyne, UK, ACM, 06/2012.
Abstract
Lee, J. - S., D. Tatar, and E. R. Pedersen,
"Time, Topic and Trawl: Stories About How We Reach Our Past",
Design of Interactive Systems (DIS 2012), Newcastle-upon-Tyne, UK, ACm, 06/2012.
Abstract
Balci, O.,
"A Life Cycle for Modeling and Simulation",
Simulation: Transactions of the Society for Modeling and Simulation International, vol. 88, no. 7, pp. 870–883, 2012.
Hossain, S., M. Akbar, and N. Polys,
"Narratives in the Network: Interactive Methods for Mining Cell Signaling Networks",
Journal of Computational Biology, vol. 19, no. 9, pp. 1043-1059, 2012.
Polys, N., and A. Wood,
"New Platforms for Health Hypermedia",
Issues in Information Systems, vol. 13, no. 1, pp. 40-50, 2012.
Phillips, R. D., L. T. Watson, R. H. Wynne, and N. Ramakrishnan,
"Continuous iterative guided spectral class rejection classification algorithm",
IEEE Trans. Geoscience Remote Sensing, vol. 50, pp. 2303--2317, 2012.
Viana, F. A. C., R. T. Haftka, and L. T. Watson,
"Sequential sampling for contour estimation with concurrent function evaluations",
Structural Multidisciplinary Optim., vol. 45, pp. 615--618, 2012.
Ghommem, M., M. R. Hajj, D. T. Mook, and L. T. Watson,
"Global optimization of actively morphing flapping wings",
Journal of Fluids and Structures, vol. 33, pp. 210--228, 2012.
Pu, Y., S. Lee, L. T. Watson, and Y. Cao,
"The effect of unhealthy-cells in synchronized insulin secretion",
2012 IEEE Internat. Conf. on Bioinformatics and Biomedicine, Philadelphia, PA, pp. 416--419, 2012.
McCrickard, D. S.,
Making Claims: Knowledge Design, Capture, and Sharing in HCI,
: Morgan & Claypool, 2012.
McCrickard, D. S., J. T. Barksdale, and F. Doswell,
"Understanding cool: An analytic exploration of contributing factors for teens",
PsychNology Journal, vol. 10, no. 2, pp. 93-102, 06/2012.
Streefkerk, J. W., D. S. McCrickard, M. P. van Esch-Bussemakers, and M. Neerincx,
"Balancing awareness and interruption in mobile patrol using context-aware notification",
International Journal of Mobile Human Computer Interaction (IJMHCI), vol. 4, no. 3, pp. 1-27, 07/2012.
Barksdale, J. T., and D. S. McCrickard,
"Software product innovation in agile usability teams: An analytical framework of social capital, network governance, and usability knowledge management",
International Journal of Agile and Extreme Software Development, vol. 1, no. 1, pp. 52-77, 06/2012.
2011
Balci, O., J. D. Arthur, and W. F. Ormsby,
"Achieving Reusability and Composability with a Simulation Conceptual Model",
Journal of Simulation, vol. 5, no. 3 (Aug.), pp. 157-165, 2011.
Dias, Z., U. Dias, and J. C. Setubal,
"Using inversion signatures to generate draft genome scaffolds",
ACM International Conference on Bioinformatics and Computational Biology 2011, Chicago, IL, 08/2011.
Belal, N. A., and L. S. Heath,
"A Theoretical Model for Whole Genome Alignment",
Journal of Computational Biology, vol. 18, no. 5, pp. 705-728, 2011.
Feng, W. - C., Y. Cao, D. Patnaik, and N. Ramakrishnan,
"Temporal Data Mining for Neuroscience",
GPU computing Gems, Emerald Edition: Elsevier Inc., 2011.
Cao, Y., D. Patnaik, S. Ponce, J. Archuleta, P. Butler, W. - C. Feng, and N. Ramakrishnan,
"Parallel Mining of Neuronal Spike Streams on Graphics Processing Units",
International Journal of Parallel Programming: Springer Netherlands, pp. 1-28, 2011.
Shah, E., and E. Tilevich,
"Reverse-engineering user interfaces to facilitate porting to and across mobile devices and platforms",
NEAT '11: in Proceedings of the NExt-generation Applications of smarTphones, 2011.
Kwon, Y. - W., and E. Tilevich,
"A declarative approach to hardening services against QoS vulnerabilities",
MESOCA '11: Proceedings of the 2011 IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems, 2011.
Kwon, Y. - W., E. Tilevich, and W. Cook,
"Which middleware platform should you choose for your next remote service?",
Service Oriented Computing and Applications, vol. 5: Springer London, pp. 61-70, 2011.
Kang, P., E. Tilevich, S. Varadarajan, and N. Ramakrishnan,
"Maintainable and reusable scientific software adaptation: democratizing scientific software adaptation",
AOSD '11: Proceedings of the 10th International Conference on Aspect-Oriented Software Development, 2011.
Rafique, M. M., A. R. Butt, and E. Tilevich,
"Reusable software components for accelerator-based clusters",
Journal of Systems and Software, vol. 84, no. 7, pp. 1071–1081, 2011.
Heath, L. S., and N. Parikh,
"Generating Random Graphs with Tunable Clustering Coefficient",
Physica A, vol. 390, pp. 4577-4587, 2011.
Lewis SN, N. E., Q. D. Weeks C, and L. Zhang,
"Prediction of Disease and Phenotype Associations from Genome-Wide Association Studies",
PLoS ONE, vol. 6, 2011.
Delcambre, L., D. Archer, S. Price, and S. Britell,
"Superimposing a Strand Map over Lectures and Textbook Content (In a Database Class)",
Journal of Computing Sciences in College, vol. 27, no. 1, pp. 143-151, 2011.
Woods, M., and S. H. Edwards,
"Improving exception messages with ExceptionDoctor",
Proceedings of the 2011 International Conference on Frontiers in Education: Computer Science and Computer Engineering, Las Vegas, NV, CSREA Press, pp. pp. 466-471, 2011.
Snyder, J., B. McBair, S. H. Edwards, and C. B. Dietrich,
"OSSIE: An open source software defined radio platform for education and research",
Proceedings of the 2011 International Conference on Frontiers in Education: Computer Science and Computer Engineering, Las Vegas, NV, CSREA Press, pp. pp. 30-34, 2011.
Li, M., Z. Yang, and W. Lou,
"CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding",
IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, vol. 29, no. 1, pp. 223-235, 01/2011.
Zeng, K., W. Lou, and M. Li,
Multihop Wireless Networks: Opportunistic Routing,
: Wiley, 2011.
Wang, Q., K. Ren, S. Yu, and W. Lou,
"Dependable and secure sensor data storage with dynamic integrity assurance",
ACM Transactions on Senor Networks (ToSN), vol. 8, no. 1, 08/2011.
Wang, Q., C. Wang, K. R. Jin Li, and W. Lou,
"Enabling public verifiability and data dynamics for storage security in cloud computing",
IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 5, 05/2011.
Yu, S., K. Ren, and W. Lou,
"FDAC: Toward fine-grained distributed data access control in wireless sensor networks",
IEEE Transactions on Parallel and Distributed Systems, vol. 22, no. 4, 05/2011.
Cao, N., Z. Yang, K. R. Cong Wang, and W. Lou,
"Privacy-preserving query over encrypted graph-structured data in cloud computing",
The 31th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, 06/2011.
Li, M., S. Yu, N. Cao, and W. Lou,
"Authorized private keyword search over encrypted personal health records in cloud computing",
The 30th International Conference on Distributed Computing Systems (ICDCS 2011), Minneapolis, MN, USA, 06/2011.
Li, M., N. Cao, S. Yu, and W. Lou,
"FindU: Privacy-preserving personal profile matching in mobile social networks",
IEEE INFOCOM 2011, Shanghai, China, 04/2011.
Cao, N., C. Wang, K. R. Ming Li, and W. Lou,
"Privacy-preserving multi-keyword ranked search over encrypted cloud data",
IEEE INFOCOM 2011, Shanghai, China, 04/2011.
Yang, Z., S. Yu, W. Lou, and C. Liu,
"P2: Privacy-preserving communication and precise reward architecture for V2G networks in Smart Grid",
IEEE Transactions on Smart Grid, vol. 2, no. 4, 12/2011.
Li, M., K. Zeng, and W. Lou,
"Opportunistic broadcast of event-driven warning messages in vehicular ad Hoc networks with lossy links",
Computer Networks, vol. 55, no. 10, 07/2011.
Yang, Z., M. Li, and W. Lou,
"R-Code: Network coding-based reliable broadcast in wireless mesh networks",
Ad Hoc Networks, vol. 9, no. 5, 07/2011.
Li, M., Z. Yang, and W. Lou,
"CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding",
IEEE Journal on Selected Areas in Communications (JSAC), special issue on Vehicular Communication Networks, vol. 29, no. 1, 01/2011.
Tolk, A., O. Balci, S. Y. Diallo, and P. A. Fishwick,
"Panel: Towards a Methodological Approach to Identify Future M&S Standard Needs",
Proceedings of the 2011 Winter Simulation Conference (Dec. 11-14), Phoenix, AZ, IEEE, Piscataway, NJ, pp. 2980-2997, 2011.
Lee, J. C., T. K. Judge, and D. S. McCrickard,
"Evaluating eXtreme Scenario-based Design in a Distributed Team",
2011 ACM Conference on Human Factors in Computing Systems (CHI '11), 05/2011.
McCrickard, D. S., D. M. Townsend, I. I. I. Woodrow W. Winchester, and T. Barnes,
"Leveraging card-based collaborative activities as culturally situated design tools",
HCI International 2011 (HCII '11), Orlando, FL, 07/2011.
2010
Sheetz, S., A. L. Kavanaugh, F. Quek, J. B. Kim, and S. - C. Lu,
"The Expectation of Connectedness and Cell Phone Use in Crises",
Journal of Emergency Management, 2010.
Kavanaugh, A. L., S. Sheetz, F. Quek, and J. B. Kim,
"Cell Phone Use with Social Ties during Crises: The case of the Virginia Tech tragedy",
7th International Conference on Information Systems for Crisis Response and Management (ISCRAM), Seattle, WA, 2010.
Chaube, V., A. L. Kavanaugh, and M. A. Pérez-Quiñones,
"Leveraging Social Networks to Embed Trust in Rideshare Programs: Survey Findings",
43rd Hawaii International Conference on Systems Sciences (HICSS), Kauai, Hawaii, IEEE Computer Society Press, pp. 1-8, 2010.
Vasquez-Robinet, C., J. I. Watkinson, A. A. Sioson, N. Ramakrishnan, L. S. Heath, and R. Grene,
"Differential Expression of Heat Shock Protein Genes in Preconditioning for Photosynthetic Acclimation in Water-Stressed Loblolly Pine",
Plant Biochemistry and Physiology, vol. 48, pp. 256-264, 2010.
Chen, F., C. T. Lu, and A. Boedihardjo,
"GLS-SOD: A Generalized Local Statistical Approach for Spatial Outlier Detection",
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (ACM KDD 2010), Washington DC, ACM, pp. 1069-1078, 7/2010.
Liu, X., C. T. Lu, and F. Chen,
"Spatial Outlier Detection: Random Walk Based Approaches",
Proceedings of the 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM GIS 2010), San Jose, California, ACM, pp. 370-379, 11/2010.
Dai, J., C. T. Lu, and X. Fei,
"Traffic Analysis for Holidays and Planned Events",
the 2010 SIAM Conference on Data Mining, Workshop on Data Mining for Smarter Infrastructure, Columbus, Ohio, SIAM, 4/2010.
Li, Q., and C. T. Lu,
"Appearance Based Recognition Using Spatial and Discriminant Influence",
Proceeding of the 9th International Conference on Machine Learning and Applications, Washington DC, pp. 78-83, 12/2010.
Allevato, A., and S. H. Edwards,
"Discovering patterns in student activity on programming assignments",
2010 ASEE Southeastern Section Annual Conference and Meeting, April, 2010.
Abstract
Cao, Y., D. Patnaik, S. Ponce, J. Archuleta, P. Butler, W. - C. Feng, and N. Ramakrishnan,
"Towards Chip-on-Chip Neuroscience: Fast Mining of Neuronal Spike Streams Using Graphics Hardware",
CF '10: Proceedings of the 7th ACM international conference on Computing frontiers, no. 978-1-4503-0044-5, Bertinoro, Italy, ACM, pp. 1–10, May 17 - 19, 2010.
Dumitraş, T., I. Neamtiu, and E. Tilevich,
"Report on the second ACM workshop on hot topics in software upgrades (HotSWUp'09)",
SIGOPS Oper. Syst. Rev., vol. 44, New York, NY, USA, ACM, pp. 146–152, December, 2010.
Dumitras, T., P. Narasimhan, and E. Tilevich,
"To upgrade or not to upgrade: impact of online upgrades across multiple administrative domains",
Onward '10: Proceedings of the ACM Symposium on New Ideas in Programming and Reflections on Software, 2010.
Henthorne, C., and E. Tilevich,
"Sonifying performance data to facilitate tuning of complex systems: performance tuning: music to my ears",
Onward '10: Proceedings of the ACM Symposium on New Ideas in Programming and Reflections on Software, 2010.
Kwon, Y. - W., E. Tilevich, and W. R. Cook,
"An Assessment of Middleware Platforms for Accessing Remote Services",
SCC '10: Proceedings of the 2010 IEEE International Conference on Services Computing, 2010.
Sundaravaradan, N., J. P. C. Vergara, L. S. Heath, and N. Ramakrishnan,
"Extracting Temporal Signatures for Comprehending Systems Biology Models",
16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD-2010), Washington, DC, ACM, pp. 453-462, 2010.
Maxwell, E. K., G. Back, and N. Ramakrishnan,
"Diagnosing memory leaks using graph mining on heap dumps",
16th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '10, Washington, DC, USANew York, New York, USA, ACM Press, pp. 115, 06/2010.
Warren, A., R. Anandakrishnan, and L. Zhang,
"Functional bias in molecular evolution rate of Arabidopsis thaliana",
BMC Evolutionary Biology, vol. 10, no. 1, pp. 125, 2010.
Abstract
Wang, C., K. Ren, W. Lou, and J. Li,
"Towards publicly auditable secure cloud data storage services",
IEEE Networks Magazine special issue on Future Internet: New Applications and Emerging Services, vol. 24, no. 4, 07/2010.
Li, M., W. Lou, and K. Ren,
"Data security and privacy in wireless body area networks",
IEEE Wireless Communications special issue on Wireless Technologies for E-healthcare, vol. 17, no. 1, 02/2010.
Li, M., S. Yu, K. Ren, and W. Lou,
"Securing personal health records in cloud computing: patient-centric and fine-grained data access control in multi-owner settings",
6th International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2010), Singapore, 09/2010.
Wang, C., N. Cao, K. R. Jin Li, and W. Lou,
"Secure ranked keyword search over encrypted cloud data",
The 30th International Conference on Distributed Computing Systems (ICDCS 2010), Genoa, Italy, 06/2010.
Cao, N., Q. Wang, K. Ren, and W. Lou,
"Distributed storage coding for flexible and efficient data dissemination and retrieval in wireless sensor networks",
International Conference on Communications (ICC 2010), Cape Town, South Africa, 05/2010.
Yu, S., K. Ren, and W. Lou,
"Attribute based data sharing with attribute revocation",
5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, 04/2010.
Yu, S., C. Wang, K. Ren, and W. Lou,
"Achieving secure, scalable, and fine-grained data access control in cloud computing",
IEEE INFOCOM 2010, San Diego, CA, 03/2010.
Wang, C., Q. Wang, K. Ren, and W. Lou,
"Privacy-preserving public auditing for data storage security in cloud computing",
IEEE INFOCOM 2010, San Diego, CA, 03/2010.
Li, J., Q. Wang, K. R. Cong Wang, and W. Lou,
"Fuzzy keyword search over encrypted data in cloud computing",
IEEE INFOCOM 2010 mini-conference, San Diego, CA, 03/2010.
Li, M., S. Yu, W. Lou, and K. Ren,
"Group device pairing based secure sensor association and key management for body area sensor networks",
IEEE INFOCOM 2010, San Diego, CA, 03/2010.
Yu, S., W. Lou, and K. Ren,
"Privacy-preserving user authentication in wireless access networks",
Encyclopedia of Cryptography and Security (2nd ed.): Springer, 2010.
Yu, S., K. Ren, and W. Lou,
"Attribute-based on-demand multicast group setup with receiver anonymity",
Computer Networks, vol. 54, no. 3, 02/2010.
Ren, K., S. Yu, W. Lou, and Y. Zhang,
"PEACE: A novel privacy-enhanced yet accountable security framework for metropolitan wireless mesh networks",
IEEE Transactions on Parallel and Distributed Systems, vol. 21, no. 2, 02/2010.
Zeng, K., Z. Yang, and W. Lou,
"Opportunistic routing in multi-radio multi-channel multi-hop wireless networks",
IEEE Transactions on Wireless Communications, vol. 9, no. 11, 11/2010.
Yang, Z., M. Li, and W. Lou,
"CodePlay: Live Multimedia Streaming in VANETs using Symbol-Level Network Coding",
The 18th IEEE International Conference on Network Protocols (ICNP 2010), Kyoto, Japan, 10/2010.
Zeng, K., Z. Yang, and W. Lou,
"Opportunistic routing in multi-radio multi-channel multi-hop wireless networks",
IEEE INFOCOM 2010 mini-conference, San Diego, CA, 03/2010.
Way, T., L. Cassel, K. Pearson, and U. Wolz,
"A Distributed Expertise Model for Teaching Computing Across Disciplines and Institutions",
he 2010 International Conference on Frontiers in Education: Computer Science and Computer Engineering., Las Vegas, NV, CSREA Press, 07/2010.
Abstract
Wahid, S., S. Branham, D. S. McCrickard, and S. Harrison,
"Investigating the Relationship Between Imagery and Rationale in Design",
2010 ACM Conference on Designing Interactive Systems (DIS '10), Aarhus, Denmark, 08/2010.
2009
Lu, C. T., A. Boedihardjo, and S. Shekhar,
"Analysis of Highway Traffic Data Warehouse with Map Cubes: Highway Traffic Data",
chapter in Geographic Data Mining and Knowledge Discovery (2nd edition), Harvey J. Miller and Jiawei Han (eds.), Taylor and Francis, pp. 69-97, 2009.
Edwards, S. H., J. Snyder, A. Allevato, M. A. Pérez-Quiñones, D. Kim, and B. Tretola,
"Comparing effective and ineffective behaviors of student programmers",
Fifth International Workshop on Computing Education Research - ICER '09, Berkeley, CA, USA, ACM Press, pp. 3, 2009.
Godara, J., A. L. Kavanaugh, and P. Isenhour,
"The Efficacy of Knowlege Sharing in Centralized and Self-Organizing Online Communities: Weblog Networks versus Discussion Forums",
42nd Hawaii International Conference on Systems Sciences (HICSS), Kona, Hawaii, IEEE Computer Society Press, 2009.
Perugini, S., M. E. Pinney, N. Ramakrishnan, M. A. Pérez-Quiñones, and M. B. Rosson,
"Exploring Out-of-turn Interactions with Websites",
Journal of Digital Information, vol. 10, no. 4, 2009.
Heath, L. S., and A. A. Sioson,
"Multimodal Networks: Structure and Operations",
IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 6, pp. 321-332, 2009.
Abstract
Heath, L. S., and A. A. Sioson,
"Semantics of Multimodal Network Models",
IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 6, pp. 271-280, 2009.
Hossain, M. S., M. Akbar, and F. Polys N.,
"Storytelling and Clustering for Cellular Signaling Pathways",
International Conference on Information and Knowledge Engineering (IKE'09), vol. 1, Las Vegas, Nevada, USA, pp. 109-115, July 13-16, 2009.
III, C. C. O., T. M. Murali, and N. Ramakrishnan,
"Capturing Truthiness: Mining Truth Tables in Binary Datasets",
Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC'09; Data Mining Track): ACM, pp. 1467–1474, March, 2009.
Ahn, T. - H., L. T. Watson, Y. Cao, C. A. Shaffer, and W. T. Baumann,
"Cell cycle modeling for budding yeast with stochastic simulation algorithms",
Computer Modeling in Engineering and Sciences, vol. 51, pp. 27--52, 2009.
Edwards, S. H., and G. Kulczycki,
"Proceedings of the 11th International Conference on Software Reuse: Formal Foundations of Reuse and Domain Engineering",
Lecture Notes in Computer Science, vol. 5791: Springer Verlag, 2009.
Ponce, S., H. Jing, S. I. Park, C. Khoury, F. Quek, and Y. Cao,
An Application-Oriented Approach for Accelerating Data-Parallel Computation with Graphics Processing Unit,
, no. TR-09-05: Computer Science Department, Virginia Polytechnical Institute and State University, March, 2009.
Cao, Y., D. P. S. abd Ponce, J. Archuleta, P. Butler, W. - C. Feng, and N. Ramakrishnan,
"Towards Chip-on-Chip Neuroscience: Fast Mining of Frequent Episodes Using Graphics Processors",
arXiv.org: Virginia Polytechnical Institute and State University, May, 2009.
Song, M., and E. Tilevich,
"Enhancing Source-Level Programming Tools with An Awareness of Transparent Program Transformations",
OOPSLA '09: Proceedings of the 2009 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications, 2009.
Ibrahim, A., Y. Jiao, E. Tilevich, and W. R. Cook,
"Remote Batch Invocation for Compositional Object Services",
ECOOP '09: Proceedings of the 23rd European Conference on Object-Oriented Programming, 2009.
Hussein, K., E. Tilevich, I. I. Bukvic, and S. B. Kim,
"Sonification Design Guidelines to Enhance Program Comprehension",
ICPC '09: Proceedings of the 17th IEEE International Conference on Program Comprehension, 2009.
Pan, D., and L. Zhang,
"An Atlas of the Speed of Copy Number Changes in Animal Gene Families and Its Implications",
PLoS ONE, vol. 4, no. 10: Public Library of Science, pp. 13, 2009.
Pan, D., and L. Zhang,
"Burst of Young Retrogenes and Independent Retrogene Formation in Mammals",
PLOS ONE, 2009.
Wang, Q., C. Wang, K. R. Jin Li, and W. Lou,
"Enabling public verifiability and data dynamics for storage security in cloud computing",
14th European Symposium on Research in Computer Security (ESORICS 2009), Saint Malo, France, 09/2009.
Yu, S., K. Ren, W. Lou, and J. Li,
"Defending against key abuse attacks in KP-ABE enabled broadcast systems",
The 5th International ICST Conference on Security and Privacy in Communication Networks (Securecomm 2009), Athens, Greece, 09/2009.
Wang, C., Q. Wang, K. Ren, and W. Lou,
"Ensuring data storage security in cloud computing",
17th IEEE International Workshop on Quality of Service (IWQoS 2009), Charleston, South Carolina, 07/2009.
Yu, S., K. Ren, and W. Lou,
"Accountable attribute-based broadcast",
IEEE Symposium on Security and Privacy (S&P 2009), Oakland, CA, 05/2009.
Yu, S., K. Ren, and W. Lou,
"FDAC: Toward fine-grained distributed data access control in wireless sensor networks",
IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 04/2009.
Wang, Q., K. Ren, W. Lou, and Y. Zhang,
"Dependable and secure sensor data storage with dynamic integrity assurance",
IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 04/2009.
Lou, W., and K. Ren,
"Security, privacy, and accountability in wireless access networks",
IEEE Wireless Communications, vol. 16, no. 4, 08/2009.
Ren, K., S. Yu, W. Lou, and Y. Zhang,
"Multi-user broadcast authentication in wireless sensor networks",
IEEE Transactions on Vehicular Technology, vol. 58, no. 8, 10/2009.
Lou, W., W. Liu, Y. Zhang, and Y. Fang,
"Improving network security by multipath routing in mobile ad hoc networks",
Wireless Networks, vol. 15, no. 3, 03/2009.
Zeng, K., Z. Yang, and W. Lou,
"Location-aided opportunistic forwarding in multirate and multihop wireless networks",
IEEE Transactions on Vehicular Technology, vol. 58, no. 6, 07/2009.
Zeng, K., K. Ren, W. Lou, and P. J. Moran,
"Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply",
Wireless Networks (WINET), vol. 15, no. 1, 01/2009.
Yang, Z., M. Li, and W. Lou,
"R-Code: Network coding based reliable broadcast in wireless mesh networks with unreliable links",
IEEE Global Telecommunications Conference (GLOBECOM 2009), Honolulu, Hawaii, USA, 12/4/2009.
Li, M., W. Lou, and K. Zeng,
"OppCast: Opportunistic broadcast of warning messages in VANETs with unreliable links",
The 6th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2009), Macau, China, 10/2009.
Yang, Z., M. Li, and W. Lou,
"A network coding approach to reliable broadcast in wireless mesh networks",
International Conference on Wireless Algorithms, Systems, and Applications (WASA 2009), Boston, MA, 08/2009.
Yang, Z., K. Zeng, and W. Lou,
"FSA: A fast coordination scheme for opportunistic routing",
International Conference on Communications (ICC 2009), Dresden, Germany, 06/2009.
2008
Jin, Y., T. M. Murali, and N. Ramakrishnan,
"Compositional Mining of Multi-relational Biological Datasets",
ACM Transactions on Knowledge Discovery from Data, vol. 2, no. 1, March, 2008.
Pati, A., Y. Jin, K. Klage, R. Helm, L. S. Heath, and N. Ramakrishnan,
"CMGSDB: Integrating Heterogeneous Caenorhabditis elegans Data Sources Using Compositional Data Mining",
Nucleic Acids Research, vol. 36, pp. D69-76, 2008.
Fox, E. A., C. Andrews*, W. Fan, J. Jiao*, A. Kassahun, S. - C. Lu*, Y. Ma*, C. North, N. Ramakrishnan, A. Scarpa, et al.,
"A Digital Library for Recovery, Research, and Learning from April 16, 2007 at Virginia Tech",
Traumatology, vol. 14, no. 1, pp. 20 pages, April, 2008.
Shu, J., L. T. Watson, N. Ramakrishnan, F. A. Kamke, and C. North,
"Unification of problem solving environment implementation layers with XML-based specifications",
Advances in Engineering Software, vol. 39, no. 3, pp. 189-201, March, 2008.
Dai, J., and C. T. Lu,
"Concurrency Control for Spatial Access Method",
Encyclopedia of Geographical Information Science, Shashi Shekhar and Hui Xiong (eds.), pp. 124-128, 2008.
DosSantos, R., and C. T. Lu,
"Geography Markup Language",
Encyclopedia of Geographical Information Science, Shashi Shekhar and Hui Xiong (eds.),, pp. 364-368, 2008.
Chen, F., and C. T. Lu,
"Nearest Nearby Query",
Encyclopedia of Geographical Information Science, Shashi Shekhar and Hui Xiong (eds.), pp. 776-782, 2008.
Kou, Y., and C. T. Lu,
"Spatial Outlier Detection",
Encyclopedia of Geographical Information Science, Shashi Shekhar and Hui Xiong (eds.), pp. 832-838, 2008.
Steel, C., and C. T. Lu,
"Impersonator Identification through Dynamic Fingerprinting",
Digital Investigation, the International Journal of Digital Forensics & Incident Response, Elsevier, 2008.
Chang, D., C. T. Lu, Y. Kou, and F. Chen,
"On Detecting Spatial Outliers",
GeoInformatica, An International Journal on Advances of Computer Science for Geographic Information System, Springer, 2008.
Chen, F., C. T. Lu, and A. Boedihardjo,
"On Locally Linear Classification by Pairwise Coupling",
Proceedings of the 8th IEEE International Conference on Data Mining, Pisa, Italy, IEEE, pp. 749-754, 12/2008.
Boedihardjo, A., C. T. Lu, and F. Chen,
"A Framework for Estimating Complex Probability Density Structures in Data Streams",
Proceedings of the 17th ACM Conference on Information and Knowledge Management, Napa Valley, CA, ACM, pp. 619-628, 10/2008.
Liu, X., C. T. Lu, and F. Chen,
"An Entropy-based Method for Assessing the Number of Spatial Outliers",
Proceedings of the 2008 IEEE International Conference on Information Reuse and Integration, Las Vegas, NV, IEEE, pp. 244-249, 07/2008.
Ren, W., K. Ren, W. Lou, and Y. Zhang,
"Efficient User Revocation for Privacy-aware PKI",
The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
Ren, K., and W. Lou,
Communication security in wireless sensor networks,
: VDM Verlag, 2008.
Ren, K., W. Lou, and Y. Zhang,
"Multi-user broadcast authentication in wireless sensor networks",
Encyclopedia on Ad Hoc and Ubiquitous Computing: World Scientific, 2008.
Ren, K., W. Lou, and Y. Zhang,
"LEDS: Providing location-aware end-to-end data security in wireless sensor networks",
IEEE Transactions on Mobile Computing (TMC), vol. 7, no. 5, 05/2008.
Ren, K., K. Zeng, and W. Lou,
"Secure and fault-tolerant event boundary detection in wireless sensor networks",
IEEE Transactions on Wireless Communications, vol. 7, no. 1, 01/2008.
Zeng, K., K. R. Shucheng Yu, W. Lou, and Y. Zhang,
"Towards secure link quality measurement in multihop wireless networks",
IEEE Global Telecommunications Conference (GLOBECOM 2008), New Orleans, LA, USA, 11/2008.
Yu, S., K. Ren, and W. Lou,
"Attribute-based on-demand multicast group Setup with receiver anonymity",
The 4th International Conference on Security and Privacy in Communication Networks (SecureComm 2008), Istanbul, Turkey, 09/2008.
Ren, K., and W. Lou,
"A sophisticated privacy-enhanced yet accountable security framework for wireless mesh networks",
The 28th International Conference on Distributed Computing Systems (ICDCS 2008), Beijing, China, 06/2008.
Ren, W., K. Ren, and W. Lou,
"Optimized User Revocation for Group Signature Based Privacy-aware PKI",
The First International Workshop on Wireless Security and Privacy (WiSP'08), Beijing, China, 06/2008.
Wan, Z., K. Ren, W. Lou, and B. Preneel,
"Anonymous ID-based group key agreement for wireless networks",
IEEE Wireless Communications and Networking Conference (WCNC’2008), Las Vegas, 03/2008.
Zeng, K., W. Lou, and H. Zhai,
"Capacity of opportunistic routing in multirate and multihop wireless networks",
IEEE Transactions on Wireless Communications, vol. 7, no. 12, 12/2008.
Guo, W., X. Huang, W. Lou, and C. Liang,
"On relay node placement and assignment for two-tiered wireless networks",
ACM Mobile Networks and Applications (MONET), special issue on "Advances in wireless mesh networks", vol. 13, 01/2008.
Li, M., and W. Lou,
"Opportunistic Broadcast of Emergency Messages in Vehicular Ad Hoc Networks with Unreliable Links",
The Fifth International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QShine 2008), Hong Kong, China, 07/2008.
Zeng, K., W. Lou, and H. Zhai,
"On end-to-end throughput of opportunistic routing in multirate and multihop wireless networks",
IEEE INFOCOM 2008, Phoenix, AZ, 04/2008.
Williams, L., D. S. McCrickard, L. Layman, and K. Hussein,
"Eleven Guidelines for Implementing Pair Programming in the Classroom",
2008 Conference on Agile Software Development (Agile 2008), Toronto, Canada, 06/2008.
Uluca, D., J. W. Streefkerk, B. Sciacchitano, and D. S. McCrickard,
"Designing automated handheld navigation support",
10th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2008), Amsterdam, the Netherlands, 09/2008.
2007
Ramakrishnan, N., M. A. Perez-Quinones, and A. Shenoy,
"Compositional Specification and Realization of Mixed-Initiative Web Dialogs",
International Journal of Web Engineering and Technology, Special Issue Special Issue on User Interface Description Languages, 2007.
Lu, C. T., Y. Kou, J. Zhao, and L. Chen,
"Detecting and Tracking Region Outliers in Meteorological Data",
Information Sciences Journal, Informatics and Computer Science Intelligent Systems Applications, An International Journal, Elsevier, vol. 177, no. 7, 2007.
Lu, C. T., D. R. F. Santos, L. Sripada, and Y. Kou,
"Advances of GML for Geospatial Applications",
GeoInformatica: An International Journal on Advances of Computer Science for Geographic Information System, vol. 11, no. 1, pp. 131-157, March, 2007.
Dai, J., and C. T. Lu,
"CLAM: Concurrent Location Management for Moving Objects",
Proceedings of the 15th International Symposium on Advances in Geographic Information Systems, Seattle Washington, Nov, 2007.
Kou, Y., C. T. Lu, and R. F. DosSantos,
"Spatial Outlier Detection: A Graph-based Approach",
Proceedings of the 19th International Conference on Tools with Artificial Intelligence, Sacramento, Patras, Greece, Oct, 2007.
Kim, H. N., A. L. Kavanaugh, and T. Smith-Jacksong,
"Implementation of Internet Technology for Local Government: Design guidelines",
40th Hawaii International Conference on Systems Sciences (HICSS): IEEE Computer Society Press, pp. 1530-1605, 2007.
Kim, J. B., A. L. Kavanaugh, and M. A. Pérez-Quiñones,
"Toward a model of political participation among young adults: The role of local groups and ICT use",
2007 International Conference on Theory and Practice of Electronic Governance (ICEGOV), Macao, ACM Press, pp. 205-212, 2007.
Kim, J. B., A. L. Kavanaugh, and K. Hult,
"Local Community Groups and Internet Use",
International Journal of Technology, Knowledge and Society, vol. 2, 2007.
Kavanaugh, A. L., H. N. Kim, M. A. Pérez-Quiñones, and P. Isenhour,
"Models of Local Government Blogging: Design tradeoffs in civic engagement",
Communities and Technologies 2008, Surrey, Springer, pp. 419-438, 2007.
Ren, K., W. Lou, K. Zeng, and P. J. Moran,
"On broadcast authentication in wireless sensor networks",
IEEE Transactions on Wireless Communications, vol. 6, no. 11, 11/2007.
Zhang, Y., W. Lou, W. Liu, and Y. Fang,
"A secure incentive protocol for mobile ad hoc networks",
ACM Wireless Networks, vol. 13, no. 5, 10/2007.
Ren, K., and W. Lou,
"Privacy-enhanced, attack-resilient access control in pervasive computing environments with optional context authentication capability",
ACM Mobile Networks and Applications (MONET) (special issue on Wireless Broadband Access), vol. 12, no. 1, 01/2007.
Yu, S., K. Ren, and W. Lou,
"A privacy-preserving lightweight authentication protocol for low-cost RFID tags",
IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Ren, K., W. Lou, and Y. Zhang,
"Multi-user broadcast authentication in wireless sensor networks",
Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007) , 01/2007.
Zeng, K., W. Lou, J. Yang, and D. B. R. III,
"On throughput efficiency of geographic opportunistic routing in multihop wireless networks",
ACM Mobile Networks and Applications (MONET), vol. 12, no. 5, 12/2007.
Zeng, K., W. Lou, and Y. Zhang,
"Multi-rate geographic opportunistic routing in wireless ad hoc networks",
IEEE Military Communication Conference (MILCOM 2007), Orlando, FL, 10/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III,
"On throughput efficiency of geographic opportunistic routing in multihop wireless networks",
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security, and Robustness (QShine 2007), Vancouver, BC, Canada, 08/2007.
Zeng, K., W. Lou, J. Yang, and R. B. D. III,
"On geographic collaborative forwarding in wireless ad hoc and sensor networks",
International Conference on Wireless Algorithms, Systems, and Applications (WASA 2007), Chicago, IL, 08/2007.
2006
Jefferson, K., C. T. Lu, X. Li, T. C. Hsu, and T. F. Chu,
"The Case for Using Spatiotemporal Traffic Data for Transportation Network Management",
Managing Travel for Planned Special Events: Tools for Practitioners, Newport Beach, California, Nov/Dec, 2006.
Lu, C. T., A. P. Boedihardjo, and J. Zheng,
"Towards an Advanced Spatial-Temporal Visualization System for the Metropolitan Washington, D.C.",
the 2006 TRB International Visualization in Transportation Symposium and Workshop, Denver, Colorado, October, 2006.
Boedihardjo, A., and C. T. Lu,
"AOID: Adaptive Online Incident Detection System",
the 9th International IEEE Conference on Intelligent Transportation Systems, September, 2006.
Lu, C. T., and A. P. Boedihardjo,
"Advanced Traffic Visualization and Mining System",
the 12th Annual ITSVA (Intelligent Transportation Society of Virginia) Conference & Exhibition, Arlington, VA, June, 2006.
Kou, Y., C. T. Lu, and D. Chen,
"Spatial Weighted Outlier Detection",
the 2006 SIAM Conference on Data Mining, Bethesda, Maryland, April, 2006.
Jin, Y., J. Dai, and C. T. Lu,
"Spatial-Temporal Data Mining in Traffic Incident Detection",
the 2006 SIAM Conference on Data Mining, Workshop on Spatial Data Mining, Bethesda, Maryland, April, 2006.
Lu, C. T., A. P. Boedihardjo, and J. Zheng,
"AITVS: Advanced Interactive Traffic Visualization System",
Proceedings of the 22nd International Conference on Data Engineering, Atlanta, GA, pp. 167- 168, April, 2006.
Kavanaugh, A., and P. Isenhour,
"Designing technology for local citizen deliberation",
Journal of Community Informatics, vol. 2, no. 2, 2006.
Kavanaugh, A. L., T. T. Zin, J. M. Carroll, J. Schmitz, M. A. Pérez-Quiñones, and P. Isenhour,
"When opinion leaders blog: New forms of citizen interaction",
2006 International Conference on Digital Government Research, vol. 151, San Diego, ACM Press, pp. 79-88, 2006.
Kavanaugh, A. L., T. T. Zin, M. B. Rosson, and J. M. Carroll,
"The Impact of the Internet on Local and distant Social Ties",
The Networked Neighborhood: The online community in context, Surrey, Springer, pp. 217-236, 2006.
Polys, Nicholas, Shupp, Lauren, Volpe, James, Glina, Vladimir, and C. and North,
"The Effects of Task, Task Mapping, and Layout Space on User Performance in Information-Rich Virtual Environments",
Technical Report TR-06-12: http://eprints.cs.vt.edu, Blacksburg, Computer Science, VT., 2006.
,
"Supporting Mixed-Reality Interfaces through X3D Specification",
Mixed Reality User Interfaces: Specification, Authoring, Adaptation (MRUI'07) - IEEE VR 2007 Workshop Proceedings, Aachen, Shaker Verlag , 2006.
Abstract
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"Securing mobile ad hoc networks with certificateless public keys",
IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 4, 10/2006.
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"MASK: An anonymous routing protocol for mobile ad hoc networks",
IEEE Transaction on Wireless Communications, vol. 5, no. 9, 09/2006.
Lou, W., and Y. Kwon,
"H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks",
IEEE Transactions on Vehicular Technology, vol. 55, no. 4, 07/2006.
Ren, K., W. Lou, K. Kim, and R. Deng,
"A novel privacy preserving authentication and access control scheme for pervasive computing environment",
IEEE Transactions on Vehicular Technology, vol. 55, no. 4, 07/2006.
Ren, K., K. Zeng, and W. Lou,
"A new approach for random key pre-distribution in large scale wireless sensor networks",
Wireless Communications & Mobile Computing (Special issue on Wireless Network Security), vol. 6, no. 3, 01/2006.
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"Location-based compromise-tolerant security mechanisms for wireless sensor networks",
IEEE Journal on Selected Areas in Communications (Special Issue on Security in Wireless Ad Hoc Networks), vol. 24, no. 2, 02/2006.
Ren, K., K. Zeng, and W. Lou,
"Fault-tolerant event boundary detection in wireless sensor networks",
IEEE Global Telecommunications Conference (GLOBECOM 2006), San Francisco, CA, 11/2006.
Ren, K., W. Lou, and P. J. Moran,
"A proactive data security framework for mission-critical sensor networks",
IEEE Military Communication Conference (MILCOM 2006), Washington, DC, 10/2006.
Ren, K., K. Zeng, W. Lou, and P. J. Moran,
"On broadcast authentication in wireless sensor networks",
International Conference on Wireless Algorithms, Systems, and Applications (WASA 2006), Xi'an, China, 08/2006.
Ren, K., W. Lou, and Y. Zhang,
"LEDS: Providing location-aware end-to-end data security in wireless sensor networks",
IEEE INFOCOM 2006, Barcelona, Spain, 04/2006.
Lou, W., W. Liu, and Y. Zhang,
"Performance optimization using multipath routing in mobile ad hoc and wireless sensor networks",
Combinatorial Optimization in Communication Networks: Kluwer, 2006.
Liu, W., Y. Zhang, W. Lou, and Y. Fang,
"A robust and energy-efficient data dissemination framework for wireless sensor networks",
ACM Wireless Networks (WINET), vol. 12, no. 4, 08/2006.
Zeng, K., W. Lou, K. Ren, and P. J. Moran,
"Energy-efficient geographic routing in environmentally powered wireless sensor networks",
IEEE Military Communication Conference (MILCOM 2006), Washington, DC, 10/2006.
Zeng, K., K. Ren, W. Lou, and P. J. Moran,
"Energy aware efficient geographical routing in lossy wireless sensor networks with environmental energy supply",
The Third International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, Ontario, Canada, 08/2006.
2005
Nambiar, S., and C. T. Lu,
"M-Payment Solutions and M-Commerce Fraud Management",
chapter in Advances in Security and Payment Methods for Mobile, Wen-Chen Hu, Chung-wei Lee, and Weidong Kou (eds.), pp. 192-213, 2005.
Lu, C. T., L. Sripada, S. Shekhar, and R. Liu,
"Transportation Data Visualization and Mining for Emergency Management",
International Journal of Critical Infrastructures, Inderscie, vol. 1, no. 2/3, pp. 170-194, 2005.
Kou, Y., C. T. Lu, A. Godrej, T. Grizzard, and H. Post,
"A Web-based Data Visualization and Analysis System for Watershed Management",
Journal of Geographic Information Science Special Issue on Distributed GIS, vol. 11, no. 1, pp. 40-49, June, 2005.
Lu, C. T., J. Zheng, and K. Jefferson,
"Cubeview: A Web-based Visualization Tool for Intelligent Transportation Systems",
ITS Virginia Journal, March, 2005.
Shekhar, S., S. Chawla, S. Ravada, A. Fetterer, X. Liu, and C. T. Lu,
"Spatial Databases – Accomplishments and Research Needs",
IEEE Transactions on Knowledge and Data Engineering, vol. 11, no. 1, pp. 45-55, Jan/Feb, 2005.
Lu, C. T., A. P. Boedihardjo, and P. Manalwar,
"Exploiting Efficient Data Mining Techniques to Enhance Intrusion Detection Systems",
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration (IEEE IRI-2005 Knowledge Acquisition and Management), Las Vegas, Nevada, pp. 512-517, August, 2005.
Mathuria, J., C. T. Lu, and J. Dai,
"An Efficient Data Model for Sensor Networks",
the 1st International Workshop on Data Mining, the 7th Joint Conference on Information Sciences, Salt Lake City, Utah, July, 2005.
Fan, W., J. Mathuria, and C. T. Lu,
"Making Data Mining Models Useful to Model Non-paying Customers of Exchange Carriers",
Proceedings of the 2005 SIAM International Conference on Data Mining, Newport Beach, CA, pp. 486-490, April, 2005.
Lu, C. T., and Y. Kou,
"A Web-based Data Analysis System for Watershed Management",
the 2005 Annual Meeting of the Associate of American Geographers(AAG), Denver, Colorado, April, 2005.
Kavanaugh, A. L., J. M. Carroll, M. B. Rosson, T. T. Zin, and D. D. Reese,
"Community Networks: Where offline communities meet online",
Journal of Computer-Mediated Communication, vol. 10, no. 4, 2005.
Kavanaugh, A. L., P. Isenhour, M. Cooper, J. M. Carroll, M. B. Rosson, and J. Schmitz,
"Information Technology in Support of Public Deliberation",
Communities and Technologies 2005, The Netherlands, Kluwer Academic Publishers, pp. 19-40, 2005.
Ren, K., K. Zeng, and W. Lou,
"On efficient key pre-distribution in wireless sensor networks",
IEEE military communication conference (MILCOM 2005): Atlantic City, NJ, 10/2005.
Ren, K., and W. Lou,
"Privacy enhanced access control in pervasive computing environments",
2nd International Conference on Broadband Networks (BroadNets 2005), Broadband Wireless Networking Symposium, Boston, MA, USA, 10/2005.
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"AC-PKI: Anonymous and certificateless public key infrastructure for mobile ad hoc networks",
International Conference on Communications (ICC’05), Seoul, Korea, 05/2005.
Zhang, Y., W. Liu, and W. Lou,
"Anonymous communications in mobile ad hoc networks",
IEEE INFOCOM 2005, Miami, FL, 03/2005.
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"Securing sensor networks with location-based keys",
IEEE Wireless Communications and Networking Conference (WCNC’2005), New Orleans, LA, 03/2005.
Liu, W., W. Lou, and Y. Fang,
"An efficient quality of service routing algorithm for delay-sensitive applications",
Computer Networks, vol. 47, no. 1, 01/2005.
Lou, W.,
"An efficient N-to-1 multipath routing protocol in wireless sensor networks",
2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2005), Washington, DC, 11/2005.
Zeng, K., K. Ren, and W. Lou,
"Geographic on-demand disjoint multipath routing in wireless ad hoc networks",
IEEE military communication conference (MILCOM 2005), Atlantic City, NJ, 10/2005.
2004
Lu, C. T., D. Chen, and Y. Kou,
"Multivariate Spatial Outlier Detection",
International Journal on Artificial Intelligence Tools, vol. 13, no. 4, pp. 801-812, December, 2004.
Huang, Y. P., G. L. Guo, and C. T. Lu,
"Using Back Propagation Model to Design a MIDI Music Classification System",
Proceedings of the International Computer Symposium, Taipei, Taiwan, pp. 253- 258, Dec, 2004.
Lu, C. T., and L. R. Liang,
"Wavelet Fuzzy Classification for Detecting and Tracking Region Outliers in Meteorological Data",
Proceedings of the 12th International Symposium on Advances in Geographic Information Systems, Washington DC,, pp. 258-265, Nov., 2004.
Nambiar, S., C. T. Lu, and L. R. Liang,
"Analysis of Payment Transaction Security in Mobile Commerce",
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration (IEEE IRI-2004), Las Vegas, Nevada, pp. 475-480, Nov, 2004.
Sripada, L., C. T. Lu, and W. Wu,
"Evaluating GML Support for Spatial Databases",
L. Sripada, C.T. Lu, W. Wu, “Evaluating GML Support for Spatial Databases,” Proceedings of the Twenty-Eighth Annual International Computer, Software & Applications Conference (COMPSAC 04), Workshop on Geographic and Biological Data Management(GBDM’ 04), Hong Kong, China, pp. 74-78, September, 2004.
Kou, Y., C. T. Lu, S. Sirwongwattana, and Y. P. Huang,
"Survey of Fraud Detection Techniques",
Proceedings of the 2004 IEEE International Conference on Networking, Sensing, and Control, Taipei, Taiwan, pp. 749-754, 2004.
Zhang, Y., W. Liu, W. Lou, and Y. Fang,
"Anonymous handshakes in mobile ad hoc networks",
IEEE MILCOM’ 2004, Monterey, CA, 10/2004.
Zhang, Y., W. Lou, and Y. Fang,
"SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks",
IEEE Wireless Communications and Networking Conference (WCNC’2004), Atlanta, GA, 03/2004.
Lou, W., W. Liu, and Y. Fang,
"SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks",
IEEE INFOCOM 2004, Hong Kong, China, 03/2004.
Liu, W., Y. Zhang, W. Lou, and Y. Fang,
"DELAR: Device/Energy/Load Aware Relaying in heterogeneous wireless ad hoc networks",
IEEE MILCOM’ 2004, Monterey, CA, 10/2004.
Liu, W., Y. Zhang, W. Lou, and Y. Fang,
"Managing wireless sensor networks with supply chain strategy",
First International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2004), Dallas, TX, 10/2004.
2003
Verstak, A., N. Ramakrishnan, L. T. Watson, J. He, C. A. Shaffer, K. K. Bae, J. Jiang, W. H. Tranter, and T. S. Rappaport,
"BSML: A binding schema markup language for data interchange in problem solving environments",
Sci. Program., vol. 11, no. 3, Amsterdam, The Netherlands, The Netherlands, IOS Press, pp. 199–224, 2003.
Shekhar, S., C. T. Lu, and P. Zhang,
"A Unified Approach to Spatial Outliers Detection",
GeoInformatica, An International Journal on Advances of Computer Science for Geographic Information System, vol. 7, no. 2, pp. 139-166, June, 2003.
Lu, C. T., D. Chen, and Y. Kou,
"Algorithms for Spatial Outlier Detection",
Proceedings of 3rd International Conference on Data Mining, Melbourne, Florida, pp. 597-600, Nov, 2003.
Lu, C. T., D. Chen, and Y. Kou,
"Detecting Spatial Outliers with Multiple Attributes",
Proceedings of the 15th International Conference on Tools with Artificial Intelligence, Sacramento, California, pp. 122-128, Nov, 2003.
Lu, C. T., Y. Kou, H. Wang, S. Shekhar, P. Zhang, and R. Liu,
"Two Web-Based Spatial Data Visualization and Mining Systems: Mapcube & Mapview",
Proceedings of the International Workshop on Next Generation Geospatial Information, National Science Foundations, Cambridge(Boston), Massachusetts, October, 2003.
Zhao, J., C. T. Lu, and Y. Kou,
"Chang Detection in Meteorological Data",
Proceedings of the 7th Joint Conference on Information Sciences, Research Triangle Park, North Carolina, pp. 509-512, Sep, 2003.
Polys, N. F.,
"Stylesheet Transformations for Interactive Visualization: Towards Web3D Chemistry Curricula",
Web3D Symposium, St. Malo, France, ACM Press, 2003.
Abstract
Lou, W., and Y. Fang,
"A survey of wireless security in mobile ad hoc networks: challenges and available solutions",
Ad Hoc Wireless Networking: Kluwer, 2003.
Lou, W., W. Liu, and Y. Fang,
"Improving network security by multipath routing",
IEEE Military Communications Conference (MILCOM 2003), Boston, MA, 10/2003.
Lou, W., W. Liu, and Y. Fang,
"A simulation study of security performance using multipath routing in ad hoc networks",
IEEE Vehicular Technology Conference (VTC Fall 03), Orlando, FL, 10/2003.
Lou, W., and Y. Fang,
"Securing data delivery in ad hoc networks",
2003 International Workshop on Cryptology and Network Security (CANS'03): Miami, FL, 09/2003.
Avudainayagam, A., W. Lou, and Y. Fang,
"DEAR: A device and energy aware routing protocol for heterogeneous ad hoc networks",
Journal of Parallel and Distributed Computing, vol. 63, no. 2, 02/2003.
Liu, W., W. Lou, X. Chen, and Y. Fang,
"A QoS-enabled MAC architecture for prioritized services in IEEE 802.11 WLANs",
IEEE GLOBECOM 2003: San Francisco, CA, 12/2003.
Liu, W., W. Lou, and Y. Fang,
"A selection function based distributed algorithm for delay-constraint least-cost unicast routing",
International Conference on Communications (ICC’03), Anchorage, AK, 05/2003.
2002
He, J., L. T. Watson, N. Ramakrishnan, C. A. Shaffer, A. Verstak, J. Jiang, K. Bae, and W. H. Tranter,
"Dynamic Data Structures for a Direct Search Algorithm",
Comput. Optim. Appl., vol. 23, no. 1, Norwell, MA, USA, Kluwer Academic Publishers, pp. 5–25, 2002.
Ramakrishnan, N., L. T. Watson, D. G. Kafura, C. J. Ribbens, and C. A. Shaffer,
"Programming Environments for Multidisciplinary Grid Communities",
Concurrency and Computation: Practice and Experience, vol. 13–15, pp. 1241–1273, Nov–December, 2002.
Shekhar, S., C. T. Lu, S. Chawla, and S. Ravada,
"Efficient Join Index Based Join Processing",
IEEE Transactions on Knowledge and Data Engineering, vol. 14, no. 6, pp. 1400-1421, Nov/Dec, 2002.
Shekhar, S., C. T. Lu, and P. Zhang,
"Detecting Graph-based Spatial Outliers",
International Journal of Intelligent Data Analysis, vol. 6, no. 3, pp. 451-468, 2002.
Shekhar, S., C. T. Lu, P. Zhang, and R. Liu,
"Data Mining for Visualization of Large Spatial Datasets",
Proceedings of the 14th IEEE International Conference On Tools with Artificial Intelligence, Washington DC, pp. 41-48, November, 2002.
Shekhar, S., C. T. Lu, R. Liu, and C. Zhou,
"CubeView: A System for Traffic Data Visualization",
Proceedings of the IEEE 5th International Conference on Intelligent Transportation Systems, Singapore, pp. 674-678, September , 2002.
Lou, W., and Y. Fang,
"Predictive caching strategy for on-demand routing protocols in ad hoc networks",
ACM Wireless Networks, vol. 8, no. 6, 11/2002.
Lou, W., and Y. Fang,
"The effects of cache organizations on the performance of on-demand routing protocols in ad hoc networks",
IEEE Military Communications Conference (MILCOM 2002), Anaheim, CA, 10/2002.
Avudainayagam, A., Y. Fang, and W. Lou,
"DEAR: A device and energy aware routing protocol for mobile ad-hoc networks",
IEEE Military Communications Conference (MILCOM’02), Anaheim, CA, 10/2002.
2001
Robert G. Capra, I. I. I., M. A. Pérez-Quiñones, and N. Ramakrishnan,
WebContext: remote access to shared context,
, Orlando, Florida, ACM Press, pp. 1-9, 2001.
Wingrave, C., D. Bowman, and N. Ramakrishnan,
"A First Step Towards Nuance-Oriented Interfaces for Virtual Environments",
Proceedings of the Virtual Reality International Conference, pp. 181-188, 2001.
Shekhar, S., C. T. Lu, X. Tan, and S. Chawla,
"Map Cube: A Visualization Tool for Spatial Data Warehouses",
chapter in Geographic Data Mining and Knowledge Discovery, Harvey J. Miller and Jiawei Han (eds.), pp. 74-109, 2001.
Shekhar, S., Y. Huang, W. Wu, C. T. Lu, and S. Chawla,
"What's Spatial About Spatial Data Mining: Three Case Studies",
chapter in Data Mining for Scientific and Engineering Applications, R. Grossman, C. Kamath, V. Kumar, R. Namburu (eds.), 2001.
Kavanaugh, A. L., and S. Patterson,
"The Impact of Community Computer Networks on Social Capital and Community Involvement",
American Behaviorah Scientist, vol. 45, no. 3, 2001.
Lou, W., and Y. Fang,
"A multipath routing approach for secure data delivery",
IEEE Military Communications Conference (MILCOM’01), Mclean, VA, 10/2001.
Lou, W., L. T. Chia, B. S. Lee, and B. Wang,
"The transmission of MPEG-2 VBR video under usage parameter control",
International Journal of Communication Systems, vol. 14, no. 2, 03/2001.
2000
Shaffer, C. A., L. T. Watson, D. G. Kafura, N. Ramakrishnan, and A. Tentner,
"Features of Problem Solving Environments for Computational Science",
Proceedings of the 2000 High Performance Computing Symposium (HPC'00), San Diego, CA, Society for Computer Simulation International, pp. 242–247, April 2000.
Ramakrishnan, N., and C. J. Ribbens,
"Mining and visualizing recommendation spaces for elliptic PDEs with continuous attributes",
ACM Trans. Math. Softw., vol. 26, pp. 254–273, 2000.
1999
Shekhar, S., C. T. Lu, X. Tan, and S. Chawla,
"Map Cube: A Visualization Tool for Spatial Data Warehouses - A Summary of Results",
NSF Workshop on Data Mining in GIS, March, 1999.
1998
Ravada, S., S. Shekhar, C. T. Lu, and S. Chawla,
"Optimizing Join Index Based Join Processing",
Proceedings of the 17th IEEE Symposium on Reliable Distributed Systems, West Lafayette, Indiana, pp. 302-310, October, 1998.
3D Interfaces for Improved Interpretation of Hard-To-Discriminate Ballistic Objects
Granting Institution: Department of Defense
Amount: $65,000
3D Visualization for Discrimination of Closely-Spaced and Spectrally-Matched Objects
Granting Institution: Department of Defense
Amount: $45,000
A High Performance Automatic Chemical Agent Classification Software for Chemical Biosensors
Granting Institution: Signal Processing Inc
Amount: $16,000
A Novel Speech Separation Approach to Speaker Identification and Speech Recognition in Noisy Environment
Granting Institution: Signal Processing Inc.
Amount: $9,500
Advanced Interactive C2 Knowledge Mining and Visualization System
Granting Institution: Department of Defense
Amount: $29,996
CIRA: Crime Information Retrieval on Android
Granting Institution: Google Inc.
Amount: $4,500
Discovering the Neural Code: Data Mining Algorithms For Network Reconstruction
Granting Institution: General Motors Corporation
Amount: $220,262
Knowledge-Based Mining Techniques for Developing Onto-Bio Thesarus for Gene/protein Names in Medical Databases
Granting Institution: Georgetown University (NIH award)
Amount: $43,011
Real-Time Biometric Tool Development
Granting Institution: Signal Processing Inc.
Amount: $12,000
Storytelling in the National Nuclear Archive
Granting Institution: Idaho National Labs
Amount: $10,866
