This collection represents a series of “Technical Reports” produced by members of the Department of Computer Science (formerly the Department of Mathematics and Computer Science) since 1986. They include material deemed by the faculty to be worthy of public release; in some cases, Technical Reports were later revised and published in the archival literature. Prior to September 2020, the series was also a venue for release of some PhD dissertations, MS theses, and undergraduate honors theses.
Prior to the year 2000, reports were numbered in the form PCS-TRyy-nnn, where yy was the 2-digit year (19yy), and nnn was a sequence number. “PCS” stood for “paper in computer science”; for the earliest reports, the pdf contains a scan of the original paper document or a distillation of the original Postscript file. In rare cases, the first three letters (“PCS”) was occasionally “DCS”, for a diskette, or “TCS" for a tape; most of these have been transferred to archive files and made available here.
Starting in the year 2000, new reports were numbered in the form TRyyyy-nnn, with sequence number nnn continuous across years. In 2021 we expanded the number format to to TRyyyy-nnnn, since the sequence numbers exceeded 999.
For more information about the Dartmouth Computer Science Technical Report series, please contact Computer.Science.Department@Dartmouth.EDU.
Submissions from 2010
Out of the Depths: Image Statistics of Space, Water, and the Minuscule World, Nimit S. Dhulekar
A 3-D Photo Forensic Analysis of the Lee Harvey Oswald Backyard Photo, Hany Farid
Detecting Photographic Composites of Famous People, Eric Kee and Hany Farid
NeuroPhone: Brain-Mobile Phone Interface using a Wireless EEG Headset, Matthew K. Mukerjee
AnonyTL Specification, Dan Peebles, Cory Cornelius, Apu Kapadia, David Kotz, Minho Shin, and Nikos Triandopoulos
Creating Large Disturbances in the Power Grid: Methods of Attack After Cyber Infiltration, Loren D. Sands-Ramshaw
The Curious Timekeeper: Creative Thesis in Interactive Sculpture, Kate I. Schnippering
Block Sensitivity versus Sensitivity, Karn Seth
Predictive YASIR: High Security with Lower Latency in Legacy SCADA, Rouslan V. Solomakhin
Numerical methods for fMRI data analysis, Geethmala Sridaran
Graph algorithms for NMR resonance assignment and cross-link experiment planning, Fei Xiong
Optimization Algorithms for Site-directed Protein Recombination Experiment Planning, Wei Zheng
Submissions from 2009
Distributed Monitoring of Conditional Entropy for Network Anomaly Detection, Chrisil Arackaparambil, Sergey Bratus, Joshua Brody, and Anna Shubina
Approximability of the Unsplittable Flow Problem on Trees, Chrisil Arackaparambil, Amit Chakrabarti, and Chien-Chung Huang
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems, Man Ho Au, Patrick P. Tsang, Willy Susilo, and Yi Mu
Surface Reconstruction through Time, LeeAnn T. Brash
Hawk: 3D Gestured-Based Interactive Bird Flight Simulation, Thomas Yale Eastman
An Information Complexity Approach to the Inner Product Problem, William B. Henderson-Frost
Hardware-Assisted Secure Computation, Alexander Iliev
A Combined Routing Method for Ad Hoc Wireless Networks, Soumendra Nanda, Zhenhui Jiang, and David Kotz
Autoscopy: Detecting Pattern-Searching Rootkits via Control Flow Tracing, Ashwin Ramaswamy
Katana: A Hot Patching Framework for ELF Executables, Ashwin Ramaswamy, Sergey Bratus, Michael E. Locasto, and Sean W. Smith
Developing an Improved, Web-Based Classroom Response System with Web Services, Oleg B. Seletsky
Applying Domain Knowledge from Structured Citation Formats to Text and Data Mining: Examples Using the CITE Architecture, D Neel Smith and Gabriel A. Weaver
Activity-Aware Electrocardiogram-based Passive Ongoing Biometric Verification, Janani C. Sriram
Automated Tracking of Dividing Nuclei in Microscopy Videos of Living Cells, Evan L. Tice
The Effects of Introspection on Computer Security Policies, Stephanie A. Trudeau
Authenticated Streamwise On-line Encryption, Patrick P. Tsang, Rouslan V. Solomakhin, and Sean W. Smith
Semantic and Visual Encoding of Diagrams, Gabriel A. Weaver
A Computational Framework for Certificate Policy Operations, Gabriel A. Weaver, Scott Rea, and Sean W. Smith
User survey regarding the needs of network researchers in trace-anonymization tools, Jihwang Yeo, Keren Tan, and David Kotz
Submissions from 2008
Functional Monitoring Without Monotonicity, Chrisil Arackaparambil, Joshua Brody, and Amit Chakrabarti
TwoKind Authentication: Protecting Private Information in Untrustworthy Environments (Extended Version), Katelin Bailey, Apu Kapadia, Linden Vongsathorn, and Sean W. Smith
The Weakest Failure Detector to Solve Mutual Exclusion, Vibhor Bhatt, Nicholas Christman, and Prasad Jayanti
Active Behavioral Fingerprinting of Wireless Devices, Sergey Bratus, Cory Cornelius, David Kotz, and Daniel Peebles
LZfuzz: a fast compression-based fuzzer for poorly documented protocols, Sergey Bratus, Axel Hansen, and Anna Shubina
A Dynamically Refocusable Sampling Infrastructure for 802.11 Networks, Udayan Deshpande
Making RBAC Work in Dynamic, Fast-Changing Corporate Environments, Ruslan Y. Dimov
Pas de Deux avec les Microrobots (Video), Bruce R. Donald, Christopher G. Levey, and Igor Paprotny
Planar Microassembly by Parallel Actuation of MEMS Microrobots (Microassembly Video), Bruce R. Donald, Christopher G. Levey, and Igor Paprotny
Digital Image Ballistics from JPEG Quantization: A Followup Study, Hany Farid
Linkability in Activity Inference Data Sets, Jeffrey Fielding
Bounded Unpopularity Matchings, Chien-Chung Huang, Telikepalli Kavitha, Dimitrios Michail, and Meghana Nasre
Toward Evaluating Lighting Design Interface Paradigms for Novice Users, William Brandon Kerr and Fabio Pellacini
Group-Aware Stream Filtering, Ming Li
Attribute-Based, Usefully Secure Email, Christopher P. Masone
Mesh-Mon: a Monitoring and Management System for Wireless Mesh Networks, Soumendra Nanda
Localized Bridging Centrality for Distributed Network Analysis, Soumendra Nanda and David Kotz
Detecting kernel rootkits, Ashwin Ramaswamy
Key Management for Secure Power SCADA, Manya K. Sleeper
Evaluating Mobility Predictors in Wireless Networks for Improving Handoff and Opportunistic Routing, Libo Song
BLAC: Revoking Repeatedly Misbehaving Anonymous Users Without Relying on TTPs, Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith
Nymble: Blocking Misbehaving Users in Anonymizing Networks, Patrick P. Tsang, Apu Kapadia, Cory Cornelius, and Sean W. Smith
PPAA: Peer-to-Peer Anonymous Authentication (Extended Version), Patrick P. Tsang and Sean W. Smith
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems (Extended Version), Patrick P. Tsang and Sean W. Smith
Anchor-Free Localization in Mixed Wireless Sensor Network Systems, Yurong Xu
Submissions from 2007
The Quality of Open Source Production: Zealots and Good Samaritans in the Case of Wikipedia, Denise Anthony, Sean W. Smith, and Tim Williamson
Dumbots: Unexpected Botnets through Networked Embedded Devices, Kwang-Hyun Baek, Sergey Bratus, and Sara Sinclair
Fast-Converging Tatonnement Algorithms for the Market Problem, R Cole and L Fleischer
When One Pipeline Is Not Enough, Thomas H. Cormen, Priya Natarajan, and Elena Riccio Davidson
Exploring the Integration of Memory Management and Trusted Computing, Nihal A. D'Cunha
Video Stabilization and Enhancement, Hany Farid and Jeffrey B. Woodward
Closest and Farthest-Line Voronoi Diagrams in the Plane, Mark C. Henle
Two's Company, Three's a Crowd: Stable Family and Threesome Roommates Problems, Chien-Chung Huang
Lighting and Optical Tools for Image Forensics, Micah Kimo Johnson
People-Centric Urban Sensing: Security Challenges for the New Paradigm, Peter Johnson, Apu Kapadia, David Kotz, and Nikos Triandopoulos
Light-Based Sample Reduction Methods for Interactive Relighting of Scenes with Minute Geometric Scale, William B. Kerr and Fabio Pellacini
A Combined Routing Method for Wireless Ad Hoc Networks, Soumendra Nanda, Zhenhui Jiang, and David Kotz
SCML: A Structural Representation for Chinese Characters, Daniel G. Peebles
Complete Configuration Space Analysis for Structure Determination of Symmetric Homo-oligomers by NMR, Shobha Potluri
Settling for limited privacy: how much does it help?, Anna M. Shubina
A Security Assessment of Trusted Platform Modules, Evan R. Sparks
Lighting with Sketches, Alexander Wakefield Steinberg
Protein Design by Mining and Sampling an Undirected Graphical Model of Evolutionary Constraints, John Thomas, Naren Ramakrishnan, and Chris Bailey-Kellogg
Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs (Extended Version), Patrick P. Tsang, Man Ho Au, Apu Kapadia, and Sean W. Smith
Secure Cryptographic Precomputation with Insecure Memory, Patrick P. Tsang and Sean W. Smith
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems, Patrick P. Tsang and Sean W. Smith
Exclusion and Object Tracking in a Network of Processes, Yih-Kuen Tsay and Chien-Chung Huang
Experiment Planning for Protein Structure Elucidation and Site-Directed Protein Recombination, Xiaoduan Ye
Submissions from 2006
Tools and algorithms to advance interactive intrusion analysis via Machine Learning and Information Retrieval, Javed Aslam, Sergey Bratus, and Virgil Pavlu
Wait-Free and Obstruction-Free Snapshot, Khanh Do Ba
Digital Image Ballistics from JPEG Quantization, Hany Farid
A Novel Minimized Dead-End Elimination Criterion and Its Application to Protein Redesign in a Hybrid Scoring and Search Algorithm for Computing Partition Functions over Molecular Ensembles, Ivelin Georgiev, Ryan H. Lilien, and Bruce R. Donald
Cheating to Get Better Roommates in a Random Stable Matching, Chien-Chung Huang
Metric Measurements on a Plane from a Single Image, Micah K. Johnson and Hany Farid
A simple computational method for the identification of disease-associated loci in complex, incomplete pedigrees, Gregory Leibon, Dan Rockmore, and Martin R. Pollak
Computation Reuse in Statics and Dynamics Problems for Assemblies of Rigid Bodies, Anne Loomis
Secure Context-sensitive Authorization, Kazuhiro Minami
SAMPLED: Shared Anonymous Music PLayback using wirelEss Devices, Constantinos Neophytou
Visualizing Paths in Context, Fabio Pellacini, Lori Lorigo, and Geri Gay
Limited Delegation (Without Sharing Secrets) in Web Applications, Nicholas J. Santos
Path Planning Algorithms under the Link-Distance Metric, David Phillip Wagner
Submissions from 2005
Lower Bounds on the Communication Complexity of Shifting, Marco D. Adelfio
Preventing Theft of Quality of Service on Open Platforms, Kwang-Hyun Baek and Sean W. Smith
A Quasi-PTAS for Unsplittable Flow on Line Graphs, Nikhil Bansal, Amit Chakrabarti, Amir Epstein, and Baruch Schieber
A toy rock climbing robot, Matthew P. Bell
Detection of Covert Channel Encoding in Network Packet Delays, Vincent Berk, Annarita Giani, and George Cybenko
Combinatorial Theorems about Embedding Trees on the Real Line, Amit Chakrabarti and Subhash Khot
Mining Frequent and Periodic Association Patterns, Guanling Chen, Heng Huang, and Minkyong Kim
Structural Analysis of Social Networks with Wireless Users, Guanling Chen and David Kotz