Search all papers or click the papers filter menu above for a selective search.
913 entries « ‹ 2 of 46
› » 21.
Kum, Hye-chung; Pathak, Darshana; Sanka, Gautam; Ahalt, Stanley
Privacy beyond anonymity Technical Report
no. 12-003, 2012.
@techreport{CS12-003,
title = {Privacy beyond anonymity},
author = {Hye-chung Kum and Darshana Pathak and Gautam Sanka and Stanley Ahalt},
url = {https://techreports.cs.unc.edu/papers/12-003.pdf},
year = {2012},
date = {2012-12-05},
number = {12-003},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
22.
Kum, Hye-chung; Ahalt, Stanley
Privacy by Design for Secondary Data Analysis Technical Report
no. 12-002, 2012.
@techreport{CS12-002,
title = {Privacy by Design for Secondary Data Analysis},
author = {Hye-chung Kum and Stanley Ahalt},
url = {https://techreports.cs.unc.edu/papers/12-002.pdf},
year = {2012},
date = {2012-12-05},
number = {12-002},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
23.
Li, Peng; Gao, Debin; Reiter, Michael K
Mitigating Timing Channels in Clouds using StopWatch* Technical Report
no. 11-010R, 2012.
@techreport{CS11-010R,
title = {Mitigating Timing Channels in Clouds using StopWatch*},
author = {Peng Li and Debin Gao and Michael K Reiter},
url = {https://techreports.cs.unc.edu/papers/11-010R.pdf},
year = {2012},
date = {2012-05-17},
number = {11-010R},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
24.
Heorhiadi, Victor; Reiter, Michael K.; Sekar, Vyas
Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems Technical Report
no. 12-001, 2012.
@techreport{CS12-001,
title = {Balancing Computation-Communication Tradeoffs in Scaling Network-Wide Intrusion Detection Systems},
author = {Victor Heorhiadi and Michael K. Reiter and Vyas Sekar},
url = {https://techreports.cs.unc.edu/papers/12-001.pdf},
year = {2012},
date = {2012-04-25},
number = {12-001},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
25.
Frederick P. Brooks, Jr.
Sixth Annual Report Interactive Graphics for Molecular Graphics System Technical Report
no. 80-015, 2012.
@techreport{CS80-015,
title = {Sixth Annual Report Interactive Graphics for Molecular Graphics System},
author = {Frederick P. Brooks, Jr.},
url = {https://techreports.cs.unc.edu/papers/80-015.pdf},
year = {2012},
date = {2012-01-26},
number = {80-015},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
26.
Li, Peng; Gao, Debin; Reiter, Michael K.
StopWatch Technical Report
no. 11-010, 2011.
@techreport{CS11-010,
title = {StopWatch},
author = {Peng Li and Debin Gao and Michael K. Reiter},
url = {https://techreports.cs.unc.edu/papers/11-010.pdf},
year = {2011},
date = {2011-12-29},
number = {11-010},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
27.
Narain, Rahul
Visual Modeling and Simulation of Multiscale Phenomena Technical Report
no. 11-009, 2011.
@techreport{CS11-009,
title = {Visual Modeling and Simulation of Multiscale Phenomena},
author = {Rahul Narain},
url = {https://techreports.cs.unc.edu/papers/11-009.pdf},
year = {2011},
date = {2011-12-21},
number = {11-009},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
28.
Chandak, Anish; Antani, Lakulish; Manocha, Dinesh
Efficient Auralization for Moving Sources and Receiver Technical Report
no. 11-008, 2011.
@techreport{CS11-008,
title = {Efficient Auralization for Moving Sources and Receiver},
author = {Anish Chandak and Lakulish Antani and Dinesh Manocha},
url = {https://techreports.cs.unc.edu/papers/11-008.pdf},
year = {2011},
date = {2011-11-08},
number = {11-008},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
29.
Wei, Lei; Reiter, Michael K.
Third-Party DFA Evaluation on Encrypted Files Technical Report
no. 11-005, 2011.
@techreport{CS11-005,
title = {Third-Party DFA Evaluation on Encrypted Files},
author = {Lei Wei and Michael K. Reiter},
url = {https://techreports.cs.unc.edu/papers/11-005.pdf},
year = {2011},
date = {2011-08-01},
number = {11-005},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
30.
Goswami, Dibyendusekhar; Monrose, Fabian; Frahm, Jan-Michael
"MAPS Technical Report
no. 11-004, 2011.
@techreport{CS11-004,
title = {"MAPS},
author = {Dibyendusekhar Goswami and Fabian Monrose and Jan-Michael Frahm},
url = {https://techreports.cs.unc.edu/papers/11-004.pdf},
year = {2011},
date = {2011-06-30},
number = {11-004},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
31.
Elliott, Glenn A.; Anderson, James H.
An Optimal k-Exclusion Real-Time Locking Protocol Motivated by Multi-GPU Systems Technical Report
no. 11-003, 2011.
@techreport{CS11-003,
title = {An Optimal k-Exclusion Real-Time Locking Protocol Motivated by Multi-GPU Systems},
author = {Glenn A. Elliott and James H. Anderson},
url = {https://techreports.cs.unc.edu/papers/11-003.pdf},
year = {2011},
date = {2011-06-10},
number = {11-003},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
32.
Elliott, Glenn A.; Sun, Chi-Hao; Anderson, James H.
Real-Time Handling of GPU Interrupts in LITMUS Technical Report
no. 11-002, 2011.
@techreport{CS11-002,
title = {Real-Time Handling of GPU Interrupts in LITMUS},
author = {Glenn A. Elliott and Chi-Hao Sun and James H. Anderson},
url = {https://techreports.cs.unc.edu/papers/11-002.pdf},
year = {2011},
date = {2011-06-10},
number = {11-002},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
33.
Huang, Xin; Monrose, Fabian; Reiter, Michael
Amplifying Limited Expert Input to Sanitize Large Network Traces Technical Report
no. 11-001, 2011.
@techreport{CS11-001,
title = {Amplifying Limited Expert Input to Sanitize Large Network Traces},
author = {Xin Huang and Fabian Monrose and Michael Reiter},
url = {https://techreports.cs.unc.edu/papers/11-001.pdf},
year = {2011},
date = {2011-04-13},
number = {11-001},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
34.
Wei, Lei; Coull, Scott E.; Reiter, Michael K.
Bounded Vector Signatures and Their Applications Technical Report
no. 10-018, 2010.
@techreport{CS10-018,
title = {Bounded Vector Signatures and Their Applications},
author = {Lei Wei and Scott E. Coull and Michael K. Reiter},
url = {https://techreports.cs.unc.edu/papers/10-018.pdf},
year = {2010},
date = {2010-12-21},
number = {10-018},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
35.
Pool, Jeff; Lastra, Anselmo; Singh, Montek
Arithmetic Circuits for Energy-Precision Tradeoffs in Mobile Graphics Processing Units Technical Report
no. 10-017, 2010.
@techreport{CS10-017,
title = {Arithmetic Circuits for Energy-Precision Tradeoffs in Mobile Graphics Processing Units},
author = {Jeff Pool and Anselmo Lastra and Montek Singh},
url = {https://techreports.cs.unc.edu/papers/10-017.pdf},
year = {2010},
date = {2010-11-19},
number = {10-017},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
36.
Gavaletz, Eric; Kaur, Jasleen
What happens when many probe for bandwidth simultaneously? Technical Report
no. 10-019, 2010.
@techreport{CS10-019,
title = {What happens when many probe for bandwidth simultaneously?},
author = {Eric Gavaletz and Jasleen Kaur},
year = {2010},
date = {2010-11-15},
number = {10-019},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
37.
Xu, Hao; Miao, William
A General Framework for Embedding Domain Specific Languages into Object-Oriented Programming Languages Technical Report
no. 10-015, 2010.
@techreport{CS10-015,
title = {A General Framework for Embedding Domain Specific Languages into Object-Oriented Programming Languages},
author = {Hao Xu and William Miao},
url = {https://techreports.cs.unc.edu/papers/10-015.pdf},
year = {2010},
date = {2010-10-13},
number = {10-015},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
38.
Erickson, Jeremy; Guan, Nan; Baruah, Sanjoy
Addendum to Tardiness Bounds for Global EDF with Deadlines Different from Periods Technical Report
no. 10-014, 2010.
@techreport{CS10-014,
title = {Addendum to Tardiness Bounds for Global EDF with Deadlines Different from Periods},
author = {Jeremy Erickson and Nan Guan and Sanjoy Baruah},
url = {https://techreports.cs.unc.edu/papers/10-014.pdf},
year = {2010},
date = {2010-09-17},
number = {10-014},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
39.
Stanat, Donald F.; Mago, Gyula A.
Optimal Storage Management in a Cellular Computer Technical Report
no. 81-006, 2010.
@techreport{CS81-006,
title = {Optimal Storage Management in a Cellular Computer},
author = {Donald F. Stanat and Gyula A. Mago},
url = {https://techreports.cs.unc.edu/papers/81-006.pdf},
year = {2010},
date = {2010-08-20},
number = {81-006},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
40.
Fuchs, Henry; Pizer, Stephen M.; Cohen, Jon S.; Brooks, Frederick P.
A Three-Dimensional Display for Medical Images from Slices Technical Report
no. 79-021, 2010.
@techreport{CS79-021,
title = {A Three-Dimensional Display for Medical Images from Slices},
author = {Henry Fuchs and Stephen M. Pizer and Jon S. Cohen and Frederick P. Brooks},
url = {https://techreports.cs.unc.edu/papers/79-021.pdf},
year = {2010},
date = {2010-08-20},
number = {79-021},
keywords = {},
pubstate = {published},
tppubtype = {techreport}
}
913 entries « ‹ 2 of 46
› »
Technical Reports produced by the Department of Computer Science at the University of North Carolina at Chapel Hill.
NOTE: All reports to which we have access have been made available here. Contact techrep@cs.unc.edu if you have problems downloading one of these reports.