When the new tech report is saved, it will be published to the Tech Report page. By default the Tech Report page displays all reports ordered by report ID descending. Marking a tech report as unpublished will not remove it from the page. This ensures that all "reserved" numbers are displayed. If you need help with the tech reports, please fill out this form.


Report ID Title Report Authors Report Date
2011-03 From a Virtualized Computing Nucleus to a Cloud Computing Universe: A Case for Dynamic Clouds Divyakant Agrawal, Sudipto Das, Amr El Abbadi
2011-02 Neptune: A Domain Specific Language for Deploying HPC Software on
Cloud Platforms
Chris Bunch, Navraj Chohan, Chandra Krintz, and Khawaja Shams
2011-01 AppScale: Open-Source Platform-as-a-Service Chris Bunch, Navraj Chohan, and Chandra Krintz
2010-26 A static, packer-agnostic filter to detect similar malware samples Gregoire Jacob, Matthias Neugschwandtner, Paolo Milani Comparetti,
Christopher Kruegel, and Giovanni Vigna
2010-25 A Comprehensive Framework for Secure Query Processing on Relational Data in The Cloud Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
2010-24 Support for Resource Constrained Microcontroller Programming by a Broad Developer Community Amichi Amar
2010-23 Memory Management for Multi-Language Multi-Runtime Systems on
Multi-Core Architectures
Michal Wegiel
2010-22 Prophiler: A fast filter for the large-scale detection of malicious web pages Davide Canali (University of California, Santa Barbara), Marco Cova (University of Birmingham, UK), Giovanni Vigna (University of California, Santa Barbara), Christopher Kruegel (University of California, Santa Barbara)
2010-21 Collection of timeseries of appetite-related sensations using a handheld computer: a case study S. Lampoudi, A. Apostolou, T. Karagiozoglou-Lampoudi
2010-20 Profile Based Sub-Image Search in Image Databases Vishwakarma Singh and Ambuj K. Singh
2010-19 SIMP: Accurate and Efficient Near Neighbor Search in High Dimensional Spaces Vishwakarma Singh and Ambuj K. Singh
2010-18 The Combinatorial BLAS: Design, Implementation, and Applications Aydın Buluç and John R. Gilbert
2010-17 Scalable Nearest Neighbors with Guarantees in Large and Composite Networks Petko Bogdanov and Ambuj K. Singh
2010-16 Language Support for Highly Resource-Constrained
Microcontroller Applications
Amichi Amar and Chandra Krintz
2010-15 Concurrent Collection as an Operating System Service for Cross-Runtime Cross-Language Memory Management Michal Wegiel and Chandra Krintz
2010-14 Understanding the Potential of Interpreter-based
Optimizations for Python
Nagy Mostafa, Chandra Krintz,Calin Cascaval, David Edelsohn,
Priya Nagpurkar, Peng Wu
2010-13 HengHa: Data Harvesting Detection on Hidden Databases Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
2010-12 TranslatAR: A Mobile Augmented Reality Translator on the Nokia N900 Victor Fragoso, Steffen Gauglitz, Shane Zamora, Jim Kleban, Matthew Turk
2010-11 Cross-Language, Type-Safe, and Transparent Object Sharing For
Co-Located Managed Runtimes
Michal Wegiel and Chandra Krintz
2010-10 Highly Parallel Sparse Matrix-Matrix Multiplication Aydın Buluç and John R. Gilbert
2010-09 Live Database Migration for Elasticity in a Multitenant Database for
Cloud Platforms
Sudipto Das, Shoji Nishimura, Divyakant Agrawal, Amr El Abbadi
2010-08 Silverline: Toward Data Confidentiality in Third-party Clouds Krishna P. N. Puttaswamy, Christopher Kruegel, and Ben Y. Zhao
2010-07 Active Cloud DB: A Database-Agnostic HTTP API to Key-Value Datastores Chris Bunch, Jonathon Kupferman, Chandra Krintz
2010-06 Dataset and Evaluation of Interest Point Detectors for Visual Tracking Steffen Gauglitz, Tobias Höllerer, Matthew Turk
2010-05 Who’s Driving this Cloud? Towards Efficient Migration for Elastic
and Autonomic Multitenant Databases
Aaron Elmore, Sudipto Das, Divyakant Agrawal, Amr El Abbadi
2010-04 ElasTraS: An Elastic, Scalable, and Self Managing Transactional
Database for the Cloud
Sudipto Das, Shashank Agarwal, Divyakant Agrawal, Amr El Abbadi
2010-03 Key-Value Datastores Comparison in AppScale Chris Bunch, Navraj Chohan, Chandra Krintz, Jovan Chohan,
Jonathan Kupferman, Puneet Lakhina, Yiming Li, Yoshihide Nomura
2010-02 Limiting the Spread of Misinformation in Social Networks Ceren Budak, Divyakant Agrawal, Amr El Abbadi
2010-01 Evaluation of four methods for real time panorama acquisition. Christopher Coffin, Sehwan Kim, and Tobias Hollerer
2009-16 Generalizing PIR for Practical Private Retrieval of Public Data Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
2009-15 Vshmem: Shared-Memory OS-Support for Multicore-based HPC systems Lamia Youseff and Rich Wolski
2009-14 Verification of String Manipulating Programs Using Multi-Track
Automata
Fang Yu, Tevfik Bultan, Oscar H. Ibarra
2009-13 Tackling Bidder Collusion in Dynamic Spectrum Auctions (Extended) Xia Zhou, Alessandra Sala, and Haitao Zheng
2009-12 Mining the Network Behavior of Bots Lorenzo Cavallaro, Christopher Kruegel, and Giovanni Vigna
2009-11 Generating Vulnerability Signatures for String Manipulating Programs
Using Automata-based Forward and Backward Symbolic Analyses
Fang Yu, Muath Alkhalaf, Tevfik Bultan
2009-10 Spectrum Allocation for Frequency-Agile Radio Networks under Physical Interference Models Lili Cao, Lei Yang, Heather Zheng
2009-09 Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez
2009-08 In-Depth Evaluation of Popular Interest Point Detectors on Video Streams Steffen Gauglitz and Tobias Höllerer
2009-07 TRUST:A General Framework for Truthful Double Spectrum Auctions (Extended) Xia Zhou and Heather Zheng
2009-06 Strongly Regular Grammars and Regular Approximation of Context-Free Languages Omer Egecioglu