This collection contains works by faculty from the Dartmouth Department of Computer Science.

Follow


Submissions from 2015

PDF

Data Citation Practices in the Crawdad Wireless Network Data Archive, Tristan Henderson and David Kotz

PDF

Mapping the Pareto Optimal Design Space for a Functionally Deimmunized Biotherapeutic Candidate, Regina S. Salvat, Andrew S. Parker, Yoonjoo Choi, Chris Bailey-Kellogg, and Karl E. Griswold

PDF

Location Privacy for Mobile Crowd Sensing through Population Mapping, Minho Shin, Cory Cornelius, Apu Kapadia, Nikos Triandopoulos, and David Kotz

Submissions from 2014

PDF

A Wearable System that Knows Who Wears It, Cory Cornelius, Ronald Peterson, Joseph Skinner, Ryan Halter, and David Kotz

PDF

Integrated Assessment of Predicted MHC Binding and Cross-Conservation with Self Reveals Patterns of Viral Camouflage, Lu He, Anne S. De Groot, Andres H. Gutierrez, William D. Martin, Lenny Moise, and Chris Bailey-Kellogg

PDF

ZEBRA: Zero-Effort Bilateral Recurring Authentication, Shrirang Mare, Andrés Molina-Markham, Cory Cornelius, Ronald Peterson, and David Kotz

PDF

Smarter Vaccine Design Will Circumvent Regulatory T Cell-Mediated Evasion in Chronic HIV and HCV Infection, Leonard Moise, Frances Terry, Andres H. Gutierrez, Ryan Tassone, Phyllis Losikoff, Stephen H. Gregory, and Chris Bailey-Kellogg

PDF

Amulet: a Secure Architecture for Mhealth Applications for Low-Power Wearable Devices, Andrés Molina-Markham, Ronald Peterson, Joseph Skinner, Tianlong Yun, Bhargav Golla, Kevin Freeman, Travis Peters, Jacob Sorber, Ryan Halter, and David Kotz

PDF

From Map to Dist: the Evolution of a Large-Scale Wlan Monitoring System, Keren Tan, Chris McDonald, Bennet Vance, Chrisil Arackaparambil, Sergey Bratus, and David Kotz

PDF

Quantitative and Functional Characterization of the Hyper-Conserved Protein of Prochlorococcus and Marine Synechococcus, Caroline E. Whidden, Katrina G. DeZeeuw, Jackie K. Zorz, Andrew P. Joy, David A. Barnett, Milo S. Johnson, Olga Zhaxybayeva, and Amanda M. Cockshutt

Submissions from 2013

PDF

Securing Information Technology in Healthcare, Denise Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andrés Molina-Markham, Karen M. Page, Sean W. Smith, Carl A. Gunter, and M. Eric Johnson

PDF

How Long is a Piece of Loop?, Yoonjoo Choi, Sumeet Agarwal, and Charlotte M. Deane

PDF

Orienteering in Knowledge Spaces: The Hyperbolic Geometry of Wikipedia Mathematics, Gregory Leibon and Daniel N. Rockmore

PDF

Bayesian Reconstruction of P(r) Directly From Two-Dimensional Detector Images Via a Markov Chain Monte Carlo Method, Sudeshna Paul, Alan M. Friedman, Chris Bailey-Kellogg, and Bruce Craig

PDF

Provenance Framework for Mhealth, Aarathi Prasad, Ronald Peterson, Shrirang Mare, Jacob Sorber, Kolin Paul, and David Kotz

Submissions from 2012

PDF

Privacy in Mobile Technology for Personal Healthcare, Sasikanth Avancha, Amit Baxi, and David Kotz

PDF

An Optimal Lower Bound on the Communication Complexity of Gap-Hamming-Distance, Amit Chakrabarti and Oded Regev

PDF

Derivation of a Novel Efficient Supervised Learning Algorithm from Cortical-Subcortical Loops, Ashok Chandrashekar and Richard Granger

PDF

Passive Biometrics for Pervasive Wearable Devices (Poster Paper), Cory Cornelius, Zachary Marois, Jacob Sorber, Ron Peterson, Shrirang Mare, and David Kotz

PDF

Who Wears Me? Bioimpedance as a Passive Biometric, Cory Cornelius, Jacob Sorber, Ronald Peterson, Joe Skinner, Ryan Halter, and David Kotz

PDF

Effects of Network Trace Sampling Methods on Privacy and Utility Metrics, Phillip A. Fazio, Keren Tan, and David Kotz

PDF

Algorithms for Optimizing Cross-Overs in DNA Shuffling, Lu He, Alan M. Friedman, and Chris Bailey-Kellogg

PDF

Quantitative Patterns of Stylistic Influence in the Evolution of Literature, James M. Hughes, Nicholas J. Foti, David C. Krakauer, and Daniel N. Rockmore

PDF

Understanding Sharing Preferences and Behavior for Mhealth Devices, Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denis Anthony, and David Kotz

PDF

An Amulet for Trustworthy Wearable Mhealth, Jacob Sorber, Minho Shin, Ronald Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma N. Smithayer, and David Kotz

Submissions from 2011

PDF

Recognizing Whether Sensors are on the Same Body, Cory Cornelius and David Kotz

PDF

Short Paper: The NetSANI Framework for Analysis and Fine-tuning of Network Trace Sanitization, Phil Fazio, Keren Tan, Jihwang Yeo, and David Kotz

Link

Nonparametric Sparsification of Complex Multiscale Networks, Nicholas J. Foti, James M. Hughes, and Daniel N. Rockmore

PDF

A Perceptual Metric for Photo Retouching, Eric Kee and Hany Farid

PDF

Identifying Unusual Days, Minkyong Kim and David Kotz

PDF

A Threat Taxonomy for mHealth Privacy, David Kotz

PDF

Adaptive Security and Privacy for Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz

PDF

Adapt-Lite: Privacy-Aware, Secure, and Efficient Mhealth Sensing, Shrirang Mare, Jacob Sorber, Minho Shin, Cory Cornelius, and David Kotz

PDF

Social Network Analysis Plugin (SNAP) for Mesh Networks, Soumendra Nanda and David Kotz

PDF

Exposing Privacy Concerns in Mhealth, Aarathi Prasad, Jacob Sorber, Timothy Stablein, Denise Anthony, and David Kotz

PDF

AnonySense: A System for Anonymous Opportunistic Sensing, Minho Shin, Cory Cornelius, Dan Peebles, Apu Kapadia, David Kotz, and Nikos Triandopoulos

Link

Routing in Mobile Opportunistic Networks, Libo Song and David Kotz

Routing in Mobile Opportunistic Networks, Libo Song and David Kotz

PDF

Privacy Analysis of User Association Logs in a Large-Scale Wireless Lan, Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz

PDF

Catch, Clean, and Release: A Survey of Obstacles and Opportunities for Network Trace Sanitization, Keren Tan, Jihwang Yeo, Michael E. Locasto, and David Kotz

PDF

Planning Combinatorial Disulfide Cross-Links for Protein Fold Determination, Fei Xiong, Alan M Friedman, and Chris Bailey-Kellogg

Submissions from 2010

PDF

On the Reliability of Wireless Fingerprinting Using Clock Skews, Chrisil Arackaparambil, Sergey Bratus, Anna Shubina, and David Kotz

PDF

Information Cost Tradeoffs for Augmented Index and Streaming Language Recognition, Amit Chakrabarti, Graham Cormode, Ranganath Kondapally, and Andrew McGregor

PDF

On Usable Authentication for Wireless Body Area Networks, Cory Cornelius and David Kotz

PDF

Quantification of Artistic Style through Sparse Coding Analysis in the Drawings of Pieter Bruegel the Elder, James M. Hughes, Daniel J. Graham, and Daniel N. Rockmore

PDF

Is Bluetooth the Right Technology for Mhealth?, Shrirang Mare and David Kotz

PDF

Optimization Algorithms for Functional Deimmunization of Therapeutic Proteins, Andrew S. Parker, Wei Zheng, Karl E. Griswold, and Chris Bailey-Kellogg

PDF

Can I Access Your Data? Privacy Management in Mhealth, Aarathi Prasad and David Kotz

PDF

Saluki: a High-Performance Wi-Fi Sniffing Program, Keren Tan and David Kotz

PDF

A Correlation Attack Against User Mobility Privacy in a Large-scale WLAN network, Keren Tan, Guanhua Yan, Jihwang Yeo, and David Kotz

Submissions from 2009

PDF

Dartmouth Internet Security Testbed (Dist): Building a Campus-Wide Wireless Testbed, Sergey Bratus, David Kotz, Keren Tan, William Taylor, Anna Shubina, Bennet Vance, and Michael E. Locasto

PDF

The Specificity of the Search Template, Mary J. Bravo and Hany Farid

PDF

Data for Cybersecurity Research: Process and ‘Wish List’, Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie Forrest, David Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, Ron Rivest, William Sanders, Stefan Savage, Sean Smith, Eugene Spafford, and Sal Stolfo

PDF

MPCS: Mobile-based Patient Compliance System for Chronic Illness Care, Guanling Chen, Bo Yan, Minho Shin, David Kotz, and Ethan Burke

PDF

Opportunistic Sensing: Security Challenges for the New Paradigm, Apu Kapadia, David Kotz, and Nikos Triandopoulos

PDF

A Privacy Framework for Mobile Health and Home-Care Systems, David Kotz, Sasikanth Avancha, and Amit Baxi

PDF

DEAMON: Energy-Efficient Sensor Monitoring, Minho Shin, Patrick Tsang, David Kotz, and Cory Cornelius

PDF

Activity-aware ECG-based Patient Authentication for Remote Health Monitoring, Janani Sriram, Minho Shin, Tanzeem Choudhury, and David Kotz

Submissions from 2008

PDF

Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract), Sergey Bratus, Joshua Brody, David Kotz, and Anna Shubina

PDF

Active Behavioral Fingerprinting of Wireless Devices, Sergey Bratus, Cory Cornelius, David Kotz, and Dan Peebles

PDF

A Scale Invariant Measure of Clutter, Mary J. Bravo and Hany Farid

PDF

Poster Abstract: Reliable People-Centric Sensing with Unreliable Voluntary Carriers, Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, and Patrick Tsang

PDF

Refocusing in 802.11 Wireless Measurement, Udayan Deshpande, Chris McDonald, and David Kotz

PDF

The Changing Usage of a Mature Campus-wide Wireless Network, Tristan Henderson, David Kotz, and Ilya Abyzov

PDF

Anonysense: Opportunistic and Privacy-Preserving Context Collection, Apu Kapadia, Nikos Triandopoulos, Cory Cornelius, Dan Peebles, and David Kotz

PDF

Topological Structures in the Equities Market Network, Gregory Leibon, Scott Pauls, Daniel Rockmore, and Robert Savell

PDF

Group-aware Stream Filtering for Bandwidth-efficient Data Dissemination, Ming Li and David Kotz

PDF

Quality-Managed Group-Aware Stream Filtering, Ming Li and David Kotz

PDF

The Tempo and Mode of Three‐Dimensional Morphological Evolution in Male Reproductive Structures, Mark A. McPeek, Li Shen, John Z. Torrey, and Hany Farid

PDF

Detecting 802.11 Mac Layer Spoofing Using Received Signal Strength, Yong Sheng, Keren Tan, Guanling Chen, David Kotz, and Andrew T. Campbell

PDF

Workshop Report — Crawdad Workshop 2007, Jihwang Yeo, David Kotz, and Tristan Henderson

Submissions from 2007

PDF

Privacy In Location Aware Computing Environments, Denise Anthony, Tristan Henderson, and David Kotz

PDF

Quickest Flows Over Time, Lisa Fleischer and Martin Skutella

PDF

Virtual Walls: Protecting Digital Privacy in Pervasive Environments, Apu Kapadia, Tristan Henderson, Jeffrey Fielding, and David Kotz

PDF

Periodic Properties of User Mobility and Access-Point Popularity, Minkyong Kim and David Kotz

PDF

The Power of Strong Fourier Sampling: Quantum Algorithms for Affine Groups and Hidden Shifts, Cristopher Moore, Daniel Rockmore, Alexander Russell, and Leonard J. Schulman

PDF

Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces, Libo Song and David Kotz

PDF

Workshop Report — Crawdad Workshop 2006, Jihwang Yeo, Tristan Henderson, and David Kotz

Submissions from 2006

PDF

Channel Sampling Strategies for Monitoring Wireless Networks, Udayan Deshpande, Tristan Henderson, and David Kotz

PDF

Risks of Using Ap Locations Discovered through War Driving, Minkyong Kim, Jeffrey J. Fielding, and David Kotz

PDF

Extracting a Mobility Model from Real User Traces, Minkyong Kim, David Kotz, and Songkuk Kim

PDF

On Improving Wireless Broadcast Reliability of Sensor Networks Using Erasure Codes, Rajnish Kumar, Arnab Paul, Umakishore Ramachandran, and David Kotz

PDF

Scalability in a Secure Distributed Proof System, Kazuhiro Minami and David Kotz

PDF

Improving Data Access for Computational Grid Applications, Ron Oldfield and David Kotz

PDF

Mobicom Poster Abstract: Bandwidth Reservation Using Wlan Handoff Prediction, Libo Song, Udayan Deshpande, Ulaş C. Kozat, David Kotz, and Ravi Jain

PDF

Predictability of Wlan Mobility and Its Effects on Bandwidth Provisioning, Libo Song, Udayan Deshpande, Ulaş C. Kozat, David Kotz, and Ravi Jain

PDF

Evaluating Next Cell Predictors with Extensive Wi-Fi Mobility Data, Libo Song, David Kotz, Ravi Jain, and Xiaoning He

PDF

Crawdad: a Community Resource for Archiving Wireless Data at Dartmouth, Jihwang Yeo, David Kotz, and Tristan Henderson

Submissions from 2005

PDF

The Kerf Toolkit for Intrusion Analysis, Javed Aslam, Sergey Bratus, David Kotz, and Ronald Peterson

PDF

Analysis of a Wi-Fi Hotspot Network, David P. Blinn, Tristan Henderson, and David Kotz

PDF

Policy-Driven Data Dissemination for Context-Aware Applications, Guanling Chen and David Kotz

PDF

Measuring Wireless Network Usage with the Experience Sampling Method, Tristan Henderson, Denise Anthony, and David Kotz

PDF

Classifying the Mobility of Users and the Popularity of Access Points, Minkyong Kim and David Kotz

PDF

Modeling Users' Mobility Among Wifi Access Points, Minkyong Kim and David Kotz

PDF

CRAWDAD: a Community Resource for Archiving Wireless Data at Dartmouth, David Kotz and Tristan Henderson

PDF

Secure Context-Sensitive Authorization, Kazuhiro Minami and David Kotz

PDF

Secure Context-sensitive Authorization, Kazuhiro Minami and David Kotz

Submissions from 2004

PDF

Kerf: Machine Learning to Aid Intrusion Analysts, Javed Aslam, Sergey Bratus, David Kotz, Ron Peterson, and Daniela Rus

PDF

Dependency Management in Distributed Settings (Poster Abstract), Guanling Chen and David Kotz

PDF

Design and Implementation of a Large-Scale Context Fusion Network, Guanling Chen, Ming Li, and David Kotz