Publications and creative works by faculty in the Department of Computer Science, College of Science and Mathematics, are collected here.

Follow


Submissions from 2019

Efficient Authentication of Approximate Record Matching for Outsourced Databases, Boxiang Dong and Hui Wendy Wang (2019)

Bandwidth Scheduling for Big Data Transfer with Deadline Constraint Between Data Centers, Aiqin Hou, Chase Q. Wu, Dingyi Fang, Liudong Zuo, Michelle Zhu, Xiaoyang Zhang, Ruimin Qiao, and Xiaoyan Yin (2019)

Minimum Neighborhood of Alternating Group Graphs, Yanze Huang, Limei Lin, Dajin Wang, and Li Xu (2019)

4D Bidirectional Lattice Digital Filters, Minas T. Kousoulis, Constantine Coutras, and George Antoniou (2019)

A Study on Flat and Hierarchical System Deployment for Edge Computing, Dawei Li, Boxiang Dong, En Wang, and Michelle Zhu (2019)

vSimilar: A High-Adaptive VM Scheduler Based on the CPU Pool Mechanism, Liwei Lin, Xiaodong Liu, Ruhui Ma, Jian Li, Dajin Wang, and Haibing Guan (2019)

Pivot: Privacy-Preserving Outsourcing of Text Data for Word Embedding Against Frequency Analysis Attack, Yanying Li, Wendy Hui Wang, and Boxiang Dong (2019)

Expressions of Sentiments During Code Reviews: Male vs. Female, Rajshakhar Paul, Amiangshu Bosu, and Kazi Zakia Sultana (2019)

Pragmatics and Semantics to Connect Specific Local Laws with Public Reactions, Manish Puri, Aparna Varde, and Boxiang Dong (2019)

A Study Examining Relationships Between Micro Patterns and Security Vulnerabilities, Kazi Zakia Sultana, Byron J. Williams, and Tanmay Bhowmik (2019)

A Comparison of Nano-Patterns vs. Software Metrics in Vulnerability Prediction, Kazi Zakia Sultana, Byron J. Williams, and Amiangshu Bosu (2019)

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy, Haipei Sun, Boxiang Dong, Hui Wendy Wang, Ting Yu, and Zhan Qin (2019)

Instance-Based Deep Transfer Learning, Tianyang Wang, Jun Huan, and Michelle Zhu (2019)

New Scheduling Algorithms for Improving Performance and Resource Utilization in Hadoop YARN Clusters, Yi Yao, Han Gao, Jiayin Wang, Bo Sheng, and Ningfang Mi (2019)

A Propagation Model with Defensive Measures for PLC-PC Worms in Industrial Networks, Yu Yao, Chuan Sheng, Qiang Fu, Hanxin Liu, and Dajin Wang (2019)

Optimizing Trade-Off Between Cost and Performance of Data Transfers using Bandwidth Reservation in Dedicated Networks, Liudong Zuo, Michelle Zhu, and Chia Han Chang (2019)

Submissions from 2018

Link

Development of a Human Error Taxonomy for Software Requirements: A Systematic Literature Review, Vaibhav Anu, Wenhua Hu, Jeffrey C. Carver, Gursimran Walia, and Gary L. Bradshaw (2018)

Development of a Human Error Taxonomy for Software Requirements: A Systematic Literature Review, Vaibhav Anu, Wenhua Hu, Jeffrey C. Carver, Gursimran S. Walia, and Gary Bradshaw (2018)

Verification Method for Area Optimization of Mixed-Polarity Reed-Muller Logic Circuits, Chuandong Chen, Bing Lin, and Michelle Zhu (2018)

Discovering Urban Traffic Congestion Propagation Patterns with Taxi Trajectory Data, Zhenhua Chen, Yongjian Yang, Liping Huang, En Wang, and Dawei Li (2018)

Secure Partial Encryption with Adversarial Functional Dependency Constraints in the Database-As-a-Service Model, Boxiang Dong and Hui (Wendy) Wang (2018)

Urban Legislation Assessment By Data Analytics with Smart City Characteristics, Xu Du, Diane Liporace, and Aparna Varde (2018)

Secure Similar Document Detection: Optimized Computation using the Jaccard Coefficient, Sam Forman and Bharath Kumar Samanthula (2018)

Design, Development and Testing an Academic Repository, Kevin M. Handeli and Stefan Robila (2018)

On the Reliability of Alternating Group Graph-Based Networks, Yanze Huang, Limei Lin, and Dajin Wang (2018)

Performance on Clustering Routing for Naturally Deployed Wireless Sensor Networks, Yung Fa Huang, Jyu Wei Wang, John Jenq, Hsing Chung Chen, and Chung Hsin Hsu (2018)

Using Human Error Information for Error Prevention, Wenhua Hu, Jeffrey C. Carver, Vaibhav Anu, Gursimran S. Walia, and Gary L. Bradshaw (2018)

Controversy and Sentiment: An Exploratory Study, Kateryna Kaplun, Christopher Leberknight, and Anna Feldman (2018)

Minimum Multiplier-Delay 4D Digital Filter, Minas T. Kousoulis, Constantine Coutras, and George Antoniou (2018)

Efficient Cloudlet Deployment: Local Cooperation and Regional Proxy, Dawei Li, Jie Wu, and Wei Chang (2018)

Single-Link Failure Recovery with or without Software-Defined Networking Switches, Dawei Li, Jie Wu, and Dajin Wang (2018)

Software-Defined Networking Switches for Fast Single-Link Failure Recovery, Dawei Li, Jie Wu, Dajin Wang, and Jiayin Wang (2018)

The G-Good-Neighbor Conditional Diagnosability of Arrangement Graphs, Limei Lin, Li Xu, Dajin Wang, and Shuming Zhou (2018)

Link

Training Industry Practitioners to Investigate the Human Error Causes of Requirements Faults, Kavitha Manjunath, Vaibhav Anu, Gursimran Walia, and Gary Bradshaw (2018)

DRESS: Dynamic Resource-Reservation Scheme for Congested Data-Intensive Computing Platforms, Ying Mao, Victoria Green, Jiayin Wang, Haoyi Xiong, and Zhishan Guo (2018)

PDF

Linguistic Characteristics of Censorable Language on SinaWeibo, Kei Yin Ng, Anna Feldman, Jing Peng, and Christopher Leberknight (2018)

Object Detection with Neural Models, Deep Learning and Common Sense to Aid Smart Mobility, Abidha Pandey, Manish Puri, and Aparna Varde (2018)

Digital Piracy, Technology, the Legal System and Computing Education, Bryan S. Passione and Stefan Robila (2018)

A Distributional Semantics Model for Idiom Detection the Case of English and Russian, Jing Peng, Katsiaryna Aharodnik, and Anna Feldman (2018)

Approximate Regularized Least Squares Algorithm for Classification, Jing Peng and Alex J. Aved (2018)

Multiview Boosting with Information Propagation for Classification, Jing Peng, Alex J. Aved, Guna Seetharaman, and Kannappan Palaniappan (2018)

Enhancing Autonomous Vehicles with Commonsense: Smart Mobility in Smart Cities, Priya Persaud, Aparna Varde, and Stefan Robila (2018)

Idioms: Humans or Machines, It’s All About Context, Manali Pradhan, Jing Peng, Anna Feldman, and Bianca Wright (2018)

Smart Governance Through Opinion Mining of Public Reactions on Ordinances, Manish Puri, Aparna Varde, Xu Du, and Gerard De Melo (2018)

Internet Censorship and Economic Impacts: A Case Study of Internet Outages in India, Nivitha Raveendran and Christopher Leberknight (2018)

Privacy-Preserving Outsourced Collaborative Frequent Itemset Mining in the Cloud, Bharath Kumar Samanthula (2018)

A Privacy-Aware and User-Centric Approach for Query Processing in Cloud, Bharath Kumar Samanthula, James Liporace, and Martin Issiov (2018)

Validating Requirements Reviews By Introducing Fault-Type Level Granularity: A Machine Learning Approach, Maninder Singh, Vaibhav Anu, Gursimran S. Walia, and Anurag Goswami (2018)

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers, Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, and Murat Kantarcioglu (2018)

Optimized Secure Data Aggregation in Wireless Sensor Networks, Scott A. Thompson and Bharath Kumar Samanthula (2018)

RoVEr: Robust and Verifiable Erasure Code for Hadoop Distributed File Systems, Teng Wang, Nam Son Nguyen, Jiayin Wang, Tengpeng Li, Xiaoqian Zhang, Ningfang Mi, Bin Zhao, and Bo Sheng (2018)

AutoAdmin: Automatic and Dynamic Resource Reservation Admission Control in Hadoop YARN Clusters, Zhengyu Yang, Janki Bhimani, Yi Yao, Cho Hsien Lin, Jiayin Wang, Ningfang Mi, and Bo Sheng (2018)

New YARN Non-Exclusive Resource Management Scheme through Opportunistic Idle Resource Assignment, Zhengyu Yang, Yi Yao, Han Gao, Jiayin Wang, Ningfang Mi, and Bo Sheng (2018)

Enhancing Received Signal Strength-Based Localization Through Coverage Hole Detection and Recovery, Shuangjiao Zhai, Zhanyong Tang, Dajin Wang, Qingpei Li, Zhanglei Li, Xiaojiang Chen, Dingyi Fang, Feng Chen, and Zheng Wang (2018)

AssureMR: Verifiable SQL Execution on Mapreduce, Bo Zhang, Boxiang Dong, and Wendy Hui Wang (2018)

Integrating Interactive Computer Simulations Into K-12 Earth and Environmental Science, Michelle Zhu, Nicole Panorkou, Pankaj Lal, Sowmith Etikyala, Erell Germia, Pricilla Iranah, Bharath Kumar Samanthula, and Debasmita Basu (2018)

Bandwidth Reservation Strategies for Scheduling Maximization in Dedicated Networks, Liudong Zuo, Michelle Zhu, and Chase Q. Wu (2018)

Intelligent Bandwidth Reservation for Big Data Transfer in High-Performance Networks, Liudong Zuo, Michelle Zhu, Chase Q. Wu, and Aiqin Hou (2018)

Submissions from 2017

Link

Incorporating Human Error Education into Software Engineering Courses via Error-based Inspections, Vaibhav Anu, Gursimran Walia, and Gary Bradshaw (2017)

Usefulness of a Human Error Identification Tool for Requirements Inspection: An Experience Report, Vaibhav Anu, Gursimran Walia, Gary Bradshaw, Wenhua Hu, and Jeffrey C. Carver (2017)

Using Human Error Abstraction Method for Detecting and Classifying Requirements Errors: A Live Study, Vaibhav Anu, Gursimran Walia, Gary Bradshaw, Wenhua Hu, and Jeffrey C. Carver (2017)

Issues and Opportunities for Human Error-Based Requirements Inspections: An Exploratory Study, Vaibhav Anu, Gursimran Walia, Wenhua Hu, Jeffrey C. Carver, and Gary Bradshaw (2017)

Regularized Difference Criterion for Computing Discriminants for Dimensionality Reduction, Alex J. Aved, Erik P. Blasch, and Jing Peng (2017)

Bioinformatics Database Systems, Kevin Byron, Katherine G. Herbert, and Jason T. L. Wang (2017)

Pairwise Ranking Aggregation By Non-Interactive Crowdsourcing with Budget Constraints, Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, and Hui Wang (2017)

Constructing Completely Independent Spanning Trees in Crossed Cubes, Baolei Cheng, Dajin Wang, and Jianxi Fan (2017)

The Relationship Between Code Smells and Traceable Patterns - Are They Measuring the Same Thing?, Zadia Codabux, Kazi Zakia Sultana, and Byron J. Williams (2017)

The Relationship Between Traceable Code Patterns and Code Smells, Zadia Codabux, Kazi Zakia Sultana, and Byron J. Williams (2017)

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems, Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu An Tang, Kai Zhang, Ying Lin, Zhichun Li, and Haifeng Chen (2017)

EARRING: Efficient Authentication of Outsourced Record Matching, Boxiang Dong and Hui Wang (2017)

Authenticated Outlier Mining for Outsourced Databases, Boxiang Dong, Hui Wendy Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, and Wenge Guo (2017)

Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases, Boxiang Dong and Wendy Wang (2017)

AutoPath: Harnessing Parallel Execution Paths for Efficient Resource Allocation in Multi-Stage Big Data Frameworks, Han Gao, Zhengyu Yang, Janki Bhimani, Teng Wang, Jiayin Wang, Bo Sheng, and Ningfang Mi (2017)

The NECST Program-Networking and Engaging in Computer Science and Information Technology Program, Katherine Herbert, Thomas J. Marlowe, Jerry Alan Fails, Cyril S. Ku, Kelly M. Goedert, Emily Hill, Nina Goodey, and Donal Thomas MacVeigh (2017)

Defect Prevention in Requirements using Human Error Information: An Empirical Study, Wenhua Hu, Jeffrey C. Carver, Vaibhav Anu, Gursimran Walia, and Gary Bradshaw (2017)

Understanding Human Errors in Software Requirements: An Online Survey, Wenhua Hu, Jefrey C. Carver, Gursimran Walia, Vaibhav Anu, and Gary Bradshaw (2017)

Parallel Prediction of Stock Volatility, Priscilla Jenq and John Jenq (2017)

ANCR-an Adaptive Network Coding Routing Scheme For WSNs with Different-Success-Rate Links, Xiang Ji, Anwen Wang, Chunyu Li, Chun Ma, Yao Peng, Dajin Wang, Qingyi Hua, Feng Chen, and Dingyi Fang (2017)

4D Kelly-Lochbaum Junction-Based Digital Filter, Minas T. Kousoulis, Constantine Coutras, and George Antoniou (2017)

4D Reverberator-Based Digital Filters, Minas T. Kousoulis, Constantine Coutras, and George Antoniou (2017)

Utility-Based Scheduling for Periodic Tasks with Multiple Parallelization Options, Dawei Li and Jie Wu (2017)

Towards the Tradeoffs in Designing Data Center Network Architectures, Dawei Li, Jie Wu, Zhiyong Liu, and Fa Zhang (2017)

Relating Extra Connectivity and Extra Conditional Diagnosability in Regular Networks, Limei Lin, Li Xu, Riqing Chen, Sun Yuan Hsieh, and Dajin Wang (2017)

Configuring and Controlling a Software Defined Network with a Pica8 Switch, Jason Loux, Dawei Li, and Jie Wu (2017)

LIDAR for Scribbler 2Enhancing Sensing Capabilities in an Educational Robot, Kevin S. Miller and Stefan Robila (2017)

Automatic Idiom Recognition with Word Embeddings, Jing Peng and Anna Feldman (2017)

Towards a Software Vulnerability Prediction Model using Traceable Code Patterns and Software Metrics, Kazi Zakia Sultana (2017)

Correlation Analysis Among Java Nano-Patterns and Software Vulnerabilities, Kazi Zakia Sultana, Ajay Deo, and Byron J. Williams (2017)

Evaluating Micro Patterns and Software Metrics in Vulnerability Prediction, Kazi Zakia Sultana and Byron J. Williams (2017)

SEINAA Stealthy and Effective Internal Attack in Hadoop Systems, Jiayin Wang, Teng Wang, Zhengyu Yang, Ying Mao, Ningfang Mi, and Bo Sheng (2017)

eSplash: Efficient Speculation in Large Scale Heterogeneous Computing Systems, Jiayin Wang, Teng Wang, Zhengyu Yang, Ningfang Mi, and Bo Sheng (2017)

EA2S2An Efficient Application-Aware Storage System for Big Data Processing in Heterogeneous Clusters, Teng Wang, Jiayin Wang, Son Nam Nguyen, Zhengyu Yang, Ningfang Mi, and Bo Sheng (2017)

An ELU Network with Total Variation for Image Denoising, Tianyang Wang, Zhengrui Qin, and Michelle Zhu (2017)

Uncertain Random Spectra: A New Metric for Assessing the Survivability of Mobile Wireless Sensor Networks, Li Xu, Jing Zhang, Pei Wei Tsai, Wei Wu, and Dajin Wang (2017)

Automatic and Scalable Data Replication Manager in Distributed Computation and Storage Infrastructure of Cyber-Physical Systems, Zhengyu Yang, Janki Bhimani, Jiayin Wang, David Evans, and Ningfang Mi (2017)

GReM: Dynamic SSD Resource Allocation in Virtualized Storage Systems with Heterogeneous IO Workloads, Zhengyu Yang, Jianzhe Tai, Janki Bhimani, Jiayin Wang, Ningfang Mi, and Bo Sheng (2017)

AutoReplica: Automatic Data Replica Manager in Distributed Caching and Data Processing Systems, Zhengyu Yang, Jiayin Wang, David Evans, and Ningfang Mi (2017)

Self-Adjusting Slot Configurations for Homogeneous and Heterogeneous Hadoop Clusters, Yi Yao, Jiayin Wang, Bo Sheng, Chiu C. Tan, and Ningfang Mi (2017)

Transport-Support Workflow Composition and Optimization for Big Data Movement in High-Performance Networks, Daqing Yun, Chase Q. Wu, and Michelle Zhu (2017)

Coverage Hole Detection and Recovery in Wireless Sensor Networks Based on RSSI-Based Localization, Shuangjiao Zhai, Zhanyong Tang, Dajin Wang, Zhanglei Li, Xiaojiang Chen, Dingyi Fang, and Feng Chen (2017)