Computer Sciences Dept.

Tech Reports for 2007

  • Tech Report ID: TR1589
    Towards Robust Firewalls Using Approximate Packet Classification
    Qunfeng Dong, Dheeraj Agrawal, Zihui Ge, Jia Wang, Jianming Wu, Suman Banerjee
    View report information || Download this report (PDF)

  • Tech Report ID: TR1590
    Scalable Anonymization Algorithms for Large Data Sets
    Kristen LeFevre and David DeWitt
    View report information || Download this report (PDF)

  • Tech Report ID: TR1591
    A la carte: An Economic Framework for Multi-ISP Service Quality
    Cristian Estan, Aditya Akella, Suman Banerjee
    View report information || Download this report (PDF)

  • Tech Report ID: TR1592
    Understanding and Exploiting Network Traffic Redundancy
    Archit Gupta, Aditya Akella, Srinivasan Seshan, Scott Shenker and Jia Wang
    View report information || Download this report (PDF)

  • Tech Report ID: TR1593
    Amdahl's Law in the Multicore Era
    Mark D. Hill, Michael R. Marty
    View report information || Download this report (PDF)

  • Tech Report ID: TR1594
    A Case for Deconstructing Hardware Transactional Memory Systems
    Mark D. Hill, Derek Hower, Keven E. Moore, Michael M. Swift, Haris Volos and David A. Wood
    View report information || Download this report (PDF)

  • Tech Report ID: TR1595
    OLAP over Imprecise Data With Domain Constraints
    Doug Burdick, AnHai Doan, Raghu Ramakrishnan, Shivakumar Vaithyanathan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1596
    Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge
    Bee-Chung Chen, Kristen LeFevre and Raghu Ramakrishnan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1597
    Diagnosing Wireless Packet Losses in 802.11: Separating Collision from Weak Signal
    Shravan Rayanchu, Arunesh Mishra, Dheeraj Agrawal, Sharad Saha, Suman Banerjee
    View report information || Download this report (PDF)

  • Tech Report ID: TR1598
    Interprocedural Analysis of Concurrent Programs Under a Context Bound
    Akash Lal, Tayssir Touili, Nicholas Kidd, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1599
    Characterizing Malcode Evolution
    Archit Gupta, Pavan Kuppili, Aditya Akella and Paul Barford
    View report information || Download this report (PDF)

  • Tech Report ID: TR1600
    A Quantum Time-Space Lower Bound for the Counting Hierarchy
    Dieter van Melkebeek and Thomas Watson
    View report information || Download this report (PDF)

  • Tech Report ID: TR1601
    A New Time-Space Lower Bound for Nondeterministic Algorithms Solving Tautologies
    S. Diehl, D. van Melkebeek, and R. Williams
    View report information || Download this report (PDF)

  • Tech Report ID: TR1602
    Numeric Program Analysis Techniques with Applications to Array Analysis and Library Summarization
    Denis Gopan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1603
    WYSINWYX: What You See Is Not What You Execute
    Gogul Balakrishnan
    View report information || Download this report (PDF)

  • Tech Report ID: TR1604
    TRAC: An Architecture for Real-Time Dissemination of Vehicular Traffic Information
    Shravan Rayanchu, Sulabh Agarwal, Arunesh Mishra, Suman Banerjee, Samrat Ganguly
    View report information || Download this report (PDF)

  • Tech Report ID: TR1605
    Adapting to Intermittent Faults in Multicore Systems
    Philip M. Wells, Koushik Chakraborty, and Gurindar S. Sohi
    View report information || Download this report (PDF)

  • Tech Report ID: TR1606
    Serializing Instructions in System-Intensive Workloads: Amdahls Law Strikes Again
    Philip Wells, Gurindar Sohi
    View report information || Download this report (PDF)

  • Tech Report ID: TR1607
    A Case for an Over-provisioned Multicore System: Energy Efficient Processing of Multithreaded Programs
    Koushik Chakraborty, Philip Wells and Gurindar Sohi
    View report information || Download this report (PDF)

  • Tech Report ID: TR1608
    Metadata-Based Parallelization of Program Instrumentation
    Matthew D. Allen and Gurindar S. Sohi
    View report information || Download this report (PDF)

  • Tech Report ID: TR1609
    Learning Ensembles of First Order Clauses That Optimize Precision Recall Curves
    Mark H. Goadrich
    View report information || Download this report (PDF)

  • Tech Report ID: TR1611
    Design and Implementation of Signatures for Transactional Memory Systems
    Daniel Sanchez
    View report information || Download this report (PDF)

  • Tech Report ID: TR1612
    Novel Uses for Machine Learning and Other Computational Methods for the Design and Interpretation of Genetic Microarrays
    Michael N. Molla
    View report information || Download this report (PDF)

  • Tech Report ID: TR1613
    Population Monte Carlo Samplers for Rendering
    ShaoHua Fan, Yu-Chi Lai, Stephen Chenney
    View report information || Download this report (PDF)

  • Tech Report ID: TR1614
    Population Monte Carlo Path Tracing
    Yu-Chi Lai, ShaoHua Fan, Charcles Dyer
    View report information || Download this report (PDF)

  • Tech Report ID: TR1615
    Learning Expressive Computational Models of Gene Regulatory Sequences and Responses
    Keith Noto
    View report information || Download this report (PDF)

  • Tech Report ID: TR1616
    Improved Asymptotic Formulas for Counting Correlation-Immune Boolean Functions
    Eric Bach
    View report information || Download this report (PDF)

  • Tech Report ID: TR1617
    Probabilistic Methods for Interpreting Electron-Density Maps
    Frank DiMaio
    View report information || Download this report (PDF)

  • Tech Report ID: TR1618
    Heap Typability is NP-Complete
    Matt Elder, Ben Liblit
    View report information || Download this report (PDF)

  • Tech Report ID: TR1619
    A New Model for Managing Configuration Data
    Adwait N. Tumbde and Michael M. Swift
    View report information || Download this report (PDF)

  • Tech Report ID: TR1620
    AFIQ: An Accounting Framework for Inter-Domain QoS with Limited Trust
    Cristian Estan, Aditya Akella, Suman Banerjee
    View report information || Download this report (PDF)

  • Tech Report ID: TR1621
    Advanced Querying for Property Checking
    Nicholas Kidd, Akash Lal, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1622
    A System for Generating Static Analyzers for Machine Instructions
    Junghee Lim, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1623
    Static Detection of Atomic-Set-Serializability Violations
    Nicholas Kidd, Thomas Reps, Julian Dolby, and Mandana Vaziri
    View report information || Download this report (PDF)

  • Tech Report ID: TR1624
    Towards the Analysis of Transactional Software
    Nicholas Kidd, Kevin Moore, Thomas Reps, and David Wood
    View report information || Download this report (PDF)

  • Tech Report ID: TR1625
    MapReduce for the Cell B.E. Architecture
    Marc de Kruijf and Karthikeyan Sankaralingam
    View report information || Download this report (PDF)

    Return to tech report index

  •  
    Computer Science | UW Home