When the new tech report is saved, it will be published to the Tech Report page. By default the Tech Report page displays all reports ordered by report ID descending. Marking a tech report as unpublished will not remove it from the page. This ensures that all "reserved" numbers are displayed. If you need help with the tech reports, please fill out this form.


Report ID Title Report Authors Report Date
2005-13 Using Association Rules for Fraud Detection in Web Advertising Networks Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi
2005-12 Toward Full-System, Cycle-Accurate Simulation of Sensor Networks Ye Wen, Selim Gurun, Navraj Chohan, Rich Wolski, and Chandra Krintz
2005-11 MARS: A Matching and Ranking System for XML Content and Structure Retrieval S. Alireza Aghili, Hua-Gang Li, Divyakant Agrawal, and Amr El Abbadi
2005-10 TWIX: Approximate and Exact Twig Structure and Content Matching over XML Document Collections using Binary Labeling S. Alireza Aghili, Hua-Gang Li, Divyakant Agrawal, and Amr El Abbadi
2005-09 Predicting Bounds on Queuing Delay in Space-shared Computing Environments John Brevik, Dan Nurmi, and Rich Wolski
2005-06 Image-space Correction of AR Registration Errors Using Graphics Hardware Stephen DiVerdi and Tobias Hollerer
2005-05 Real-time Rendering with Wavelet-Compressed Multi-Dimensional Datasets on
the GPU
Stephen DiVerdi, Nicola Candussi, and Tobias Hollerer
2005-04 AutoDVS: An Automatic, General-Purpose, Dynamic Clock Scheduling System for Hand-Held Devices S. Gurun and C. Krintz
2005-03 DIST: A Distributed Index Structure for Plume Tracking in Sensor Networks A. Meka and A. K. Singh
2005-02 Distributed Spatial Clustering in Sensor Networks A. Meka and A. K. Singh
2004-28 Combining Dynamic Physical and Virtual Illumination in Augmented Reality Stephen DiVerdi and Tobias Hollerer
2004-27 Quorum: Providing Flexible Quality of Service for Large-ScaleInternet Services Josep M. Blanquer, Antoni Batchelli, Klaus Schauser and Rich Wolski
2004-26 Real-time Nondestructive Structural Health Monitoring using Support Vector Machines and Wavelets A. Bulut, A. K. Singh, P. Shin, H. Jasso, T. Fountain, L. Yan, and A. Elgamal
2004-25 Model-Based Checkpoint Scheduling for Volatile Resource Environments Daniel Nurmi, Rich Wolski, and John Brevik
2004-24 Efficient On-Stack Replacement for Aggressive Specialization of Java Programs Sunil Soman and Chandra Krintz
2004-23 Duplicate Detection in Click Streams Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi
2004-22 Automated Verification of Access Control Policies Graham Hughes and Tevfik Bultan
2004-21 Phase-Aware Remote Profiling Priya Nagpurkar, Chandra Krintz, and Tim Sherwood
2004-20 A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks Yuan Sun, Elizabeth M. Belding-Royer, Xia Gao and James Kempf
2004-19 Preemptive RAID Scheduling Zoran Dimitrijevic, Raju Rangaswami, and Edward Chang