$\{$SEER$\}$: A Security Experimentation $\{$EnviRonment$\}$ for $\{$DETER$\}$.
Wilson, B.; Ko, C.; and Hussain, A.
In
DETER Community Workshop on Cyber Security Experimentation and Test 2007 (DETER 2007), 2007.
link
bibtex
@inproceedings{wilson2007seer,
title={$\{$SEER$\}$: A Security Experimentation $\{$EnviRonment$\}$ for $\{$DETER$\}$},
author={Wilson, Brett and Ko, Calvin and Hussain, Alefiya},
booktitle={DETER Community Workshop on Cyber Security Experimentation and Test 2007 (DETER 2007)},
year={2007}
}
A Bayesian Network Classifier for Word-level Reading Assessment.
Tepperman, J.; Black, M. P.; Price, P.; Lee, S.; Kazemzadeh, A.; Gerosa, M.; Heritage, M.; Alwan, A.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 2185-2188, Antwerp, Belgium, August 2007.
link
bibtex
@inproceedings{proc_tepperman:bayesnetwordlevelreading:icslp07,
address = {Antwerp, Belgium},
author = {Tepperman, Joseph and Black, Matthew P. and Price, Patti and Lee, Sungbok and Kazemzadeh, Abe and Gerosa, Matteo and Heritage, Margaret and Alwan, Abeer and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/TeppermanInterSpeech2007[1].pdf},
month = {August},
pages = {2185-2188},
title = {A Bayesian Network Classifier for Word-level Reading Assessment},
year = {2007}
}
A DETER Federation Architecture.
Faber, T.; Wroclawski, J.; and Lahey, K.
In
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007. Usenix
link
bibtex
A Data Integration Approach to Dynamically Fusing Geospatial Sources.
Thakkar, S.
Ph.D. Thesis, Department of Computer Science, University of Southern California, 2007.
link
bibtex
@PhDThesis{thakkar07:thesis,
Author = "Snehal Thakkar",
Title = "A Data Integration Approach to Dynamically Fusing Geospatial Sources",
School = "Department of Computer Science, University of Southern California",
Year = "2007"}
A Data Placement Service for Petascale Applications.
Chervenak, A. L.; and Schuler, R.
In
Proceedings of the 2Nd International Workshop on Petascale Data Storage: Held in Conjunction with Supercomputing '07, of
PDSW '07, pages 63–68, New York, NY, USA, 2007. ACM
link
bibtex
@inproceedings{Chervenak2007a,
acmid = {1374611},
address = {{New York, NY, USA}},
author = {Chervenak, Ann L. and Schuler, Robert},
bdsk-url-2 = {https://doi.org/10.1145/1374596.1374611},
booktitle = {Proceedings of the {{2Nd International Workshop}} on {{Petascale Data Storage}}: {{Held}} in {{Conjunction}} with {{Supercomputing}} '07},
date-added = {2018-09-12 15:11:16 -0700},
date-modified = {2020-01-21 15:51:59 -0800},
isbn = {978-1-59593-899-2},
keywords = {data management,data placement,data staging,distributed computing,workflow management},
pages = {63--68},
publisher = {{ACM}},
series = {{{PDSW}} '07},
title = {A {{Data Placement Service}} for {{Petascale Applications}}},
year = {2007}}
A robust stopping criterion for agglomerative hierarchical clustering in a speaker diarization system.
Han, K. J.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 1853-1856, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_kyu:stoppingcriteriondiarization:icslp07,
address = {Antwerp, Belgium},
author = {Han, Kyu Jeong and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/HanInterSpeech2007.pdf},
month = {Aug},
pages = {1853-1856},
title = {A robust stopping criterion for agglomerative hierarchical clustering in a speaker diarization system},
year = {2007}
}
A saliency-based auditory attention model with applications to unsupervised prominent syllable detection in speech.
Kalinli, O.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 1941-1944, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_ozelem:saliencyattentionsyllable:icslp07,
address = {Antwerp, Belgium},
author = {Kalinli, Ozlem and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/kalinliinterspeech2007.pdf},
month = {Aug},
pages = {1941-1944},
title = {A saliency-based auditory attention model with applications to unsupervised prominent syllable detection in speech},
year = {2007}
}
A statistical approach for modeling prosody features using POS tags for emotional speech synthesis.
Bulut, M.; Lee, S.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 1237-1240, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_bulut:postagsemotionalspeech:icassp07,
address = {Honolulu, Hawaii},
author = {Bulut, Murtaza and Lee, Sungbok and Narayanan, Shrikanth S.},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.367300},
keyword = {conversion, emotion, energy, POS, prosody},
link = {http://sail.usc.edu/publications/files/buluticassp2007.pdf},
month = {Apr},
pages = {1237-1240},
title = {A statistical approach for modeling prosody features using POS tags for emotional speech synthesis},
year = {2007}
}
A survey of trust in computer science and the Semantic Web.
Artz, D.; and Gil, Y.
J. Web Semant., 5(2): 58–71. 2007.
Paper
doi
link
bibtex
7 downloads
@article{DBLP:journals/ws/ArtzG07,
author = {Donovan Artz and
Yolanda Gil},
title = {A survey of trust in computer science and the Semantic Web},
journal = {J. Web Semant.},
volume = {5},
number = {2},
pages = {58--71},
year = {2007},
url = {https://doi.org/10.1016/j.websem.2007.03.002},
doi = {10.1016/J.WEBSEM.2007.03.002},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ws/ArtzG07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
A text-free approach to assessing nonnative intonation.
Tepperman, J.; Kazemzadeh, A.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 2169-2172, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_tepperman:textfreenonnativeintonation:icslp07,
address = {Antwerp, Belgium},
author = {Tepperman, Joseph and Kazemzadeh, Abe and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/TeppermanInterSpeech2007.pdf},
month = {Aug},
pages = {2169-2172},
title = {A text-free approach to assessing nonnative intonation},
year = {2007}
}
A user-centric metric for denial-of-service measurement.
Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S.
In
Proc. of Workshop on Experimental Comp. Sci, 2007.
link
bibtex
@inproceedings{mirkovic2007user,
title={A user-centric metric for denial-of-service measurement},
author={Mirkovic, Jelena and Hussain, Alefiya and Wilson, Brett and Fahmy, Sonia and Reiher, Peter and Thomas, Roshan and Yao, Wei-Min and Schwab, Stephen},
booktitle={Proc. of Workshop on Experimental Comp. Sci},
year={2007}
}
ARGOS: Dynamic Composition of Web Services for Goods Movement Analysis and Planning (Project Highlights 2007).
Ambite, J. L.; Giuliano, G.; and Gordon, P.
In
Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007), Philadelphia, PA, USA, May 2007.
Paper
link
bibtex
@InProceedings{ambite2007:dgo-ph,
author = {Jos\'{e} Luis Ambite and Genevieve Giuliano and Peter Gordon},
title = {ARGOS: Dynamic Composition of Web Services for Goods
Movement Analysis and Planning (Project Highlights 2007)},
booktitle = {Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007)},
month = {May},
year = {2007},
urlPaper ="http://www.isi.edu/~ambite/ambite-dgo2007-ph-final.pdf",
address = {Philadelphia, PA, USA}
}
Advancing Exploration Risk Reduction and Workforce Motivation through Dynamic Flight Testing.
Barnhart, D.; Sullivan, J.; Will, P.; and Gruntman, M.
In
AIAA Space 2007 Conference, 2007.
Paper
link
bibtex
@inproceedings{barnhart2007advancing,
title={Advancing Exploration Risk Reduction and Workforce Motivation through Dynamic Flight Testing},
author={Barnhart, David and Sullivan, Joe and Will, Peter and Gruntman, Mike},
booktitle={AIAA Space 2007 Conference},
year={2007},
url = {https://doi.org/10.2514/6.2007-6040}
}
An Automatic Approach to Semantic Annotation of Unstructured, Ungrammatical Sources: A First Look.
Michelson, M.; and Knoblock, C. A.
In
Proceedings of the 1st IJCAI Workshop on Analytics for Noisy Unstructured Text Data, 2007.
Paper
link
bibtex
@inproceedings{michelson07:and,
author = "Matthew Michelson and Craig A. Knoblock",
title = "An Automatic Approach to Semantic Annotation of Unstructured, Ungrammatical Sources: A First Look",
booktitle = "Proceedings of the 1st IJCAI Workshop on Analytics for Noisy Unstructured Text Data",
location = "Hyderabad, India",
year = "2007",
urlPaper= "http://usc-isi-i2.github.io/papers/michelson07-and.pdf",
Keywords = {"Information Extraction"}}
An Experimental Approach to Integrating NetFlow Flow-level Records and NLANR Packet-level Traces.
Zhang, C.; Liu, B.; Su, X.; Alvarez, H.; and Ibarra, J.
Silicon Valley, 07/2007 2007.
link
bibtex
@proceedings {7343,
title = {An Experimental Approach to Integrating NetFlow Flow-level Records and NLANR Packet-level Traces},
journal = {2nd International Conference on Internet Monitoring and Protection (IEEE Computer Society Press)},
year = {2007},
month = {07/2007},
address = {Silicon Valley},
author = {Zhang, C. and B. Liu and X. Su and H. Alvarez and J. Ibarra}
}
An acoustic measure for word prominence in spontaneous speech.
Wang, D.; and Narayanan, S. S.
IEEE Transactions on Audio, Speech, and Language Processing, 15(2): 690-701. Feb 2007.
doi
link
bibtex
@article{Wang2007Anacousticmeasurefor,
author = {Wang, Dagen and Narayanan, Shrikanth S.},
doi = {10.1109/TASL.2006.881703},
journal = {IEEE Transactions on Audio, Speech, and Language Processing},
keyword = {part of speech, prominence detection, rich speech transcription, spoken language processing},
link = {http://sail.usc.edu/publications/files/wang_tasl_2007.pdf},
month = {Feb},
number = {2},
pages = {690-701},
title = {An acoustic measure for word prominence in spontaneous speech},
volume = {15},
year = {2007}
}
Analysis of audio clustering using word descriptions.
Sundaram, S.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 769-772, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_sundaram:clusteringworddescriptions:icassp07,
address = {Honolulu, Hawaii},
author = {Sundaram, Shiva and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.366349},
link = {http://sail.usc.edu/publications/files/sundaramicassp2007[1].pdf},
month = {Apr},
pages = {769-772},
title = {Analysis of audio clustering using word descriptions},
year = {2007}
}
Analyzing the Multimodal Behaviors of Users of a Speech-to-Speech Translation Device by Using Concept Matching Scores.
Shin, J.; Georgiou, P.; and Narayanan, S. S.
In
Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 259-263, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_jongho:multimodalbehaviorsconceptmatching:mmsp07,
address = {Chania, Greece},
author = {Shin, JongHo and Georgiou, Panayiotis and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {10.1109/MMSP.2007.4412867},
link = {http://sail.usc.edu/publications/files/ShinMMSP2007.pdf},
location = {BEST STUDENT PAPER AWARD},
month = {Oct},
pages = {259-263},
title = {Analyzing the Multimodal Behaviors of Users of a Speech-to-Speech Translation Device by Using Concept Matching Scores},
year = {2007}
}
Applying Trust to a Secure Message Passing Domain.
DeAngelis, D.; and Barber, K. S.
In
Proceedings of the Workshop on Trust in Agent Societies at the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), pages 39, Honolulu Hawaii, 2007. Citeseer
Paper
link
bibtex
@inproceedings{DeAngelis2007,
address = {Honolulu Hawaii},
author = {DeAngelis, David and Barber, K. Suzanne},
booktitle = {Proceedings of the Workshop on Trust in Agent Societies at the Fourth International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005)},
file = {:home/dave/Documents/References/DeAngelis, Barber - 2007 - Applying Trust to a Secure Message Passing Domain.pdf:pdf},
pages = {39},
publisher = {Citeseer},
title = {Applying Trust to a Secure Message Passing Domain},
url = {https://pdfs.semanticscholar.org/b371/94a373c6f962e2b2b31d2793160848a0acaa.pdf},
year = {2007}
}
Argos: A Framework for Automatically Generating Data Processing Workflows.
Ambite, J. L.; and Kapoor, D.
In
Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007), Philadelphia, PA, USA, May 2007.
(System Demonstration)
Paper
link
bibtex
@InProceedings{ambite2007:dgo-sd,
author = {Jos\'{e} Luis Ambite and Dipsy Kapoor},
title = {Argos: A Framework for Automatically Generating
Data Processing Workflows},
booktitle = {Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007)},
month = {May},
year = {2007},
address = {Philadelphia, PA, USA},
urlPaper ="http://www.isi.edu/~ambite/ambite-dgo2007-sd-final.pdf",
note = {(System Demonstration)}
}
Automatic Generation of Data Processing Workflows for Transportation Modeling.
Ambite, J. L.; and Kapoor, D.
In
Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007), Philadelphia, PA, USA, May 2007.
\bf Best Paper Award
Paper
link
bibtex
@InProceedings{ambite2007:dgo,
author = {Jos\'{e} Luis Ambite and Dipsy Kapoor},
title = {Automatic Generation of Data Processing Workflows for Transportation Modeling},
booktitle = {Proceedings of the 8th Annual International Conference on Digital Government Research (dg.o2007)},
month = {May},
year = {2007},
address = {Philadelphia, PA, USA},
urlPaper="http://www.isi.edu/~ambite/ambite-dgo2007-final.pdf",
note = {{\bf Best Paper Award}}
}
Automatic acoustic synthesis of human-like laughter.
Sundaram, S.; and Narayanan, S. S.
Journal of the Acoustical Society of America, 121(1): 527-535. Jan 2007.
link
bibtex
@article{Sundaram2007Automaticacousticsynthesisof,
author = {Sundaram, Shiva and Narayanan, Shrikanth S.},
bib2html_rescat = {care},
journal = {Journal of the Acoustical Society of America},
link = {http://sail.usc.edu/publications/files/sundaram_jasa_2007.pdf},
month = {Jan},
number = {1},
pages = {527-535},
title = {Automatic acoustic synthesis of human-like laughter},
volume = {121},
year = {2007}
}
Automatic detection and classification of disfluent reading miscues in young childrens speech for the purpose of assessment.
Black, M. P.; Tepperman, J.; Lee, S.; Price, P.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 206-209, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_matthew:classdisfluentreadmiscues:icslp07,
address = {Antwerp, Belgium},
author = {Black, Matthew P. and Tepperman, Joseph and Lee, Sungbok and Price, Patti and Narayanan, Shrikanth S.},
bib2html_rescat = {care},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/black_interspeech_2007.pdf},
month = {Aug},
pages = {206-209},
title = {Automatic detection and classification of disfluent reading miscues in young childrens speech for the purpose of assessment},
year = {2007}
}
Automatically Composing Data Workflows with Relational Descriptions and Shim Services.
Ambite, J. L.; and Kapoor, D.
In
Proceedings of the 6th International Semantic Web Conference, Busan, Korea, November 2007.
Paper
link
bibtex
@InProceedings{ambite2007:iswc,
author = {Jos\'{e} Luis Ambite and Dipsy Kapoor},
title = {Automatically Composing Data Workflows with Relational Descriptions and Shim Services},
booktitle = {Proceedings of the 6th International Semantic Web Conference},
urlPaper ="http://www.isi.edu/~ambite/ambite-iswc2007.pdf",
month = {November},
year = {2007},
address = {Busan, Korea}
}
Automating DDoS Experimentation.
Mirkovic, J.; Wilson, B.; Hussain, A.; Fahmy, S.; Reiher, P.; Thomas, R.; and Schwab, S.
In
Usenix Workshop on Cyber Security Experimentation, 2007.
link
bibtex
@inproceedings{mirkovic2007automating,
title={Automating DDoS Experimentation.},
author={Mirkovic, Jelena and Wilson, Brett and Hussain, Alefiya and Fahmy, Sonia and Reiher, Peter and Thomas, Roshan and Schwab, Stephen},
booktitle={Usenix Workshop on Cyber Security Experimentation},
year={2007}
}
Automating ddos experimentation.
Mirkovic, J.; Wilson, B.; Hussain, A.; Fahmy, S.; Reiher, P.; Thomas, R.; Schwab, S.; and Centreville, V.
In
Proc. of the DETER Community Workshop on Cyber Security Experimentation and Test. USENIX Association, 2007.
link
bibtex
@inproceedings{mirkovic2007automating,
title={Automating ddos experimentation},
author={Mirkovic, Jelena and Wilson, Brett and Hussain, Alefiya and Fahmy, Sonia and Reiher, Peter and Thomas, Roshan and Schwab, Stephen and Centreville, VA},
booktitle={Proc. of the DETER Community Workshop on Cyber Security Experimentation and Test. USENIX Association},
year={2007}
}
Backward and Forward Bisimulation Minimisation of Weighted Tree Automata.
Högberg, J.; Maletti, A.; and May, J.
In Holub, J.; and Ždárek, J., editor(s),
Proceedings of the 12th International Conference on Implementation and Application of Automata, CIAA 2007, volume 4783, of
Lecture Notes in Computer Science, pages 109–121, Prague, Czech Republic, July 16–18 2007. Springer-Verlag
link
bibtex
@InProceedings{hogbergmalettimay07:ciaa,
author = {Johanna H\"{o}gberg and Andreas Maletti and Jonathan May},
title = {Backward and Forward Bisimulation Minimisation of Weighted Tree Automata},
booktitle = {Proceedings of the 12th International Conference on Implementation and Application of Automata, CIAA 2007},
pages = {109--121},
year = 2007,
editor = {Jan Holub and Jan \v{Z}d\'{a}rek},
volume = 4783,
series = {Lecture Notes in Computer Science},
address = {Prague, Czech Republic},
month = {July 16--18},
publisher = {Springer-Verlag}
}
Beginning to Understand Unstructured, Ungrammatical Text: An Information Integration Approach.
Michelson, M.; and Knoblock, C. A.
In
Proceedings of the AAAI Spring Symposium on Machine Reading, 2007.
Paper
link
bibtex
@inproceedings{michelson07:sss,
author = "Matthew Michelson and Craig A. Knoblock",
title = "Beginning to Understand Unstructured, Ungrammatical Text: An Information Integration Approach",
booktitle = "Proceedings of the AAAI Spring Symposium on Machine Reading",
location = "Stanford, CA",
year = 2007,
urlPaper= "http://usc-isi-i2.github.io/papers/michelson07-sss.pdf",
Keywords = {"Information Extraction"}}
Bisimulation Minimisation for Weighted Tree Automata.
Högberg, J.; Maletti, A.; and May, J.
In Harju, T.; Karhumäki, J.; and Lepistö, A., editor(s),
Proceedings of the 11th International Conference on Developments in Language Theory, DLT 2007, volume 4588, of
Lecture Notes in Computer Science, pages 229–240, Turku, Finland, July 3–6 2007. Springer-Verlag
link
bibtex
@InProceedings{hogbergmalettimay07:dlt,
author = {Johanna H\"{o}gberg and Andreas Maletti and Jonathan May},
title = {Bisimulation Minimisation for Weighted Tree Automata},
booktitle = {Proceedings of the 11th International Conference on Developments in Language Theory, DLT 2007},
pages = {229--240},
year = 2007,
editor = {Tero Harju and Juhani Karhum\"{a}ki and Arto Lepist\"{o}},
volume = 4588,
series = {Lecture Notes in Computer Science},
address = {Turku, Finland},
month = {July 3--6},
publisher = {Springer-Verlag}
}
Building Data Integration Queries by Demonstration.
Tuchinda, R.; Szekely, P.; and Knoblock, C. A.
In
Proceedings of the International Conference on Intelligent User Interface, January 2007.
Presentation
Paper
link
bibtex
93 downloads
@inproceedings{tuchinda07:iui,
author = "Rattapoom Tuchinda and Pedro Szekely and Craig A. Knoblock",
title = "Building Data Integration Queries by Demonstration",
booktitle = "{Proceedings of the International Conference on Intelligent User Interface}",
month = "January",
year = "2007",
urlPresentation= "http://usc-isi-i2.github.io/slides/tuchinda07-iui-slides.pdf",
urlPaper= "http://usc-isi-i2.github.io/papers/tuchinda07-iui.pdf",
Keywords = {"Mashup Construction"}}
Building a Global Federation System for Climate Change Research: The Earth System Grid Center for Enabling Technologies (ESG-CET).
Ananthakrishnan, R; Bernholdt, D E; Bharathi, S; Brown, D; Chen, M; Chervenak, A L; Cinquini, L; Drach, R; Foster, I T; Fox, P; Fraser, D; Halliday, K; Hankin, S; Jones, P; Kesselman, C; Middleton, D E; Schwidder, J; Schweitzer, R; Schuler, R; Shoshani, A; Siebenlist, F; Sim, A; Strand, W G; Wilhelmi, N; Su, M; and Williams, D N
Journal of Physics: Conference Series, 78(1): 012050. 2007.
link
bibtex
abstract
@article{Ananthakrishnan2007a,
abstract = {The recent release of the Intergovernmental Panel on Climate Change (IPCC) 4th Assessment Report (AR4) has generated significant media attention. Much has been said about the US role in this report, which included significant support from the Department of Energy through the Scientific Discovery through Advanced Computing (SciDAC) and other Department of Energy (DOE) programs for climate model development and the production execution of simulations. The SciDAC-supported Earth System Grid Center for Enabling Technologies (ESG-CET) also played a major role in the IPCC AR4: all of the simulation data that went into the report was made available to climate scientists worldwide exclusively via the ESG-CET At the same time as the IPCC AR4 database was being developed, the National Center for Atmospheric Research (NCAR), a leading US climate science laboratory and a ESG participant, began publishing model runs from the Community Climate System Model (CCSM), and its predecessor the Parallel Coupled Model (PCM) through ESG In aggregate, ESG-CET provides seamless access to over 180 terabytes of distributed climate simulation data to over 6,000 registered users worldwide, who have taken delivery of more than 250 terabytes from the archive. Not only does this represent a substantial advance in scientific knowledge, it is also a major step forward in how we conduct the research process on a global scale. Moving forward, the next IPCC assessment report, AR5, will demand multi-site metadata federation for data discovery and cross-domain identity management for single sign-on of users in a more diverse federation enterprise environment. Towards this aim, ESG is leading the effort in the climate community towards standardization of material for the global federation of metadata, security, and data services required to standardize, analyze, and access data worldwide.},
author = {Ananthakrishnan, R and Bernholdt, D E and Bharathi, S and Brown, D and Chen, M and Chervenak, A L and Cinquini, L and Drach, R and Foster, I T and Fox, P and Fraser, D and Halliday, K and Hankin, S and Jones, P and Kesselman, C and Middleton, D E and Schwidder, J and Schweitzer, R and Schuler, R and Shoshani, A and Siebenlist, F and Sim, A and Strand, W G and Wilhelmi, N and Su, M and Williams, D N},
date-added = {2018-09-12 16:23:17 -0700},
date-modified = {2020-01-21 15:51:59 -0800},
journal = {Journal of Physics: Conference Series},
number = {1},
pages = {012050},
title = {Building a Global Federation System for Climate Change Research: The Earth System Grid Center for Enabling Technologies ({{ESG-CET}})},
volume = {78},
year = {2007}}
The recent release of the Intergovernmental Panel on Climate Change (IPCC) 4th Assessment Report (AR4) has generated significant media attention. Much has been said about the US role in this report, which included significant support from the Department of Energy through the Scientific Discovery through Advanced Computing (SciDAC) and other Department of Energy (DOE) programs for climate model development and the production execution of simulations. The SciDAC-supported Earth System Grid Center for Enabling Technologies (ESG-CET) also played a major role in the IPCC AR4: all of the simulation data that went into the report was made available to climate scientists worldwide exclusively via the ESG-CET At the same time as the IPCC AR4 database was being developed, the National Center for Atmospheric Research (NCAR), a leading US climate science laboratory and a ESG participant, began publishing model runs from the Community Climate System Model (CCSM), and its predecessor the Parallel Coupled Model (PCM) through ESG In aggregate, ESG-CET provides seamless access to over 180 terabytes of distributed climate simulation data to over 6,000 registered users worldwide, who have taken delivery of more than 250 terabytes from the archive. Not only does this represent a substantial advance in scientific knowledge, it is also a major step forward in how we conduct the research process on a global scale. Moving forward, the next IPCC assessment report, AR5, will demand multi-site metadata federation for data discovery and cross-domain identity management for single sign-on of users in a more diverse federation enterprise environment. Towards this aim, ESG is leading the effort in the climate community towards standardization of material for the global federation of metadata, security, and data services required to standardize, analyze, and access data worldwide.
Building reputations for internet clients.
Wei, S.; and Mirkovic, J.
Electronic Notes in Theoretical Computer Science, 179: 17–30. 2007.
link
bibtex
@article{wei2007building,
title={Building reputations for internet clients},
author={Wei, Songjie and Mirkovic, Jelena},
journal={Electronic Notes in Theoretical Computer Science},
volume={179},
pages={17--30},
year={2007},
publisher={Elsevier}
}
Cascading dynamics in modular networks.
Galstyan, A.; and Cohen, P.
Physical Review E, 75(3): 036109. 2007.
link
bibtex
5 downloads
@article{galstyan2007cascading,
title={Cascading dynamics in modular networks},
author={Galstyan, Aram and Cohen, Paul},
journal={Physical Review E},
volume={75},
number={3},
pages={036109},
year={2007},
publisher={American Physical Society}
}
Centralized, distributed or something else? Making timely decisions in multi-agent systems.
Harbers, T.; Maheswaran, R. T; and Szekely, P.
PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, 22(1): 738. 2007.
link
bibtex
@article{harbers2007centralized,
title={Centralized, distributed or something else? Making timely decisions in multi-agent systems},
author={Harbers, Tim and Maheswaran, Rajiv T and Szekely, Pedro},
journal={PROCEEDINGS OF THE NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE},
volume={22},
number={1},
pages={738},
year={2007},
publisher={Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999}
}
Connecting Scientific Data to Scientific Experiments with Provenance.
Miles, S.; Deelman, E.; Groth, P.; Vahi, K.; Mehta, G.; and Moreau, L.
In
Third IEEE International Conference on e-Science and Grid Computing (e-Science 2007), 2007.
Paper
link
bibtex
@InProceedings{ miles2007connecting,
Author = {Simon Miles and Ewa Deelman and Paul Groth and Karan Vahi
and Gaurang Mehta and Luc Moreau},
URL = {http://portal.acm.org/citation.cfm?id=1332478.1333573},
Title = {Connecting Scientific Data to Scientific Experiments with
Provenance},
BookTitle = {Third IEEE International Conference on e-Science and Grid
Computing (e-Science 2007)},
Year = {2007}
}
CyberBridges A Model Collaboration Infrastructure for e-Science.
Alvarez, H. L.; Chatfield, D.; Cox, D. A.; Crumpler, E.; D\textquoterightCunha, C.; Gutierrez, R.; Ibarra, J.; Johnson, E.; Kumar, K.; Milledge, T.; Narasimhan, G.; Sadjadi, S. M.; and Zhang, C.
05/2007 2007.
doi
link
bibtex
@proceedings {4215367,
title = {CyberBridges A Model Collaboration Infrastructure for e-Science},
journal = {Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid {\textquoteright}07)},
year = {2007},
month = {05/2007},
pages = {65-72},
keywords = {advanced networking, Biomedical engineering, Collaborative work, computer science education, creative process, CyberBridges pilot project, cyberinfrastructure, Design engineering, diverse science, e-Science, education collaborations, educational process, engineering computing, engineering disciplines, engineering education, graduate student education, grid computing, grid infrastructure, high performance computing, Information technology, information technology community, International collaboration, international research, Internet, model collaboration infrastructure, natural sciences computing, Online Communities/Technical Collaboration, Physics, professional process, Testing},
doi = {10.1109/CCGRID.2007.35},
author = {H. L. Alvarez and D. Chatfield and D. A. Cox and E. Crumpler and C. D{\textquoteright}Cunha and R. Gutierrez and J. Ibarra and E. Johnson and K. Kumar and T. Milledge and G. Narasimhan and S. M. Sadjadi and Zhang, C.}
}
CyberBridges: Integrating Advanced Grid Infrastructure with Science and Engineering.
Alvarez, H.; Ibarra, J.; Kumar, K.; Zhang, C.; and et al
Madison, Wisconsin, 06/2007 2007.
link
bibtex
@proceedings {7345,
title = {CyberBridges: Integrating Advanced Grid Infrastructure with Science and Engineering},
journal = {TeraGrid Conference},
year = {2007},
month = {06/2007},
address = {Madison, Wisconsin},
author = {H. Alvarez and J. Ibarra and K. Kumar and Zhang, C. and et al}
}
DDoS benchmarks and experimentation workbench for the DETER testbed.
Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; and Schwab, S.
In
In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007, 2007.
link
bibtex
@inproceedings{mirkovic2007ddos,
title={DDoS benchmarks and experimentation workbench for the DETER testbed},
author={Mirkovic, Jelena and Wei, Songjie and Hussain, Alefiya and Wilson, Brett and Thomas, Roshan and Schwab, Stephen},
booktitle={In Proceedings of the 3rd IEEE Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom 2007},
year={2007}
}
DDoS benchmarks and experimenter's workbench for the DETER testbed.
Mirkovic, J.; Wei, S.; Hussain, A.; Wilson, B.; Thomas, R.; Schwab, S.; Fahmy, S.; Chertov, R.; and Reiher, P.
In
2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities, pages 1–7, 2007. IEEE
link
bibtex
@inproceedings{mirkovic2007ddos,
title={DDoS benchmarks and experimenter's workbench for the DETER testbed},
author={Mirkovic, Jelena and Wei, Songjie and Hussain, Alefiya and Wilson, Brett and Thomas, Roshan and Schwab, Stephen and Fahmy, Sonia and Chertov, Roman and Reiher, Peter},
booktitle={2007 3rd International Conference on Testbeds and Research Infrastructure for the Development of Networks and Communities},
pages={1--7},
year={2007},
organization={IEEE}
}
Data Placement for Scientific Applications in Distributed Environments.
Chervenak, A.; Deelman, E.; Livny, M.; Su, M.; Schuler, R.; Bharathi, S.; Mehta, G.; and Vahi, K.
In
Proceedings of Grid Conference 2007, 2007.
Paper
link
bibtex
@InProceedings{ chervenak2007placement,
Author = {Ann Chervenak and Ewa Deelman and Miron Livny and Mei-Hui
Su and Rob Schuler and Shishir Bharathi and Gaurang Mehta
and Karan Vahi},
URL = {http://pegasus.isi.edu/publications/grid2007.pdf},
Title = {Data Placement for Scientific Applications in Distributed
Environments},
BookTitle = {Proceedings of Grid Conference 2007},
Year = {2007}
}
Data driven approach for language model adaptation using stepwise relative entropy minimization.
Sethy, A.; Narayanan, S. S.; and Ramabhadran, B.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 177-180, Honolulu, Hawaii, Apr 2007.
link
bibtex
@inproceedings{proc_sethy:stepwiseentropyminimization:icassp07,
address = {Honolulu, Hawaii},
author = {Sethy, Abhinav and Narayanan, Shrikanth S. and Ramabhadran, Bhuvana},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
keyword = {language model adaptation, relative entropy, speech recognition, TC-STAR, text mining},
link = {http://sail.usc.edu/publications/files/sethy_icassp_2007.pdf},
month = {Apr},
pages = {177-180},
title = {Data driven approach for language model adaptation using stepwise relative entropy minimization},
year = {2007}
}
Discriminating Two Types of Noise Sources Using Cortical Representation and Dimension Reduction Technique.
Sundaram, S.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 1, pages 213-216, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_sundaram:noisesourcescorticalrep:icassp07,
address = {Honolulu, Hawaii},
author = {Sundaram, Shiva and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.366654},
link = {http://sail.usc.edu/publications/files/SundaramICASSP2007[2].pdf},
month = {Apr},
pages = {213-216},
title = {Discriminating Two Types of Noise Sources Using Cortical Representation and Dimension Reduction Technique},
volume = {1},
year = {2007}
}
Dynamics of Collaborative Document Rating Systems.
Lerman, K.
In
Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web Mining and Social Network Analysis, 2007.
Paper
link
bibtex
@INPROCEEDINGS{Lerman07snakdd,
AUTHOR = {Kristina Lerman},
TITLE = {Dynamics of Collaborative Document Rating Systems},
BOOKTITLE = {Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web Mining and Social Network Analysis},
YEAR = {2007},
urlPaper = {http://www.isi.edu/~lerman/papers/rankdynamics3.pdf},
keywords = {social-dynamics},
}
Early Auditory Processing Inspired Features for Robust Automatic Speech Recognition.
Kalinli, O.; and Narayanan, S. S.
In
Proceedings of European Signal Processing Conference (EUSIPCO), pages 2385-2389, Poznan, Poland, Sep 2007.
link
bibtex
@inproceedings{proc_ozelem:auditoryinspiredfeaturesautospch:eusipco07,
address = {Poznan, Poland},
author = {Kalinli, Ozlem and Narayanan, Shrikanth S.},
booktitle = {Proceedings of European Signal Processing Conference (EUSIPCO)},
link = {http://sail.usc.edu/publications/files/KalinliEUSIPCO2007.pdf},
month = {Sep},
pages = {2385-2389},
title = {Early Auditory Processing Inspired Features for Robust Automatic Speech Recognition},
year = {2007}
}
Empirical comparison of “hard” and “soft” label propagation for relational classification.
Galstyan, A.; and Cohen, P. R
In
International Conference on Inductive Logic Programming, pages 98–111, 2007. Springer, Berlin, Heidelberg
link
bibtex
@inproceedings{galstyan2007empirical,
title={Empirical comparison of “hard” and “soft” label propagation for relational classification},
author={Galstyan, Aram and Cohen, Paul R},
booktitle={International Conference on Inductive Logic Programming},
pages={98--111},
year={2007},
organization={Springer, Berlin, Heidelberg}
}
Enabling Distributed Petascale Science.
Baranovski, A.; Bharathi, S.; Bresnahan, J.; Chervenak, A.; Foster, I.; Fraser, D.; Freeman, T.; Gunter, D.; Jackson, K.; Keahey, K.; Kesselman, C.; Konerding, D. E; Leroy, N.; Link, M.; Livny, M.; Miller, N.; Miller, R.; Oleynik, G.; Pearlman, L.; Schopf, J. M; Schuler, R.; and Tierney, B.
Journal of Physics: Conference Series, 78(1): 012020. 2007.
link
bibtex
abstract
@article{Baranovski2007a,
abstract = {Petascale science is an end-to-end endeavour, involving not only the creation of massive datasets at supercomputers or experimental facilities, but the subsequent analysis of that data by a user community that may be distributed across many laboratories and universities. The new SciDAC Center for Enabling Distributed Petascale Science (CEDPS) is developing tools to support this end-to-end process. These tools include data placement services for the reliable, high-performance, secure, and policy-driven placement of data within a distributed science environment; tools and techniques for the construction, operation, and provisioning of scalable science services; and tools for the detection and diagnosis of failures in end-to-end data placement and distributed application hosting configurations. In each area, we build on a strong base of existing technology and have made useful progress in the first year of the project. For example, we have recently achieved order-of-magnitude improvements in transfer times (for lots of small files) and implemented asynchronous data staging capabilities; demonstrated dynamic deployment of complex application stacks for the STAR experiment; and designed and deployed end-to-end troubleshooting services. We look forward to working with SciDAC application and technology projects to realize the promise of petascale science.},
author = {Baranovski, Andrew and Bharathi, Shishir and Bresnahan, John and Chervenak, Ann and Foster, Ian and Fraser, Dan and Freeman, Tim and Gunter, Dan and Jackson, Keith and Keahey, Kate and Kesselman, Carl and Konerding, David E and Leroy, Nick and Link, Mike and Livny, Miron and Miller, Neill and Miller, Robert and Oleynik, Gene and Pearlman, Laura and Schopf, Jennifer M and Schuler, Robert and Tierney, Brian},
date-added = {2018-09-12 16:21:47 -0700},
date-modified = {2020-01-21 15:51:59 -0800},
journal = {Journal of Physics: Conference Series},
number = {1},
pages = {012020},
title = {Enabling Distributed Petascale Science},
volume = {78},
year = {2007}}
Petascale science is an end-to-end endeavour, involving not only the creation of massive datasets at supercomputers or experimental facilities, but the subsequent analysis of that data by a user community that may be distributed across many laboratories and universities. The new SciDAC Center for Enabling Distributed Petascale Science (CEDPS) is developing tools to support this end-to-end process. These tools include data placement services for the reliable, high-performance, secure, and policy-driven placement of data within a distributed science environment; tools and techniques for the construction, operation, and provisioning of scalable science services; and tools for the detection and diagnosis of failures in end-to-end data placement and distributed application hosting configurations. In each area, we build on a strong base of existing technology and have made useful progress in the first year of the project. For example, we have recently achieved order-of-magnitude improvements in transfer times (for lots of small files) and implemented asynchronous data staging capabilities; demonstrated dynamic deployment of complex application stacks for the STAR experiment; and designed and deployed end-to-end troubleshooting services. We look forward to working with SciDAC application and technology projects to realize the promise of petascale science.
End-to-End Routing for Dual-Radio Sensor Networks.
Stathopoulos, T.; Lukac, M.; McIntire, D.; Heidemann, J. S.; Estrin, D.; and Kaiser, W. J.
In
INFOCOM 2007. 26th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, USA, pages 2252–2260, 2007. IEEE
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/infocom/StathopoulosLMHEK07,
author = {Thanos Stathopoulos and
Martin Lukac and
Dustin McIntire and
John S. Heidemann and
Deborah Estrin and
William J. Kaiser},
title = {End-to-End Routing for Dual-Radio Sensor Networks},
booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
Joint Conference of the {IEEE} Computer and Communications Societies,
6-12 May 2007, Anchorage, Alaska, {USA}},
pages = {2252--2260},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/INFCOM.2007.260},
doi = {10.1109/INFCOM.2007.260},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/infocom/StathopoulosLMHEK07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Enhancing Interaction with To-Do Lists: Using Artificial Assistants.
Gil, Y.; and Chklovski, T.
In Yorke-Smith, N., editor(s),
Interaction Challenges for Intelligent Assistants, Papers from the 2007 AAAI Spring Symposium, 26-28 March 2007, Stanford University, CA, USA, volume SS-07-04, of
AAAI Technical Report, pages 43–51, 2007. AAAI Press
link
bibtex
1 download
@inproceedings{DBLP:conf/icia/GilC07,
author = {Yolanda Gil and
Timothy Chklovski},
editor = {Neil Yorke{-}Smith},
title = {Enhancing Interaction with To-Do Lists: Using Artificial Assistants},
booktitle = {Interaction Challenges for Intelligent Assistants, Papers from the
2007 {AAAI} Spring Symposium, 26-28 March 2007, Stanford University,
CA, {USA}},
series = {{AAAI} Technical Report},
volume = {{SS-07-04}},
pages = {43--51},
publisher = {{AAAI} Press},
year = {2007},
timestamp = {Tue, 10 Nov 2015 10:39:01 +0100},
biburl = {https://dblp.org/rec/conf/icia/GilC07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
EntityBases: Compiling, Organizing and Querying Massive Entity Repositories.
Knoblock, C. A.; Ambite, J. L.; Ganesan, K.; Muslea, M.; Minton, S.; Barish, G.; Gamble, E.; Nanjo, C.; See, K.; Shahabi, C.; ; and Chen, C.
In
International Conference on Artificial Intelligence (ICAI'07), Las Vegas, Nevada, USA, June 2007.
Paper
link
bibtex
@inproceedings{ knoblock2007:eb,
title = {EntityBases: Compiling, Organizing and Querying Massive Entity Repositories},
booktitle = {International Conference on Artificial Intelligence (ICAI'07)},
author = {Craig A. Knoblock and Jos� Luis Ambite and Kavita Ganesan and Maria Muslea and Steven Minton and Greg Barish and Evan Gamble and Claude Nanjo and Kane See and Cyrus Shahabi and and Ching-Chien Chen},
month = {June},
year = {2007},
address = {Las Vegas, Nevada, USA},
urlpaper = {http://usc-isi-i2.github.io/papers/knoblock07-icai.pdf},
Keywords = {"Record Linkage"}
}
Estimating P2P Traffic Volume at USC.
Bartlett, G.; Heidemann, J.; Papadopoulos, C.; and Pepin, J.
Technical Report ISI-TR-2007-645, USC/Information Sciences Institute, June 2007.
Paper
link
bibtex
abstract
@TechReport{Bartlett07c,
author = "Genevieve Bartlett and John Heidemann and Christos
Papadopoulos and James Pepin",
title = "Estimating {P2P} Traffic Volume at {USC}",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-06-01",
number = "ISI-TR-2007-645",
month = jun,
keywords = "peer-to-peer traffic characterization, p2p",
jsubject = "traffic_detection",
project = "ant, lander, madcat",
jlocation = "johnh: pafile",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07c.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07c.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
With the rise of peer-to-peer (P2P) file sharing applications there
has been an increasing interest in understanding the popularity and
use of P2P. In this study, we look at P2P use on the University of
Southern California's campus network throughout a 14-hour period. We
quantify the volume of traffic from P2P activity as well as the number
of campus hosts involved in P2P at USC. Since port-matching
techniques often fail for P2P applications, we estimate traffic based
on both port-based and connection-pattern based techniques. We do not
have access to packet data and so these measures provide only bounds
on P2P traffic. In addition, while we identify P2P sharing, we cannot
comment the types of data being shared (either music or data,
restricted or freely available). We find that 3--13\% of active hosts
on campus participate in P2P, and that this traffic accounts for
21--33\% of the bytes transferred to and from our campus.
",
}
With the rise of peer-to-peer (P2P) file sharing applications there has been an increasing interest in understanding the popularity and use of P2P. In this study, we look at P2P use on the University of Southern California's campus network throughout a 14-hour period. We quantify the volume of traffic from P2P activity as well as the number of campus hosts involved in P2P at USC. Since port-matching techniques often fail for P2P applications, we estimate traffic based on both port-based and connection-pattern based techniques. We do not have access to packet data and so these measures provide only bounds on P2P traffic. In addition, while we identify P2P sharing, we cannot comment the types of data being shared (either music or data, restricted or freely available). We find that 3–13% of active hosts on campus participate in P2P, and that this traffic accounts for 21–33% of the bytes transferred to and from our campus.
Evaluating the Importance of Concurrent Packet Communication in Wireless Networks.
Son, D.; Krishnamachari, B.; and Heidemann, J.
Technical Report ISI-TR-639, USC/Information Sciences Institute, April 2007.
Paper
link
bibtex
abstract
@TechReport{Son07a,
author = "Dongjin Son and Bhaskar Krishnamachari and John Heidemann",
title = "Evaluating the Importance of Concurrent Packet Communication in Wireless Networks",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-04-01",
project = "ilense, macss",
jsubject = "wireless_propagation",
number = "ISI-TR-639",
month = apr,
location = "johnh: pafile",
keywords = "sensornets, 802.11, rts-cts, concurrent
packet transmission",
location = "johnh: pafile",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Son07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Son07a.pdf",
copyrightholder = "authors",
myorganization = "USC/Information Sciences Institute",
abstract = "
Nearly all wireless media-access (MAC) protocols are designed today
with the very conservative assumption that concurrent transmissions
should be prevented, because sender-receiver pairs within radio range
sending on the same channel will corrupt each other's communication.
While recent work has suggested that channel capture effects can be
significant in reality, this paper presents the first systematic study
to quantify the impact of these effects on the ability to have
concurrent communications among two sender-receiver pairs that are
within range of each other. We first derive a simple decision rule to
determine when such concurrent communication is possible while
minimizing transmission power. Through a comprehensive set of
realistic simulations, we then systematically quantify the feasibility
of concurrent communication with and without transmission power
control as many radio and environmental parameters vary, including
node position, mean and variance of path loss,
signal-to-interference-plus-noise-ratio threshold ($SINR_\theta$) for
packet reception, granularity and range of transmission power
control. Our simulations show that often, 40--75\% of the time
depending primarily on distance and location, two pairs of nodes can
communicate concurrently without loss even if both transmitters are
within the radio sensing range of both receivers. We can observe
large CTXable region with fixed transmit power, but dynamic power
control significantly improves concurrent communications. Finally, at
least one transmitter can almost always capture the channel in the
event of concurrent transmissions, so the cost of failed attempts to
CTX are minimal. We validate our simulations with testbed experiments
using MicaZ motes, confirming that concurrent communication is
possible to a very significant extent in real systems. These results
suggest that CSMA with RTS/CTS is overly conservative and there are
often gains to be realized by abandoning it.
",
}
Nearly all wireless media-access (MAC) protocols are designed today with the very conservative assumption that concurrent transmissions should be prevented, because sender-receiver pairs within radio range sending on the same channel will corrupt each other's communication. While recent work has suggested that channel capture effects can be significant in reality, this paper presents the first systematic study to quantify the impact of these effects on the ability to have concurrent communications among two sender-receiver pairs that are within range of each other. We first derive a simple decision rule to determine when such concurrent communication is possible while minimizing transmission power. Through a comprehensive set of realistic simulations, we then systematically quantify the feasibility of concurrent communication with and without transmission power control as many radio and environmental parameters vary, including node position, mean and variance of path loss, signal-to-interference-plus-noise-ratio threshold ($SINR_θ$) for packet reception, granularity and range of transmission power control. Our simulations show that often, 40–75% of the time depending primarily on distance and location, two pairs of nodes can communicate concurrently without loss even if both transmitters are within the radio sensing range of both receivers. We can observe large CTXable region with fixed transmit power, but dynamic power control significantly improves concurrent communications. Finally, at least one transmitter can almost always capture the channel in the event of concurrent transmissions, so the cost of failed attempts to CTX are minimal. We validate our simulations with testbed experiments using MicaZ motes, confirming that concurrent communication is possible to a very significant extent in real systems. These results suggest that CSMA with RTS/CTS is overly conservative and there are often gains to be realized by abandoning it.
Examining the challenges of scientific workflows.
Gil, Y.; Deelman, E.; Ellisman, M.; Fahringer, T.; Fox, G., C.; Gannon, D.; Goble, C.; Livny, M.; Moreau, L.; and Myers, J.
Computer, 40(12). 2007.
link
bibtex
@article{
title = {Examining the challenges of scientific workflows},
type = {article},
year = {2007},
volume = {40},
publisher = {IEEE},
id = {6b9bfd9c-9d7c-31ad-a5e5-f84dbb91e3be},
created = {2018-01-19T07:02:38.193Z},
file_attached = {false},
profile_id = {42d295c0-0737-38d6-8b43-508cab6ea85d},
last_modified = {2020-05-11T14:43:40.721Z},
read = {false},
starred = {false},
authored = {true},
confirmed = {true},
hidden = {false},
citation_key = {Gil2007},
source_type = {JOUR},
folder_uuids = {023ec473-8727-4d72-856c-6687cf1caa00},
private_publication = {false},
bibtype = {article},
author = {Gil, Yolanda and Deelman, Ewa and Ellisman, Mark and Fahringer, Thomas and Fox, Geoffrey Charles and Gannon, Dennis and Goble, Carole and Livny, Miron and Moreau, Luc and Myers, Jim},
journal = {Computer},
number = {12}
}
Experiments in automatic genre classification of full-length music tracks using audio activity rate.
Sundaram, S.; and Narayanan, S. S.
In
Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 98-102, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_shiva:genreclassmusicactivity:mmsp07,
address = {Chania, Greece},
author = {Sundaram, Shiva and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {https://doi.org/10.1109/mmsp.2007.4412827},
link = {http://sail.usc.edu/publications/files/SundaramMMSP2007.pdf},
month = {Oct},
pages = {98-102},
title = {Experiments in automatic genre classification of full-length music tracks using audio activity rate},
year = {2007}
}
Exploiting Automatically Inferred Constraint Models for Building Identification in Satellite Imagery.
Michalowski, M.; Knoblock, C. A.; Bayer, K. M.; and Choueiry, B. Y.
In
Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (ACMGIS 07), pages 35-42, 2007.
Presentation
Paper
link
bibtex
@inproceedings{michalowski:07acmgis,
AUTHOR = {Martin Michalowski and Craig A. Knoblock and Kenneth M. Bayer and Berthe Y. Choueiry },
TITLE = {Exploiting Automatically Inferred Constraint Models for Building Identification in Satellite Imagery},
YEAR = 2007,
BOOKTITLE = {Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (ACMGIS 07)},
PAGES = {35-42},
urlPresentation= "http://usc-isi-i2.github.io/slides/michalowski07-acmgis-slides.pdf",
urlPaper= "http://usc-isi-i2.github.io/papers/michalowski07-acmgis.pdf",
Keywords = {"Constraint Integration"}}
Exploiting Problem Data to Enrich Models of Constraint Problems.
Michalowski, M.; Knoblock, C. A.; and Choueiry, B. Y.
In
Proceedings of the 6th International Workshop On Constraint Modelling and Reformulation (ModRef07), pages 1-15, 2007.
Presentation
Paper
link
bibtex
@INPROCEEDINGS{Michalowski07:ModRef,
author = {Martin Michalowski and Craig A. Knoblock and Berthe Y. Choueiry},
title = {Exploiting Problem Data to Enrich Models of Constraint Problems},
booktitle = {Proceedings of the 6th International Workshop On
Constraint Modelling and Reformulation (ModRef07)},
year = {2007},
pages = {1-15},
urlPresentation= "http://usc-isi-i2.github.io/slides/michalowski07-modref-poster.png",
urlPaper= "http://usc-isi-i2.github.io/papers/michalowski07-modref.pdf",
Keywords = {"Constraint Integration"}
}
Exploiting Social Annotation for Resource Discovery.
Plangprasopchok, A.; and Lerman, K.
In
Proceedings of AAAI workshop on Information Integration on the Web (IIWeb07), 2007.
Paper
link
bibtex
3 downloads
@INPROCEEDINGS{Plangprasopchok07iiweb,
AUTHOR = {Anon Plangprasopchok and Kristina Lerman},
TITLE = {Exploiting Social Annotation for Resource Discovery},
BOOKTITLE = {Proceedings of AAAI workshop on Information Integration on the Web (IIWeb07)},
YEAR = {2007},
keywords = {social-annotation},
urlPaper = {http://arxiv.org/abs/0704.1675},
}
Exploiting acoustic and syntactic features for prosody labeling in a maximum entropy framework.
Rangarajan, V.; Bangalore, S.; and Narayanan, S. S.
In
Proceedings of the Human Language Technologies (HLT) Conference, pages 797-811, Rochester, NY, Apr 2007.
doi
link
bibtex
@inproceedings{proc_vivek:acousticsyntacticprosody:hlt07,
address = {Rochester, NY},
author = {Rangarajan, Vivek and Bangalore, Srinivas and Narayanan, Shrikanth S.},
booktitle = {Proceedings of the Human Language Technologies (HLT) Conference},
doi = {10.1109/TASL.2008.917071},
link = {http://sail.usc.edu/publications/files/RangarajanHLT2006.pdf},
month = {Apr},
pages = {797-811},
title = {Exploiting acoustic and syntactic features for prosody labeling in a maximum entropy framework},
year = {2007}
}
Exploiting prosodic features for dialog act tagging in a discriminative modeling framework.
Rangarajan, V.; Bangalore, S.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 150-153, Antwerp, Belgium, Aug 2007.
doi
link
bibtex
@inproceedings{proc_vivek:prosodicfeaturesdialogtagging:icslp07,
address = {Antwerp, Belgium},
author = {Rangarajan, Vivek and Bangalore, Srinivas and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion, speechlinks},
booktitle = {Proceedings of InterSpeech},
doi = {10.1109/TASL.2008.917071},
link = {http://sail.usc.edu/publications/files/RangarajanInterSpeech2007.pdf},
month = {Aug},
pages = {150-153},
title = {Exploiting prosodic features for dialog act tagging in a discriminative modeling framework},
year = {2007}
}
Exploring Visible Internet Hosts through Census and Survey.
Heidemann, J.; Pradkin, Y.; Govindan, R.; Papadopoulos, C.; and Bannister, J.
Technical Report ISI-TR-2007-640, USC/Information Sciences Institute, May 2007.
Paper
link
bibtex
abstract
@techreport{Heidemann07c,
author = "John Heidemann and Yuri Pradkin and Ramesh Govindan and Christos Papadopoulos and Joseph Bannister",
title = "Exploring Visible Internet Hosts through Census and Survey",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-05-01",
number = "ISI-TR-2007-640",
month = may,
jlocation = "johnh: pafile",
keywords = "visible internet, exploration, census, survey",
copyrightholder = "author",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann07c.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Heidemann07c.pdf",
otherurl = "ftp://ftp.isi.edu/isi-pubs/tr-640.pdf",
myorganization = "USC/Information Sciences Institute",
project = "ant, lacrend",
codeurl = "https://ant.isi.edu/software/",
dataseturl = "https://ant.isi.edu/datasets/all.html",
blogurl = "",
abstract = "
Measurement studies published in the literature have, for the most part, ignored the population of hosts. While many hosts are hidden behind firewalls and in private address space, there is much to be learned from examining the population of visible Internet hosts--one can better understand network growth and accessibility and this understanding can help to assess vulnerabilities, deployment of new technologies, and improve network models. This paper is, to our knowledge, the first attempt to measure the population of visible Internet edge hosts. We measure hosts in two ways: via periodic Internet censuses, where we query all accessible Internet addresses every few months, and via surveys of a small fraction of the responsive address space, probing each address every 11 minutes for one week. These approaches are complementary: a census is effective at evaluating the Internet as a whole, while surveys validate the census and allow observation of the lifetime of typical address occupancy. We find that only 3.6\% of allocated addresses are actually occupied by visible hosts, and that occupancy is unevenly distributed, with a quarter of responsive /24 subnets less than 5\% full, and only 9\% of subnets more than half full. We establish an upper-bound on the number of servers in the Internet at 36 million, about 16\% of the responsive addresses. Many firewalls are visible and we observe significant diversity in the distribution of firewalled block size. While the absolute number of firewalled blocks appears stable, the ratio of coverage of visible firewalls to the number of visible addresses is declining, perhaps suggesting increasing use of invisible firewalls.
",
}
Measurement studies published in the literature have, for the most part, ignored the population of hosts. While many hosts are hidden behind firewalls and in private address space, there is much to be learned from examining the population of visible Internet hosts–one can better understand network growth and accessibility and this understanding can help to assess vulnerabilities, deployment of new technologies, and improve network models. This paper is, to our knowledge, the first attempt to measure the population of visible Internet edge hosts. We measure hosts in two ways: via periodic Internet censuses, where we query all accessible Internet addresses every few months, and via surveys of a small fraction of the responsive address space, probing each address every 11 minutes for one week. These approaches are complementary: a census is effective at evaluating the Internet as a whole, while surveys validate the census and allow observation of the lifetime of typical address occupancy. We find that only 3.6% of allocated addresses are actually occupied by visible hosts, and that occupancy is unevenly distributed, with a quarter of responsive /24 subnets less than 5% full, and only 9% of subnets more than half full. We establish an upper-bound on the number of servers in the Internet at 36 million, about 16% of the responsive addresses. Many firewalls are visible and we observe significant diversity in the distribution of firewalled block size. While the absolute number of firewalled blocks appears stable, the ratio of coverage of visible firewalls to the number of visible addresses is declining, perhaps suggesting increasing use of invisible firewalls.
Fine-grained capabilities for flooding DDoS defense using client reputations.
Natu, M.; and Mirkovic, J.
In
Proceedings of the 2007 workshop on Large Scale Attack Defense, pages 105–112, 2007. ACM
link
bibtex
@inproceedings{natu2007fine,
title={Fine-grained capabilities for flooding DDoS defense using client reputations},
author={Natu, Maitreya and Mirkovic, Jelena},
booktitle={Proceedings of the 2007 workshop on Large Scale Attack Defense},
pages={105--112},
year={2007},
organization={ACM}
}
Fishing for phishes: Applying capture-recapture methods to estimate phishing populations.
Weaver, R.; and Collins, M P.
In
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit, pages 14–25, 2007.
link
bibtex
@inproceedings{weaver2007fishing,
title={Fishing for phishes: Applying capture-recapture methods to estimate phishing populations},
author={Weaver, Rhiannon and Collins, M Patrick},
booktitle={Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit},
pages={14--25},
year={2007}
}
From Text to Geographic Coordinates: The Current State of Geocoding.
Goldberg, D. W.; Wilson, J. P.; and Knoblock, C. A.
Journal of the Urban and Regional Information Systems Association, 19(1): 33–46. 2007.
link
bibtex
@article{goldberg07:urisa,
author = {Daniel W. Goldberg and John P. Wilson and Craig A. Knoblock},
title = {From Text to Geographic Coordinates: The Current State of Geocoding},
journal = "Journal of the Urban and Regional Information Systems Association",
year = 2007,
volume = {19},
number = {1},
pages = {33--46},
Keywords = {"Geocoding"}}
.
Berriman, G. B.; Deelman, E.; Good, J.; Jacob, J. C.; Katz, D. S.; Laity, A. C.; Prince, T. A.; Singh, G.; and Su, M.
Generating Complex Astronomy Workflows. 2007.
link
bibtex
@InBook{ berriman2007complex,
Author = {G. Bruce Berriman and Ewa Deelman and John Good and Joseph
C. Jacob and Daniel S. Katz and Anastasia C. Laity and
Thomas A. Prince and Gurmeet Singh and Mei-Hui Su},
Title = {Generating Complex Astronomy Workflows},
BookTitle = {Workflows for e-Science},
Year = {2007}
}
Geospatial Data Integration.
Knoblock, C. A.; and Shahabi, C.
In Wilson, J.; and Fotheringham, A. S., editor(s),
The Handbook of Geographic Information Science. Wiley-Blackwell, 2007.
ISBN: 978-1-4051-0796-9
link
bibtex
@incollection{knoblock07:gdi,
Author = "Craig A. Knoblock and Cyrus Shahabi",
Title= "Geospatial Data Integration",
Booktitle = "The Handbook of Geographic Information Science",
Editor = "John Wilson and A. Stewart Fotheringham",
Publisher ="Wiley-Blackwell",
Year = 2007,
Note = "ISBN: 978-1-4051-0796-9"}
Globus MEDICUS - Federation of DICOM Medical Imaging Devices into Healthcare Grids.
Erberich, S. G; Silverstein, J. C; Chervenak, A.; Schuler, R.; Nelson, M. D; and Kesselman, C.
Studies in health technology and informatics, 126: 269–78. January 2007.
link
bibtex
abstract
@article{Erberich2007a,
abstract = {The Digital Imaging and Communications in Medicine (DICOM) standard defines Radiology medical device interoperability and image data exchange between modalities, image databases - Picture Archiving and Communication Systems (PACS) - and image review end-points. However the scope of DICOM and PACS technology is currently limited to the trusted and static environment of the hospital. In order to meet the demand for ad-hoc tele-radiology and image guided medical procedures within the global healthcare enterprise, a new technology must provide mobility, security, flexible scale of operations, and rapid responsiveness for DICOM medical devices and subsequently medical image data. Grid technology, an informatics approach to securely federate independently operated computing, storage, and data management resources at the global scale over public networks, meets these core requirements. Here we present an approach to federate DICOM and PACS devices for large-scale medical image workflows within a global healthcare enterprise. The Globus MEDICUS (Medical Imaging and Computing for Unified Information Sharing) project uses the standards-based Globus Toolkit Grid infrastructure to vertically integrate a new service for DICOM devices - the DICOM Grid Interface Service (DGIS). This new service translates between DICOM and Grid operations and thus transparently extends DICOM to Globus based Grid infrastructure. This Grid image workflow paradigm has been designed to provide not only solutions for global image communication, but fault-tolerance and disaster recovery using Grid data replication technology. Actual use-case of 40 MEDICUS Grid connected international hospitals of the Childerns Oncology Group and the Neuroblastoma Cancer Foundation and further clinical applications are discussed. The open-source Globus MEDICU http://dev.globus.org/wiki/Incubator/MEDICUS.},
author = {Erberich, Stephan G and Silverstein, Jonathan C and Chervenak, Ann and Schuler, Robert and Nelson, Marvin D and Kesselman, Carl},
date-added = {2018-09-12 15:47:54 -0700},
date-modified = {2020-01-21 15:51:59 -0800},
issn = {0926-9630},
journal = {Studies in health technology and informatics},
keywords = {Database Management Systems,Diagnostic Imaging,Diagnostic Imaging: instrumentation,Humans,Medical Informatics,Radiology Information Systems,United States},
month = jan,
pages = {269--78},
pmid = {17476069},
title = {Globus {{MEDICUS}} - Federation of {{DICOM}} Medical Imaging Devices into Healthcare {{Grids}}.},
volume = {126},
year = {2007}}
The Digital Imaging and Communications in Medicine (DICOM) standard defines Radiology medical device interoperability and image data exchange between modalities, image databases - Picture Archiving and Communication Systems (PACS) - and image review end-points. However the scope of DICOM and PACS technology is currently limited to the trusted and static environment of the hospital. In order to meet the demand for ad-hoc tele-radiology and image guided medical procedures within the global healthcare enterprise, a new technology must provide mobility, security, flexible scale of operations, and rapid responsiveness for DICOM medical devices and subsequently medical image data. Grid technology, an informatics approach to securely federate independently operated computing, storage, and data management resources at the global scale over public networks, meets these core requirements. Here we present an approach to federate DICOM and PACS devices for large-scale medical image workflows within a global healthcare enterprise. The Globus MEDICUS (Medical Imaging and Computing for Unified Information Sharing) project uses the standards-based Globus Toolkit Grid infrastructure to vertically integrate a new service for DICOM devices - the DICOM Grid Interface Service (DGIS). This new service translates between DICOM and Grid operations and thus transparently extends DICOM to Globus based Grid infrastructure. This Grid image workflow paradigm has been designed to provide not only solutions for global image communication, but fault-tolerance and disaster recovery using Grid data replication technology. Actual use-case of 40 MEDICUS Grid connected international hospitals of the Childerns Oncology Group and the Neuroblastoma Cancer Foundation and further clinical applications are discussed. The open-source Globus MEDICU http://dev.globus.org/wiki/Incubator/MEDICUS.
Hassan: A Virtual Human for Tactical Questioning.
Traum, D.; Roque, A.; Georgiou, P.; Gerten, J.; Martinovski, B.; Narayanan, S. S.; Robinson, S.; and Vaswani, A.
In Leuski, A., editor(s),
Proceedings of the 8th SIGdial Workshop on Discourse and Dialogue, pages 71-74, Sep 2007. ACL
link
bibtex
@inproceedings{Traum2007Hassan:AVirtualHuman,
author = {Traum, David and Roque, Antonio and Georgiou, Panayiotis and Gerten, Jillian and Martinovski, Bilyana and Narayanan, Shrikanth S. and Robinson, Susan and Vaswani, Ashish},
booktitle = {Proceedings of the 8th SIGdial Workshop on Discourse and Dialogue},
editor = {Leuski, Anton},
link = {http://sail.usc.edu/publications/files/traumsigdial07.pdf},
location = {Antwerp, Belgium},
month = {Sep},
organization = {ACL},
pages = {71-74},
title = {Hassan: A Virtual Human for Tactical Questioning},
year = {2007}
}
Hit-list worm detection and bot identification in large networks using protocol graphs.
Collins, M P.; and Reiter, M. K
In
Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings 10, pages 276–295, 2007. Springer Berlin Heidelberg
link
bibtex
@inproceedings{collins2007hit,
title={Hit-list worm detection and bot identification in large networks using protocol graphs},
author={Collins, M Patrick and Reiter, Michael K},
booktitle={Recent Advances in Intrusion Detection: 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007. Proceedings 10},
pages={276--295},
year={2007},
organization={Springer Berlin Heidelberg}
}
IPsec Security Policy Database Configuration MIB.
Baer, M.; Charlet, R.; Hardaker, W.; Story, R.; and Wang, C.
RFC 4807 (Proposed Standard), 03 2007.
Paper
doi
link
bibtex
abstract
@misc{rfc4807,
author="M. Baer and R. Charlet and W. Hardaker and R. Story and C. Wang",
title="{IPsec Security Policy Database Configuration MIB}",
howpublished="RFC 4807 (Proposed Standard)",
series="Internet Request for Comments",
type="RFC",
number="4807",
year=2007,
month=03,
issn="2070-1721",
publisher="RFC Editor",
institution="RFC Editor",
organization="RFC Editor",
address="Fremont, CA, USA",
url="https://www.rfc-editor.org/rfc/rfc4807.txt",
key="RFC 4807",
abstract={This document defines a Structure of Management Information Version 2 (SMIv2) Management Information Base (MIB) module for configuring the security policy database of a device implementing the IPsec protocol. The policy-based packet filtering and the corresponding execution of actions described in this document are of a more general nature than for IPsec configuration alone, such as for configuration of a firewall. This MIB module is designed to be extensible with other enterprise or standards-based defined packet filters and actions. [STANDARDS-TRACK]},
keywords="management information base, IPSEC-SPD-MIB",
doi="10.17487/RFC4807",
}
This document defines a Structure of Management Information Version 2 (SMIv2) Management Information Base (MIB) module for configuring the security policy database of a device implementing the IPsec protocol. The policy-based packet filtering and the corresponding execution of actions described in this document are of a more general nature than for IPsec configuration alone, such as for configuration of a firewall. This MIB module is designed to be extensible with other enterprise or standards-based defined packet filters and actions. [STANDARDS-TRACK]
Improved Speech Recognition Using Acoustic and Lexical Correlates of Pitch Accent in a N-best Rescoring Framework.
Ananthakrishnan, S.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), volume 4, pages 873-876, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_shankar:lexicalnbestrescoring:icassp07,
address = {Honolulu, Hawaii},
author = {Ananthakrishnan, Sankaranarayanan and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.367209},
link = {http://sail.usc.edu/publications/files/04218240.pdf},
month = {Apr},
pages = {873-876},
title = {Improved Speech Recognition Using Acoustic and Lexical Correlates of Pitch Accent in a N-best Rescoring Framework},
volume = {4},
year = {2007}
}
Incorporating tutoring principles into interactive knowledge acquisition.
Kim, J.; and Gil, Y.
Int. J. Hum. Comput. Stud., 65(10): 852–872. 2007.
Paper
doi
link
bibtex
2 downloads
@article{DBLP:journals/ijmms/KimG07,
author = {Jihie Kim and
Yolanda Gil},
title = {Incorporating tutoring principles into interactive knowledge acquisition},
journal = {Int. J. Hum. Comput. Stud.},
volume = {65},
number = {10},
pages = {852--872},
year = {2007},
url = {https://doi.org/10.1016/j.ijhcs.2007.06.003},
doi = {10.1016/J.IJHCS.2007.06.003},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijmms/KimG07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing.
Bartlett, G.; Heidemann, J.; and Papadopoulos, C.
In
Proceedings of the 10thIEEE Global Internet Symposium, Anchorage, Alaska, USA, May 2007. IEEE
An extended version of this paper is available as ISI-TR-2006-627
Paper
link
bibtex
abstract
@InProceedings{Bartlett07a,
author = "Genevieve Bartlett and John Heidemann and Christos Papadopoulos",
title = "Inherent Behaviors for On-line Detection of
Peer-to-Peer File Sharing",
booktitle = "Proceedings of the " # "10th" # " IEEE Global Internet Symposium",
year = 2007,
sortdate = "2007-05-01",
month = may,
publisher = "IEEE",
address = "Anchorage, Alaska, USA",
xxxpages = "xxx",
jlocation = "johnh: pafile",
note = "An extended version of this paper is available as ISI-TR-2006-627",
keywords = "peer-to-peer, traffic classification, encryption",
project = "ant, lander, predict",
jsubject = "traffic_detection",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07a.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "IEEE",
copyrightterms = " Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. ",
abstract = "
Blind techniques to detect network applications---approaches that do
not consider packet contents---are increasingly desirable because they
have fewer legal and privacy concerns, and they can be robust to
application changes and intentional cloaking. In this paper we
identify several behaviors that are \emph{inherent} to peer-to-peer
(P2P) traffic and demonstrate that they can detect both BitTorrent and
Gnutella hosts using only packet header and timing information. We
identify three basic behaviors: failed connections, the ratio of
incoming and outgoing connections, and the use of unprivileged ports.
We show that while individual behaviors are sometimes effective, they
work best when used together. We quantify the effectiveness of our
approach using two day-long traces, from 2005 and 2006, showing that
they are quite accurate: BitTorrent hosts are detected with an 83\%
true positive rate and only a 2\% false positive rate, and Gnutella
hosts with a 75\% true positive rate and a 4\% false postivie rate.
Our system is suitable for on-line use, with 75\% of BitTorrent hosts
detected in less than 10 minutes of trace data.
",
}
Blind techniques to detect network applications—approaches that do not consider packet contents—are increasingly desirable because they have fewer legal and privacy concerns, and they can be robust to application changes and intentional cloaking. In this paper we identify several behaviors that are \emphinherent to peer-to-peer (P2P) traffic and demonstrate that they can detect both BitTorrent and Gnutella hosts using only packet header and timing information. We identify three basic behaviors: failed connections, the ratio of incoming and outgoing connections, and the use of unprivileged ports. We show that while individual behaviors are sometimes effective, they work best when used together. We quantify the effectiveness of our approach using two day-long traces, from 2005 and 2006, showing that they are quite accurate: BitTorrent hosts are detected with an 83% true positive rate and only a 2% false positive rate, and Gnutella hosts with a 75% true positive rate and a 4% false postivie rate. Our system is suitable for on-line use, with 75% of BitTorrent hosts detected in less than 10 minutes of trace data.
Integrating Existing Scientific Workflow Systems: The Kepler/Pegasus Example.
Mandal, N.; Deelman, E.; Mehta, G.; Su, M.; and Vahi, K.
In
Proceedings of the Second Workshop on Workflows in Support of Large-Scale Science (WORKS07), 2007.
Paper
link
bibtex
@InProceedings{ mandal2007works,
Author = {Nandita Mandal and Ewa Deelman and Gaurang Mehta and
Mei-Hui Su and Karan Vahi},
URL = {http://pegasus.isi.edu/publications/kepler-works07.pdf},
Title = {Integrating Existing Scientific Workflow Systems: The
Kepler/Pegasus Example},
BookTitle = {Proceedings of the Second Workshop on Workflows in Support
of Large-Scale Science (WORKS07)},
Year = {2007}
}
Intelligent Optimization of Parallel and Distributed Applications.
Bansal, B.; Çatalyürek, Ü. V.; Chame, J.; Chen, C.; Deelman, E.; Gil, Y.; Hall, M. W.; Kumar, V. S.; Kurç, T. M.; Lerman, K.; Nakano, A.; Nelson, Y. L.; Saltz, J. H.; Sharma, A.; and Vashishta, P.
In
21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pages 1–6, 2007. IEEE
Paper
doi
link
bibtex
@inproceedings{DBLP:conf/ipps/BansalCCCDGHKKLNNSSV07,
author = {Bhupesh Bansal and
{\"{U}}mit V. {\c{C}}ataly{\"{u}}rek and
Jacqueline Chame and
Chun Chen and
Ewa Deelman and
Yolanda Gil and
Mary W. Hall and
Vijay S. Kumar and
Tahsin M. Kur{\c{c}} and
Kristina Lerman and
Aiichiro Nakano and
Yoon{-}Ju Lee Nelson and
Joel H. Saltz and
Ashish Sharma and
Priya Vashishta},
title = {Intelligent Optimization of Parallel and Distributed Applications},
booktitle = {21th International Parallel and Distributed Processing Symposium {(IPDPS}
2007), Proceedings, 26-30 March 2007, Long Beach, California, {USA}},
pages = {1--6},
publisher = {{IEEE}},
year = {2007},
url = {https://doi.org/10.1109/IPDPS.2007.370490},
doi = {10.1109/IPDPS.2007.370490},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ipps/BansalCCCDGHKKLNNSSV07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Internet Packet Size Distributions: Some Observations.
Sinha, R.; Papadopoulos, C.; and Heidemann, J.
Technical Report ISI-TR-2007-643, USC/Information Sciences Institute, May 2007.
Orignally released October 2005 as web page ˘rlhttp://netweb.usc.edu/%7ersinha/pkt-sizes/
Paper
link
bibtex
abstract
@TechReport{Sinha07a,
author = "Rishi Sinha and Christos Papadopoulos and John Heidemann",
title = "Internet Packet Size Distributions: Some Observations",
institution = "USC/Information Sciences Institute",
note = "Orignally released October 2005 as web page \url{http://netweb.usc.edu/%7ersinha/pkt-sizes/}",
year = 2007,
sortdate = "2007-05-01",
project = "ant",
jsubject = "traffic_modeling",
number = "ISI-TR-2007-643",
month = may,
jlocation = "johnh: pafile",
keywords = "internet packet size",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Sinha07a.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Sinha07a.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
This technical report captures the web page \url{http://netweb.usc.edu/%7ersinha/pkt-sizes/}, summarizing our observations
about packet sizes on the Internet in October 2005.
Other than reformatting, the technical content has not been changed.
",
}
This technical report captures the web page ˘rlhttp://netweb.usc.edu/%7ersinha/pkt-sizes/, summarizing our observations about packet sizes on the Internet in October 2005. Other than reformatting, the technical content has not been changed.
Interrelation between speech and facial gestures in emotional utterances: A single subject study.
Busso, C.; and Narayanan, S. S.
IEEE Transactions on Audio, Speech, and Language Processing, 15(8): 2331-2347. Nov 2007.
doi
link
bibtex
@article{Busso2007Interrelationbetweenspeechand,
author = {Busso, Carlos and Narayanan, Shrikanth S.},
bib2html_rescat = {},
doi = {10.1109/TASL.2007.905145},
journal = {IEEE Transactions on Audio, Speech, and Language Processing},
link = {http://sail.usc.edu/publications/files/bussotaslp2007[1].pdf},
month = {Nov},
number = {8},
pages = {2331-2347},
title = {Interrelation between speech and facial gestures in emotional utterances: A single subject study},
volume = {15},
year = {2007}
}
Investigating Implicit Cues for User State Estimation in Human-robot Interaction Using Physiological Measurements.
Mower, E.; Feil-Seifer, D.; Mataric, M. J.; and Narayanan, S. S.
In
Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN), pages 1125-1130, Jeju Island, Korea, Aug 2007.
doi
link
bibtex
@inproceedings{proc_emily:implicitcueshumanrobotphysiological:07,
address = {Jeju Island, Korea},
author = {Mower, Emily and Feil-Seifer, David and Mataric, Maja J. and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion},
booktitle = {Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication (RO-MAN)},
doi = {10.1109/ROMAN.2007.4415249},
link = {http://sail.usc.edu/publications/files/04415249.pdf},
month = {Aug},
pages = {1125-1130},
title = {Investigating Implicit Cues for User State Estimation in Human-robot Interaction Using Physiological Measurements},
year = {2007}
}
Joint analysis of the emotional fingerprint in the face and speech: A single subject study.
Busso, C.; and Narayanan, S. S.
In
Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 43-47, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_carlos:emotionalfingerprint:mmsp07,
address = {Chania, Greece},
author = {Busso, Carlos and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion},
booktitle = {Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {10.1109/MMSP.2007.4412814},
link = {http://sail.usc.edu/publications/files/BussoMMSP2007.pdf},
month = {Oct},
pages = {43-47},
title = {Joint analysis of the emotional fingerprint in the face and speech: A single subject study},
year = {2007}
}
Learning expressive human-like head motion sequences from speech.
Busso, C.; Deng, Z.; Neumann, U.; and Narayanan, S. S.
In Deng, Z., editor(s),
Data-Driven 3D Facial Animations, pages 113-131. Springer-Verlag Press, 2007.
doi
link
bibtex
@incollection{Busso2007Learningexpressivehuman-likehead,
author = {Busso, Carlos and Deng, Zhigang and Neumann, Ulrich and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Data-Driven 3D Facial Animations},
doi = {https://doi.org/10.1007/978-1-84628-907-1_6},
editor = {Deng, Zhigang},
link = {http://sail.usc.edu/publications/files/BussoData-Driven3DFacialAnimations2007.pdf},
pages = {113-131},
publisher = {Springer-Verlag Press},
title = {Learning expressive human-like head motion sequences from speech},
year = {2007}
}
Lunar descent and landing technique development through real-time earth based flight dynamics operations.
Barnhart, D.; Barrett, T.; Rahman, O.; Raskin, C.; Rudolph; and Michael
In
58th International Astronautical Congress, 2007.
link
bibtex
@inproceedings{barnhart2007lunar,
title={Lunar descent and landing technique development through real-time earth based flight dynamics operations},
author={Barnhart, David and Barrett, Tim and Rahman, Omair and Raskin, Cassandra and Rudolph and Michael},
booktitle={58th International Astronautical Congress},
year={2007}
}
MAC Stability in Sensor Networks at High Network Densities.
McHenry, T.; and Heidemann, J.
Technical Report ISI-TR-2007-628, USC/Information Sciences Institute, January 2007.
Paper
link
bibtex
abstract
@TechReport{McHenry07a,
author = "Tyler McHenry and John Heidemann",
title = "MAC Stability in Sensor Networks at High Network Densities",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-01-01",
project = "ilense",
jsubject = "sensornet_subtransport",
number = "ISI-TR-2007-628",
month = jan,
location = "johnh: pafile",
keywords = "dense network operation",
url = "http://www.isi.edu/%7ejohnh/PAPERS/McHenry07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/McHenry07a.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Although MAC protocols have been the subject of extensive study, there
has been little study of MAC operation as network density (number of
neighbors per node) increases. Although network densities are often
low (2--12 neighbors), density can rise in special situations (such as
hundreds of people attending a conference in the same room) and new
deployments (such as dense instrumentation of a structure with a
sensor network). In anticipation of these applications, this paper
studies the stability of S-MAC as network density increases to
densities of 50 to 150 neighbors, well beyond its current design
parameters. We present a mathematical model of expected behavior,
then use experiments to show the importance of accounting for clock
offset. Although offset cannot easily be modeled, we show that a
simulation closely matches the experimental data. Finally, we
describe how an offset-aware MAC can correct for hardware variation to
allow operations at twice the density of current S-MAC. Although the
details are specific to S-MAC, the results apply more generally.
",
}
Although MAC protocols have been the subject of extensive study, there has been little study of MAC operation as network density (number of neighbors per node) increases. Although network densities are often low (2–12 neighbors), density can rise in special situations (such as hundreds of people attending a conference in the same room) and new deployments (such as dense instrumentation of a structure with a sensor network). In anticipation of these applications, this paper studies the stability of S-MAC as network density increases to densities of 50 to 150 neighbors, well beyond its current design parameters. We present a mathematical model of expected behavior, then use experiments to show the importance of accounting for clock offset. Although offset cannot easily be modeled, we show that a simulation closely matches the experimental data. Finally, we describe how an offset-aware MAC can correct for hardware variation to allow operations at twice the density of current S-MAC. Although the details are specific to S-MAC, the results apply more generally.
Mapping the Internet Address Space (Poster).
Heidemann, J.; and Pradkin, Y.
. August 2007.
Paper
link
bibtex
abstract
@Article{Heidemann07f,
author = "John Heidemann and Yuri Pradkin",
title = "Mapping the Internet Address Space (Poster)",
year = 2007,
sortdate = "2007-08-01",
project = "ant, lander, lacrend",
jsubject = "topology_modeling",
month = aug,
myorganization = "USC/Information Sciences Institute",
abstract = "(no abstract)",
url = "https://ant.isi.edu/address/",
myorganization = "USC/Information Sciences Institute",
codeurl = "",
dataseturl = "https://ant.isi.edu/datasets/all.html",
blogurl = ""
}
(no abstract)
Minimum probability of error signal representation.
Silva, J.; and Narayanan, S. S.
In
Proceedings of the IEEE Machine Learning for Signal Processing (MLSP) Workshop, pages 348-353, Thessaloniki, Greece, Aug 2007.
doi
link
bibtex
@inproceedings{proc_jorge:minproberrorsignalrep:07,
address = {Thessaloniki, Greece},
author = {Silva, Jorge and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the IEEE Machine Learning for Signal Processing (MLSP) Workshop},
doi = {https://doi.org/10.1109/mlsp.2007.4414331},
link = {http://sail.usc.edu/publications/files/SilvaMLSP2007.pdf},
month = {Aug},
pages = {348-353},
title = {Minimum probability of error signal representation},
year = {2007}
}
Modeling Human Perception of Situation Awareness During Constructive Experimentation.
Colon, P.; Anhalt, M.; Curiel, J.; Yao, K.; and Tran, J.
In
Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC), Orlando, Florida, 2007.
link
bibtex
@inproceedings{colon_modeling_2007,
address = {Orlando, Florida},
title = {Modeling {Human} {Perception} of {Situation} {Awareness} {During} {Constructive} {Experimentation}},
booktitle = {Interservice/{Industry} {Training}, {Simulation}, and {Education} {Conference} ({I}/{ITSEC})},
author = {Colon, Philip and Anhalt, Michael and Curiel, Jacqueline and Yao, Ke-Thia and Tran, John},
year = {2007},
}
Multimodal meeting monitoring: Improvements on speaker tracking and segmentation through a modified mixture particle filter.
Rozgic, V.; Busso, C.; Georgiou, P.; and Narayanan, S. S.
In
Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 60-65, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_viktor:multimodalmeeting:mmsp07,
address = {Chania, Greece},
author = {Rozgic, Viktor and Busso, Carlos and Georgiou, Panayiotis and Narayanan, Shrikanth S.},
booktitle = {Proceedings of IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {10.1109/MMSP.2007.4412818},
link = {http://sail.usc.edu/publications/files/rozgicmmsp2007.pdf},
month = {Oct},
pages = {60-65},
title = {Multimodal meeting monitoring: Improvements on speaker tracking and segmentation through a modified mixture particle filter},
year = {2007}
}
On Implementing Graph Cuts on CUDA.
Hussein, M.; Varshney, A.; and Davis, L.
In
First Workshop on General Purpose Processing on Graphics Processing Units, Boston, MA, October 2007.
link
bibtex
@inproceedings{hussein_graph_cut_gpu_2007,
author = {Mohamed Hussein and Amitabh Varshney and Larry Davis},
title = {On Implementing Graph Cuts on CUDA},
booktitle = {First Workshop on General Purpose Processing on Graphics Processing
Units},
year = {2007},
address = {Boston, MA},
month = {October}
}
On Web Browsing Privacy in Anonymized NetFlows.
Coull, S. E; Collins, M. P; Wright, C. V; Monrose, F.; Reiter, M. K; and others
In
USENIX Security Symposium, pages 339–352, 2007.
link
bibtex
@inproceedings{coull2007web,
title={On Web Browsing Privacy in Anonymized NetFlows.},
author={Coull, Scott E and Collins, Michael P and Wright, Charles V and Monrose, Fabian and Reiter, Michael K and others},
booktitle={USENIX Security Symposium},
pages={339--352},
year={2007}
}
On the Black Art of Designing Computational Workflows.
Gil, Y.; Gonzalez-Calero, P. A.; and Deelman, E.
In
Proceedings of the Second Workshop on Workflows in Support of Large-Scale Science (WORKS), held in conjunction with the IEEE International Symposium on High Performance Distributed Computing (HPDC), Monterrey, CA, 2007.
Paper
link
bibtex
@inproceedings{ gil-etal-works07,
title = {On the Black Art of Designing Computational Workflows},
author = {Yolanda Gil and Pedro A. Gonzalez-Calero and Ewa Deelman},
booktitle = {Proceedings of the Second Workshop on Workflows in Support of Large-Scale Science (WORKS), held in conjunction with the IEEE International Symposium on High Performance Distributed Computing (HPDC)},
address = {Monterrey, CA},
year = {2007},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/gil-etal-works07.pdf }
}
Optimal wavelet packets decomposition based on a rate-distortion optimality criterion.
Silva, J.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 817-820, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_silva:waveletpacketsratedistortion:icassp07,
address = {Honolulu, Hawaii},
author = {Silva, Jorge and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {https://doi.org/10.1109/icassp.2007.366805},
link = {http://sail.usc.edu/publications/files/SilvaICASSP2007[2].pdf},
month = {Apr},
pages = {817-820},
title = {Optimal wavelet packets decomposition based on a rate-distortion optimality criterion},
year = {2007}
}
Optimization of Memory Allocation in VSIPL.
Suh, J.; McMahon, J. O.; Kang, D.; and Crago, S. P.
In
High Performance Embedded Computing (HPEC), Poster Session, September 2007.
Paper
link
bibtex
@inproceedings{Suh2007,
author= {Suh, Jinwoo and McMahon, Janice O. and Kang, Dong-In and Crago, Stephen P.},
title= {Optimization of Memory Allocation in VSIPL},
booktitle= {High Performance Embedded Computing (HPEC), Poster Session},
location= {Lexington, Massachusetts},
month= {September},
year= {2007},
url = {https://archive.ll.mit.edu/HPEC/agendas/proc07/Day1/16_Suh_Abstract.pdf}
}
.
Deelman, E.; Mehta, G.; Singh, G.; Su, M.; and Vahi, K.
Pegasus: Mapping Large-Scale Workflows to Distributed Resources. 2007.
link
bibtex
@InBook{ deelman2007pegasusmapping,
Author = {Ewa Deelman and Gaurang Mehta and Gurmeet Singh and
Mei-Hui Su and Karan Vahi},
Title = {Pegasus: Mapping Large-Scale Workflows to Distributed
Resources},
BookTitle = {Workflows for e-Science},
Year = {2007}
}
Personalizing Results of Image Search on Flickr.
Lerman, K.; Plangprasopchok, A.; and Wong, M. C.
In
Proceedings of AAAI workshop on Intelligent Techniques for Web Personlization, 2007.
Paper
link
bibtex
@INPROCEEDINGS{Lerman07flickrsearch,
AUTHOR = {Kristina Lerman and Anon Plangprasopchok and Michael C. Wong},
TITLE = {Personalizing Results of Image Search on Flickr},
BOOKTITLE = {Proceedings of AAAI workshop on Intelligent Techniques for Web Personlization},
YEAR = {2007},
keywords = {social-annotation},
urlPaper = {http://arxiv.org/abs/0704.1676},
}
Preliminary Study toward Intelligent Run-time Resource Management Techniques for Large Multi-Core Architectures.
Kang, D.; Suh, J.; McMahon, J. O.; and Crago, S. P.
In
High Performance Embedded Computing (HPEC), September 2007.
link
bibtex
@inproceedings{Kang2007,
author= {Kang, Dong-In and Suh, Jinwoo and McMahon, Janice O. and Crago, Stephen P.},
title= {Preliminary Study toward Intelligent Run-time Resource Management Techniques for Large Multi-Core Architectures},
booktitle= {High Performance Embedded Computing (HPEC)},
location= {Lexington, Massachusetts},
month= {September},
year= {2007}
}
Primitives-based evaluation and estimations of emotions in speech.
Grimm, M.; Kroschel, K.; Mower, E.; and Narayanan, S. S.
Speech Communication, 49(10-11): 787-800. Nov 2007.
doi
link
bibtex
@article{Grimm2007Primitives-basedevaluationandestimations,
author = {Grimm, Michael and Kroschel, Kristian and Mower, Emily and Narayanan, Shrikanth S.},
doi = {10.1016/j.specom.2007.01.010},
journal = {Speech Communication},
keyword = {emotion estimation, emotion expression variations, emotion recognition, emotion space concept, fuzzy logic, man machine interaction, natural speech understanding, speech analysis},
link = {http://sail.usc.edu/publications/files/grimmspcom2007.pdf},
month = {Nov},
number = {10-11},
pages = {787-800},
title = {Primitives-based evaluation and estimations of emotions in speech},
volume = {49},
year = {2007}
}
Privacy Enforcement in Data Analysis Workflows.
Gil, Y.; Cheung, W. K.; Ratnakar, V.; and Chan, K.
In
Proceedings of the AAAI Workshop on Privacy Enforcement and Accountability with Semantics (PEAS), held in conjunction with the Sixth International Semantic Web Conference (ISWC) and the Second Asian Semantic Web Conference (ASWC), Busan, Korea, 2007.
Paper
link
bibtex
4 downloads
@inproceedings{ gil-etal-peas07,
title = {Privacy Enforcement in Data Analysis Workflows},
author = {Yolanda Gil and William K. Cheung and Varun Ratnakar and Kai-kin Chan},
booktitle = {Proceedings of the AAAI Workshop on Privacy Enforcement and Accountability with Semantics (PEAS), held in conjunction with the Sixth International Semantic Web Conference (ISWC) and the Second Asian Semantic Web Conference (ASWC)},
address = {Busan, Korea},
year = {2007},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/gil-etal-peas07.pdf }
}
Prosody-enriched lattices for improved syllable recognition.
Ananthakrishnan, S.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 1813-1816, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_shankar:prosodylatticessyllable:icslp07,
address = {Antwerp, Belgium},
author = {Ananthakrishnan, Sankaranarayanan and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/AnanthakrishnanInterSpeech2007.pdf},
month = {Aug},
pages = {1813-1816},
title = {Prosody-enriched lattices for improved syllable recognition},
year = {2007}
}
Provenance Trails in the Wings/Pegasus Workflow System.
Kim, J.; Deelman, E.; Gil, Y.; Mehta, G.; and Ratnakar, V.
Concurrency and Computation: Practice and Experience, Special Issue on the First Provenance Challenge. 2007.
Paper
link
bibtex
@Article{ kim2007provenance,
Author = {Jihie Kim and Ewa Deelman and Yolanda Gil and Gaurang
Mehta and Varun Ratnakar},
URL = {http://pegasus.isi.edu/publications/CCPE07-Provenance.pdf},
Title = {Provenance Trails in the Wings/Pegasus Workflow System},
Journal = {Concurrency and Computation: Practice and Experience,
Special Issue on the First Provenance Challenge},
Year = {2007}
}
Quality-Driven Geospatial Data Integration.
Thakkar, S.; Knoblock, C. A.; and Ambite, J. L.
In
Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (ACMGIS 07), 2007.
Paper
link
bibtex
1 download
@inproceedings{thakkar07:acmgis,
AUTHOR = {Snehal Thakkar and Craig A. Knoblock and Jos\'{e} Luis Ambite},
TITLE = {Quality-Driven Geospatial Data Integration},
YEAR = 2007,
BOOKTITLE = {Proceedings of the 15th ACM International Symposium on Advances in Geographic Information Systems (ACMGIS 07)},
urlPaper= "http://usc-isi-i2.github.io/papers/thakkar07-acmgis.pdf",
Keywords = {"Geospatial Integration"}}
Real-Time Human Detection and Tracking from Mobile Vehicles.
Abd-Almageed, W.; Hussein, M.; Abdelkader, M.; and Davis, L.
In
2007 IEEE Intelligent Transportation Systems Conference, pages 149–154, 2007.
doi
link
bibtex
abstract
@inproceedings{abd-almageed_real-time_2007,
title = {Real-Time Human Detection and Tracking from Mobile Vehicles},
rights = {All rights reserved},
doi = {10.1109/ITSC.2007.4357721},
abstract = {This paper presents a real-time system for detecting and tracking humans from mobile vehicles. The system integrates human detection and tracking algorithms and employs depth information obtained from a stereo vision system. Depth information is used to limit the search space of the detector. We also present a simpler and faster variant of the popular Adaboost human detector. Experimental results demonstrate that integrating depth information vastly reduces the false detection rate compared with detection without stereo. Also, we show that integrating stereo enables the detection and tracking subsystem to operate in real-time.},
eventtitle = {2007 {IEEE} Intelligent Transportation Systems Conference},
pages = {149--154},
booktitle = {2007 {IEEE} Intelligent Transportation Systems Conference},
author = {Abd-Almageed, W. and Hussein, M. and Abdelkader, M. and Davis, L.},
date = {2007-09},
year = {2007},
keywords = {Adaboost human detector, Detectors, Humans, Image edge detection, image recognition, Intelligent transportation systems, Intelligent vehicles, mobile vehicle, Motion analysis, Motion detection, motion estimation, object detection, optical tracking, Real time systems, real-time human detection, real-time human tracking, real-time systems, road vehicles, stereo image processing, stereo vision system, Tracking, traffic engineering computing, Vehicle detection},
file = {IEEE Xplore Abstract Record:C\:\\Users\\Mohamed Hussein\\Zotero\\storage\\PGJXP5XE\\4357721.html:text/html}
}
This paper presents a real-time system for detecting and tracking humans from mobile vehicles. The system integrates human detection and tracking algorithms and employs depth information obtained from a stereo vision system. Depth information is used to limit the search space of the detector. We also present a simpler and faster variant of the popular Adaboost human detector. Experimental results demonstrate that integrating depth information vastly reduces the false detection rate compared with detection without stereo. Also, we show that integrating stereo enables the detection and tracking subsystem to operate in real-time.
Real-time Monitoring of Participants Interaction in a Meeting Using Audio-Visual Sensors.
Busso, C.; Georgiou, P.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 685-688, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_busso:monitoringmeetingsensors:icassp07,
address = {Honolulu, Hawaii},
author = {Busso, Carlos and Georgiou, Panayiotis and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.366328},
link = {http://sail.usc.edu/publications/files/busso2007_real-time-monit.pdf},
month = {Apr},
pages = {685-688},
title = {Real-time Monitoring of Participants Interaction in a Meeting Using Audio-Visual Sensors},
year = {2007}
}
Real-time emotion detection system using speech: Multi-modal fusion of different timescale features.
Kim, S.; Georgiou, P.; Lee, S.; and Narayanan, S. S.
In
Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 48-51, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_samuel:multimodalfusiontimescalefeatures:mmsp07,
address = {Chania, Greece},
author = {Kim, Samuel and Georgiou, Panayiotis and Lee, Sungbok and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion},
booktitle = {Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {10.1109/MMSP.2007.4412815},
link = {http://sail.usc.edu/publications/files/KimMMSP2007.pdf},
month = {Oct},
pages = {48-51},
title = {Real-time emotion detection system using speech: Multi-modal fusion of different timescale features},
year = {2007}
}
Reconfigurable Computing Cluster (RCC) Project: Investigating the Feasibility of FPGA-Based Petascale Computing.
Sass, R.; Kritikos, W. V.; Schmidt, A. G.; Beeravolu, S.; Beeraka, P.; Datta, K.; Andrews, D.; Miller, R. S.; and Stanzione, D.
In
Proceedings of the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM\textquoteright07), 2007. IEEE Computer Society
link
bibtex
@inproceedings{sass2007a,
author = {Ron Sass and William V. Kritikos and Andrew G. Schmidt and Srinivas Beeravolu and Parag Beeraka and Kushal Datta and David Andrews and Richard S. Miller and Daniel Stanzione, Jr.},
booktitle = {Proceedings of the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM{\textquoteright}07)},
publisher = {IEEE Computer Society},
title = {Reconfigurable Computing Cluster (RCC) Project: Investigating the Feasibility of FPGA-Based Petascale Computing},
year = {2007}}
Reconfigurable FPGA-based Clusters: Next Step in Supercomputing.
Venugopalan, V.
2007.
link
bibtex
@conference{Venugopalan2007Reconfigur,
author = {Venugopalan, Vivek},
booktitle = {23rd GSA Research Symposium at Virginia Tech},
date-added = {2021-01-30 10:24:01 -0500},
date-modified = {2021-01-30 10:24:01 -0500},
title = {{Reconfigurable FPGA-based Clusters: Next Step in Supercomputing}},
year = {2007}}
Rigid head motion in expressive speech animation: Analysis and synthesis.
Busso, C.; Deng, Z.; Grimm, M.; Neumann, U.; and Narayanan, S. S.
IEEE Transactions on Audio, Speech, and Language Processing, 15(3): 1075-1086. Mar 2007.
doi
link
bibtex
@article{Busso2007Rigidheadmotionin,
author = {Busso, Carlos and Deng, Zhigang and Grimm, Michael and Neumann, Ulrich and Narayanan, Shrikanth S.},
bib2html_rescat = {emotion},
doi = {10.1109/TASL.2006.885910},
journal = {IEEE Transactions on Audio, Speech, and Language Processing},
link = {http://sail.usc.edu/publications/files/BussoTASLP2007[2].pdf},
month = {Mar},
number = {3},
pages = {1075-1086},
title = {Rigid head motion in expressive speech animation: Analysis and synthesis},
volume = {15},
year = {2007}
}
Robust Speaker Clustering Strategies to Data Source Variation for Improved Speaker Diarization.
Han, K. J.; Kim, S.; and Narayanan, S. S.
In
Proceedings of the IEEE Automatic Speech Recognition and Understanding (ASRU) Workshop, pages 262-267, Kyoto, Japan, Dec 2007.
doi
link
bibtex
@inproceedings{proc_kyu:robustspeakercluster:asru07,
address = {Kyoto, Japan},
author = {Han, Kyu Jeong and Kim, Samuel and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the IEEE Automatic Speech Recognition and Understanding (ASRU) Workshop},
doi = {10.1109/ASRU.2007.4430121},
link = {http://sail.usc.edu/publications/files/HanASRU2007.pdf},
month = {Dec},
pages = {262-267},
title = {Robust Speaker Clustering Strategies to Data Source Variation for Improved Speaker Diarization},
year = {2007}
}
Robust Speaker Identification Based on Selective Use of Feature Vectors.
Kwon, S.; and Narayanan, S. S.
Pattern Recognition Letters, 28(1): 85-89. Jan 2007.
doi
link
bibtex
@article{Kwon2007Robustspeakeridentificationbased,
author = {Kwon, Soonil and Narayanan, Shrikanth S.},
bib2html_rescat = {},
doi = {10.1016/j.patrec.2006.06.009},
journal = {Pattern Recognition Letters},
link = {http://sail.usc.edu/publications/files/KwonPRL2007.pdf},
month = {Jan},
number = {1},
pages = {85-89},
title = {Robust Speaker Identification Based on Selective Use of Feature Vectors},
volume = {28},
year = {2007}
}
Robust speech rate estimation for spontaneous speech.
Wang, D.; and Narayanan, S. S.
IEEE Transactions on Audio, Speech, and Language Processing, 15(8): 2190-2201. Nov 2007.
doi
link
bibtex
@article{Wang2007Robustspeechrateestimation,
author = {Wang, Dagen and Narayanan, Shrikanth S.},
bib2html_rescat = {},
doi = {10.1109/TASL.2007.905178},
journal = {IEEE Transactions on Audio, Speech, and Language Processing},
link = {http://sail.usc.edu/publications/files/WangTASLP2007[2].pdf},
month = {Nov},
number = {8},
pages = {2190-2201},
title = {Robust speech rate estimation for spontaneous speech},
volume = {15},
year = {2007}
}
.
Maechling, P.; Deelman, E.; Zhao, L.; Graves, R.; Mehta, G.; Gupta, N.; Mehringer, J.; Kesselman, C.; Callaghan, S.; Okaya, D.; Francoeur, H.; Gupta, V.; Cui, Y.; Vahi, K.; Jordan, T.; and Field, E.
SCEC CyberShake Workflows: Automating Probabilistic Seismic Hazard Analysis Calculations. 2007.
link
bibtex
@InBook{ maechling2007automating,
Author = {Philip Maechling and Ewa Deelman and Li Zhao and Robert
Graves and Gaurang Mehta and Nitin Gupta and John Mehringer
and Carl Kesselman and Scott Callaghan and David Okaya and
Hunter Francoeur and Vipin Gupta and Yifeng Cui and Karan
Vahi and Thomas Jordan and Edward Field},
Title = {SCEC CyberShake Workflows: Automating Probabilistic
Seismic Hazard Analysis Calculations},
BookTitle = {Workflows for e-Science},
Year = {2007}
}
Scheduling Data-Intensive Workflows onto Storage-Constrained Distributed Resources.
Ramakrishnan, A.; Singh, G.; Zhao, H.; Deelman, E.; Sakellariou, R.; Vahi, K.; Blackburn, K.; Meyers, D.; and Samidi, M.
In
Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid), 2007.
Paper
link
bibtex
@InProceedings{ ramakrishnan2007data,
Author = {Arun Ramakrishnan and Gurmeet Singh and Henan Zhao and Ewa
Deelman and Rizos Sakellariou and Karan Vahi and Kent
Blackburn and David Meyers and Michael Samidi},
URL = {http://pegasus.isi.edu/publications/Ramakrishnan-DataIntensiveWorkflow.pdf},
Title = {Scheduling Data-Intensive Workflows onto
Storage-Constrained Distributed Resources},
BookTitle = {Seventh IEEE International Symposium on Cluster Computing
and the Grid (CCGrid)},
Year = {2007}
}
Seer: A security experimentation environment for deter.
Schwab, S.; Wilson, B.; Ko, C.; and Hussain, A.
In
Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, pages 2–2, 2007.
link
bibtex
@inproceedings{schwab2007seer,
title={Seer: A security experimentation environment for deter},
author={Schwab, Stephen and Wilson, Brett and Ko, Calvin and Hussain, Alefiya},
booktitle={Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007},
pages={2--2},
year={2007}
}
Selecting on-topic sentences from natural language corpora.
Levit, M.; Boschee, E.; and Freedman, M.
In pages 2793-2796, 08 2007.
doi
link
bibtex
@inproceedings{inproceedings,
author = {Levit, Michael and Boschee, Elizabeth and Freedman, Marjorie},
year = {2007},
month = {08},
pages = {2793-2796},
title = {Selecting on-topic sentences from natural language corpora},
doi = {10.21437/Interspeech.2007-720}
}
Sensor-Internet Share and Search—Enabling Collaboration of Citizen Scientists.
Reddy, S.; Chen, G.; Fulkerson, B.; Kim, S. J.; Park, U.; Yau, N.; Cho, J.; Hansen, M.; and Heidemann, J.
In
Proceedings of the ACM Workshop on Data Sharing and Interoperability on the World-wide Sensor Web, pages 11–16, Cambridge, Mass., USA, April 2007. ACM
Paper
link
bibtex
abstract
@InProceedings{Reddy07a,
author = "Sasank Reddy and Gong Chen and Brian
Fulkerson and Sung Jin Kim and Unkyu Park and Nathan
Yau and Junghoo Cho and Mark Hansen and John Heidemann",
title = "Sensor-Internet Share and Search---Enabling Collaboration
of Citizen Scientists",
booktitle = "Proceedings of the " # " ACM Workshop on Data Sharing and Interoperability on the World-wide Sensor Web",
year = 2007,
sortdate = "2007-04-01",
project = "ilense, siss, cens",
jsubject = "sensornet_sharing",
publisher = "ACM",
address = "Cambridge, Mass., USA",
month = apr,
pages = "11--16",
location = "johnh: pafile",
keywords = "sensor internet sharing, SISS",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Reddy07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Reddy07a.pdf",
abstract = "
Over the last decade, embedded sensing systems have been successfully
deployed in a range of application areas, from education and science
to military and industry. These systems are becoming more robust,
capable, and widely adopted. Yet today, most sensor networks function
in isolated patches, each with different mechanisms to deliver data to
their users, and often have no formal methods to share data with
others. As sensornets become more numerous and their data more
valuable, it becomes increasingly important to have common means to
share data over the Internet. In addition to simplifying use of a
single sensornet, we seek to enable sharing of data across multiple
systems, and ultimately \emph{slogging} (sensornet logging), where a
single user may discover, process, and republish data from thousands
of independently operated sensors. To meet these goals we propose an
architecture to interconnect, share, and search sensor data. This
paper describes the building blocks of this architecture: sensor
stores, search engines, and publishers, joined by a common sensor data
streaming protocol. We then detail the research challenges that must
be addressed to meet our goal of enabling sensor access to users from
scientists, data analysts, to citizen scientists.
",
}
Over the last decade, embedded sensing systems have been successfully deployed in a range of application areas, from education and science to military and industry. These systems are becoming more robust, capable, and widely adopted. Yet today, most sensor networks function in isolated patches, each with different mechanisms to deliver data to their users, and often have no formal methods to share data with others. As sensornets become more numerous and their data more valuable, it becomes increasingly important to have common means to share data over the Internet. In addition to simplifying use of a single sensornet, we seek to enable sharing of data across multiple systems, and ultimately \emphslogging (sensornet logging), where a single user may discover, process, and republish data from thousands of independently operated sensors. To meet these goals we propose an architecture to interconnect, share, and search sensor data. This paper describes the building blocks of this architecture: sensor stores, search engines, and publishers, joined by a common sensor data streaming protocol. We then detail the research challenges that must be addressed to meet our goal of enabling sensor access to users from scientists, data analysts, to citizen scientists.
Sensornets and the Next Big Thing.
Heidemann, J.
Keynote talk at the European Conference on Wireless Sensor Networks, January 2007.
Delft, The Netherlands
Paper
link
bibtex
abstract
@Misc{Heidemann07b,
author = "John Heidemann",
title = "Sensornets and the Next Big Thing",
howpublished = "Keynote talk at the " # " European Conference on Wireless Sensor Networks",
note = "Delft, The Netherlands",
year = 2007,
sortdate = "2007-01-01",
project = "ilense",
jsubject = "sensornet_general",
month = jan,
location = "johnh: pafile",
keywords = "sensornet, vision, new directions",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Heidemann07b.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Heidemann07b.pdf",
abstract = "The last eight years have seen huge progress in sensornet
technologies: small computers and sensors costing tens of dollars,
tiny operating systems running in hundreds of bytes of memory,
short-range radios consuming minimal power, and multi-hop networks
covering local areas. As sensornet research continues, one tend is
``bigger'': more powerful computers and sensors, higher-level operating
systems services, mixes of radio technologies, and wide-area networks
connecting sensornets in global deployments. This talk will look at
these trends in new applications, and explore what principles from
small sensornets carry on.",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
}
The last eight years have seen huge progress in sensornet technologies: small computers and sensors costing tens of dollars, tiny operating systems running in hundreds of bytes of memory, short-range radios consuming minimal power, and multi-hop networks covering local areas. As sensornet research continues, one tend is ``bigger'': more powerful computers and sensors, higher-level operating systems services, mixes of radio technologies, and wide-area networks connecting sensornets in global deployments. This talk will look at these trends in new applications, and explore what principles from small sensornets carry on.
Social Browsing on Flickr.
Lerman, K.; and Jones, L.
In Glance, N. S.; Nicolov, N.; Adar, E.; Hurst, M.; Liberman, M.; and Salvetti, F., editor(s),
Proceedings of the First International Conference on Weblogs and Social Media, ICWSM 2007, Boulder, Colorado, USA, March 26-28, 2007, 2007.
Paper
link
bibtex
6 downloads
@inproceedings{DBLP:conf/icwsm/LermanJ07,
author = {Kristina Lerman and
Laurie Jones},
editor = {Natalie S. Glance and
Nicolas Nicolov and
Eytan Adar and
Matthew Hurst and
Mark Liberman and
Franco Salvetti},
title = {Social Browsing on Flickr},
booktitle = {Proceedings of the First International Conference on Weblogs and Social
Media, {ICWSM} 2007, Boulder, Colorado, USA, March 26-28, 2007},
year = {2007},
url = {http://www.icwsm.org/papers/paper27.html},
timestamp = {Fri, 05 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icwsm/LermanJ07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Spatial Behavior of Individuals and Groups: Preliminary Findings from a Museum Scenario.
Shell, D.; Viswanathan, S.; Huang, J.; Ghosh, R.; Huang, J.; Matarić, M.; Lerman, K.; and Sekuler, R.
In
Proceedings of IROS workshop on Spatial Behavior Modeling, 2007.
link
bibtex
@INPROCEEDINGS{Shell07iros,
AUTHOR = {D. Shell and S. Viswanathan and J. Huang and Rumi Ghosh and J. Huang and M. Matari{\'c}
and Kristina Lerman and R. Sekuler},
TITLE = {Spatial Behavior of Individuals and Groups: Preliminary Findings from a Museum Scenario},
BOOKTITLE = {Proceedings of IROS workshop on Spatial Behavior Modeling},
YEAR = {2007},
keywords = {social-dynamics},
}
Statistical modeling and retrieval of polyphonic music.
Unal, E.; Chew, E.; Georgiou, P.; and Narayanan, S. S.
In
Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP), pages 405-409, Chania, Greece, Oct 2007.
doi
link
bibtex
@inproceedings{proc_erdem:statmodelingpolyphonicmusic:mmsp07,
address = {Chania, Greece},
author = {Unal, Erdem and Chew, Elaine and Georgiou, Panayiotis and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the IEEE International Workshop on Multimedia Signal Processing (MMSP)},
doi = {https://doi.org/10.1109/mmsp.2007.4412902},
link = {http://sail.usc.edu/publications/files/UnalMMSP2007.pdf},
month = {Oct},
pages = {405-409},
title = {Statistical modeling and retrieval of polyphonic music},
year = {2007}
}
Studying the Spatial Correlation of Loss Patterns Among Communicating Wireless Sensor Nodes.
Murtaza, M. Z.; Heidemann, J.; and Stann, F.
Technical Report ISI-TR-2007-626, USC/Information Sciences Institute, March 2007.
This technical report is a public release of a USC/CSD directed research report done August, 2005.
Paper
link
bibtex
abstract
@TechReport{Murtaza07a,
author = "Muhammad Zaki Murtaza and John Heidemann and Fred Stann",
title = "Studying the Spatial Correlation of Loss Patterns Among
Communicating Wireless Sensor Nodes",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-03-01",
project = "ilense, nocredit, siss, srvc",
jsubject = "wireless_propagation",
number = "ISI-TR-2007-626",
note = "This technical report is a public release of a USC/CSD
directed research report done August, 2005.",
month = mar,
location = "johnh: pafile",
keywords = "wireless propagation, physical interference",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Murtaza07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Murtaza07a.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Simulation can be an important step in the development of software for
wireless sensor networks and has been the subject of intense research
in the past decade. The simulation software should account for all
possible factors affecting the wireless sensor networks. In this study
we have addressed the question of correlated loss in among the
communicating wireless sensor nodes. The results might help us update
simulation software. Our approach is to check the fluctuations in the
reception rates of the sensor nodes by introducing physical
interferences between sender and receiver nodes. We performed two
series of experiments in different surroundings. We show how the
introduction of the line-of-sight physical interference between sender
and receiver affects the reception rates. The results from this study
can shed new light over the question of correlated loss among sensor
nodes, experiencing the same kind of physical interference.
",
}
Simulation can be an important step in the development of software for wireless sensor networks and has been the subject of intense research in the past decade. The simulation software should account for all possible factors affecting the wireless sensor networks. In this study we have addressed the question of correlated loss in among the communicating wireless sensor nodes. The results might help us update simulation software. Our approach is to check the fluctuations in the reception rates of the sensor nodes by introducing physical interferences between sender and receiver nodes. We performed two series of experiments in different surroundings. We show how the introduction of the line-of-sight physical interference between sender and receiver affects the reception rates. The results from this study can shed new light over the question of correlated loss among sensor nodes, experiencing the same kind of physical interference.
Support vector regression for automatic recognition of spontaneous emotions in speech.
Grimm, M.; Kroschel, K.; and Narayanan, S. S.
In
Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 1085-1088, Honolulu, Hawaii, Apr 2007.
doi
link
bibtex
@inproceedings{proc_grimm:svregressionemotions:icassp07,
address = {Honolulu, Hawaii},
author = {Grimm, Michael and Kroschel, Kristian and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP)},
doi = {10.1109/ICASSP.2007.367262},
keyword = {EMOTION},
link = {http://sail.usc.edu/publications/files/GrimmICASSP2007.pdf},
month = {Apr},
pages = {1085-1088},
title = {Support vector regression for automatic recognition of spontaneous emotions in speech},
year = {2007}
}
T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks.
Syed, A. A.; Ye, W.; and Heidemann, J.
Technical Report ISI-TR-2007-638b, USC/Information Sciences Institute, April 2007.
Technical report originally released April 2007, updated July 2007
Paper
link
bibtex
abstract
@TechReport{Syed07a,
author = "Affan A. Syed and Wei Ye and John Heidemann",
title = "T-Lohi: A New Class of MAC Protocols for
Underwater Acoustic Sensor Networks",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-04-01",
project = "ilense, snuse, cisoft",
jsubject = "chronological",
number = "ISI-TR-2007-638b",
month = apr,
location = "johnh: pafile",
note = "Technical report originally released April 2007,
updated July 2007",
keywords = "Lohi, underwater MAC, acoustic networks",
supporting = "The simulator used in this paper is available at
\url{http://www.isi.edu/ilense/software/}.",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Syed07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Syed07a.pdf",
abstract = "
This paper introduces T-Lohi, a new class of distributed and
energy-efficient media-access protocols (MAC) for underwater acoustic
sensor networks (UWSN). MAC design for UWSN faces significant
challenges. For example, acoustic communication suffers from latencies
five orders-of-magnitude larger than radio communication, so a naive
CSMA MAC would require very long listen time resulting in low
throughput and poor energy efficiency. In this paper, we first
identify unique characteristics in underwater networking that may
affect all MACs, such as space-time uncertainty and deafness
conditions. We then develop T-Lohi employing a novel tone-based
reservation mechanism that exploits space-time uncertainty and high
latency to detect collisions and \emph{count contenders}, achieving
good throughput across all offered loads. It employs our low-power
wake-up receiver to significantly reduce energy consumption. Finally,
we evaluate design choices and protocol performance through extensive
simulation. The results show that the energy cost of packet
transmission is within~3--9\% of optimal, that our protocols achieve
good channel utilization, within~30\% of the theoretical maximum. We
also show that our protocols are stable and fair under both low and
very high offered loads.
",
}
% title = "Understanding Spatio-Temporal Uncertainty in Medium Access with {ALOHA} Protocols",
This paper introduces T-Lohi, a new class of distributed and energy-efficient media-access protocols (MAC) for underwater acoustic sensor networks (UWSN). MAC design for UWSN faces significant challenges. For example, acoustic communication suffers from latencies five orders-of-magnitude larger than radio communication, so a naive CSMA MAC would require very long listen time resulting in low throughput and poor energy efficiency. In this paper, we first identify unique characteristics in underwater networking that may affect all MACs, such as space-time uncertainty and deafness conditions. We then develop T-Lohi employing a novel tone-based reservation mechanism that exploits space-time uncertainty and high latency to detect collisions and \emphcount contenders, achieving good throughput across all offered loads. It employs our low-power wake-up receiver to significantly reduce energy consumption. Finally, we evaluate design choices and protocol performance through extensive simulation. The results show that the energy cost of packet transmission is within 3–9% of optimal, that our protocols achieve good channel utilization, within 30% of the theoretical maximum. We also show that our protocols are stable and fair under both low and very high offered loads.
The economics of QoS allocation strategies in the Internet: An empirical study.
Hwang, J.; Weiss, M. B.; McKnight, L. W.; and Wroclawski, J.
In
Internet services: The economics of quality of service in networked markets, grids, and markets. MIT Press, 2007.
link
bibtex
Towards Concurrent Communication in Wireless Networks.
Son, D.; Heidemann, J.; and Krishnamachari, B.
Technical Report ISI-TR-2007-648, USC/Information Sciences Institute, July 2007.
Paper
link
bibtex
abstract
@TechReport{Son07b,
author = "Dongjin Son and John Heidemann and Bhaskar Krishnamachari",
title = "Towards Concurrent Communication in Wireless Networks",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-07-01",
project = "ilense, nocredit, macss",
jsubject = "wireless_propagation",
number = "ISI-TR-2007-648",
month = jul,
location = "johnh: pafile",
keywords = "RTS/CTS, concurrent transmission, channel capture",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Son07b.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Son07b.pdf",
copyrightholder = "authors",
myorganization = "USC/Information Sciences Institute",
abstract = "
Avoiding collisions is one of the key roles of media-access (MAC)
protocols. Since MACAW and 802.11, carrier sense and exchange of
request-to-send (RTS) and clear-to-send (CTS) packets have been used
to prevent concurrent communication in wireless networks. Yet these
approaches have significant cost: they prevent \emph{all} concurrent
communication, even exchanges that might not result in loss; they
reduce end-to-end throughput in a multi-hop network; and control
traffic imposes control overhead on networks with small data payloads
such as 802.15.4. In this paper, we show that RTS/CTS is almost
\emph{never} desirable in modern wireless networks that support power
control and channel capture. We use four-node experiments with
802.15.4 radios to show that \emph{concurrent communication} is often
possible, depending on node locations and transmit powers. We
validate an SINR-based propagation model against these experiments and
use simulation to systematically explore how node location affects the
ability to communicate. Given optimal power settings, when two
sources are outside some minimal distance, they can communicate
concurrently with two receivers more than 80\% of the time. An
optimal algorithm requires perfect knowledge of the channel and
transmission state, so we then sketch \emph{Gain-Adaptive Power
Control}, a MAC protocol that provides significant benefit with only
local and prior information. Compared to optimal, we show that this
practical MAC can transmit concurrently 75\% of the time, but requires
a larger minimum source separation. We also show that least one
sender can capture the channel 77--88\% of the time, regardless of
source and receiver location, so the cost of failed concurrent
communication is only slightly worse than RTS/CTS. These results
provide compelling evidence that future MAC protocols should exploit
power control and channel capture.
",
}
% title = "{RMST}: Reliable Data Transport in Sensor Networks",
Avoiding collisions is one of the key roles of media-access (MAC) protocols. Since MACAW and 802.11, carrier sense and exchange of request-to-send (RTS) and clear-to-send (CTS) packets have been used to prevent concurrent communication in wireless networks. Yet these approaches have significant cost: they prevent \emphall concurrent communication, even exchanges that might not result in loss; they reduce end-to-end throughput in a multi-hop network; and control traffic imposes control overhead on networks with small data payloads such as 802.15.4. In this paper, we show that RTS/CTS is almost \emphnever desirable in modern wireless networks that support power control and channel capture. We use four-node experiments with 802.15.4 radios to show that \emphconcurrent communication is often possible, depending on node locations and transmit powers. We validate an SINR-based propagation model against these experiments and use simulation to systematically explore how node location affects the ability to communicate. Given optimal power settings, when two sources are outside some minimal distance, they can communicate concurrently with two receivers more than 80% of the time. An optimal algorithm requires perfect knowledge of the channel and transmission state, so we then sketch \emphGain-Adaptive Power Control, a MAC protocol that provides significant benefit with only local and prior information. Compared to optimal, we show that this practical MAC can transmit concurrently 75% of the time, but requires a larger minimum source separation. We also show that least one sender can capture the channel 77–88% of the time, regardless of source and receiver location, so the cost of failed concurrent communication is only slightly worse than RTS/CTS. These results provide compelling evidence that future MAC protocols should exploit power control and channel capture.
Towards Privacy Aware Data Analysis Workflows for e-Science.
Cheung, W.; and Gil, Y.
In
Proceedings of the AAAI Workshop on Semantic e-Science (SeS2007), held in conjunction with the Twenty-Second Conference of the Association for the Advancement of Artificial Intelligence (AAAI), Vancouver, British Columbia, Canada, 2007.
Paper
link
bibtex
2 downloads
@inproceedings{ cheung-gil-aaai-ses-07,
title = {Towards Privacy Aware Data Analysis Workflows for e-Science},
author = {William Cheung and Yolanda Gil},
booktitle = {Proceedings of the AAAI Workshop on Semantic e-Science (SeS2007), held in conjunction with the Twenty-Second Conference of the Association for the Advancement of Artificial Intelligence (AAAI)},
address = {Vancouver, British Columbia, Canada},
year = {2007},
url = {https://knowledgecaptureanddiscovery.github.io/yolanda_gil_website/papers/cheung-gil-aaai-ses-07.pdf }
}
Towards content trust of web resources.
Gil, Y.; and Artz, D.
J. Web Semant., 5(4): 227–239. 2007.
Paper
doi
link
bibtex
1 download
@article{DBLP:journals/ws/GilA07,
author = {Yolanda Gil and
Donovan Artz},
title = {Towards content trust of web resources},
journal = {J. Web Semant.},
volume = {5},
number = {4},
pages = {227--239},
year = {2007},
url = {https://doi.org/10.1016/j.websem.2007.09.005},
doi = {10.1016/J.WEBSEM.2007.09.005},
timestamp = {Tue, 16 Aug 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ws/GilA07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Towards user-centric metrics for denial-of-service measurement.
Mirkovic, J.; Hussain, A.; Wilson, B.; Fahmy, S.; Reiher, P.; Thomas, R.; Yao, W.; and Schwab, S.
In
Proceedings of the 2007 workshop on Experimental computer science, pages 8–es, 2007.
link
bibtex
@inproceedings{mirkovic2007towards,
title={Towards user-centric metrics for denial-of-service measurement},
author={Mirkovic, Jelena and Hussain, Alefiya and Wilson, Brett and Fahmy, Sonia and Reiher, Peter and Thomas, Roshan and Yao, Wei-Min and Schwab, Stephen},
booktitle={Proceedings of the 2007 workshop on Experimental computer science},
pages={8--es},
year={2007}
}
Understanding Passive and Active Service Discovery.
Bartlett, G.; Heidemann, J.; and Papadopoulos, C.
In
Proceedings of the ACM Internet Measurement Conference, pages to appear, San Diego, California, USA, October 2007. ACM
Paper
link
bibtex
abstract
@InProceedings{Bartlett07d,
author = "Genevieve Bartlett and John Heidemann and Christos Papadopoulos",
title = "Understanding Passive and Active Service
Discovery",
booktitle = "Proceedings of the " # "ACM Internet Measurement Conference",
year = 2007,
sortdate = "2007-10-01",
publisher = "ACM",
address = "San Diego, California, USA",
month = oct,
pages = "to appear",
jlocation = "johnh: pafile",
keywords = "passive service discovery, active service discovery",
project = "ant, lander, predict",
jsubject = "traffic_detection",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07d.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07d.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "ACM",
copyrightterms = "Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ",
abstract = "
Increasingly, network operators do not directly operate computers on
their network, yet are responsible for assessing network
vulnerabilities to ensure compliance with laws and policies about
information disclosure, and tracking services that affect
provisioning. Thus, with decentralized network management,
\emph{service discovery} becomes an important part of maintaining and
protecting computer networks. We explore two approaches to service
discovery: \emph{active probing} and \emph{passive monitoring}.
Active probing finds all services currently on the network, except
services temporarily unavailable or hidden by firewalls; however, it
is often too invasive, especially if used across administrative
boundaries. Passive monitoring is typically much slower and can find
transient services, but misses services that are idle. We compare the
accuracy of passive and active approaches to service discovery and
show that they are complimentary, highlighting the need for multiple
active scans coupled with long-duration passive monitoring. We find
passive monitoring is well suited for quickly finding popular
services, finding servers responsible for 99\% of incoming connections
within minutes. Active scanning is better suited to rapidly finding
\emph{all} servers, which is important for vulnerability
detection--one scan finds 98\% of services in two hours, missing only
a handful. External scans are an unexpected ally to passive
monitoring, speeding service discovery by the equivalent of 9--15 days
of additional observation. Finally, we show how the use of static or
dynamic addresses changes the effectiveness of service discovery, both
due to address reuse and VPN effects.
",
}
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with laws and policies about information disclosure, and tracking services that affect provisioning. Thus, with decentralized network management, \emphservice discovery becomes an important part of maintaining and protecting computer networks. We explore two approaches to service discovery: \emphactive probing and \emphpassive monitoring. Active probing finds all services currently on the network, except services temporarily unavailable or hidden by firewalls; however, it is often too invasive, especially if used across administrative boundaries. Passive monitoring is typically much slower and can find transient services, but misses services that are idle. We compare the accuracy of passive and active approaches to service discovery and show that they are complimentary, highlighting the need for multiple active scans coupled with long-duration passive monitoring. We find passive monitoring is well suited for quickly finding popular services, finding servers responsible for 99% of incoming connections within minutes. Active scanning is better suited to rapidly finding \emphall servers, which is important for vulnerability detection–one scan finds 98% of services in two hours, missing only a handful. External scans are an unexpected ally to passive monitoring, speeding service discovery by the equivalent of 9–15 days of additional observation. Finally, we show how the use of static or dynamic addresses changes the effectiveness of service discovery, both due to address reuse and VPN effects.
Understanding Passive and Active Service Discovery (extended).
Bartlett, G.; Heidemann, J.; and Papadopoulos, C.
Technical Report ISI-TR-2007-642, USC/Information Sciences Institute, May 2007.
To appear, ACM Internet Measurement Conference 2007
Paper
link
bibtex
abstract
@TechReport{Bartlett07b,
author = "Genevieve Bartlett and John Heidemann and Christos Papadopoulos",
title = "Understanding Passive and Active Service
Discovery (extended)",
institution = "USC/Information Sciences Institute",
year = 2007,
sortdate = "2007-05-01",
number = "ISI-TR-2007-642",
note = "To appear, ACM Internet Measurement Conference 2007",
month = may,
keywords = "passive service discovery, active service discovery",
project = "ant, lander, predict",
jsubject = "traffic_detection",
jlocation = "johnh: pafile",
url = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07b.html",
pdfurl = "https://ant.isi.edu/%7ejohnh/PAPERS/Bartlett07b.pdf",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "authors",
abstract = "
Increasingly, network operators do not directly operate computers on
their network, yet are responsible for assessing network
vulnerabilities to ensure compliance with laws and policies about
information disclosure, and tracking services that affect
provisioning. Thus, with decentralized network management,
\emph{service discovery} becomes an important part of maintaining and
protecting computer networks. We explore two approaches to service
discovery: \emph{active probing} and \emph{passive monitoring}.
Active probing finds all services currently on the network, except
services temporarily unavailable or hidden by firewalls; however, it
is often too invasive, especially if used across administrative
boundaries. Passive monitoring is typically much slower and can find
transient services, but misses services that are idle. We compare the
accuracy of passive and active approaches to service discovery and
show that they are complimentary, highlighting the need for multiple
active scans coupled with long-duration passive monitoring. We find
passive monitoring is well suited for quickly finding popular
services, finding servers responsible for 99\% of incoming connections
within minutes. Active scanning is better suited to rapidly finding
\emph{all} servers, which is important for vulnerability
detection--one scan finds 98\% of services in two hours, missing only
a handful. External scans are an unexpected ally to passive
monitoring, speeding service discovery by the equivalent of 9--15 days
of additional observation. Finally, we show how the use of static or
dynamic addresses changes the effectiveness of service discovery, both
due to address reuse and VPN effects.
",
}
Increasingly, network operators do not directly operate computers on their network, yet are responsible for assessing network vulnerabilities to ensure compliance with laws and policies about information disclosure, and tracking services that affect provisioning. Thus, with decentralized network management, \emphservice discovery becomes an important part of maintaining and protecting computer networks. We explore two approaches to service discovery: \emphactive probing and \emphpassive monitoring. Active probing finds all services currently on the network, except services temporarily unavailable or hidden by firewalls; however, it is often too invasive, especially if used across administrative boundaries. Passive monitoring is typically much slower and can find transient services, but misses services that are idle. We compare the accuracy of passive and active approaches to service discovery and show that they are complimentary, highlighting the need for multiple active scans coupled with long-duration passive monitoring. We find passive monitoring is well suited for quickly finding popular services, finding servers responsible for 99% of incoming connections within minutes. Active scanning is better suited to rapidly finding \emphall servers, which is important for vulnerability detection–one scan finds 98% of services in two hours, missing only a handful. External scans are an unexpected ally to passive monitoring, speeding service discovery by the equivalent of 9–15 days of additional observation. Finally, we show how the use of static or dynamic addresses changes the effectiveness of service discovery, both due to address reuse and VPN effects.
Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols.
Syed, A.; Ye, W.; Krishnamachari, B.; and Heidemann, J.
In
Proceedings of the SecondACM International Workshop on UnderWater Networks (WUWNet) , pages 41–48, Montréal, Quebec, Canada, September 2007. ACM
Paper
doi
link
bibtex
abstract
@InProceedings{Syed07b,
author = "Affan Syed and Wei Ye and Bhaskar Krishnamachari and John Heidemann",
title = "Understanding Spatio-Temporal Uncertainty in Medium Access with ALOHA Protocols",
booktitle = "Proceedings of the " # "Second" # " ACM International Workshop on UnderWater Networks ({WUWNet}) ",
year = 2007,
sortdate = "2007-09-01",
project = "ilense, snuse, cisoft",
jsubject = "sensornet_high_latency",
publisher = "ACM",
address = "Montr{\'e}al, Quebec, Canada",
month = sep,
pages = "41--48",
location = "johnh: pafile",
keywords = "ALOHA, underwater MAC",
myorganization = "USC/Information Sciences Institute",
copyrightholder = "ACM",
copyrightterms = "Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. ",
doi = "http://doi.acm.org/10.1145/1287812.1287822",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Syed07b.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Syed07b.pdf",
abstract = "
The goal of this paper is to gain deep understanding of how
location-dependent propagation latency affects medium access control
(MAC) by using ALOHA as a case study. MAC protocols in underwater
acoustic networks suffer from latency that is five orders-of-magnitude
larger than that in radio networks. Existing work on analyzing MAC
throughput in RF networks, where the propagation latency is
negligible, generally makes assumptions that render propagation
latency irrelevant. As a result, only transmit time is considered as
being uncertain in contention-based protocols. We introduce the
spatial dimension of uncertainty that is inherent to varying locations
of transmitters, resulting in unequal propagation latency to a
receiver, where collision occurs. We show through simulation that the
benefit of synchronization in slotted ALOHA is lost due to such
latency. We propose a modification that adds guard bands to
transmission slots to handle spatial uncertainty. We then perform
simulation and first order analysis on this modified MAC to find its
optimal operating parameters.
",
}
% title = "{T-Lohi}: A New Class of {MAC} Protocols for
% Underwater Acoustic Sensor Networks",
The goal of this paper is to gain deep understanding of how location-dependent propagation latency affects medium access control (MAC) by using ALOHA as a case study. MAC protocols in underwater acoustic networks suffer from latency that is five orders-of-magnitude larger than that in radio networks. Existing work on analyzing MAC throughput in RF networks, where the propagation latency is negligible, generally makes assumptions that render propagation latency irrelevant. As a result, only transmit time is considered as being uncertain in contention-based protocols. We introduce the spatial dimension of uncertainty that is inherent to varying locations of transmitters, resulting in unequal propagation latency to a receiver, where collision occurs. We show through simulation that the benefit of synchronization in slotted ALOHA is lost due to such latency. We propose a modification that adds guard bands to transmission slots to handle spatial uncertainty. We then perform simulation and first order analysis on this modified MAC to find its optimal operating parameters.
Underwater Networking Research at USC/ISI.
Heidemann, J.; Ye, W.; and Wills, J.
In
Proceedings of the Undersea Distributed Networked Systems Conference, Newport, Rhode Island, USA, February 2007.
Paper
link
bibtex
abstract
@InProceedings{Heidemann07a,
author = "John Heidemann and Wei Ye and Jack Wills",
title = "Underwater Networking Research at {USC/ISI}",
booktitle = "Proceedings of the " # "Undersea Distributed Networked Systems Conference",
year = 2007,
sortdate = "2007-02-01",
project = "ilense",
jsubject = "sensornet_high_latency",
xxxpublisher = "xxx",
address = "Newport, Rhode Island, USA",
month = feb,
xxxpages = "to appear?",
location = "johnh: pafile",
keywords = "underwater sensornet, overview",
url = "http://www.isi.edu/%7ejohnh/PAPERS/Heidemann07a.html",
pdfurl = "http://www.isi.edu/%7ejohnh/PAPERS/Heidemann07a.pdf",
abstract = "No formal abstract, but this 1-page white paper
summarizes ongoing research in underwater
sensor networking at USC/ISI as of 2007",
}
No formal abstract, but this 1-page white paper summarizes ongoing research in underwater sensor networking at USC/ISI as of 2007
Universal consistency of data-driven partitions for divergence estimation.
Silva, J.; and Narayanan, S. S.
In
Proceedings of the IEEE International Symposium on Information Theory (ISIT), pages 2021-2025, Nice, France, Jun 2007.
doi
link
bibtex
@inproceedings{proc_jorge:consistencypartitionsdivergenceest:07,
address = {Nice, France},
author = {Silva, Jorge and Narayanan, Shrikanth S.},
booktitle = {Proceedings of the IEEE International Symposium on Information Theory (ISIT)},
doi = {10.1109/ISIT.2007.4557518},
link = {http://sail.usc.edu/publications/files/silvaisit2007.pdf},
month = {Jun},
pages = {2021-2025},
title = {Universal consistency of data-driven partitions for divergence estimation},
year = {2007}
}
Using neutral speech models for emotional speech analysis.
Busso, C.; Lee, S.; and Narayanan, S. S.
In
Proceedings of InterSpeech, pages 2225-2228, Antwerp, Belgium, Aug 2007.
link
bibtex
@inproceedings{proc_busso:neutralspchmodelsemotional:icslp07,
address = {Antwerp, Belgium},
author = {Busso, Carlos and Lee, Sungbok and Narayanan, Shrikanth S.},
bib2html_rescat = {},
booktitle = {Proceedings of InterSpeech},
link = {http://sail.usc.edu/publications/files/BussoInterSpeech2007.pdf},
month = {Aug},
pages = {2225-2228},
title = {Using neutral speech models for emotional speech analysis},
year = {2007}
}
Using uncleanliness to predict future botnet addresses.
Collins, M P.; Shimeall, T. J; Faber, S.; Janies, J.; Weaver, R.; De Shon, M.; and Kadane, J.
In
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 93–104, 2007.
link
bibtex
@inproceedings{collins2007using,
title={Using uncleanliness to predict future botnet addresses},
author={Collins, M Patrick and Shimeall, Timothy J and Faber, Sidney and Janies, Jeff and Weaver, Rhiannon and De Shon, Markus and Kadane, Joseph},
booktitle={Proceedings of the 7th ACM SIGCOMM conference on Internet measurement},
pages={93--104},
year={2007}
}
Vizscript: visualizing complex interactions in multi-agent systems.
Jin, J.; Maheswaran, R. T; Sanchez, R.; and Szekely, P.
In
Proceedings of the 12th international conference on Intelligent user interfaces, pages 369–372, 2007. ACM
link
bibtex
@inproceedings{jin2007vizscript,
title={Vizscript: visualizing complex interactions in multi-agent systems},
author={Jin, Jing and Maheswaran, Rajiv T and Sanchez, Romeo and Szekely, Pedro},
booktitle={Proceedings of the 12th international conference on Intelligent user interfaces},
pages={369--372},
year={2007},
organization={ACM}
}
When is service really denied? a user-centric dos metric.
Mirkovic, J.; Hussain, A.; Willson, B.; Fahmy, S.; Yao, W.; Reiher, P.; Schwab, S.; and Thomas, R.
In
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 357–358, 2007.
link
bibtex
@inproceedings{mirkovic2007service,
title={When is service really denied? a user-centric dos metric},
author={Mirkovic, Jelena and Hussain, Alefiya and Willson, Brett and Fahmy, Sonia and Yao, Wei-Min and Reiher, Peter and Schwab, Stephen and Thomas, Roshan},
booktitle={Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems},
pages={357--358},
year={2007}
}
Wings for Pegasus: Creating Large-Scale Scientific Applications Using Semantic Representations of Computational Workflows.
Gil, Y.; Ratnakar, V.; Deelman, E.; Mehta, G.; and Kim, J.
In
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, July 22-26, 2007, Vancouver, British Columbia, Canada, pages 1767–1774, 2007. AAAI Press
Paper
link
bibtex
1 download
@inproceedings{DBLP:conf/aaai/GilRDMK07,
author = {Yolanda Gil and
Varun Ratnakar and
Ewa Deelman and
Gaurang Mehta and
Jihie Kim},
title = {Wings for Pegasus: Creating Large-Scale Scientific Applications Using
Semantic Representations of Computational Workflows},
booktitle = {Proceedings of the Twenty-Second {AAAI} Conference on Artificial Intelligence,
July 22-26, 2007, Vancouver, British Columbia, Canada},
pages = {1767--1774},
publisher = {{AAAI} Press},
year = {2007},
url = {http://www.aaai.org/Library/AAAI/2007/aaai07-284.php},
timestamp = {Tue, 05 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/aaai/GilRDMK07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}