1. G. Allen, P. Bogden, G. Creager, C. Dekate,
C. Jesch, H. Kaiser, J. MacLaren, W. Perrie, G. Stone, and X. Zhang. Gis and
integrated coastal ocean forecasting. Concurrency and Computation: Practice
and Experience, 20:1637–1651, 2008.
2. M. Balman and T. Kosar. Dynamic adaptation of
parallelism level in data transfer scheduling. In Proceedings of the 2nd
International Workshop on Adaptive Systems in Heterogeneous Environments,
Tsukuba, Japan, 2009.
3. M. Balman and T. Kosar. Error detection
and error classification: Failure awareness in data transfer scheduling. To
appear in the International Journal of
Autonomic Computing (IJAC), 2010.
4. M. Balman and T. Kosar. Early error detection
and classiÞcation in data transfer scheduling. In Proceedings of the 3rd
International Workshop on P2P, Parallel, Grid and Internet Computing,
Tsukuba, Japan, 2009.
5. M. Balasubramanian, S.
Zabic, L. Zangwill, H. Thompson, P. Wolenski, S.S. Iyengar, and BB. Karki. A
framework for detecting glaucomatous progression in the optic nerve head of an
eye using proper orthogonal decomposition. IEEE Transactions on Information
Technology in Biomedicine, 2009. Accepted.
6.
Kiran S. Balagani and Vir V. Phoha, ÒOn the
feature selection criteria based on an approximation of multi-dimensional
mutual information.Ó To appear in IEEE Transactions on Pattern Analysis and
Machine Intelligence.
7.
Kiran S. Balagani and Vir V. Phoha, ÒOn the
feature selection criteria based on an approximation of multi-dimensional
mutual information.Ó To appear in IEEE Transactions on Pattern Analysis and
Machine Intelligence.
8.
K.S. Balagani, V.V. Phoha, S.S. Iyengar, and N. Balakrishnan. On Guo and NixonÕs
criterion for feature subset selection: assumptions, implications, and
alternative options. Accepted (to appear in 2010) in the IEEE Transactions
on Systems, Man, and Cybernetics - Part A.
9. A. Gehani, M. Kim, and J. Zhang, [UTF-8?]‰ÛśSteps
toward managing lineage metadata in grid [UTF-8?]Clusters‰Ûť, in Proceedings of the 1st Workshop on Theory
and Practice of Provenance in the 7th USENIX Conference on File and Storage
Technologies (FAST), 2009.
10. J.G. Buchart III, J. Kanno, R.R. Selmic, and
V. Phoha. Detecting coverage holes in wireless sensor networks. In Proceedings
of the 17th Mediterranean Conference on Control and Automation,
Thessaloniki, Greece, 2009.
11. C. A. Duncan, J. Kanno, and R. R. Selmic,
ÒDetecting (Approximate) Hole Coverage Areas in Wireless Sensor Networks,Ó
Proc. Cyberspace Research Workshop, Shreveport, Louisiana, June 2009.
12. M. Gates, G. Pepper, A. K. Mitra, C. Hu, S.
Zein-Sabatto, T. Rogers, R. R. Selmic, E. Hamdan, M. Malkani, ÒUnmanned vehicle
technology for networked non-line-of-sight sensing applications,Ó submitted to
SPIE Defense and Security 2010, Orlando, FL.
13. A. Gehani, M. Kim, and J. Zhang. Steps toward
managing lineage metadata in grid clusters. In Proceedings of the 1st
Workshop on Theory and Practice of Provenance in the 7th USENIX Conference on
File and Storage Technologies (FAST), 2009.
14. T. Goodwin, Lt. R. Carr, A.K. Mitra, and R.R.
Selmic. Coupled sensor/platform control design for low-level chemical detection
with position-adaptive micro-uavs. In Proceedings of the SPIE Defense and
Security, Orlando, Florida, 2009.
15. J. Gourd. A web services based approach to mobile agent
migration and security. The J of Mgmt and Eng Integration, 2009.
Accepted.
16. J. Gourd and G. Vert. Hyper
Distribution of Contextual Information--The Consumer Producer Problem. In Global
Contextual Processing, Its Constraints and Theoretical Operation, pages
165-259. Taylor and Francis, 2009
17. A. Hutanu, T. Kosar, and G.
Allen. A ßexible asynchronous rpc system architecture for h-performance remote
data access. In Proceedings of the High Performance and Distributed
Computing Conference (HPDCÕ09), Munich, Germany, 2009. Accepted.
18. V. Iyer, S.S. Iyengar, N. Balakrishnan, V.
Phoha, and G.R. Murthy. Distributed source coding for sensor data model and
estimation of cluster head errors using bayesian and k-near neighborhood
classiÞers in deployment of dense wireless sensor networks. In Proceedings
of the SENSORCOMM conference, Athens/Vouliagmeni, Greece, 2009.
19. V. Iyer, S.S. Iyengar, N. Balakrishnan, V.
Phoha, and M.B. Srinivas. Farms: Fusionable ambient renewable macs. In Proceedings
of the IEEE Sensors Applications Symposium, pages 169–174, 2009.
20. D. Jethwa, R.R. Selmic, and F. Figueroa.
Real-time implementation of intelligent actuator control with a transducer
health monitoring capability. Intl J of Factory Automation, Robotics,
and Soft Computing, 1:5–10, 2009.
21. L. Jiang, G. Allen, and Q. Chen. Towards an
integrated problem-solving environment for hydrid numerical models with
statistical learning components. In Proceedings of Teragrid, 2009.
22. J. Kackley and J. Gourd. A
ßow direction algorithm for geometry-based networks utilizing a prioritized bfs
method. The J of Mgmt and Eng Integration, 2008. Accepted.
23. J. Kackley,
J. Gourd, and M. Gambrell. Increasing p2p gameplay performance utilizing i3p.
In GameOn'NA'09: 5th International North American Conference on Intelligent
Games and Simulation, Atlanta, GA, August 2009.
24. J. Kanno, J. G. Buchart III,
R. R. Selmic and V. Phoha, ÒDetecting coverage holes in wireless sensor
networks,Ó Proc. 17th Mediterranean Conference on Control and Automation,
Thessaloniki, Greece, June 24-26, 2009.
25. J. Kanno, R. R. Selmic, J. G.
Buchart, and V. Phoha, ÒDetecting coverage holes in wireless sensor networks,Ó
submitted to IEEE Transactions on Mobile Computing, September 2009.
26. M.E. Karim, V. Phoha, and R.
Mathur. Detecting transformation of codes in metamorphic malwares. J in Computer
Virology, 2009. Accepted.
27. M.E. Karim, V. Phoha, and M.A. Sultan. An
immunological model for detecting bot activities. In Proceedings of the SPIE
Cybersensing Conference, 2009.
28. M. E. Karim, V. V. Phoha, "A calculus for reasoning about contextual information
and similarity," in Global Contextual Processing, Its Constraints and
Theoretical Operation, by
G. Vert, S.S. Iyengar, V. Phoha, CRC Press 2010
(expected).
29. D. Katz, G. Allen, R.
Cortez, C. Cruz-Neira, R. Gottumukkala, Z. Greenwood, L. Guice, S. Jha, R.
Kolluru, T. Kosar, L. Leger, H. Liu, C. McMahon, J. Nabryski, B.
Rodriguez-Milla, E. Sediel, G. Speyrer, M. StubbleÞeld, B. Voss, and S.
Whittenburg. Louisiana: A model for advancing louisiana: A model for advancing
regional e-research through cyberinfrastructure. Philosophical Transactions
of Royal Society, 2009. Accepted.
30. T.
Kosar and M. Balman. A new paradigm: Data-aware scheduling in grid computing. In Future Generation Computing Systems
(FGCS), 25 406-413, (2009).
31. T.
Kosar, M. Balman, I. Suslu, E. Yildirim, and D. Yin. Data-aware distributed computing
with stork data scheduler. In Proceedings
of SEE-GRID-SCIÕ09, Istanbul, Turkey, December 2009.
32. P.T.K. Kumar, V.V. Phoha, S.S. Iyengar, and
P. Iyengar. Reduction of noise due to systematic uncertainties in 113min spect
imaging using information theory. Computers in Biology and Medicine,
39:482–488, 2009.
33. A. K. Mitra, T.
Goodwin, and R. R. Selmic, ÒSensor Agnostics for Networked MAV Applications,Ó
submitted to SPIE Defense and Security 2010, Orlando, FL.
34. K. A. Rahman, Kiran
S. Balagani, Vir V. Phoha, and C. Okoye. ÒMovement, speed, and camera distance
measurement for human motion detection based on inter-ocular distance. Ó In
proceedings of the Second Cyberspace Research Workshop and Symposium, Shreveport,
Louisiana, June 2009.
35. R. Selmic, M. Polycarpou, and T. Parisini.
Actuator fault detection in nonlinear uncertain systems using neural on-line
approximation models. European Journal of Control, 15:29–44, 2009.
36. D. C. Shadrach,
Kiran S. Balagani, and Vir V. Phoha. ÒA weighted metric based adaptive
algorithm for web server load balancing. Ó In the proceedings of the Third
International Conference on Intelligent Information Technology Application,
China, November 2009.
37. S. Shrestha, M. Balachandran, M. Agarwal,
V.V. Phoha, and K. Varahramyan. A chipless rÞd sensor system for cyber centric
monitoring applications. IEEE Transactions-on Microwave Theory and
TechniquesÕ Special Issue on RFID Hardware and Integration Technologies,
57:1303–1309, 2009.
38. J. Tao, G. Allen, P. Diener,
F. Loeffler, R. Haas, I. Hinder, E. Schnetter, and Y. Zlochower. Towards a
highly efficient and scalable infrastructure for numerical relativity codes. In
Proceedings of TeraGrid, 2009. Accepted.
39. ¥N. Trivedi, S.S. Iyengar,
and N. Balakrishnan. RipplesÕ: Message efficient, coverage-aware clustering in
wireless sensor and actor networks. International Journal of Communication
and Distributed Systems 2:112-134, 2009.
40. G. Vert, S.S. Iyengar, V. Phoha, Global contextual
processing, its application and theory, CRC Press, in print Summer 2010.
41. G. Vert, J. Gourd, and S.S. Iyengar.
Integration of the visual authentication of spatial data with spatial-temporal
class taxonomies for advanced spatial authentication modeling to create pretty
good security. In Proceedings of the 2nd Cyberspace Research Workshop,
Center for Secure Cyberspace and USAF, Shreveport, LA, 2009.
42. G. Vert, S.S. Iyengar, and V. Phoha. DeÞning
a new type of global information architecture for contextual information
processing. In Proceedings of IKEÕ09 the 2009 International Conference on
Information and Knowledge Engineering, Las Vegas, NV, 2009.
43. G. Vert, S.S. Iyengar, and V. Phoha. Security
models for contextual based global processing an architecture and overview. In Proceedings
of the Cyber Security and Information Intelligence Research Conference, Oak
Ridge, Tennessee, 2009.
44. G. Vert and E. Triantaphyllou. Security level
determination using branes for contextual based global processing: An
architecture. In Proceedings of SAMÕ09 - The 2009 International Conference
on Security and Management, Las Vegas, NV, 2009.
45. X.
Wang*, D. Huang*, I. Akturk*, M. Balman*, G. Allen and T. Kosar. Semantic enabled
metadata management in PetaShare. In International Journal of Grid and
Utility Computing (IJGUC), 1: 275-286, 2009.
46. X.
Wang* and T. Kosar. Design and implementation of metadata system in
PetaShare.
In Proceedings of 21st
International Conference on Scientific and Statistical Database Management
(SSDBM 2009), New Orleans, LA, June 2009.
47. X. Wang and T. Kosar.
Metadata in petashare: Irods vs. protg. In Proceedings of 21st International
Conference on ScientiÞc and Statistical Database Management (SS-DBMÕ09),
New Orleans, LA, 2009. Accepted.
48. J. Yao, J. Zhang, J. Kanno, and R.R. Selmic.
Decentralized detection and patching of coverage holes in wireless sensor
networks. In Proceedings of the SPIE Defense and Security, Orlando,
Florida, 2009.
49. E.
Yildirim, D. Yin, and T. Kosar. Balancing TCP buffer vs parallel streams in application
level throughput optimization
In Proceedings of DADC'09 (in conjunction with HPDC'09), Munich,
Germany, June 2009
50. E.
Yildirim, D. Yin, and T. Kosar. Prediction of optimal parallelism level in wide
area data transfers. To appear in IEEE
Transactions on Parallel and Distributed Computing (TPDS), 2010.
51. D.
Yin, E. Yildirim, and T. Kosar. A data throughput prediction and optimization service
for widely distributed many-task computing. In Workshop on Many-Task Computing on Grids and Supercomputers (MTAGS), in
conjunction with Supercomputing09, Portland, OR, November 16, 2009.
52. Z. Yun, M.Xie, F. Zhou, G.
Allen, T. Kosar. And Z. Lei. Collaborating mechanical design phases across a
grid. In Proceedings of 11th
IEEE International Conference on Computational Science and Engineering Workshops, Sao
Paulo, Brazil, 163-170, 2008.
53. J. Zhang, P. Porras and J.
Ullrich, [UTF-8?]‰ÛśGaussian process learning for cyber-attack early
[UTF-8?]Warning,‰Û in Statistical Analysis and Data Mining. 2009
54. J. Zhang and S. Shakya,
"Knowledge transfer for feature generation in document classification"
in Proceedings of International
Conference on Machine Learning and
Applications, 2009.
55. L . Zhou, Y. Zhifeng, and G.
Allen. Grid resource allocation in grid computing: infrastructure
service and applications. CRC Press, 2008.
56. V.V. Phoha and K.S.
Balagani. A dependence tree based method for network anomaly classiÞcation.
U.S. Patent Office, 2009. ROI pending to Office of Intellectual Property and
Commercialization.
57. Vir V. Phoha (La Tech), Sunil Babu (La Tech), S. Phoha
(Penn State), A. Ray (Penn State). ÒAn Augmented Computer User Login
Authentication Using Classifying Regions of Keystroke Density Neural Network.Ó U.S. Patent No. 7620819. November 17, 2009.
BioPassword,
Inc. of Issaquah, Washington (now AdmitOne Security), has licensed this
technology from Louisiana Tech and provides guaranteed financial returns to
Louisiana Tech.
58. R. R. Selmic. MAVs with Integrated Flopping Wings Sensors.
Louisiana Tech University, 2009.
59. G. Allen, C. McMahon, E.
Seidel, and T. Tierney. The 2003 Louisiana optical network initiative (LONI)
concept paper. Technical Report CCT-TR-2009-3, 2009.
60. G. Allen and E. Schnetter.
The cactus framework: Software sustainability position paper. Technical Report
CCT-TR-2009-5, 2009.
61. Atkison,
T., ÒAiding Prediction Algorithms in Detecting High-Dimensional Malicious
Applications Using a Randomized Projection Technique,Ó in ACM Southeast.
62.
Atkison,
T., ÒRandomized Projection versus
Mutual Information: A Comparison Study on Rogue Application DetectionÓ.
63. Atkison,
T., ÓUsing Data Slicing to Improve Rogue Software Detection Algorithms,Ó in
Information Sciences: Data Mining for Software Trustworthiness.
64. Atkison, T., ÒUsing a Static Analysis Method in Detecting High-Dimensional Rogue ApplicationsÓ.
65. K.S. Balagani and V.V.
Phoha. Network anomaly detection using dependence trees. IEEE Transactions
on Information Forensics and Security. Manuscript in preparation for
possible submission.
66. K.S. Balagani and V.V.
Phoha. Relationship between bayes error rate and mutual information based
feature selection criteria. IEEE Transactions on Pattern Analysis and
Machine Intelligence. Paper under second round of review for possible
publication.
67. K.S. Balagani, V.V. Phoha,
S.S. Iyengar, and N. Balakrishnan. On the feature selection criterion proposed
in gait feature subset selection by mutual information. IEEE Transactions on
Systems, Man, and Cyberkinetics - Part A. Paper under second round review
for possible publication.
68. K.S. Balagani, V.V. Phoha,
and S.S. Joshi. A comment on application of majority voting to pattern
recognition: An analysis of its behavior and performance. IEEE Transactions
on Systems on Man, Cybernetics - Part A. Submitted.
69. K.S. Balagani, V.V. Phoha,
S. Ray, and S. Phoha. On the discriminabilty of keystroke feature vectors for
user recognition using Þxed text. IEEE Transactions on Systems, Man, and
Cybernetics - Part B. Submitted.
70. Q.J. Chen, C. Eksilsson, M.
Tyagi, and G. Allen. Coastal and ocean modeling infrastructure (comi):
development of an integrated modeling framework for simulations of coastal
processes in deltaic environments using high-performance computing. Technical
Report CCT-TR-2008-8, 2008.
71. C. A. Duncan, J. Kanno, and
R. Selmic. Detecting (approximate)
hole coverage areas in wireless sensor networks,Ó 2nd Cyberspace
Research Workshop. Submitted.
72. C. A. Duncan. On graph thickness, geometric
thickness, and separator theorems,Ó 21st Canadian Conference on
Computational Geometry, 2009. Submitted.
73. C. A. Duncan, M. T.
Goodrich, and S. G. Kobourov.
Planar drawings of higher-genus graphs, 17th International
Symposium on Graph Drawing, 2009. Submitted.
74. J. Gourd and D. Ali. A
weighted relative contribution algorithm for grid-based analysis of
heterogeneous geospatial data. Intl J of Data Analysis Techniques and
Strategies, 2008. Submitted.
75. A. Hutanu, J. Ge, C. Toole,
R. Paruchuri, A. Yates, and G. Allen. The loni internet2 dcn, and cesnet teams,
distributed visualization using optical networks. Technical Report
CCT-TY-2008-10, 2008. Demonstration at Supercomputing 2008.
76. M.E. Karim, A. Lakhotia, and
V. Phoha. Minmax preserved information: Minmax interval tree vs. PQ tree. Information
Processing Letters, 2009. Submitted.
77. M.E. Karim and V. Phoha. Calculus
for processing contextual information. Book Chapter. 2009.
78. V.V. Phoha, K.S. Balagani
and S.S. Joshi. Bayes error bounds on independent and derived feature for
computer user identiÞcation using keystroke dynamics. Machine Learning
Journal. Currently undergoing major revision for possible publication.
79. M.A. Sultan, M.S. Hossain,
M.E. Karim, and V.V. Phoha. A framework to understand
botnet traffic gesture. In Workshop
on Cyber Security Experimentation and Test, 2009. Submitted.
80. H. Tims, G. Turner, C.
Duncan, B. Etheridge. Cyber
Discovery Camp – Integrated Approach to Cyber Studies, 39th
Annual Frontiers in Education Conference, 2009. Submitted.
81. J. Tao, G. Allen, I. Hinder,
E. Schnetter, and Y. Zlochower. Xirel: Standard benchmarks for numerical
relativity codes. Technical Report CCT-TR-2008-5, 2008.
82. H.C. Wu, K. Yan, and S.S.
Iyengar. Robustness analysis of source localization using gaussianity measure. IEEE
Transactions on Computers, 2008. Submitted.
83. J. Zhang. "A survey on streaming algorithms
for massive graphs" in managing and mining graph data, edited by C.
Aggarwal and H. Wang. Submitted for publishing, 2010.