Computer Sciences Dept.

Tech Reports for 2009

  • Tech Report ID: TR1648
    Active Learning Literature Survey
    Burr Settles
    View report information || Download this report (PDF)

  • Tech Report ID: TR1649
    A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks
    Nicholas Kidd, Peter Lammich, Tayssir Touili, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1650
    On the Effectiveness of Pre-Acceptance Spam Filtering
    Tatsuya Mori, Holly Esquivel, Aditya Akella, Z. Morley Mao, Yinglian Xie, Fang Yu
    View report information || Download this report (PDF)

  • Tech Report ID: TR1651
    Building Cheap and Large CAMs Using BufferHash
    Ashok Anand, Steven Kappes, Aditya Akella and Suman Nath
    View report information || Download this report (PDF)

  • Tech Report ID: TR1652
    To CMP or not to CMP: Analyzing Packet Classification on Modern and Traditional Network Processors
    Randy Smith, Dan Gibson, Shijin Kong
    View report information || Download this report (PDF)

  • Tech Report ID: TR1653
    Physically-based Animation Rendering with Markov Chain Monte Carlo
    Yu-Chi Lai, Feng Liu, Charles Dyer
    View report information || Download this report (PDF)

  • Tech Report ID: TR1654
    RouteBazaar: An Economic Framework for Flexible Routing
    Holly Esquivel, Chitra Muthukrishnan, Feng Niu, Shuchi Chawla, Aditya Akella
    View report information || Download this report (PDF)

  • Tech Report ID: TR1655
    Verifying Information Flow Control Over Unbounded Processes
    William Haris, Nicholas Kidd, Sagar Chaki, Somesh Jha, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1656
    Forwardflow: Scalable, RAM-Based Dataflow Execution
    Dan Gibson and David Wood
    View report information || Download this report (PDF)

  • Tech Report ID: TR1657
    Relational Transfer in Reinforcement Learning
    Lisa Torrey
    View report information || Download this report (PDF)

  • Tech Report ID: TR1658
    Flexible Lookup Modules for Rapid Deployment of New Protocols in High-speed Routers
    Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Estan, Karthikeyan Sankaralingam
    View report information || Download this report (PDF)

  • Tech Report ID: TR1659
    MCDASH: Refinement-Based Property Verification for Machine Code
    Akash Lal, Junghee Lim, Thomas Reps
    View report information || Download this report (PDF)

  • Tech Report ID: TR1660
    Understanding the World’s Worst Spamming Botnet
    Tatsuya Mori, Holly Esquivel, Aditya Akella, Akihiro Shimoda, Shigeki Goto
    View report information || Download this report (PDF)

  • Tech Report ID: TR1661
    Adaptively Finding and Combining First-Order Rules for Large, Skewed Data Sets
    Louis Oliphant
    View report information || Download this report (PDF)

  • Tech Report ID: TR1662
    Interprocedural Analysis and the Verification of Concurrent Programs
    Akash Lal
    View report information || Download this report (PDF)

  • Tech Report ID: TR1663
    Solving Large Steiner Triple Covering Problems
    Jim Ostrowski, Jeff Linderoth, Fabrizio Rossi, Stefano Smriglio
    View report information || Download this report (PDF)

  • Tech Report ID: TR1664
    Algorithms and Software for Convex Mixed Integer Nonlinear Programs
    Pierre Bonami, Mustafa Kilinc, Jeff Linderoth
    View report information || Download this report (PDF)

  • Tech Report ID: TR1665
    Static Verification of Data-Consistency Properties
    Nicholas Kidd
    View report information || Download this report (PDF)

  • Tech Report ID: TR1666
    The Case for Fine-Grained Traffic Engineering in Data Centers
    Theophilus A Benson, Aditya Akella, Ming Zhang
    View report information || Download this report (PDF)

    Return to tech report index

  •  
    Computer Science | UW Home