When the new tech report is saved, it will be published to the Tech Report page. By default the Tech Report page displays all reports ordered by report ID descending. Marking a tech report as unpublished will not remove it from the page. This ensures that all "reserved" numbers are displayed. If you need help with the tech reports, please fill out this form.


Report ID Title Report Authors Report Date
2009-05 Interactive Manipulation of Large Graph Layouts Peterson Trethewey, Tobias Hollerer
2009-04 Thread Cooperation in Multicore Architectures for Frequency
Counting Over Multiple Data Streams
Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi
2009-03 Anonymizing Edge-Weighted Social Network Graphs Sudipto Das, Ömer Egecioglu, and Amr El Abbadi
2009-02 AppScale: Scalable and Open AppEngine Application Development and Deployment Navraj Chohan, Chris Bunch, Sydney Pang, Chandra Krintz, Nagy Mostafa, Sunil Soman, Rich Wolski
2009-01 On Stateless Multicounter Machines Omer Egecioglu and Oscar H. Ibarra
2008-19 Offline Framework for Performance Comparison of Software
Revisions
Nagy Mostafa and Chandra Krintz
2008-18 Clouded Data: Comprehending Scalable Data Management Systems Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi
2008-17 Inter-OS Communication on Highly Parallel Multi-Core Architectures Lamia Youseff, Dmitrii Zagorodnov, and Rich Wolski
2008-16 Bidirectional interface grammars Graham Hughes and Tevfik Bultan
2008-15 Gaussian Elimination Based Algorithms on the GPU Aydin Buluc, John R. Gilbert, Ceren Budak
2008-14 Hardware Assisted Compression in Wireless Sensor Networks Navraj Chohan
2008-13 Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao
2008-12 Protecting Anonymity in Dynamic Peer-to-Peer Networks Krishna Puttaswamy, Alessandra Sala, Christo Wilson, Ben Y. Zhao
2008-11 Rome: Performance and Anonymity using Route Meshes Krishna P. N. Puttaswamy, Alessandra Sala, Omer Egecioglu, and Ben Y. Zhao
2008-10 Eucalyptus : A Technical Report on an Elastic Utility Computing Archietcture
Linking Your Programs to Useful Systems
Daniel Nurmi, Rich Wolski, Chris Grzegorczyk, Graziano Obertelli, Sunil
Soman, Lamia Youseff, Dmitrii Zagorodnov
2008-09 CycleNet: Empirical Analysis of 802.15.4 in Mobile Scenarios Navraj Chohan and Camilla Fiorese
2008-08 CoTS: A Scalable Framework for Parallelizing Frequency Counting over Data Streams Sudipto Das, Shyam Antony, Divyakant Agrawal, Amr El Abbadi
2008-07 Memory Management for Multi-Application Managed Runtime Environments Sunil Soman
2008-06 Efficient Algorithms and Routing Protocols for Handling Transient Single Node Failures Amit M. Bhosle, Teofilo F. Gonzalez
2008-05 Analysis, Detection, and Exploitation of Phase Behavior in Java Programs Priya Nagpurkar
2008-04 Efficient Skyline Computation over Ad-hoc Aggregations Shyam Antony, Ping Wu, Divyakant Agrawal, Amr El Abbadi
2008-03 Green WLANs: On-demand WLAN Infrastructures Amit P. Jardosh, Konstantina Papagiannaki, Elizabeth M. Belding,
Kevin C. Almeroth, Gianluca Iannaccone, Bapi Vinnakota
2008-02 Exploiting Adaptation in a Java Virtual Machine
to Enable Both Programmer Productivity and
Performance for Heterogeneous Devices
Lingli Zhang
2008-01 Securing Structured Overlays Against Identity Attacks Krishna P. N. Puttaswamy, Ben Y. Zhao and Haitao Zheng
2007-12 Searching for Rare Objects Using Index Replication Krishna P. N. Puttaswamy, Alessandra Sala, and Ben Y. Zhao
2007-11 Environmental Tomography: Modeling the Environment with Mobile Phones Stacy Patterson, Bassam Bamieh, and Amr El Abbadi
2007-10 QUIP: Querying Significant Patterns from Image Databases Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Singh, Chris
Banna, Geoffrey P. Lewis, Steven K. Fisher
2007-09 VARQ: Implementing Probabilistic Advanced Reservations for
Batch-scheduled Parallel Machines
Dan Nurmi, John Brevik, and Rich Wolski
2007-07 DIOMEDES: An integrated automotive diagnostics system
that is customizable, low-cost, and non-intrusive built
on a wireless sensor network
Erik Peterson
2007-06 Integrating Condor and Queue Bounds Estimation from Time
Series (QBETS) Into the UCLA Grid Portal
Kerby Johnson
2007-05
Modeling, Predicting and Reducing Energy
Consumption in Resource Restricted Computers
Selim Gurun
2007-04 Language and Virtual Machine Support
for Efficient Fine-Grained Futures in Java
Lingli Zhang, Chandra Krintz, Sunil Soman
2007-03 Approximation Algorithms for the Minimum-Length Corridor and
Related Problems
Arturo Gonzalez-Gutierrez and Teofilo F. Gonzalez
2007-02 MIST: Distributed Indexing and Querying in Sensor
Networks using Statistical Models
Arnab Bhattacharya, Anand Meka and Ambuj K. Singh
2007-01 Optimization Techniques for Reactive Network Monitoring Ahmet Bulut, Nick Koudas, Anand Meka, Ambuj K. Singh, Divesh Srivastava
2006-15 GraphRank: Statistical Modeling and Mining of Significant Subgraphs
in the Feature Space
Huahai He and Ambuj K. Singh
2006-14 A Game-Theoretic Analysis of Wireless Access Point Selection by
Mobile Users
Kimaya Mittal, Elizabeth Belding and Subhash Suri
2006-13 Improved Throughput Bounds for Interference-aware Routing in
Wireless Networks
Chiranjeeb Buragohain, Subhash Suri, Csaba D. Toth and
Yunhong Zhou
2006-11 Realizability of Interactions in Collaboration Diagrams Tevfik Bultan and Xiang Fu
2006-10 Paravirtualization For HPC Systems Lamia Youseff, Rich Wolski, Brent Gorda, Chandra Krintz
2006-09 Convergence Analysis of Scalable Gossip Protocols Stacy Patterson, Bassam Bamieh, and Amr El Abbadi
2006-08 Energy Characterization of the Stargate Sensor Network Gateway Selim Gurun and Chandra Krintz
2006-07 Full System Energy Estimation for Sensor Network Gateways Selim Gurun and Chandra Krintz
2006-06 Hide and Seek: Detecting Hit Inflation Fraud in Streams of Web Advertising
Networks
Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi
2006-05 Highly Dependable Concurrent Programming Using Design for Verification Aysu Betin-Can and Tevfik Bultan
2006-04 Pairwise Disjoint Shortest Paths in the n-Cube and Related Problems Teofilo F. Gonzalez and David Serena
2006-03 Behavior-based Spyware Detection Greg Banks, Giovanni Vigna, and Richard A. Kemmerer
2006-02 Remote Performance Monitoring (RPM): Full-System Power,
Energy, and Performance Profiling for Resource-Constrained Devices
Selim Gurun, Priya Nagpurkar, and Chandra Krintz
2006-01 S^2DB: A Novel Simulation-Based Debugger for Sensor Network Applications Ye Wen and Rich Wolski
2005-30 DiSenS: Scalable Distributed Sensor Network Simulation Ye Wen, Rich Wolski, and Gregory Moore
2005-29 Linux Kernel Specialization for Scientific Application
Performance
Lamia M. Youseff, Rich Wolski, Chandra Krintz
2005-28 Synchronizability of Conversations Among Web Services Xiang Fu, Tevfik Bultan, Jianwen Su
2005-27 SCHMIB: Segregating Clusters Hierarchically Making Improved Bounds John Brevik, Daniel Nurmi, Rich Wolski
2005-26 Predicting Bounds on Queuing Delay for Batch-scheduled Parallel Machines John Brevik, Daniel Nurmi, Rich Wolski
2005-25 Uniform Generation of Anonymous and Neutral Preference Profiles for
Social Choice Rules
Omer Egecioglu
2005-24 FLUX: Fuzzy Content and Structure Matching of XML Range Queries using Structural Bloom Filters Hua-Gang Li, Alireza Aghili, Divyakant Agrawal, and Amr El Abbadi
2005-23 Efficient Computation of Frequent and Top-k Elements in Data Streams Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi
2005-16 Indexing Spatially Sensitive Distance Measures Using Multi-Resolution Lower Bounds Vebjorn Ljosa, Arnab Bhattacharya, and Ambuj K. Singh
2005-15 3D Hand Pose Reconstruction with ISOSOM Haiying Guan and Matthew Turk
2005-14 Efficient Processing of Distributed Top-k Queries Hailing Yu, Hua-Gang Li, Ping Wu, Divyakant Agrawal, and Amr El Abbadi