My UW
|
UW Search
Computer Science Home Page
|
|
|
Tech Reports for 2009
Tech Report ID: TR1648
Active Learning Literature Survey
Burr Settles
View report information || Download this report (PDF)
Tech Report ID: TR1649
A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks
Nicholas Kidd, Peter Lammich, Tayssir Touili, Thomas Reps
View report information || Download this report (PDF)
Tech Report ID: TR1650
On the Effectiveness of Pre-Acceptance Spam Filtering
Tatsuya Mori, Holly Esquivel, Aditya Akella, Z. Morley Mao, Yinglian Xie, Fang Yu
View report information || Download this report (PDF)
Tech Report ID: TR1651
Building Cheap and Large CAMs Using BufferHash
Ashok Anand, Steven Kappes, Aditya Akella and Suman Nath
View report information || Download this report (PDF)
Tech Report ID: TR1652
To CMP or not to CMP: Analyzing Packet Classification on Modern and Traditional Network Processors
Randy Smith, Dan Gibson, Shijin Kong
View report information || Download this report (PDF)
Tech Report ID: TR1653
Physically-based Animation Rendering with Markov Chain Monte Carlo
Yu-Chi Lai, Feng Liu, Charles Dyer
View report information || Download this report (PDF)
Tech Report ID: TR1654
RouteBazaar: An Economic Framework for Flexible Routing
Holly Esquivel, Chitra Muthukrishnan, Feng Niu, Shuchi Chawla, Aditya Akella
View report information || Download this report (PDF)
Tech Report ID: TR1655
Verifying Information Flow Control Over Unbounded Processes
William Haris, Nicholas Kidd, Sagar Chaki, Somesh Jha, Thomas Reps
View report information || Download this report (PDF)
Tech Report ID: TR1656
Forwardflow: Scalable, RAM-Based Dataflow Execution
Dan Gibson and David Wood
View report information || Download this report (PDF)
Tech Report ID: TR1657
Relational Transfer in Reinforcement Learning
Lisa Torrey
View report information || Download this report (PDF)
Tech Report ID: TR1658
Flexible Lookup Modules for Rapid Deployment of New Protocols in High-speed Routers
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Estan, Karthikeyan Sankaralingam
View report information || Download this report (PDF)
Tech Report ID: TR1659
MCDASH: Refinement-Based Property Verification for Machine Code
Akash Lal, Junghee Lim, Thomas Reps
View report information || Download this report (PDF)
Tech Report ID: TR1660
Understanding the World’s Worst Spamming Botnet
Tatsuya Mori, Holly Esquivel, Aditya Akella, Akihiro Shimoda, Shigeki Goto
View report information || Download this report (PDF)
Tech Report ID: TR1661
Adaptively Finding and Combining First-Order Rules for Large, Skewed Data Sets
Louis Oliphant
View report information || Download this report (PDF)
Tech Report ID: TR1662
Interprocedural Analysis and the Verification of Concurrent Programs
Akash Lal
View report information || Download this report (PDF)
Tech Report ID: TR1663
Solving Large Steiner Triple Covering Problems
Jim Ostrowski, Jeff Linderoth, Fabrizio Rossi, Stefano Smriglio
View report information || Download this report (PDF)
Tech Report ID: TR1664
Algorithms and Software for Convex Mixed Integer Nonlinear Programs
Pierre Bonami, Mustafa Kilinc, Jeff Linderoth
View report information || Download this report (PDF)
Tech Report ID: TR1665
Static Verification of Data-Consistency Properties
Nicholas Kidd
View report information || Download this report (PDF)
Tech Report ID: TR1666
The Case for Fine-Grained Traffic Engineering in Data Centers
Theophilus A Benson, Aditya Akella, Ming Zhang
View report information || Download this report (PDF)
Return to tech report index
|
|
|