This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.

Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.

Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.

For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.

Follow


Submissions from 2010

PDF

Out of the Depths: Image Statistics of Space, Water, and the Minuscule World, Nimit S. Dhulekar

PDF

A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo, Hany Farid

PDF

Detecting Photographic Composites of Famous People, Eric Kee and Hany Farid

PDF

NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee

PDF

AnonyTL Specification, Dan Peebles, Cory Cornelius, Apu Kapadia, David Kotz, Minho Shin, and Nikos Triandopoulos

PDF

Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw

PDF

The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering

PDF

Block Sensitivity versus Sensitivity, Karn Seth

PDF

Predictive YASIR: High Security with Lower Latency in Legacy SCADA, Rouslan V. Solomakhin

PDF

Numerical methods for fMRI data analysis, Geethmala Sridaran

PDF

Graph algorithms for NMR resonance assignment and cross-link experiment planning, Fei Xiong

PDF

Optimization Algorithms for Site-directed Protein Recombination Experiment Planning, Wei Zheng

Submissions from 2009

PDF

Distributed Monitoring of Conditional Entropy for Network Anomaly Detection, Chrisil Arackaparambil, Sergey Bratus, Joshua Brody, and Anna Shubina

PDF

Approximability of the Unsplittable Flow Problem on Trees, Chrisil Arackaparambil, Amit Chakrabarti, and Chien-Chung Huang

PDF

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems, Man Ho Au, Patrick P. Tsang, Willy Susilo, and Yi Mu

PDF

Surface Reconstruction through Time, LeeAnn T. Brash

PDF

Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman

PDF

An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost

PDF

Hardware-Assisted Secure Computation, Alexander Iliev

PDF

A Combined Routing Method for Ad Hoc Wireless Networks, Soumendra Nanda, Zhenhui Jiang, and David Kotz

PDF

Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, Ashwin Ramaswamy

PDF

Katana: A Hot Patching Framework for ELF Executables, Ashwin Ramaswamy, Sergey Bratus, Michael E. Locasto, and Sean W. Smith

PDF

Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky

PDF

Applying Domain Knowledge from Structured Citation Formats to Text and Data Mining: Examples Using the CITE Architecture, D Neel Smith and Gabriel A. Weaver

PDF

Activity-Aware Electrocardiogram-based Passive Ongoing Biometric Verification, Janani C. Sriram

PDF

Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice

PDF

The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau

PDF

Authenticated Streamwise On-line Encryption, Patrick P. Tsang, Rouslan V. Solomakhin, and Sean W. Smith

PDF

Semantic and Visual Encoding of Diagrams, Gabriel A. Weaver

PDF

A Computational Framework for Certificate Policy Operations, Gabriel A. Weaver, Scott Rea, and Sean W. Smith

PDF

User survey regarding the needs of network researchers in trace-anonymization tools, Jihwang Yeo, Keren Tan, and David Kotz

Submissions from 2008

PDF

Functional Monitoring Without Monotonicity, Chrisil Arackaparambil, Joshua Brody, and Amit Chakrabarti

PDF

TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version), Katelin Bailey, Apu Kapadia, Linden Vongsathorn, and Sean W. Smith

PDF

The Weakest Failure Detector to Solve Mutual Exclusion, Vibhor Bhatt, Nicholas Christman, and Prasad Jayanti

PDF

Active Behavioral Fingerprinting of Wireless Devices, Sergey Bratus, Cory Cornelius, David Kotz, and Daniel Peebles

PDF

LZfuzz: a fast compression-based fuzzer for poorly documented protocols, Sergey Bratus, Axel Hansen, and Anna Shubina

PDF

A Dynamically Refocusable Sampling Infrastructure for 802.11 Networks, Udayan Deshpande

PDF

Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov

Link

Pas de Deux avec les Microrobots (Video), Bruce R. Donald, Christopher G. Levey, and Igor Paprotny

Link

Planar Microassembly by Parallel Actuation of MEMS Microrobots (Microassembly Video), Bruce R. Donald, Christopher G. Levey, and Igor Paprotny

PDF

Digital Image Ballistics from JPEG Quantization: A Followup Study, Hany Farid

PDF

Linkability in Activity Inference Data Sets, Jeffrey Fielding

PDF

Bounded Unpopularity Matchings, Chien-Chung Huang, Telikepalli Kavitha, Dimitrios Michail, and Meghana Nasre

PDF

Toward Evaluating Lighting Design Interface Paradigms for Novice Users, William Brandon Kerr and Fabio Pellacini

PDF

Group-Aware Stream Filtering, Ming Li

PDF

Attribute-Based, Usefully Secure Email, Christopher P. Masone

PDF

Mesh-Mon: a Monitoring and Management System for Wireless Mesh Networks, Soumendra Nanda

PDF

Localized Bridging Centrality for Distributed Network Analysis, Soumendra Nanda and David Kotz

PDF

Detecting kernel rootkits, Ashwin Ramaswamy

PDF

Key Management for Secure Power SCADA, Manya K. Sleeper

PDF

Evaluating Mobility Predictors in Wireless Networks for Improving Handoff and Opportunistic Routing, Libo Song

PDF

BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs, Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith

PDF

Nymble: Blocking Misbehaving Users in Anonymizing Networks, Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith

PDF

PPAA: Peer-to-Peer Anonymous Authentication (Extended Version), Patrick P. Tsang and Sean W. Smith

PDF

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version), Patrick P. Tsang and Sean W. Smith

PDF

Anchor-Free Localization in Mixed Wireless Sensor Network Systems, Yurong Xu

Submissions from 2007

PDF

The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia, Denise Anthony, Sean W. Smith, and Tim Williamson

PDF

Dumbots: Unexpected Botnets through Networked Embedded Devices, Kwang-Hyun Baek, Sergey Bratus, and Sara Sinclair

PDF

Fast-Converging Tatonnement Algorithms for the Market Problem, R Cole and L Fleischer

PDF

When One Pipeline Is Not Enough, Thomas H. Cormen, Priya Natarajan, and Elena Riccio Davidson

PDF

Exploring the Integration of Memory Management and Trusted Computing, Nihal A. D'Cunha

PDF

Video Stabilization and Enhancement, Hany Farid and Jeffrey B. Woodward

PDF

Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle

PDF

Two's Company, Three's a Crowd: Stable Family and Threesome Roommates Problems, Chien-Chung Huang

PDF

Lighting and Optical Tools for Image Forensics, Micah Kimo Johnson

PDF

People-Centric Urban Sensing: Security Challenges for the New Paradigm, Peter Johnson, Apu Kapadia, David Kotz, and Nikos Triandopoulos

PDF

Light-Based Sample Reduction Methods for Interactive Relighting of Scenes with Minute Geometric Scale, William B. Kerr and Fabio Pellacini

PDF

A Combined Routing Method for Wireless Ad Hoc Networks, Soumendra Nanda, Zhenhui Jiang, and David Kotz

PDF

SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles

PDF

Complete Configuration Space Analysis for Structure Determination of Symmetric Homo-oligomers by NMR, Shobha Potluri

PDF

Settling for limited privacy: how much does it help?, Anna M. Shubina

PDF

A Security Assessment of Trusted Platform Modules, Evan R. Sparks

PDF

Lighting with Sketches, Alexander Wakefield Steinberg

PDF

Protein Design by Mining and Sampling an Undirected Graphical Model of Evolutionary Constraints, John Thomas, Naren Ramakrishnan, and Chris Bailey-Kellogg

PDF

Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version), Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith

PDF

Secure Cryptographic Precomputation with Insecure Memory, Patrick P. Tsang and Sean W. Smith

PDF

YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems, Patrick P. Tsang and Sean W. Smith

PDF

Exclusion and Object Tracking in a Network of Processes, Yih-Kuen Tsay and Chien-Chung Huang

PDF

Experiment Planning for Protein Structure Elucidation and Site-Directed Protein Recombination, Xiaoduan Ye

Submissions from 2006

PDF

Tools and algorithms to advance interactive intrusion analysis via Machine Learning and Information Retrieval, Javed Aslam, Sergey Bratus, and Virgil Pavlu

PDF

Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba

PDF

Digital Image Ballistics from JPEG Quantization, Hany Farid

PDF

A Novel Minimized Dead-End Elimination Criterion and Its Application to Protein Redesign in a Hybrid Scoring and Search Algorithm for Computing Partition Functions over Molecular Ensembles, Ivelin Georgiev, Ryan H. Lilien, and Bruce R. Donald

PDF

Cheating to Get Better Roommates in a Random Stable Matching, Chien-Chung Huang

PDF

Metric Measurements on a Plane from a Single Image, Micah K. Johnson and Hany Farid

PDF

A simple computational method for the identification of disease-associated loci in complex, incomplete pedigrees, Gregory Leibon, Dan Rockmore, and Martin R. Pollak

PDF

Computation Reuse in Statics and Dynamics Problems for Assemblies of Rigid Bodies, Anne Loomis

PDF

Secure Context-sensitive Authorization, Kazuhiro Minami

PDF

SAMPLED: Shared Anonymous Music PLayback using wirelEss Devices, Constantinos Neophytou

PDF

Visualizing Paths in Context, Fabio Pellacini, Lori Lorigo, and Geri Gay

PDF

Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos

PDF

Path Planning Algorithms under the Link-Distance Metric, David Phillip Wagner

Submissions from 2005

PDF

Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio

PDF

Preventing Theft of Quality of Service on Open Platforms, Kwang-Hyun Baek and Sean W. Smith

PDF

A Quasi-PTAS for Unsplittable Flow on Line Graphs, Nikhil Bansal, Amit Chakrabarti, Amir Epstein, and Baruch Schieber

PDF

A toy rock climbing robot, Matthew P. Bell

PDF

Detection of Covert Channel Encoding in Network Packet Delays, Vincent Berk, Annarita Giani, and George Cybenko

PDF

Combinatorial Theorems about Embedding Trees on the Real Line, Amit Chakrabarti and Subhash Khot

PDF

Mining Frequent and Periodic Association Patterns, Guanling Chen, Heng Huang, and Minkyong Kim

PDF

Structural Analysis of Social Networks with Wireless Users, Guanling Chen and David Kotz