Skip navigation

Publications

Publications by thrust area

Building resilient cyberinfrastructure

Resilient cyber physical systems

Scientific foundations of resilient systems

 

Publications by primary faculty author

Saurabh Bagchi publications

Milind Kulkarni publications

Jitesh Panchal publications

Gesualdo Scutari publications

Felix Xiaozhu Lin publications

Srini Peeta publications

Gesualdo Scutari publications

 

All Publications

2018

1. Tian, Y., Sun, Y., Du, B., and Scutari, G. (2018). ASY-SONATA: Achieving Geometric Convergence for Distributed Asynchronous Optimization. arXiv preprint arXiv:1803.10359, . Cited by 1. [ http ]

2. Wang, J., Peeta, S., He, X., and Zhao, J. (2018). Combined multinomial logit modal split and paired combinatorial logit traffic assignment model. Transportmetrica A: Transport Science, Taylor & Francis. [ http ]

3. Bagchi, S., Kumar, R., Kalyanam, R., Harrell, S., Ellis, C. A., and Song, C. (2018). FRESCO: Open Source Data Repository for Computational Usage and Failures. Other, . [ http ]

4. Yi, E. B., Maji, A. K., and Bagchi, S. (2018). How Reliable is my Wearable: A Fuzz Testing-based Study. Other, https://engineering.purdue.edu/dcsl/publications/papers/2018/final_android-wear-robustness_dsn18_submitted.pdf. [ http ]

5. Wang, J., Kim, Y. H., He, X. S., and Peeta, S. (2018). Information Flow Propagation Wave Model Based on an Information Relay Control Strategy Under Congested V2V Communications. Other, . [ http ]

6. Gutierrez, C. N., Kim, T., Corte, R. D., Avery, J., Goldwasser, D., Cinque, M., and Bagchi, S. (2018). Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks. IEEE Transactions on Dependable and Secure Computing (TDSC), IEEE. [ http ]

7. Bagchi, S., and Panchal, J. (2018). Living on the Edge Dependably: New Challenges and Solution Directions. Other, . [ http ]

8. Shankar, R., Kobin, B., Bagchi, S., Kistler, M., and Rellermeyer, J. (2018). MAVIS: Managing Datacenters using Smartphones. arXiv preprint arXiv:1802.06270, . [ http ]

9. Gutierrez, C. N., Spafford, E. H., Bagchi, S., and Yurek, T. (2018). Reactive redundancy for data destruction protection (R2D2). Computers & Security, Elsevier Advanced Technology. [ http ]

10. Dachowicz, A., Chaduvula, S. C., Atallah, M. J., Bilionis, I., and Panchal, J. H. (2018). Strategic information revelation in collaborative design. Advanced Engineering Informatics, Elsevier. [ http ]

11. Sen, S., Koo, J., and Bagchi, S. (2018). TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices. IEEE Internet Computing, IEEE. Cited by 1. [ http ]

2017

1. Hota, A., Clements, A. A., Bagchi, S., and Sundaram, S. (2017). A Game-Theoretic Framework for Securing Interdependent Assets in Networks.. Other, Sandia National Lab.(SNL-NM), Albuquerque, NM (United States); Sandia National Laboratories, null. [ http ]

2. Wang, J., Kim, Y. H., He, X., and Peeta, S. (2017). Analytical model for information flow propagation wave under an information relay control strategy in a congested vehicle-to-vehicle communication environment. Transportation Research Part C: Emerging Technologies, Pergamon. [ http ]

3. Cannelli, L., Facchinei, F., Kungurtsev, V., and Scutari, G. (2017). Asynchronous parallel nonconvex large-scale optimization. Other, IEEE. [ http ]

4. Liu, X., Chen, T., Qian, F., Guo, Z., Lin, F. X., Wang, X., and Chen, K. (2017). Characterizing Smartwatch Usage in the Wild. Other, ACM. Cited by 8. [ http ]

5. Vollmer, M., Spall, S., Chamith, B., Sakka, L., Koparkar, C., Kulkarni, M., Tobin-Hochstadt, S., and Newton, R. R. (2017). Compiling Tree Transforms to Operate on Packed Representations. Other, Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Cited by 3. [ http ]

6. Daneshmand, A., Sun, Y., Scutari, G., and Facchinei, F. (2017). D2L: Decentralized dictionary learning over dynamic networks. Other, IEEE. [ http ]

7. Wood, P., Zhang, H., Siddiqui, M., and Bagchi, S. (2017). Dependability in Edge Computing. arXiv preprint arXiv:1710.11222, . [ http ]

8. Notarnicola, I., Sun, Y., Scutari, G., and Notarstefano, G. (2017). Distributed big-data optimization via block communications. Other, IEEE. [ http ]

9. Notarnicola, I., Sun, Y., Scutari, G., and Notarstefano, G. (2017). Distributed big-data optimization via block-iterative convexification and averaging. Other, IEEE. Cited by 1. [ http ]

10. Thottethodi, M., Vijaykumar, T., and Kulkarni, M. (2017). Efficient Collaborative Approximation in MapReduce without Missing Rare Keys. Other, IEEE. [ http ]

11. Liou, H., Hu, S., and Peeta, S. (2017). Estimation of Time-Dependent Intersection Turning Proportions for Adaptive Traffic Signal Control under Limited Link Traffic Counts from Heterogeneous Sensors. Other, School of Civil Engineering, Purdue University. [ http ]

12. Facchinei, F., Lampariello, L., and Scutari, G. (2017). Feasible methods for nonconvex nonsmooth problems with applications in green communications. Mathematical Programming, Springer Berlin Heidelberg. Cited by 5. [ http ]

13. Facchinei, F., Kungurtsev, V., Lampariello, L., and Scutari, G. (2017). Ghost penalties in nonconvex constrained optimization: Diminishing step-sizes and iteration complexity. arXiv preprint arXiv:1709.03384, . Cited by 1. [ http ]

14. Zhang, H., Bagchi, S., and Wang, H. (2017). Integrity of Data in a Mobile Crowdsensing Campaign: A Case Study. Other, . [ http ]

15. Mokhtari, A., Koppel, A., Scutari, G., and Ribeiro, A. (2017). Large-scale nonconvex stochastic optimization by doubly stochastic successive convex approximation. University of Pennsylvania Technical Report, . Cited by 3. [ http ]

16. Thomas, T., Koo, J., and Bagchi, S. (2017). Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations. Other, https://engineering.purdue.edu/dcsl/publications/papers/2017/final_minerva_comsnets18_cameraready.pdf. [ http ]

17. Kim, Y. H., and Peeta, S. (2017). Modeling of the dynamic flow propagation of multiple units of information under vehicle-to-vehicle communications based advanced traveler information systems. Journal of Intelligent Transportation Systems, Taylor & Francis. Cited by 2. [ http ]

18. Kim, Y. H., Peeta, S., and He, X. (2017). Modeling the information flow propagation wave under vehicle-to-vehicle communications. Transportation Research Part C: Emerging Technologies, Pergamon. Cited by 1. [ http ]

19. Cannelli, L., Facchinei, F., and Scutari, G. (2017). Multi-Agent asynchronous nonconvex large-scale optimization. Other, IEEE. Cited by 1. [ http ]

20. Li, Y., Zhang, L., Zheng, H., He, X., Peeta, S., Zheng, T., and Li, Y. (2017). Nonlane-Discipline-Based Car-Following Model for Electric Vehicles in Transportation-Cyber-Physical Systems. IEEE Transactions on Intelligent Transportation Systems, IEEE. Cited by 11. [ http ]

21. Wang, N., Yi, E. B., and Bagchi, S. (2017). On Reliability of Android Wearable Health Devices. arXiv preprint arXiv:1706.09247, . [ http ]

22. Mitra, S., Gupta, M. K., Misailovic, S., and Bagchi, S. (2017). Phase-aware optimization in approximate computing. Code Generation and Optimization (CGO), 2017 IEEE/ACM International Symposium on, IEEE. Cited by 7. [ http ]

23. Lin, L., He, Z., Peeta, S., and Wen, X. (2017). Predicting Station-level Hourly Demands in a Large-scale Bike-sharing Network: A Graph Convolutional Neural Network Approach. arXiv preprint arXiv:1712.04997, . [ http ]

24. Utterback, R., Agrawal, K., Lee, I., and Kulkarni, M. (2017). Processor-Oblivious Record and Replay. Proceedings of the 22nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, ACM. Cited by 1. [ http ]

25. Clements, A. A., Almakhdhub, N. S., Saab, K. S., Srivastava, P., Koo, J., Bagchi, S., and Payer, M. (2017). Protecting Bare-metal Embedded Systems With Privilege Overlays. Other, IEEE. Cited by 5. [ http ]

26. Mahgoub, A., Wood, P., Ganesh, S., Mitra, S., Gerlach, W., Harrison, T., Meyer, F., Grama, A., Bagchi, S., and Chaterji, S. (2017). Rafiki: A Middleware for Parameter Tuning of NoSQL Datastores for Dynamic Metagenomics Workloads. ACM/IFIP/USENIX Middleware Conference, . [ http ]

27. Koo, J., Lin, X., and Bagchi, S. (2017). RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters. Other, IEEE. Cited by 2. [ http ]

28. Zhang, H., Theera-Ampornpunt, N., Wang, H., Bagchi, S., and Panta, R. K. (2017). Sense-Aid: A framework for enabling network as a service for participatory sensing. Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, ACM. [ http ]

29. Huang, G., Xu, M., Lin, F. X., Liu, Y., Ma, Y., Pushp, S., and Liu, X. (2017). ShuffleDog: Characterizing and Adapting User-Perceived Latency of Android Apps. IEEE Transactions on Mobile Computing, IEEE. Cited by 4. [ http ]

30. Liou, H., Hu, S., Peeta, S., Kim, Y. H., and Lee, C. (2017). Stochastic Network Vehicular Origin-Destination Demand Using Multi-Sensor Information Fusion Approaches. Other, School of Civil Engineering, Purdue University. [ http ]

31. Kannan, S., Wood, P., Deatrick, L., Beane, P., Chaterji, S., and Bagchi, S. (2017). TopHat: Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks. International Conference on Security and Privacy in Communication System, Springer. [ http ]

32. Bagchi, K. J. S., Theera-Ampornpunt, N., Ammar, M., Zegura, E., Mangla, T., and Panta, R. K. (2017). TANGO: Performance and Fault Management in Cellular Networks through Cooperation between Devices and Edge Computing Nodes. Other, . [ http ]

33. Lee, C., Michelusi, N., and Scutari, G. (2017). Topology-Agnostic Average Consensus in Sensor Networks with Limited Data Rate. Purdue University, West Lafayette, IN, Tech. Rep, . [ http ]

34. Sakka, L., Sundararajah, K., and Kulkarni, M. (2017). TreeFuser: a framework for analyzing and fusing general recursive tree traversals. Proceedings of the ACM on Programming Languages, ACM. [ http ]

35. Hegde, N., Liu, J., Sundararajah, K., and Kulkarni, M. (2017). Treelogy: A benchmark suite for tree traversals. Other, IEEE. Cited by 2. [ http ]

36. Patwari, A., Laguna, I., Schulz, M., and Bagchi, S. (2017). Understanding the Spatial Characteristics of DRAM Errors in HPC Clusters. Other, ACM. Cited by 1. [ http ]

2016

1. Sha, Z., and Panchal, J. H. (2016). A Degree-Based Decision-Centric Model for Complex Networked Systems. ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. [ http ]

2. Mitra, S., Javagal, S., Maji, A. K., Gamblin, T., Moody, A., Harrell, S., and Bagchi, S. (2016). A Study of Failures in Community Clusters: The Case of Conte. Software Reliability Engineering Workshops (ISSREW), 2016 IEEE International Symposium on, IEEE. Cited by 1. [ http ]

3. Sarmin, S., Bagchi, S., and Al Islam, A. (2016). Chameleon: defending secret information from eavesdropping over physical environment. 2016 International Conference on Networking Systems and Security (NSysS), IEEE. [ http ]

4. Shen, D., Liu, X., and Lin, F. X. (2016). Characterizing emerging heterogeneous memory. Other, ACM. Cited by 8. [ http ]

5. Dachowicz, A., Chaduvula, S. C., Panchal, J. H., and Atallah, M. (2016). Confidentiality Management in Collaborative Design. ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 2. [ http ]

6. Song, P., Scutari, G., Facchinei, F., and Lampariello, L. (2016). D3m: Distributed multi-cell multigroup multicasting. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 6. [ http ]

7. Wood, P., Bagchi, S., and Hussain, A. (2016). Defending against strategic adversaries in dynamic pricing markets for smart grids. 2016 8th International Conference on Communication Systems and Networks (COMSNETS), IEEE. Cited by 2. [ http ]

8. Sun, Y., Scutari, G., and Palomar, D. (2016). Distributed nonconvex multiagent optimization over time-varying networks. arXiv preprint arXiv:1607.00249, . Cited by 24. [ http ]

9. Di Lorenzo, P., and Scutari, G. (2016). Distributed nonconvex optimization over time-varying networks. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 7. [ http ]

10. Benedyk, I. V., Peeta, S., Zheng, H., Guo, Y., and Iyer, A. V. (2016). Dynamic Model for System-Level Strategic Intermodal Facility Investment Planning. Transportation Research Record: Journal of the Transportation Research Board, Transportation Research Board of the National Academies. Cited by 4. [ http ]

11. Lu, C., Liu, J., Qu, Y., Peeta, S., Rouphail, N. M., and Zhou, X. (2016). Eco-system optimal time-dependent flow assignment in a congested network. Transportation Research Part B: Methodological, Pergamon. Cited by 11. [ http ]

12. Pandita, P., Bilionis, I., and Panchal, J. (2016). Extending Expected Improvement for High-Dimensional Stochastic Optimization of Expensive Black-Box Functions. Journal of Mechanical Design, American Society of Mechanical Engineers. Cited by 5. [ http ]

13. Liu, J., Hegde, N., and Kulkarni, M. (2016). Hybrid CPU-GPU scheduling and execution of tree traversals. Proceedings of the 2016 International Conference on Supercomputing, ACM. Cited by 5. [ http ]

14. Al-Shuwaili, A. N., Simeone, O., Bagheri, A., and Scutari, G. (2016). Joint Uplink/Downlink Optimization for Backhaul-Limited Mobile Cloud Computing with User Scheduling. arXiv preprint arXiv:1607.06521, . Cited by 8. [ http ]

15. Miralinaghi, M., and Peeta, S. (2016). Multi-period equilibrium modeling planning framework for tradable credit schemes. Transportation Research Part E: Logistics and Transportation Review, Elsevier. Cited by 9. [ http ]

16. Li, Y., Jiang, X., Zhu, H., He, X., Peeta, S., Zheng, T., and Li, Y. (2016). Multiple measures-based chaotic time series for traffic flow prediction based on Bayesian theory. Nonlinear Dynamics, Springer. Cited by 10. [ http ]

17. Di Lorenzo, P., and Scutari, G. (2016). Next: In-network nonconvex optimization. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 61. [ http ]

18. Sundaram, S., and Bagchi, S. (2016). Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets. Decision and Game Theory for Security: 7th International Conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, Proceedings, Springer. [ http ]

19. Zhu, S., Zheng, H., Peeta, S., Guo, Y., Cheng, L., and Sun, W. (2016). Optimal Heterogeneous Sensor Deployment Strategy for Dynamic Origin Destination Demand Estimation. Transportation Research Record: Journal of the Transportation Research Board, Transportation Research Board of the National Academies. Cited by 2. [ http ]

20. Mitra, S., Panta, R., Ra, M., and Bagchi, S. (2016). Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage. Proceedings of the Eleventh European Conference on Computer Systems, ACM. Cited by 16. [ http ]

21. Lu, Y., Kulkarni, M., Jaber, N., and Zhu, J. X. (2016). Programming language support for analyzing non-persistent data. Technologies for Homeland Security (HST), 2016 IEEE Symposium on, IEEE. [ http ]

22. Thekinen, J., and Panchal, J. H. (2016). Resource allocation in cloud-based design and manufacturing: A mechanism design approach. Journal of Manufacturing Systems, Elsevier. Cited by 3. [ http ]

23. Agrawal, S., Zheng, H., Peeta, S., and Kumar, A. (2016). Routing aspects of electric vehicle drivers and their effects on network performance. Transportation Research Part D: Transport and Environment, Elsevier. Cited by 9. [ http ]

24. Mahadik, K., Wright, C., Zhang, J., Kulkarni, M., Bagchi, S., and Chaterji, S. (2016). SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications. Proceedings of the 2016 International Conference on Supercomputing, ACM. Cited by 6. [ http ]

25. Thomas, T. E., Bhattad, A. J., Mitra, S., and Bagchi, S. (2016). Sirius: Neural network based probabilistic assertions for detecting silent data corruption in parallel programs. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 4. [ http ]

26. Akyildiz, I. F., Wang, P., and Lin, S. (2016). SoftWater: Software-defined networking for next-generation underwater communication systems. Ad Hoc Networks, Elsevier. Cited by 25. [ http ]

27. Hegde, N., Liu, J., and Kulkarni, M. (2016). SPIRIT: a runtime system for distributed irregular tree applications. Proceedings of the 21st ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, ACM. Cited by 1. [ http ]

28. Theera-Ampornpunt, N., Mangla, T., Bagchi, S., Panta, R., Joshi, K., Ammar, M., and Zegura, E. (2016). TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices. Reliable Distributed Systems (SRDS), 2016 IEEE 35th Symposium on, IEEE. Cited by 1. [ http ]

29. Guan, Z., Melodia, T., and Scutari, G. (2016). To transmit or not to transmit? Distributed queueing games in infrastructureless wireless networks. IEEE/ACM Transactions on Networking, IEEE. Cited by 17. [ http ]

30. Shin, D., Bagchi, S., and Wang, C. (2016). Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks. IEEE Transactions on Mobile Computing, IEEE. Cited by 2. [ http ]

31. Shergadwala, M., Kannan, K. N., and Panchal, J. H. (2016). Understanding the Impact of Expertise on Design Outcome: An Approach Based on Concept Inventories and Item Response Theory. ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 2. [ http ]

32. Mangla, T., Theera-Ampornpunt, N., Ammar, M., Zegura, E., and Bagchi, S. (2016). Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments. Proceedings of the 8th International Workshop on Mobile Video, ACM. Cited by 11. [ http ]

2015

1. He, X., and Peeta, S. (2015). A Marginal Utility Day-to-day Traffic Evolution Model. Transportation Research Board 94th Annual Meeting, . Cited by 2. [ http ]

2. Liu, R., Jiang, L., Jiang, N., and Lin, F. X. (2015). Anatomizing System Activities on Interactive Wearable Devices. Proceedings of the 6th Asia-Pacific Workshop on Systems, ACM. Cited by 4. [ http ]

3. Xu, C., Lin, F. X., Wang, Y., and Zhong, a. L. (2015). Automated OS-level Device Runtime Power Management. Proc. Int. Conf. Architectural Support for Programming  Languages and Operating Systems, ACM. Cited by 16. [ http ]

4. Sha, Z., Kannan, K. N., and Panchal, J. H. (2015). Behavioral experimentation and game theory in engineering systems design. Journal of Mechanical Design, American Society of Mechanical Engineers. Cited by 9. [ http ]

5. Kulkarni, M., and Lu, Y. (2015). Beyond Big Data--Rethinking Programming Languages for Non-persistent Data. 2015 International Conference on Cloud Computing and Big Data (CCBD), IEEE. Cited by 2. [ http ]

6. Li, H., Lu, X., Liu, X., Xie, T., Bian, K., Lin, F. X., Mei, Q., and Feng, F. (2015). Characterizing Smartphone Usage Patterns from Millions of Android Users. Proceedings of the 2015 ACM Conference on Internet Measurement Conference, ACM. Cited by 43. [ http ]

7. Hsu, Y., and Peeta, S. (2015). Clearance time estimation for incorporating evacuation risk in routing strategies for evacuation operations. Networks and Spatial Economics, Springer. Cited by 11. [ http ]

8. Mitra, S., Bronevetsky, G., Javagal, S., and Bagchi, S. (2015). Dealing with the unknown: Resilience to prediction errors. Parallel Architecture and Compilation (PACT), 2015 International Conference on, IEEE. Cited by 5. [ http ]

9. Laguna, I., Ahn, D. H., Supinski, B. R. d., Gamblin, T., Lee, G. L., Schulz, M., Bagchi, S., Kulkarni, M., Zhou, B., Chen, Z., and Qin, F. (2015). Debugging high-performance computing applications at massive scales. Communications of the ACM, ACM. Cited by 7. [ http ]

10. Elmahdi, A., Taha, A. F., Sun, D., and Panchal, J. H. (2015). Decentralized control framework and stability analysis for networked control systems. Journal of Dynamic Systems, Measurement, and Control, American Society of Mechanical Engineers. Cited by 19. [ http ]

11. Avery, J., Guterriez, C., Almeshekah, M., Bagchi, S., and Spafford, E. H. (2015). Deception in computing: where and how it has been used. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

12. Wood, P., Gutierrez, C., and Bagchi, S. (2015). Denial of Service Elusion (DoSE): Keeping clients connected for less. Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on, IEEE. Cited by 11. [ http ]

13. Laguna, I., Ahn, D. H., de Supinski, B. R., Bagchi, S., and Gamblin, T. (2015). Diagnosis of Performance Faults in Large-Scale MPI Applications via Probabilistic Progress-Dependence Inference. IEEE Transactions on Parallel and Distributed Systems, IEEE. Cited by 3. [ http ]

14. Di Lorenzo, P., and Scutari, G. (2015). Distributed nonconvex optimization over networks. Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP), 2015 IEEE 6th International Workshop on, IEEE. Cited by 12. [ http ]

15. Taha, A. F., Qi, J., Wang, J., and Panchal, J. H. (2015). Dynamic State Estimation under Cyber Attacks: A Comparative Study of Kalman Filters and Observers. arXiv preprint arXiv:1508.07252, . Cited by 4. [ http ]

16. Bond, M. D., Kulkarni, M., Cao, M., Salmi, M. F., and Huang, J. (2015). Efficient Deterministic Replay of Multithreaded Executions in a Managed Language Virtual Machine. Proceedings of the Principles and Practices of Programming on The Java Platform, ACM. Cited by 11. [ http ]

17. Ren, B., Jo, Y., Krishnamoorthy, S., Agrawal, K., and Kulkarni, M. (2015). Efficient execution of recursive programs on commodity vector hardware. ACM SIGPLAN Notices, ACM. Cited by 14. [ http ]

18. Bagchi, S., Javagal, S. R., Mitra, S., Harrell, S., and Schwarz, C. (2015). Fresco-the open data repository for workloads and failures in large-scale computing clusters. Other, . Cited by 2. [ http ]

19. Daneshmand, A., Facchinei, F., Kungurtsev, V., and Scutari, G. (2015). Hybrid random/deterministic parallel algorithms for convex and nonconvex big data optimization. IEEE Transactions on Signal Processing, IEEE. Cited by 33. [ http ]

20. Maji, A. K., Mitra, S., and Bagchi, S. (2015). Ice: An integrated configuration engine for interference mitigation in cloud services. Autonomic Computing (ICAC), 2015 IEEE International Conference on, IEEE. Cited by 12. [ http ]

21. Grady, C. A., He, X., and Peeta, S. (2015). Integrating social network analysis with analytic network process for international development project selection. Expert Systems with Applications, Elsevier. Cited by 14. [ http ]

22. Sardellitti, S., Scutari, G., and Barbarossa, S. (2015). Joint optimization of radio and computational resources for multicell mobile-edge computing. IEEE Transactions on Signal and Information Processing over Networks, IEEE. Cited by 141. [ http ]

23. Lin, F. X., Wang, Z., and Zhong, L. (2015). K2: A Mobile Operating System for Heterogeneous Coherence Domains. ACM Transactions on Computer Systems (TOCS), ACM. Cited by 5. [ http ]

24. Kim, Y. H., Peeta, S., and He, X. (2015). Macroscopic Modeling of Spatiotemporal Information Flow Propagation Wave under Vehicle-to-Vehicle Communications. 2015 IEEE 18th International Conference on Intelligent Transportation Systems, IEEE. Cited by 1. [ http ]

25. He, X., Zheng, H., and Peeta, S. (2015). Model and a solution algorithm for the dynamic resource allocation problem for large-scale transportation network evacuation. Transportation Research Part C: Emerging Technologies, Elsevier. Cited by 15. [ http ]

26. Gutierrez, C. N., Bagchi, S., Mohammed, H., and Avery, J. (2015). Modeling Deception In Information Security As A Hypergame A Primer. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

27. Kim, Y. H., Peeta, S., and He, X. (2015). Modeling the Spatiotemporal Propagation Characteristics of Information under Vehicle-to-Vehicle Communications. Transportation Research Board 94th Annual Meeting, . [ http ]

28. Zheng, H., and Peeta, S. (2015). Network design for personal rapid transit under transit-oriented development. Transportation Research Part C: Emerging Technologies, Elsevier. Cited by 13. [ http ]

29. Wood, P., Bagchi, S., and Hussain, A. (2015). Optimizing defensive investments in energy-based cyber-physical systems. Parallel and Distributed Processing Symposium Workshop (IPDPSW), 2015 IEEE International, IEEE. Cited by 2. [ http ]

30. Liu, C., and Kulkarni, M. (2015). Optimizing the LULESH stencil code using concurrent collections. Proceedings of the 5th International Workshop on Domain-Specific Languages and High-Level Frameworks for High Performance Computing, ACM. Cited by 2. [ http ]

31. Facchinei, F., Scutari, G., and Sagratella, S. (2015). Parallel selective algorithms for nonconvex big data optimization. IEEE Transactions on Signal Processing, IEEE. Cited by 100. [ http ]

32. Yan, Y., He, X., Hong, L., Ouyang, M., and Peeta, S. (2015). Pre-disaster Investment Model for Strengthening the Chinese Railway System Under Earthquakes. Other, . Cited by 1. [ http ]

33. Benedyk, I. V., Peeta, S., Zheng, H., Guo, Y., and Iyer, A. V. (2015). Risk Management in a Systems View of Intermodal Facility Investment Under Uncertainty in Freight Commodity Flow. Dissertation, . [ http ]

34. Taha, A. F., Qi, J., Wang, J., and Panchal, J. H. (2015). Risk mitigation for dynamic state estimation against cyber attacks and unknown inputs. arXiv preprint arXiv:1508.07246, . Cited by 18. [ http ]

35. Davendralingam, N., Sha, Z., Moolchandani, K., Maheshwari, A., Panchal, J. H., and DeLaurentis, D. A. (2015). Scientific Foundations for Systems Engineering: Challenges and Strategies. ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 4. [ http ]

36. Wang, J., He, X., and Peeta, S. (2015). Sensitivity analysis based approximation models for day-to-day link flow evolution process. Transportation Research Part B: Methodological, Elsevier. Cited by 6. [ http ]

37. Avery, J., Gutierrez, C., Wood, P., Corte, R. D., Modelo-Howard, J. F. G., Berndt, B., McDermott, K., Bagchi, S., Goldwasser, D., and Cinque, M. (2015). SNIPE: signature generation for phishing emails. Proceedings of the 16th Annual Information Security Symposium, CERIAS-Purdue University. Cited by 1. [ http ]

38. Tancreti, M., Sundaram, V., Bagchi, S., and Eugster, P. (2015). Software-only system-level record and replay in wireless sensor networks. Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM. [ http ]

39. Tancreti, M., Sundaram, V., Bagchi, S., and Eugster, P. (2015). TARDIS: software-only system-level record and replay in wireless sensor networks. Proceedings of the 14th International Conference on Information Processing in Sensor Networks, ACM. Cited by 7. [ http ]

40. Sengupta, A., Cao, M., Bond, M. D., and Kulkarni, M. (2015). Toward Efficient Strong Memory Model Support for the Java Platform via Hybrid Synchronization. Proceedings of the Principles and Practices of Programming on The Java Platform, ACM. Cited by 3. [ http ]

41. Peeta, S., Liu, H., and He, X. (2015). Traffic Network Modeling. Other, Routledge Handbooks Online. Cited by 1. [ http ]

42. Weijiang, Y., Balakrishna, S., Liu, J., and Kulkarni, M. (2015). Tree dependence analysis. ACM SIGPLAN Notices, ACM. Cited by 6. [ http ]

43. Bi, Y., Shergadwala, M., Reid, T., and Panchal, J. H. (2015). Understanding the utilization of information stimuli in design decision making using eye gaze data. ASME 2015 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 4. [ http ]

44. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2015). Unknown input observer design and analysis for networked control systems. International Journal of Control, Taylor \& Francis. Cited by 6. [ http ]

45. Hong, L., Ouyang, M., Peeta, S., He, X., and Yan, Y. (2015). Vulnerability assessment and mitigation for the Chinese railway system under floods. Reliability Engineering \& System Safety, Elsevier. Cited by 38. [ http ]

46. Hong, L., Ouyang, M., Peeta, S., Yan, Y., and He, X. (2015). Vulnerability Assessment and Reduction for the Chinese Railway System Under Floods. Transportation Research Board 94th Annual Meeting, . Cited by 1. [ http ]

2014

1. Alvarado, A., Scutari, G., and Pang, J. (2014). A New Decomposition Method for Multiuser DC-Programming and its Applications. Signal Processing, IEEE Transactions on, IEEE. Cited by 49. [ http ]

2. Taha, A. F., Hachem, N. A., and Panchal, J. H. (2014). A Quasi-Feed-In-Tariff policy formulation in micro-grids: A bi-level multi-period approach. Energy Policy, Elsevier. Cited by 19. [ http ]

3. Shawly, T., Liu, J., Burow, N., Bagchi, S., Berthier, R., and Bobba, R. B. (2014). A risk assessment tool for advanced metering infrastructures. Smart Grid Communications (SmartGridComm), 2014 IEEE International Conference on, IEEE. Cited by 5. [ http ]

4. Du, L., and Peeta, S. (2014). A stochastic optimization model to reduce expected post-disaster response time through pre-disaster investment decisions. Networks and spatial economics, Springer. Cited by 14. [ http ]

5. Mitra, S., Laguna, I., Ahn, D. H., Bagchi, S., Schulz, M., and Gamblin, T. (2014). Accurate application progress analysis for large-scale parallel debugging. ACM SIGPLAN Notices, ACM. Cited by 22. [ http ]

6. Snir, M., Wisniewski, R. W., Abraham, J. A., Adve, S. V., Bagchi, S., Balaji, P., Belak, J., Bose, P., Cappello, F., Carlson, B., and others, B. (2014). Addressing failures in exascale computing. International Journal of High Performance Computing Applications, Sage Publications. Cited by 179. [ http ]

7. Kim, Y. H., Peeta, S., and He, X. (2014). An analytical model to characterize the spatiotemporal propagation of information under vehicle-to-vehicle communications. 17th International IEEE Conference on Intelligent Transportation Systems (ITSC), IEEE. Cited by 11. [ http ]

8. Elmahdi, A., Taha, A. F., Sun, D., and Panchal, J. H. (2014). An optimal general purpose scheduler for networked control systems. Systems, Man and Cybernetics (SMC), 2014 IEEE International Conference on, IEEE. Cited by 4. [ http ]

9. Hsu, Y., and Peeta, S. (2014). Behavior-consistent information-based network traffic control for evacuation operations. Transportation research part C: emerging technologies, Elsevier. Cited by 11. [ http ]

10. Taha, A. F., and Panchal, J. H. (2014). Decision-making in energy systems with multiple technologies and uncertain preferences. IEEE Transactions on Systems, Man, and Cybernetics: Systems, IEEE. Cited by 7. [ http ]

11. Scutari, G., Facchinei, F., Song, P., Palomar, D. P., and Pang, J. (2014). Decomposition by partial linearization: Parallel optimization of multi-agent systems. IEEE Transactions on Signal Processing, IEEE. Cited by 148. [ http ]

12. Xu, C., Lin, F. X., and Zhong, L. (2014). Device drivers should not do power management. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 5. [ http ]

13. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Distributed joint optimization of radio and computational resources for mobile cloud computing. Cloud Networking (CloudNet), 2014 IEEE 3rd International Conference on, IEEE. Cited by 7. [ http ]

14. Sardellitti, S., Barbarossa, S., and Scutari, G. (2014). Distributed mobile cloud computing: Joint optimization of radio and computational resources. 2014 IEEE Globecom Workshops (GC Workshops), IEEE. Cited by 9. [ http ]

15. LiKamWa, R., Wang, Z., Carroll, A., Lin, F. X., and Zhong, L. (2014). Draining our glass: An energy and heat characterization of google glass. Proceedings of 5th Asia-Pacific Workshop on Systems, ACM. Cited by 55. [ http ]

16. Zhang, P., and Peeta, S. (2014). Dynamic and disequilibrium analysis of interdependent infrastructure systems. Transportation Research Part B: Methodological, Elsevier. Cited by 6. [ http ]

17. He, X., and Peeta, S. (2014). Dynamic resource allocation problem for transportation network evacuation. Networks and Spatial Economics, Springer. Cited by 11. [ http ]

18. Bond, M. D., Kulkarni, M., Cao, M., Salmi, M. F., and Huang, J. (2014). Efficient Deterministic Replay of Multithreaded Programs Based on Efficient Tracking of Cross-Thread Dependences. Ohio Sate CSE Tech Report OSU-CISRC-12/14-TR20. Ohio State University, . Cited by 1. [ http ]

19. Vanem, E. (2014). E-Maritime services for communication with class and for enhanced safety, security and environmental protection in shipping. International Journal for Traffic and Transport Engineering, . Cited by 1. [ http ]

20. Sha, Z., and Panchal, J. H. (2014). Estimating linking preferences and behaviors of autonomous systems in the Internet using a discrete choice model. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE. Cited by 8. [ http ]

21. Sha, Z., and Panchal, J. H. (2014). Estimating Local Decision-Making Behavior in Complex Evolutionary Systems. Journal of Mechanical Design, American Society of Mechanical Engineers. Cited by 12. [ http ]

22. Song, D., He, X., and Peeta, S. (2014). Field Deployment to Quantify the Value of Real-time Information by Integrating Driver Routing Decisions and Route Assignment Strategies. Tech Report, . [ http ]

23. Daneshmand, A., Facchinei, F., Kungurtsev, V., and Scutari, G. (2014). Flexible selective parallel algorithms for big data optimization. 2014 48th Asilomar Conference on Signals, Systems and Computers, IEEE. Cited by 2. [ http ]

24. Kim, Y. H., and Peeta, S. (2014). Graph Theoretical Modeling for Dynamic Traffic Information Update Problem Under Vehicle-to-Vehicle Communications. Transportation Research Board 93rd Annual Meeting, . [ http ]

25. Song, D., He, X., Peeta, S., and Zhou, X. (2014). Integrated Deployment Architecture for Predictive Real-Time Traffic Routing Incorporating Human Factors Considerations. Tech Report, . Cited by 1. [ http ]

26. Peters, J. C., Kumar, A., Zheng, H., Agrawal, S., and Peeta, S. (2014). Integrated Framework to Capture the Interdependencies between Transportation and Energy Sectors due to Policy Decisions. Nextrans Project, . Cited by 2. [ http ]

27. Arshad, F. A., Maji, A. K., Mudgal, S., and Bagchi, S. (2014). Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?. 11th International Conference on Autonomic Computing (ICAC 14), . [ http ]

28. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint cell selection and radio resource allocation in MIMO small cell networks via successive convex approximation. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 8. [ http ]

29. Sardellitti, S., Scutari, G., and Barbarossa, S. (2014). Joint optimization of radio and computational resources for multicell mobile cloud computing. Signal Processing Advances in Wireless Communications (SPAWC), 2014 IEEE 15th International Workshop on, IEEE. Cited by 10. [ http ]

30. Bowen, Z., Bronevetsky, G., Casas-Guix, M., and Bagchi, S. (2014). KONGMING: Performance Prediction in the Cloud via Multidimensional Interference Surrogates. Tech Report, Lawrence Livermore National Laboratory (LLNL), Livermore, CA. [ http ]

31. Maji, A. K., Mitra, S., Zhou, B., Bagchi, S., and Verma, A. (2014). Mitigating interference in cloud services by middleware reconfiguration. Proceedings of the 15th International Middleware Conference, ACM. Cited by 29. [ http ]

32. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Networked unknown input observer analysis and design for time-delay systems. 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), IEEE. Cited by 4. [ http ]

33. Atzeni, I., Ordóñez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2014). Non-cooperative Day - Ahead Bidding Strategies for Demand-Side Expected Cost Minimization with Real-Time Adjustments: A GNEP Approach. IEEE Transactions on Signal Processing, IEEE. Cited by 26. [ http ]

34. Facchinei, F., Pang, J., and Scutari, G. (2014). Non-cooperative games with minmax objectives. Computational Optimization and Applications, Springer. Cited by 2. [ http ]

35. Elmahdi, A., Taha, A. F., and Sun, D. (2014). Observer-based decentralized control scheme for stability analysis of networked systems. 11th IEEE International Conference on Control \& Automation (ICCA), IEEE. Cited by 8. [ http ]

36. Mahadik, K., Chaterji, S., Zhou, B., Kulkarni, M., and Bagchi, S. (2014). Orion: Scaling genomic sequence matching with fine-grained parallelization. SC14: International Conference for High Performance Computing, Networking, Storage and Analysis, IEEE. Cited by 10. [ http ]

37. Scutari, G., Facchinei, F., Lampariello, L., and Song, P. (2014). Parallel and distributed methods for nonconvex optimization. 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE. Cited by 22. [ http ]

38. Kulkarni, M., Choudhary, L., Kumbhani, B., and Kshetrimayum, R. S. (2014). Performance analysis comparison of transmit antenna selection with maximal ratio combining and orthogonal space time block codes in equicorrelated Rayleigh fading multiple input multiple output channels. IET Communications, IET. Cited by 8. [ http ]

39. Avery, J., Modelo-Howard, G., Arshad, F., Bagchi, S., and Qi, Y. (2014). pSigene: generalizing attack signatures. Proceedings of the 15th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

40. Howard, G. M., Gutierrez, C. N., Arshad, F. A., Bagchi, S., and Qi, Y. (2014). psigene: Webcrawling to generalize sql injection signatures. 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, IEEE. Cited by 13. [ http ]

41. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Pure Time Delay Analysis for Decentralized Networked Control Systems. ASME 2014 Dynamic Systems and Control Conference, American Society of Mechanical Engineers. Cited by 2. [ http ]

42. Scutari, G., Facchinei, F., Pang, J., and Palomar, D. P. (2014). Real and complex monotone communication games. IEEE Transactions on Information Theory, IEEE. Cited by 65. [ http ]

43. Islam, T. Z., Bagchi, S., and Eigenmann, R. (2014). Reliable and Efficient Distributed Checkpointing System for Grid Environments. Journal of Grid Computing, Springer. Cited by 4. [ http ]

44. Hsu, Y., and Peeta, S. (2014). Risk-based spatial zone determination problem for stage-based evacuation operations. Transportation research part C: emerging technologies, Elsevier. Cited by 18. [ http ]

45. Wang, S., Bhandari, S., Atallah, M., Panchal, J. H., and Ramani, K. (2014). Secure collaboration in engineering systems design. ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 3. [ http ]

46. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Stability analysis of networked control systems with unknown inputs. Communication, Control, and Computing (Allerton), 2014 52nd Annual Allerton Conference on, IEEE. Cited by 2. [ http ]

47. Taha, A. F., Elmahdi, A., Panchal, J. H., and Sun, D. (2014). Time delay analysis for networked control systems with applications to power networks. ASME Journal of Dynamic Systems, Measurement, and Control, . Cited by 4. [ http ]

48. Hsu, Y., and Peeta, S. (2014). Using Behavior-Consistent Information-Based Control for Traffic Routing in Real-Time Evacuation Operations. Transportation Research Board 93rd Annual Meeting, . [ http ]

49. Facchinei, F., Pang, J., Scutari, G., and Lampariello, L. (2014). VI-constrained hemivariational inequalities: distributed algorithms and power control in ad-hoc networks. Mathematical Programming, Springer. Cited by 16. [ http ]

2013

1. Koo, J., Shin, D., Lin, X., and Bagchi, S. (2013). A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks. Ad Hoc Networks, Elsevier. Cited by 1. [ http ]

2. Hsu, Y., and Peeta, S. (2013). An aggregate approach to model evacuee behavior for no-notice evacuation operations. Transportation, Springer. Cited by 25. [ http ]

3. Shin, D., and Bagchi, S. (2013). An optimization framework for monitoring multi-channel multi-radio wireless mesh networks. Ad Hoc Networks, Elsevier. Cited by 13. [ http ]

4. Laguna, I., Mitra, S., Arshad, F. A., Theera-Ampornpunt, N., Zhu, Z., Bagchi, S., Midkiff, S. P., Kistler, M., and Gheith, A. (2013). Automatic problem localization via multi-dimensional metric profiling. 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, IEEE. Cited by 12. [ http ]

5. Kulkarni, M., Wadekar, P., and Dagale, H. (2013). Block Division Based CAMShift Algorithm for Real-Time Object Tracking Using Distributed Smart Cameras. Multimedia (ISM), 2013 IEEE International Symposium on, IEEE. Cited by 2. [ http ]

6. Arshad, F. A., Krause, R. J., and Bagchi, S. (2013). Characterizing configuration problems in java ee application servers: An empirical study with glassfish and jboss. 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), IEEE. Cited by 12. [ http ]

7. Atzeni, I., Ordónez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2013). Cooperative day-ahead bidding strategies for demand-side expected cost minimization. Acoustics, Speech and Signal Processing (ICASSP), 2013 IEEE International Conference on, IEEE. Cited by 5. [ http ]

8. Scutari, G., Facchinei, F., Song, P., Palomar, D. P., and Pang, J. (2013). Decomposition by partial linearization in multiuser systems. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE. Cited by 4. [ http ]

9. Atzeni, I., Ord{\'o}{\~n}ez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2013). Demand-side management via distributed energy generation and storage optimization. IEEE Transactions on Smart Grid, IEEE. Cited by 267. [ http ]

10. Khalil, I., Bagchi, S., AbuAli, N., and Hayajneh, M. (2013). DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks. Security and Communication Networks, . Cited by 3. [ http ]

11. Shin, D., Moses, D., Venkatachalam, M., and Bagchi, S. (2013). Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches. IEEE network, IEEE. Cited by 34. [ http ]

12. Guan, Z., Melodia, T., and Scutari, G. (2013). Distributed queueing games in interference-limited wireless networks. 2013 IEEE International Conference on Communications (ICC), IEEE. Cited by 10. [ http ]

13. Chuang, W., Sang, B., Yoo, S., Gu, R., Kulkarni, M., and Killian, C. (2013). Eventwave: Programming model and runtime support for tightly-coupled elastic cloud applications. Proceedings of the 4th annual Symposium on Cloud Computing, ACM. Cited by 22. [ http ]

14. Liu, C., Jamal, M. H., Kulkarni, M., Prakash, A., and Pai, V. (2013). Exploiting domain knowledge to optimize parallel computational mechanics codes. Proceedings of the 27th international ACM conference on International conference on supercomputing, ACM. Cited by 9. [ http ]

15. Scutari, G., and Pang, J. (2013). Joint sensing and power allocation in nonconvex cognitive radio games: Nash equilibria and distributed algorithms. IEEE Transactions on Information Theory, IEEE. Cited by 39. [ http ]

16. Pang, J., and Scutari, G. (2013). Joint sensing and power allocation in nonconvex cognitive radio games: Quasi-Nash equilibria. IEEE Transactions on Signal Processing, IEEE. Cited by 44. [ http ]

17. Bagchi, S., Arshad, F., Rellermeyer, J., Osiecki, T., Kistler, M., and Gheith, A. (2013). Lilliput meets brobdingnagian: Data center systems management through mobile devices. 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), IEEE. Cited by 1. [ http ]

18. Shin, D., Koo, J., Yang, L., Lin, X., Bagchi, S., and Zhang, J. (2013). Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks. Communications and Network Security (CNS), 2013 IEEE Conference on, IEEE. Cited by 2. [ http ]

19. Yang, Y., Rubio, F., Scutari, G., and Palomar, D. P. (2013). Multi-portfolio optimization: A potential game approach. IEEE Transactions on Signal Processing, IEEE. Cited by 13. [ http ]

20. Atzeni, I., Ordóñez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2013). Non-cooperative and Cooperative Optimization of Distributed Energy Generation and Storage in the Demand-Side of the Smart Grid.. IEEE Trans. Signal Processing, . Cited by 95. [ http ]

21. Yang, Y., Scutari, G., and Palomar, D. P. (2013). Parallel stochastic decomposition algorithms for multi-agent systems. 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE. Cited by 16. [ http ]

22. Modelo-Howard, G., Arshad, F., Gutierrez, C., Bagchi, S., and Qi, Y. (2013). pSigene: webcrawling to generalize SQLi signatures. Proceedings of the 14th Annual Information Security Symposium, CERIAS-Purdue University. [ http ]

23. Yang, Y., Scutari, G., Song, P., and Palomar, D. P. (2013). Robust MIMO cognitive radio systems under interference temperature constraints. IEEE Journal on Selected Areas in Communications, IEEE. Cited by 43. [ http ]

24. Yang, Y., Song, P., Scutari, G., and Palomar, D. P. (2013). Robust MIMO cognitive radio systems under temperature interference constraints. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, IEEE. [ http ]

25. Mitra, S., Laguna, I., Ahn, D. H., Gamblin, T., Schulz, M., and Bagchi, S. (2013). Scalable parallel debugging via loop-aware progress dependence analysis. appear as a poster at the 25th IEEE/ACM International Conference for High Performance Computing, Networking, Storage and Analysis (Supercomputing), . Cited by 2. [ http ]

26. Choi, S., Gutierrez, C., Lim, H., Bagchi, S., and Bertino, E. (2013). Secure and resilient proximity-based access control. Proceedings of the 2013 international workshop on Data management \& analytics for healthcare, ACM. Cited by 4. [ http ]

27. AlSaber, N., and Kulkarni, M. (2013). SemCache: semantics-aware caching for efficient GPU offloading. Proceedings of the 27th international ACM conference on International conference on supercomputing, ACM. Cited by 15. [ http ]

28. Shin, D., Bagchi, S., and Wang, C. (2013). Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks. 2013 IEEE International Conference on Sensing, Communications and Networking (SECON), IEEE. Cited by 5. [ http ]

29. Sha, Z., and Panchal, J. H. (2013). Towards the design of complex evolving networks with high robustness and resilience. Procedia Computer Science, Elsevier. Cited by 13. [ http ]

30. Theera-Ampornpunt, N., Bagchi, S., Joshi, K. R., and Panta, R. K. (2013). Using big data for more dependability: a cellular network tale. Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, ACM. Cited by 9. [ http ]

31. Zhou, B., Too, J., Kulkarni, M., and Bagchi, S. (2013). WuKong: automatically detecting and localizing bugs that manifest at large system scales. Proceedings of the 22nd international symposium on High-performance parallel and distributed computing, ACM. Cited by 11. [ http ]

2012

1. Du, L., and Peeta, S. (2012). A Bi-level Stochastic Optimization Model to Enhance Transportation Network Survivability and Reduce Response Times Under Disasters. Transportation Research Board 91st Annual Meeting, . Cited by 4. [ http ]

2. Tsai, T., Theera-Ampornpunt, N., and Bagchi, S. (2012). A study of soft error consequences in hard disk drives. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 12. [ http ]

3. Zhou, B., Kulkarni, M., and Bagchi, S. (2012). ABHRANTA: Locating Bugs that Manifest at Large System Scales.. HotDep, . Cited by 3. [ http ]

4. Maji, A. K., Arshad, F. A., Bagchi, S., and Rellermeyer, J. S. (2012). An empirical study of the robustness of inter-component communication in Android. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 73. [ http ]

5. Bronevetsky, G., Laguna, I., de Supinski, B. R., and Bagchi, S. (2012). Automatic fault characterization via abnormality-enhanced classification. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), IEEE. Cited by 41. [ http ]

6. Jo, Y., and Kulkarni, M. (2012). Automatically enhancing locality for tree traversals with traversal splicing. ACM SIGPLAN Notices, ACM. Cited by 19. [ http ]

7. Le, Q., and Panchal, J. H. (2012). Building smaller sized surrogate models of complex bipartite networks based on degree distributions. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, IEEE. Cited by 8. [ http ]

8. Atzeni, I., Ord{\'o}nez, L. G., Scutari, G., Palomar, D. P., and Fonollosa, J. R. (2012). Day-ahead bidding strategies for demand-side expected cost minimization. Smart Grid Communications (SmartGridComm), 2012 IEEE Third International Conference on, IEEE. Cited by 22. [ http ]

9. Rellermeyer, J. S., and Bagchi, S. (2012). Dependability as a cloud service-a modular approach. IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), IEEE. Cited by 7. [ http ]

10. Shin, D., Bagchi, S., and Wang, C. (2012). Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 30. [ http ]

11. Scutari, G., Facchinei, F., and Pang, J. (2012). Equilibrium selection in MIMO communication games. 2012 IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), IEEE. Cited by 3. [ http ]

12. Scutari, G., Facchinei, F., Pang, J., and Lampariello, L. (2012). Equilibrium selection in power control games on the interference channel. INFOCOM, 2012 Proceedings IEEE, IEEE. Cited by 10. [ http ]

13. Rytsareva, I., Le, Q., Conner, E., Kalyanaraman, A., and Panchal, J. H. (2012). Evaluating Socio-Technical Coordination in Open-Source Communities: A Cluster-Based Approach. ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 1. [ http ]

14. Wang, Z., Lin, F. X., Zhong, L., and Chishtie, M. (2012). Guadalupe: a browser design for heterogeneous hardware. arXiv preprint arXiv:1212.5170, . [ http ]

15. Islam, T. Z., Mohror, K., Bagchi, S., Moody, A., Supinski, B. R. D., and Eigenmann, R. (2012). McrEngine: A scalable checkpointing system using data-aware aggregation and compression. Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, IEEE Computer Society Press. Cited by 73. [ http ]

16. Panta, R. K., and Bagchi, S. (2012). Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems, IEEE. Cited by 3. [ http ]

17. Scutari, G., Palomar, D. P., Facchinei, F., and Pang, J. (2012). Monotone games for cognitive radio systems. Distributed Decision Making and Control, Springer. Cited by 46. [ http ]

18. Nishant, J. D., Shivaprakasha, K., and Kulkarni, M. (2012). Multi threshold adaptive range clustering (M-TRAC) algorithm for energy balancing in wireless sensor networks. 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN), IEEE. Cited by 2. [ http ]

19. Al Islam, A. A., Alam, S. I., Raghunathan, V., and Bagchi, S. (2012). Multi-armed bandit congestion control in multi-hop infrastructure wireless mesh networks. 2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, IEEE. Cited by 3. [ http ]

20. Le, Q., and Panchal, J. H. (2012). Network-based analysis of the structure and evolution of an open source software product. System Science (HICSS), 2012 45th Hawaii International Conference on, IEEE. Cited by 3. [ http ]

21. Du, L., Sharma, A., and Peeta, S. (2012). Optimal advance detector location for green termination systems on high-speed isolated rural intersections. Transportation Research Part B: Methodological, Elsevier. Cited by 3. [ http ]

22. Liu, C., Li, J., Huang, W., Rubio, J., Speight, E., and Lin, X. (2012). Power-efficient time-sensitive mapping in heterogeneous systems. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 34. [ http ]

23. Koo, J., Lin, X., and Bagchi, S. (2012). PRIVATUS: Wallet-friendly privacy protection for smart meters. European Symposium on Research in Computer Security, Springer. Cited by 18. [ http ]

24. Laguna, I., Ahn, D. H., de Supinski, B. R., Bagchi, S., and Gamblin, T. (2012). Probabilistic diagnosis of performance faults in large-scale parallel applications. Proceedings of the 21st international conference on Parallel architectures and compilation techniques, ACM. Cited by 20. [ http ]

25. Chuang, W., Sang, B., Killian, C. E., and Kulkarni, M. (2012). Programming Model Support for Dependable, Elastic Cloud Applications.. HotDep, . Cited by 2. [ http ]

26. Lin, F. X., Wang, Z., and Zhong, L. (2012). Supporting distributed execution of smartphone workloads on loosely coupled heterogeneous processors. Presented as part of the 2012 Workshop on Power-Aware Computing and Systems, . Cited by 9. [ http ]

27. Arshad, F. A., Modelo-Howard, G., and Bagchi, S. (2012). To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network. 2012 20th IEEE International Conference on Network Protocols (ICNP), IEEE. Cited by 3. [ http ]

28. Bond, M. D., and Kulkarni, M. (2012). Tracking Conflicting Accesses Efficiently for Software Record and Replay. Tech Report, Technical report, Ohio State University. Cited by 2. [ http ]

2011

1. Zhang, P., and Peeta, S. (2011). A generalized modeling framework to analyze interdependencies among infrastructure systems. Transportation Research Part B: Methodological, Elsevier. Cited by 98. [ http ]

2. Zhang, P., and Peeta, S. (2011). A Multi-Period Dynamic Model for Analyzing the Infrastructure Interdependencies. Transportation Research Board 90th Annual Meeting, . [ http ]

3. Modelo-Howard, G., Bagchi, S., and Lebanon, G. (2011). Approximation algorithms for determining placement of intrusion detectors. CERIASTech. Report, . Cited by 3. [ http ]

4. Tancreti, M., Hossain, M. S., Bagchi, S., and Raghunathan, V. (2011). Aveksha: A hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems. Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, ACM. Cited by 35. [ http ]

5. Hsu, Y., and Peeta, S. (2011). Behavior Modeling for Information-Based No-Notice Evacuation. Transportation Research Board 90th Annual Meeting, . Cited by 1. [ http ]

6. Arshad, F. A., and Bagchi, S. (2011). Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service. Reliable Distributed Systems (SRDS), 2011 30th IEEE Symposium on, IEEE. Cited by 2. [ http ]

7. Wang, M., Li, Z., Li, F., Feng, X., Bagchi, S., and Lu, Y. (2011). Dependence-based multi-level tracing and replay for wireless sensor networks debugging. ACM SIGPLAN Notices, ACM. Cited by 10. [ http ]

8. Zhou, X., Sharma, S., and Peeta, S. (2011). Development of a Mobile Probe-Based Traffic Data Fusion and Flow Management Platform for Innovative Public-Private Information-Based Partnerships. USDOT Region V Regional University Transportation Center Final Report, . Cited by 3. [ http ]

9. Scutari, G., Palomar, D. P., Facchinei, F., and Pang, J. (2011). Distributed dynamic pricing for MIMO interfering multiuser systems: A unified approach. Network Games, Control and Optimization (NetGCooP), 2011 5th International Conference on, IEEE. Cited by 29. [ http ]

10. Peeta, S., Sharma, S., and Hsu, Y. (2011). Dynamic Real-Time Routing for Evacuation Response Planning and Execution. Publication FHWA/IN/JTRP-2011/08, Joint Transportation Research Program. Cited by 4. [ http ]

11. Panta, R. K., Bagchi, S., and Midkiff, S. P. (2011). Efficient incremental code update for sensor networks. ACM Transactions on Sensor Networks (TOSN), ACM. Cited by 35. [ http ]

12. Jo, Y., and Kulkarni, M. (2011). Enhancing locality for recursive traversals of recursive structures. ACM SIGPLAN Notices, ACM. Cited by 34. [ http ]

13. Panchal, J. H., and Messer, M. (2011). Extracting the structure of design information from collaborative tagging. Journal of Computing and Information Science in Engineering, American Society of Mechanical Engineers. Cited by 4. [ http ]

14. Hossain, M. S., Islam, A. A. A., Kulkarni, M., and Raghunathan, V. (2011). usetl: A set based programming abstraction for wireless sensor networks. Information Processing in Sensor Networks (IPSN), 2011 10th International Conference on, IEEE. Cited by 16. [ http ]

15. Yoo, S., Lee, H., Killian, C., and Kulkarni, M. (2011). Incontext: simple parallelism for distributed applications. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 14. [ http ]

16. Laguna, I., Gamblin, T., de Supinski, B. R., Bagchi, S., Bronevetsky, G., Anh, D. H., Schulz, M., and Rountree, B. (2011). Large scale debugging of parallel tasks with automaded. Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis, ACM. Cited by 24. [ http ]

17. Sinha, A., Panchal, J. H., Allen, J. K., and Mistree, F. (2011). Managing uncertainty in multiscale systems via simulation model refinement. ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 3. [ http ]

18. Yang, Y., Rubio, F., Scutari, G., and Palomar, D. (2011). Multi-portfolio Optimization: A Potential Game Approach. International Conference on Game Theory for Networks, Springer Berlin Heidelberg. Cited by 1. [ http ]

19. Pang, J., and Scutari, G. (2011). Nonconvex games with side constraints. SIAM Journal on Optimization, SIAM. Cited by 33. [ http ]

20. Theera-Ampornpunt, N., Zhou, B., and Bagchi, S. (2011). Predicting Time to Failure for Large Scale Distributed Systems. 42nd Annual IEEE/IFIP International Conference On Dependable Systems And Networks (DSN 2011), . Cited by 1. [ http ]

21. Lin, F. X., Ashbrook, D., and White, S. (2011). RhythmLink: securely pairing I/O-constrained devices by tapping. Proceedings of the 24th annual ACM symposium on User interface software and technology, ACM. Cited by 18. [ http ]

22. Wang, J., Scutari, G., and Palomar, D. P. (2011). Robust MIMO cognitive radio via game theory. IEEE Transactions on Signal Processing, IEEE. Cited by 118. [ http ]

23. Modelo-Howard, G., Sweval, J., and Bagchi, S. (2011). Secure configuration of intrusion detection sensors for changing enterprise systems. International Conference on Security and Privacy in Communication Systems, Springer. Cited by 5. [ http ]

24. Hariharan, S., Shroff, N. B., and Bagchi, S. (2011). Secure neighbor discovery through overhearing in static multihop wireless networks. Computer Networks, Elsevier. Cited by 15. [ http ]

25. Zhang, P., and Peeta, S. (2011). Static Equilibrium Analysis of the Infrastructure Interdependencies. Transportation Research Board 90th Annual Meeting, . [ http ]

26. Khalil, I., and Bagchi, S. (2011). Stealthy attacks in wireless ad hoc networks: detection and countermeasure. IEEE Transactions on Mobile Computing, IEEE. Cited by 62. [ http ]

27. Sinha, K., and Kulkarni, M. (2011). Techniques for fine-grained, multi-site computation offloading. Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, IEEE Computer Society. Cited by 48. [ http ]

28. Hacker, T. J., Eigenmann, R., Bagchi, S., Irfanoglu, A., Pujol, S., Catlin, A., and Rathje, E. (2011). The neeshub cyberinfrastructure for earthquake engineering. Computing in Science \& Engineering, AIP Publishing. Cited by 41. [ http ]

29. Kulkarni, M., Pai, V., and Schuff, D. (2011). Towards architecture independent metrics for multicore performance analysis. ACM SIGMETRICS Performance Evaluation Review, ACM. Cited by 11. [ http ]

30. Lin, F. X., Wang, Z., LiKamWa, R., and Zhong, L. (2011). Transparent programming of heterogeneous smartphones for sensing. arXiv preprint arXiv:1103.2348, . Cited by 4. [ http ]

31. Sha, Z., Le, Q., and Panchal, J. H. (2011). Using SysML for conceptual representation of agent-based models. ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, American Society of Mechanical Engineers. Cited by 5. [ http ]

32. Maji, A. K., and Bagchi, S. (2011). v-CAPS: a confidentiality and anonymity preserving routing protocol for content-based publish-subscribe networks. International Conference on Security and Privacy in Communication Systems, Springer Berlin Heidelberg. Cited by 4. [ http ]

33. Zhou, B., Kulkarni, M., and Bagchi, S. (2011). Vrisha: using scaling properties of parallel programs for bug detection and localization. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 13. [ http ]

34. Zhou, B., Kulkarni, M., and Bagchi, S. (2011). Vrisha: using scaling properties of parallel programs for bug detection and localization. Proceedings of the 20th international symposium on High performance distributed computing, ACM. Cited by 13. [ http ]