a.    Scholarly publications published or accepted for publication

 

1.     G. Allen, P. Bogden, G. Creager, C. Dekate, C. Jesch, H. Kaiser, J. MacLaren, W. Perrie, G. Stone, and X. Zhang. Gis and integrated coastal ocean forecasting. Concurrency and Computation: Practice and Experience, 20:1637–1651, 2008.

 

2.     M. Balman and T. Kosar. Dynamic adaptation of parallelism level in data transfer scheduling. In Proceedings of the 2nd International Workshop on Adaptive Systems in Heterogeneous Environments, Tsukuba, Japan, 2009.

 

3.      M. Balman and T. Kosar. Error detection and error classification: Failure awareness in data transfer scheduling. To appear in the International Journal of Autonomic Computing (IJAC), 2010.

 

4.     M. Balman and T. Kosar. Early error detection and classiÞcation in data transfer scheduling. In Proceedings of the 3rd International Workshop on P2P, Parallel, Grid and Internet Computing, Tsukuba, Japan, 2009.

 

5.     M. Balasubramanian, S. Zabic, L. Zangwill, H. Thompson, P. Wolenski, S.S. Iyengar, and BB. Karki. A framework for detecting glaucomatous progression in the optic nerve head of an eye using proper orthogonal decomposition. IEEE Transactions on Information Technology in Biomedicine, 2009. Accepted.

 

6.     Kiran S. Balagani and Vir V. Phoha, ÒOn the feature selection criteria based on an approximation of multi-dimensional mutual information.Ó To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence.  

7.     Kiran S. Balagani and Vir V. Phoha, ÒOn the feature selection criteria based on an approximation of multi-dimensional mutual information.Ó To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence.  

 

8.     K.S. Balagani, V.V. Phoha, S.S. Iyengar, and N. Balakrishnan. On Guo and NixonÕs criterion for feature subset selection: assumptions, implications, and alternative options. Accepted (to appear in 2010) in the IEEE Transactions on Systems, Man, and Cybernetics - Part A.

 

9.     A. Gehani, M. Kim, and J. Zhang, [UTF-8?]‰ÛśSteps toward managing lineage metadata in grid [UTF-8?]Clusters‰Ûť, in Proceedings of the 1st Workshop on Theory and Practice of Provenance in the 7th USENIX Conference on File and Storage Technologies (FAST), 2009.

 

10.  J.G. Buchart III, J. Kanno, R.R. Selmic, and V. Phoha. Detecting coverage holes in wireless sensor networks. In Proceedings of the 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, 2009.

 

11.  C. A. Duncan, J. Kanno, and R. R. Selmic, ÒDetecting (Approximate) Hole Coverage Areas in Wireless Sensor Networks,Ó Proc. Cyberspace Research Workshop, Shreveport, Louisiana, June 2009.

 

12.  M. Gates, G. Pepper, A. K. Mitra, C. Hu, S. Zein-Sabatto, T. Rogers, R. R. Selmic, E. Hamdan, M. Malkani, ÒUnmanned vehicle technology for networked non-line-of-sight sensing applications,Ó submitted to SPIE Defense and Security 2010, Orlando, FL.

 

13.  A. Gehani, M. Kim, and J. Zhang. Steps toward managing lineage metadata in grid clusters. In Proceedings of the 1st Workshop on Theory and Practice of Provenance in the 7th USENIX Conference on File and Storage Technologies (FAST), 2009.

 

14.  T. Goodwin, Lt. R. Carr, A.K. Mitra, and R.R. Selmic. Coupled sensor/platform control design for low-level chemical detection with position-adaptive micro-uavs. In Proceedings of the SPIE Defense and Security, Orlando, Florida, 2009.

 

15.   J. Gourd. A web services based approach to mobile agent migration and security. The J of Mgmt and Eng Integration, 2009. Accepted.

 

16.   J. Gourd and G. Vert. Hyper Distribution of Contextual Information--The Consumer Producer Problem. In Global Contextual Processing, Its Constraints and Theoretical Operation, pages 165-259. Taylor and Francis, 2009

 

17.  A. Hutanu, T. Kosar, and G. Allen. A ßexible asynchronous rpc system architecture for h-performance remote data access. In Proceedings of the High Performance and Distributed Computing Conference (HPDCÕ09), Munich, Germany, 2009. Accepted.

 

18.  V. Iyer, S.S. Iyengar, N. Balakrishnan, V. Phoha, and G.R. Murthy. Distributed source coding for sensor data model and estimation of cluster head errors using bayesian and k-near neighborhood classiÞers in deployment of dense wireless sensor networks. In Proceedings of the SENSORCOMM conference, Athens/Vouliagmeni, Greece, 2009.

 

19.  V. Iyer, S.S. Iyengar, N. Balakrishnan, V. Phoha, and M.B. Srinivas. Farms: Fusionable ambient renewable macs. In Proceedings of the IEEE Sensors Applications Symposium, pages 169–174, 2009.

 

20.  D. Jethwa, R.R. Selmic, and F. Figueroa. Real-time implementation of intelligent actuator control with a transducer health monitoring capability. Intl J of Factory Automation, Robotics, and Soft Computing, 1:5–10, 2009.

 

21.  L. Jiang, G. Allen, and Q. Chen. Towards an integrated problem-solving environment for hydrid numerical models with statistical learning components. In Proceedings of Teragrid, 2009.

 

22.  J. Kackley and J. Gourd. A ßow direction algorithm for geometry-based networks utilizing a prioritized bfs method. The J of Mgmt and Eng Integration, 2008. Accepted.

 

23.  J. Kackley, J. Gourd, and M. Gambrell. Increasing p2p gameplay performance utilizing i3p. In GameOn'NA'09: 5th International North American Conference on Intelligent Games and Simulation, Atlanta, GA, August 2009.

 

24.  J. Kanno, J. G. Buchart III, R. R. Selmic and V. Phoha, ÒDetecting coverage holes in wireless sensor networks,Ó Proc. 17th Mediterranean Conference on Control and Automation, Thessaloniki, Greece, June 24-26, 2009.

 

25.  J. Kanno, R. R. Selmic, J. G. Buchart, and V. Phoha, ÒDetecting coverage holes in wireless sensor networks,Ó submitted to IEEE Transactions on Mobile Computing, September 2009.

 

26.  M.E. Karim, V. Phoha, and R. Mathur. Detecting transformation of codes in metamorphic malwares. J in Computer Virology, 2009. Accepted.

 

27.  M.E. Karim, V. Phoha, and M.A. Sultan. An immunological model for detecting bot activities. In Proceedings of the SPIE Cybersensing Conference, 2009.

 

28.  M. E. Karim, V. V. Phoha, "A calculus for reasoning about contextual information and similarity," in Global Contextual Processing, Its Constraints and Theoretical Operation, by
G. Vert, S.S. Iyengar, V. Phoha, CRC Press 2010 (expected).

 

29.  D. Katz, G. Allen, R. Cortez, C. Cruz-Neira, R. Gottumukkala, Z. Greenwood, L. Guice, S. Jha, R. Kolluru, T. Kosar, L. Leger, H. Liu, C. McMahon, J. Nabryski, B. Rodriguez-Milla, E. Sediel, G. Speyrer, M. StubbleÞeld, B. Voss, and S. Whittenburg. Louisiana: A model for advancing louisiana: A model for advancing regional e-research through cyberinfrastructure. Philosophical Transactions of Royal Society, 2009. Accepted.

 

30.  T. Kosar and M. Balman. A new paradigm: Data-aware scheduling in grid computing. In Future Generation Computing Systems (FGCS), 25 406-413, (2009).

 

31.  T. Kosar, M. Balman, I. Suslu, E. Yildirim, and D. Yin. Data-aware distributed computing with stork data scheduler. In Proceedings of SEE-GRID-SCIÕ09, Istanbul, Turkey, December 2009.

 

32.  P.T.K. Kumar, V.V. Phoha, S.S. Iyengar, and P. Iyengar. Reduction of noise due to systematic uncertainties in 113min spect imaging using information theory. Computers in Biology and Medicine, 39:482–488, 2009.

 

33.  A. K. Mitra, T. Goodwin, and R. R. Selmic, ÒSensor Agnostics for Networked MAV Applications,Ó submitted to SPIE Defense and Security 2010, Orlando, FL.

34.  K. A. Rahman, Kiran S. Balagani, Vir V. Phoha, and C. Okoye. ÒMovement, speed, and camera distance measurement for human motion detection based on inter-ocular distance. Ó In proceedings of the Second Cyberspace Research Workshop and Symposium, Shreveport, Louisiana, June 2009.

35.  R. Selmic, M. Polycarpou, and T. Parisini. Actuator fault detection in nonlinear uncertain systems using neural on-line approximation models. European Journal of Control, 15:29–44, 2009.

 

36.  D. C. Shadrach, Kiran S. Balagani, and Vir V. Phoha. ÒA weighted metric based adaptive algorithm for web server load balancing. Ó In the proceedings of the Third International Conference on Intelligent Information Technology Application, China, November 2009.

37.  S. Shrestha, M. Balachandran, M. Agarwal, V.V. Phoha, and K. Varahramyan. A chipless rÞd sensor system for cyber centric monitoring applications. IEEE Transactions-on Microwave Theory and TechniquesÕ Special Issue on RFID Hardware and Integration Technologies, 57:1303–1309, 2009.

 

38.  J. Tao, G. Allen, P. Diener, F. Loeffler, R. Haas, I. Hinder, E. Schnetter, and Y. Zlochower. Towards a highly efficient and scalable infrastructure for numerical relativity codes. In Proceedings of TeraGrid, 2009. Accepted.

 

39.  ¥N. Trivedi, S.S. Iyengar, and N. Balakrishnan. RipplesÕ: Message efficient, coverage-aware clustering in wireless sensor and actor networks. International Journal of Communication and Distributed Systems 2:112-134, 2009.

 

40.  G. Vert, S.S. Iyengar, V. Phoha, Global contextual processing, its application and theory, CRC Press, in print Summer 2010.

41.  G. Vert, J. Gourd, and S.S. Iyengar. Integration of the visual authentication of spatial data with spatial-temporal class taxonomies for advanced spatial authentication modeling to create pretty good security. In Proceedings of the 2nd Cyberspace Research Workshop, Center for Secure Cyberspace and USAF, Shreveport, LA, 2009.

 

42.  G. Vert, S.S. Iyengar, and V. Phoha. DeÞning a new type of global information architecture for contextual information processing. In Proceedings of IKEÕ09 the 2009 International Conference on Information and Knowledge Engineering, Las Vegas, NV, 2009.

 

43.  G. Vert, S.S. Iyengar, and V. Phoha. Security models for contextual based global processing an architecture and overview. In Proceedings of the Cyber Security and Information Intelligence Research Conference, Oak Ridge, Tennessee, 2009.

 

44.  G. Vert and E. Triantaphyllou. Security level determination using branes for contextual based global processing: An architecture. In Proceedings of SAMÕ09 - The 2009 International Conference on Security and Management, Las Vegas, NV, 2009.

 

45.  X. Wang*, D. Huang*, I. Akturk*, M. Balman*, G. Allen and T. Kosar. Semantic enabled metadata management in PetaShare. In International Journal of Grid and Utility Computing (IJGUC), 1: 275-286, 2009.

 

46.  X. Wang* and T. Kosar. Design and implementation of metadata system in PetaShare.
In Proceedings of 21st International Conference on Scientific and Statistical Database Management (SSDBM 2009), New Orleans, LA, June 2009.

 

47.  X. Wang and T. Kosar. Metadata in petashare: Irods vs. protg. In Proceedings of 21st International Conference on ScientiÞc and Statistical Database Management (SS-DBMÕ09), New Orleans, LA, 2009. Accepted.

 

48.  J. Yao, J. Zhang, J. Kanno, and R.R. Selmic. Decentralized detection and patching of coverage holes in wireless sensor networks. In Proceedings of the SPIE Defense and Security, Orlando, Florida, 2009.

 

49.  E. Yildirim, D. Yin, and T. Kosar. Balancing TCP buffer vs parallel streams in application level throughput optimization
 
In Proceedings of DADC'09 (in conjunction with HPDC'09), Munich, Germany, June 2009

 

50.  E. Yildirim, D. Yin, and T. Kosar. Prediction of optimal parallelism level in wide area data transfers. To appear in IEEE Transactions on Parallel and Distributed Computing (TPDS), 2010.

 

51.  D. Yin, E. Yildirim, and T. Kosar. A data throughput prediction and optimization service for widely distributed many-task computing. In Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS), in conjunction with Supercomputing09, Portland, OR, November 16, 2009.

52.  Z. Yun, M.Xie, F. Zhou, G. Allen, T. Kosar. And Z. Lei. Collaborating mechanical design phases across a grid. In Proceedings of 11th IEEE International Conference on Computational Science  and Engineering Workshops, Sao Paulo, Brazil, 163-170, 2008.

 

53.  J. Zhang, P. Porras and J. Ullrich, [UTF-8?]‰ÛśGaussian process learning for cyber-attack early [UTF-8?]Warning,‰Û in Statistical Analysis and Data Mining. 2009

 

54.  J. Zhang and S. Shakya, "Knowledge transfer for feature generation in document classification" in Proceedings of International Conference on Machine Learning and
Applications
, 2009.

 

55.  L . Zhou, Y. Zhifeng, and G. Allen. Grid resource allocation in grid computing:   infrastructure service and applications. CRC Press, 2008.

 

 

 

I.      Reports of Invention Filed

56.  V.V. Phoha and K.S. Balagani. A dependence tree based method for network anomaly classiÞcation. U.S. Patent Office, 2009. ROI pending to Office of Intellectual Property and Commercialization.

 

57.  Vir V. Phoha (La Tech), Sunil Babu (La Tech), S. Phoha (Penn State), A. Ray (Penn State). ÒAn Augmented Computer User Login Authentication Using Classifying Regions of Keystroke Density Neural Network.Ó U.S. Patent No. 7620819. November 17, 2009.
BioPassword, Inc. of Issaquah, Washington (now AdmitOne Security), has licensed this technology from Louisiana Tech and provides guaranteed financial returns to Louisiana Tech.


 

58.  R. R. Selmic. MAVs with Integrated Flopping Wings Sensors. Louisiana Tech University, 2009.

 

 

 

A.    Research Papers under Review for Publication

59.  G. Allen, C. McMahon, E. Seidel, and T. Tierney. The 2003 Louisiana optical network initiative (LONI) concept paper. Technical Report CCT-TR-2009-3, 2009.

 

60.  G. Allen and E. Schnetter. The cactus framework: Software sustainability position paper. Technical Report CCT-TR-2009-5, 2009.

 

61.  Atkison, T., ÒAiding Prediction Algorithms in Detecting High-Dimensional Malicious Applications Using a Randomized Projection Technique,Ó in ACM Southeast.  

62.  Atkison, T., ÒRandomized Projection versus Mutual Information: A Comparison Study on Rogue Application DetectionÓ.  

63.  Atkison, T., ÓUsing Data Slicing to Improve Rogue Software Detection Algorithms,Ó in Information Sciences: Data Mining for Software Trustworthiness.  

64.  Atkison, T., ÒUsing a Static Analysis Method in Detecting High-Dimensional Rogue ApplicationsÓ.

65.  K.S. Balagani and V.V. Phoha. Network anomaly detection using dependence trees. IEEE Transactions on Information Forensics and Security. Manuscript in preparation for possible submission.

 

66.  K.S. Balagani and V.V. Phoha. Relationship between bayes error rate and mutual information based feature selection criteria. IEEE Transactions on Pattern Analysis and Machine Intelligence. Paper under second round of review for possible publication.

 

67.  K.S. Balagani, V.V. Phoha, S.S. Iyengar, and N. Balakrishnan. On the feature selection criterion proposed in gait feature subset selection by mutual information. IEEE Transactions on Systems, Man, and Cyberkinetics - Part A. Paper under second round review for possible publication.

 

68.  K.S. Balagani, V.V. Phoha, and S.S. Joshi. A comment on application of majority voting to pattern recognition: An analysis of its behavior and performance. IEEE Transactions on Systems on Man, Cybernetics - Part A. Submitted.

 

69.  K.S. Balagani, V.V. Phoha, S. Ray, and S. Phoha. On the discriminabilty of keystroke feature vectors for user recognition using Þxed text. IEEE Transactions on Systems, Man, and Cybernetics - Part B. Submitted.

 

70.  Q.J. Chen, C. Eksilsson, M. Tyagi, and G. Allen. Coastal and ocean modeling infrastructure (comi): development of an integrated modeling framework for simulations of coastal processes in deltaic environments using high-performance computing. Technical Report CCT-TR-2008-8, 2008.

 

71.  C. A. Duncan, J. Kanno, and R. Selmic.  Detecting (approximate) hole coverage areas in wireless sensor networks,Ó 2nd Cyberspace Research Workshop. Submitted.

 

72.  C. A. Duncan.  On graph thickness, geometric thickness, and separator theorems,Ó 21st Canadian Conference on Computational Geometry, 2009. Submitted.

 

73.  C. A. Duncan, M. T. Goodrich, and S. G. Kobourov.  Planar drawings of higher-genus graphs, 17th International Symposium on Graph Drawing, 2009. Submitted.

 

74.  J. Gourd and D. Ali. A weighted relative contribution algorithm for grid-based analysis of heterogeneous geospatial data. Intl J of Data Analysis Techniques and Strategies, 2008. Submitted.

 

75.  A. Hutanu, J. Ge, C. Toole, R. Paruchuri, A. Yates, and G. Allen. The loni internet2 dcn, and cesnet teams, distributed visualization using optical networks. Technical Report CCT-TY-2008-10, 2008. Demonstration at Supercomputing 2008.

 

76.  M.E. Karim, A. Lakhotia, and V. Phoha. Minmax preserved information: Minmax interval tree vs. PQ tree. Information Processing Letters, 2009. Submitted.

 

77.  M.E. Karim and V. Phoha. Calculus for processing contextual information. Book Chapter. 2009.

 

78.  V.V. Phoha, K.S. Balagani and S.S. Joshi. Bayes error bounds on independent and derived feature for computer user identiÞcation using keystroke dynamics. Machine Learning Journal. Currently undergoing major revision for possible publication.

 

79.  M.A. Sultan, M.S. Hossain, M.E. Karim, and V.V. Phoha. A framework to understand botnet traffic gesture.  In Workshop on Cyber Security Experimentation and Test, 2009. Submitted.

 

80.  H. Tims, G. Turner, C. Duncan, B. Etheridge.  Cyber Discovery Camp – Integrated Approach to Cyber Studies, 39th Annual Frontiers in Education Conference, 2009. Submitted.

 

81.  J. Tao, G. Allen, I. Hinder, E. Schnetter, and Y. Zlochower. Xirel: Standard benchmarks for numerical relativity codes. Technical Report CCT-TR-2008-5, 2008.

 

82.  H.C. Wu, K. Yan, and S.S. Iyengar. Robustness analysis of source localization using gaussianity measure. IEEE Transactions on Computers, 2008. Submitted.

 

83.  J. Zhang.  "A survey on streaming algorithms for massive graphs" in managing and mining graph data, edited by C. Aggarwal and H. Wang. Submitted for publishing, 2010.