ISI Technical Reports

This section contains all Technical Reports published by ISI over the past several decades. The search box below enables searches by report titles, authors and report numbers. Technical Reports written by ISI researchers, but not published by ISI, may be available through the author’s individual website.

Journal articles and other publications can be found here.

The research object suite of ontologies: Sharing and exchanging research data and methods on the open webK. Belhajjame, J. Zhao, D. Garijo, K. Hettne, R. Palma, O. Corcho, J. - M. Gomez-Perez, S. Bechhofer, G. Klyne, C. Goble,
2014

Web-scale Content Reuse Detection (extended)C. Ardi, J. Heidemann,
ISI-TR-2014-692
2014

When the {Internet} Sleeps: Correlating Diurnal Networks With External Factors (extended)L. Quan, J. Heidemann, Y. Pradkin,
ISI-TR-2014-691
2014

T-{DNS}: Connection-Oriented {DNS} to Improve Privacy and Security (extended)L. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, N. Somaiya,
ISI-TR-2014-693
2014

T-{DNS}: Connection-Oriented {DNS} to Improve Privacy and SecurityL. Zhu, Z. Hu, J. Heidemann, D. Wessels, A. Mankin, N. Somaiya,
ISI-TR-2014-688
2014

Practical Resource Monitoring for Robust High Throughput ComputingG. Juve, B. Tovar, R. F. da Silva, C. Robinson, D. Thain, E. Deelman, W. Allcock, M. Livny,
Technical Report 14-950
2014

Practical Resource Monitoring for Robust High Throughput ComputingG. Juve, B. Tovar, R. F. da Silva, C. Robinson, D. Thain, E. Deelman, W. Allcock, M. Livny,
Technical Report 14-950
2014

A Holistic Framework for Bridging Physical Threats to User QoE
X. Cai, J. Heidemann, and W. Willinger
ISI-TR-687
July, 2013

Reducing False Alarms with Multi-modal Sensing for Pipeline Blockage (Extended)C. Zhang and J. Heidemann
ISI-TR-686b
June, 2013

A Holistic Framework for Bridging Regional Threats to User {QoE}X. Cai, J. Heidemann, W. Willinger,
ISI-TR-2013-687
2013