When the new tech report is saved, it will be published to the Tech Report page. By default the Tech Report page displays all reports ordered by report ID descending. Marking a tech report as unpublished will not remove it from the page. This ensures that all "reserved" numbers are displayed. If you need help with the tech reports, please fill out this form.


Report ID Title Report Authors Report Date
2010-09 Live Database Migration for Elasticity in a Multitenant Database for
Cloud Platforms
Sudipto Das, Shoji Nishimura, Divyakant Agrawal, Amr El Abbadi
2010-08 Silverline: Toward Data Confidentiality in Third-party Clouds Krishna P. N. Puttaswamy, Christopher Kruegel, and Ben Y. Zhao
2010-07 Active Cloud DB: A Database-Agnostic HTTP API to Key-Value Datastores Chris Bunch, Jonathon Kupferman, Chandra Krintz
2010-06 Dataset and Evaluation of Interest Point Detectors for Visual Tracking Steffen Gauglitz, Tobias Höllerer, Matthew Turk
2010-05 Who’s Driving this Cloud? Towards Efficient Migration for Elastic
and Autonomic Multitenant Databases
Aaron Elmore, Sudipto Das, Divyakant Agrawal, Amr El Abbadi
2010-04 ElasTraS: An Elastic, Scalable, and Self Managing Transactional
Database for the Cloud
Sudipto Das, Shashank Agarwal, Divyakant Agrawal, Amr El Abbadi
2010-03 Key-Value Datastores Comparison in AppScale Chris Bunch, Navraj Chohan, Chandra Krintz, Jovan Chohan,
Jonathan Kupferman, Puneet Lakhina, Yiming Li, Yoshihide Nomura
2010-02 Limiting the Spread of Misinformation in Social Networks Ceren Budak, Divyakant Agrawal, Amr El Abbadi
2010-01 Evaluation of four methods for real time panorama acquisition. Christopher Coffin, Sehwan Kim, and Tobias Hollerer
2009-16 Generalizing PIR for Practical Private Retrieval of Public Data Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
2009-15 Vshmem: Shared-Memory OS-Support for Multicore-based HPC systems Lamia Youseff and Rich Wolski
2009-14 Verification of String Manipulating Programs Using Multi-Track
Automata
Fang Yu, Tevfik Bultan, Oscar H. Ibarra
2009-13 Tackling Bidder Collusion in Dynamic Spectrum Auctions (Extended) Xia Zhou, Alessandra Sala, and Haitao Zheng
2009-12 Mining the Network Behavior of Bots Lorenzo Cavallaro, Christopher Kruegel, and Giovanni Vigna
2009-11 Generating Vulnerability Signatures for String Manipulating Programs
Using Automata-based Forward and Backward Symbolic Analyses
Fang Yu, Muath Alkhalaf, Tevfik Bultan
2009-10 Spectrum Allocation for Frequency-Agile Radio Networks under Physical Interference Models Lili Cao, Lei Yang, Heather Zheng
2009-09 Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez
2009-08 In-Depth Evaluation of Popular Interest Point Detectors on Video Streams Steffen Gauglitz and Tobias Höllerer
2009-07 TRUST:A General Framework for Truthful Double Spectrum Auctions (Extended) Xia Zhou and Heather Zheng
2009-06 Strongly Regular Grammars and Regular Approximation of Context-Free Languages Omer Egecioglu