Computer Sciences Dept.

Tech Reports for 2005

  • Tech Report ID: TR1520
    Caching with "Good Enough" Currency, Consistency, and Completeness
    Hongfei Guo, Per-Ake Larson, Raghu Ramakrishnan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1521
    Multidimensional K-Anonymity
    Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1522
    Formalizing Attack Mutation for NIDS Testing
    Shai Rubin, Somesh Jha, Barton P. Miller
    View report information || Download this report (PDF)

  • Tech Report ID: TR1523
    Graph Isomorphism for Colored Graphs with Color Multiplicity Bounded by 3
    Akash Lal, Dieter van Melkebeek
    View report information || Download this report (PDF)

  • Tech Report ID: TR1524
    Thread-Level Transactional Memory
    Kevin E. Moore, Mark D. Hill, David A. Wood
    View report information || Download this report (PDF)

  • Tech Report ID: TR1525
    Toward Comprehensive Traffic Generation for Online IDS Evaluation
    Joel Sommers, Vinod Yegneswaran, Paul Barford
    View report information || Download this report (PDF)

  • Tech Report ID: TR1526
    Distributed Certificate-Chain Discovery in SPKI/SDSI
    Stefan Schwoon, Hao Wang, Somesh Jha, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1527
    Reducing the Dependence of Trust-Management Systems on PKI
    Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine
    View report information || Download this report (PDF)

  • Tech Report ID: TR1529
    Detecting Collisions in Graph-Driven Motion Synthesis
    Mankyu Sung, Stephen Chenney, Michael Gleicher
    View report information || Download this report (PDF)

  • Tech Report ID: TR1530
    Semi-Supervised Learning Literature Survey
    Xiaojin (Jerry) Zhu
    View report information || Download this report (PDF)

  • Tech Report ID: TR1531
    Strengthening Software Self-Checksumming via Self-Modifying Code
    Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger
    View report information || Download this report (PDF)

  • Tech Report ID: TR1532
    Verifying Concurrent Message-Passing C Programs with Recursive Calls
    Sagar Chaki, Edmund Clarke, Nicholas Kidd, Thomas Reps, Tayssir Touili
    View report information || Download this report (PDF)

  • Tech Report ID: TR1533
    Recovery of Variables and Heap Structure in x86 Executables
    Gogul Balakrishnan, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1534
    A Loop-Aware Search Strategy for Automated Performance Analysis
    Eli D. Collins, Barton P. Miller
    View report information || Download this report (PDF)

  • Tech Report ID: TR1535
    BTrace: Path Optimization for Debugging
    Akash Lal, Junghee Lim, Marina Polishchuk, Ben Liblit
    View report information || Download this report (PDF)

  • Tech Report ID: TR1536
    Aggregate Sharing in Stream Databases
    Lidan Wang, Jeffrey Freschl
    View report information || Download this report (PDF)

  • Tech Report ID: TR1537
    Badger: An Entropy-Based Web Search Clustering System with Randomization and Voting
    Lidan Wang, Chloe Whyte Schulze
    View report information || Download this report (PDF)

  • Tech Report ID: TR1538
    Data-Driven Group Animation
    Yu-Chi Lai, Stephen Chenney, Shaohua Fan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1539
    Malware Normalization
    Mihai Christodorescu, Johannes Kinder, Somesh Jha, Stefan Katzenbeisser, Helmut Veith
    View report information || Download this report (PDF)

  • Tech Report ID: TR1541
    End-Biased Samples for Join Cardinality Estimation
    Cristian Estan, Jeffrey F. Naughton
    View report information || Download this report (PDF)

  • Tech Report ID: TR1542
    Approximating Streaming Window Joins Under CPU Limitations
    Ahmed Ayad, Jeffrey Naughton, Stephen Wright, Utkarsh Srivastava
    View report information || Download this report (PDF)

  • Tech Report ID: TR1543
    On Effective Model-Based Intrusion Detection
    Jonathon Giffin, Somesh Jha, Barton Miller
    View report information || Download this report (PDF)

  • Tech Report ID: TR1544
    Retrofitting Legacy Code for Authorization Policy Enforcement
    Vinod Ganapathy, Trent Jaeger, Somesh Jha
    View report information || Download this report (PDF)

  • Tech Report ID: TR1545
    Database Support for Matching: Limitations and Opportunities
    Ameet Kini, Srinath Shankar, David DeWitt, Jeffrey Naughton
    View report information || Download this report (PDF)

  • Tech Report ID: TR1546
    A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
    Joel Sommers, Paul Barford, Walter Willinger
    View report information || Download this report (PDF)

  • Tech Report ID: TR1547
    On Filtering of DDoS Attacks Based on Source Address Prefixes
    Gary Pack, Jaeyoung Yoon, Eli Collins, Cristian Estan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1548
    Recency-Abstraction for Heap-Allocated Storage
    Gogul Balakrishnan, Thomas Reps
    View report information || Download this report (PDF)

    Return to tech report index

  •  
    Computer Science | UW Home