Cyber Research Publications

Dr. Boult's Journal and Selective Conference Publications1
  1. W. J. Scheirer and T. E. Boult, W. Scheirer and T. Boult, "Bipartite Biotokens: Definition, Implementation, and Analysis", to appear the International Conference on Biometrics, June 2009
  2. W. Scheirer and T. Boult, "A Fusion-Based Approach to Enhancing Multi-Modal Biometric Recognition System Failure Prediction and Overall Performance", IEEE Int. Conf. on Biometrics Theory Application and Systems, 2008.
  3. W. Scheirer and T. Boult, "Bio-Cryptographic Protocols with Bipartite Biotokens", IEEE Biometrics Research Symposium at the Biometrics Consoritum Conference, Sept 2008.
  4. Xiaobo Zhou , Dennis Ippoliti, Terrance Boult "Hop-count based probabilistic packet dropping: Congestion mitigation with loss differentiation" Computer Communications, Volume 30, Issue 18, 10 December 2007, Pages 3859-3869
  5. W. J. Scheirer and T. E. Boult, "Cracking Fuzzy Vaults and Biometric Encryption", IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, Sept. 2007.
  6. T.E. Boult, W.J. Scheirer and R. Woodworth, "Revocable Fingerprint Biotokens: Accuracy and Security Analysis", IEEE Conf. on Computer Vision and Pattern Recognition, June 2007.
  7. T. Zhang and T.E. Boult, "Two thresholds are better than one", IEEE Seventh Workshop on Visual Surveilallance, June 2007.
  8. Shree K. Nayar, Vlad Branzoi, Terrance E. Boult: Programmable Imaging: Towards a Flexible Camera. International Journal of Computer Vision 70(1): 7-22 2007.
  9. X. Zhou, D. Ippoli, T. Boult, "HPPD: A Hop-Count Probabilistic Packet Dropper," IEEE International Conference on Communications, 2006.
  10. T. E. Boult, "Robust distance measures for face recognition supporting revocable biometric tokens", IEEE Conf. on Face and Gesture, April 2006.
  11. M.J. Zukoski, T. Boult and T. Iyriboz, "A novel approach to medical image compression", Int. J. Bioinformatics Research and Applications, pages 89-103, Vol. 2, No. 1, 2006,
  12. T.P. Ripokia and T.E. Boult, "Classification Enhancement via Biometric Pattern Perturbation". IAPR Conference on Audio- and Video-based Biometric Person Authentication, (AVBPA Springer Lecture Notes in Computer Science 3546) pp850-859, July 2005.
  13. W. Li, X. Gao, Y. Zhu, V. Ramesh & T.E. Boult, "On the Small Sample Performance of Boosted Classifiers" IEEE Conf. on Computer Vision and Pattern Recognition, Page(s):574 - 581 vol. 2., June 2005
  14. S. K. Nayar, P. N. Belhumeur and T. E. Boult, Lighting Sensitive Displays," ACM Transactions on Graphics (TOG), Volume 23, Issue 4, 963 - 979, 2004
  15. S. K. Nayar, V. Branzoi T. E. Boult, "Programmable Imaging using a Digital Micro-mirror Array" IEEE Conf. on Computer Vision and Pattern Recognition, June 2004. Winner: Best paper Award
  16. Li Yu, Terrance E. Boult, "Understanding Images of Graphical User Interfaces: A New Approach to Activity Recognition for Visual Surveillance," Second IEEE Workshop on Event Mining, in conjunction with IEEE CVPR04.
  17. Binglong Xie, Visvanathan Ramesh and Terrance Boult. "Sudden illumination change detection using order consistency", Image and Vision Computing Volume 22, Issue 2 , 1 February 2004, Pages 117-125.
  18. T.E. Boult, X. Gao, R. Micheals, and M. Eckmann, `` Omni-directional Visual Surveillance'' Image and Vision Computing Volume 22, Issue 7 , 1 July 2004, Pages 515-534
  19. Binglong Xie, D. Comaniciu, V. Ramesh, M. Simon and T.Boult "Component Fusion for Face Detection in the Presence of Heteroscedastic Noise" Pattern Recognition, Proceeding of the 25th DAGM Symposium, Magdeburg, Germany, September 10-12, 2003, Springer Lecture Notes in Computer Science Volume 2781 / 2003, pp. 434-441.
  20. X.Gao, V.Ramesh and T.E. Boult,, ``Statistical Characterization of Morphological Operator Sequences'', Proc. of the European Conference on Computer Vision, May, 2002.
  21. Y.U. Chen and T.E. Boult, ``Dynamic Home Agent Reassignment in Mobile IP'' IEEE Wireless Communication and Networking Conference (WCNC), March 2002.
  22. R.J. Micheals and T.E. Boult, ``Efficient Evaluation of Classification and Recognition Systems'' , Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, Dec 2001.
  23. T.E. Boult, R.J. Micheals, X. Gao and M. Eckmann, ``Into the woods: visual surveillance of non-cooperative and camouflaged targets in complex outdoor settings'' , the Proceedings of the IEEE, Oct 2001.
  24. M.C. Chiang and T.E. Boult, ``Efficient super-resolution via image warping'', Image and Vision Computing, Elsevier House, July, 2000.
  25. W. Yin and T.E. Boult, ``Physical Panoramic Pyramid and Noise Sensitivity in Pyramids'', Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, June, 2000
  26. X.Gao, T.E. Boult, F.Coetzee and V.Ramesh ``Error Analysis of Background Adaption'', Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, June, 2000
  27. T. O'Donnell, X.S. Fang, T.E. Boult, and A. Gupta. ``The extruded generalized cylinder: A deformable model for object recovery.'' In Deformable Models in Medical Image Analysis, editors: A. Singh, D. Goldgof, and D. Terzopoulos. IEEE Computer Society Press, 1998.
  28. T.O'Donnell, A.Gupta and T.E. Boult. ``The Hybrid Volumetric Ventriculoid: A model for MR-SPAMM 3-D analysis.'' In Deformable Models in Medical Image Analysis, editors: A. Singh, D. Goldgof, and D. Terzopoulos. IEEE Computer Society Press, 1998. This led to US Patent # 5,923,770
  29. S.K. Nayar, X.S. Fang and T.E. Boult. ``Separation of Reflection Components Using Color and Polarization'' International Journal of Computer Vision, Vol 21 #3, pp 163-186, 1997.
  30. T.O'Donnell, A.Gupta and T.E. Boult. ``A New Model of the Recovery of Cylindrical Structures from Medical Image Data'', the first IEEE Proceedings on Computer Vision, Virtual Reality and Robotics in Medicine, 1997.
  31. M.C. Chiang and T.E. Boult. ``Local Blur Estimation and Super-Resolution'' Proc. of IEEE Conf. on Comp. Vision and Pattern Recognition, 1997.
  32. T.O'Donnell, T.E. Boult  and A.Gupta. ``Global models with parametric offsets as applied to cardiac motion recovery.'' in Proc. of IEEE Conf. on Comp. Vision and Pattern Recognition, 1996. This led to US Patent # 6,088,472.
  33. A. Gross and T.E. Boult. ``Understanding Straight Homogeneous Generalized Cylinders: A Case Study'', IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), Feb 1996.
  34. B. Yener and T.E. Boult. ``Flow Trees: a Lower Bound Computational Tool for Network Optimization, the Journal of High Speed Networks, Special Issue on WDM Networks, 4:1, 99-113, 1995.
  35. T.E. Boult, R.A. Melter, F. Skorina and I. Stojmenovic ``Applications of G-neighbors to Image Processing and Morphology'', Machine Graphics and Vision Int. Journal, Nov. 1995.
  36. T.O'Donnell, A.Gupta and T.E. Boult. ``The hybrid volumetric ventriculoid: A model for MR-SPAMM 3-D analysis.'' In Proc. of Int. Conf. on Computers in Cardiology, Oct 1995. (Finalist in best paper award competition.) This led to US Patent # 5,923,770
  37. T.O'Donnell, T.E. Boult  and A. Gupta. ``A Periodic Generalized Cylinder Model with Local Deformations for Tracking Closed Contours Exhibiting Repeating Motion'', the Proc. of the International Conf. on Pattern Recognition, Nov 1994.
  38. T. O'Donnell, X.S. Fang, T.E. Boult, and A. Gupta. ``The extruded generalized cylinder: A deformable model for object recovery.'' In Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, p174-182, June 1994.
  39. B. Yener and T.E. Boult. ``A Study of Upper and Lower Bounds for Minimum Congestion Routing in Lightwave Networks'', IEEE INFOCOM, June 1994.
  40. A.D. Gross and T.E. Boult. ``Analyzing Skewed Symmetries.'' International Journal of Computer Vision, Nov 1994.
  41. S.K. Nayar, X.S. Fang and T.E. Boult. ``Removal of Specular Reflections and Interreflections Using Color and Polarization,'' Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, June 1993.
  42. T.E. Boult  and G.Wolberg. ``Local Image Reconstruction and Sub-Pixel Restoration Algorithms.'' Computer graphics and image processing: Graphical models and Image processing (CVGIP:GMIP), Vol 55, No. 1. pp. 63-77, Jan. 1993.
  43. T.E. Boult  and L.G. Brown. ``Factorization-based Segmentation of Motions.'' in Proc. of the IEEE Workshop on Motion Understanding, pages 179-186, Oct 1991.
  44. L.B. Wolff  and T.E. Boult.  ``Constraining Object Features Using a Polarization Reflectance Model.'' IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), , 13(6), pages 635-657, July 1991.
  45. T.E. Boult and L.B. Wolff. ``Physically-based Edge Labeling.'' Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pages 656-663, June 1991.
  46. T.E. Boult,  ``Dynamic Digital Distance Maps in Two Dimensions.''  IEEE Journal of Robotics and Automation pages 590-603, Oct 1990.
  47. T.E. Boult and K. Sikorski.  ``An Almost Optimal Complexity Algorithm for Computing Topological Degree in Two Dimensions''.  SIAM Scientific and Statistical Computation, pages 686-698, 1989.
  48. L.B. Wolff  and T.E. Boult,  ``Polarization / Radiometric Based Material Classification''. Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pages 387-395, 1989.
  49. L.B. Wolff  and T.E. Boult,  ``Using Line Correspondence Stereo to Measure Surface Orientation'' in Proc. of the International Joint Conf. on Artificial Intelligence, pages 1655-1660, 1989.
  50. G.Wolberg and T.E. Boult.  ``Separable Image Warping with Spatial Lookup Tables''. Computer Graphics, Vol 23 pages 369-378, 1989. (Also Proc. of the ACM SIGGAPH 1989. This lead to US Patent #5,204,944.)
  51. T.E. Boult and K. Sikorski.  ``Can We Approximate Zeros of Functions with Non-Zero Topological Degree?''  Journal of Complexity, 3(2), pages 317-329, 1988.
  52. T.E. Boult and L.H. Chen.  ``Synergistic Smooth Surface Stereo''.   Proc. of the IEEE International Conf. on Computer Vision, pages 118-123, 1988.
  53. A.D. Gross and  T.E. Boult.  ``Error of Fit Measures for Recovering Parametric Solids''.   Proc. of the IEEE International Conf. on Computer Vision, pages 690-695, 1988.
  54. T.E. Boult and L.H. Chen.  ``Analysis of Two New Stereo Matching Algorithms''.   Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pages 177-182, 1988.
  55. M.L. Moerdler and  T.E. Boult.  ``The Integration of Information from Stereo and Multiple Shape-From Texture Algorithms.'' Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pages 524-529, 1988.
  56. T.E. Boult.  ``Optimal Algorithms: Tools for Mathematical Modeling.''  Journal of Complexity, 3(2) 1987.
  57. T.E. Boult.  ``What is Regular in Regularization?''   Proc. of the IEEE International Conf. on Computer Vision, pages 457-462, 1987.
  58. T.E. Boult and K. Sikorski.  ``Complexity of Computing Topological Degree of Lipschitz Functions in N-Dimensions.''  Journal of Complexity, 2(1), pages 44-69, March 1986.
  59. T.E. Boult and J.R. Kender.  ``Visual Surface Reconstruction using Sparse Depth Data.''   Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pages 68-77, 1986.

 

[Cai07] Yu Cai and Edward Chow, "Algorithms for Selecting Multiple Mirror Sites for Parallel Download," IJCSNS International Journal of Computer Science and Network Security, Vol. 7 No. 10 pp. 273-278.
[Cai06] Yu Cai and C. Edward Chow, "On path selection for multipath connection," CISSE conference
2006, paper# 194.
[Cear03] Angela Cearns and C. Edward Chow, “A2D2: Design of an Autonomous Anti-DDoS (A2D2) Network,” Proceedings of IASTED Conference on Applied Informatics, February 2003.
[Chow04a] C. Edward Chow, Yu Cai, David Wilkinson and Ganesh Godavari, “Secure Collective Defense System,” Proceedings of GLOBECOM 2004, Volume: 4, November 2004, pp. 2245 – 2249.
[Chow04b] C. Edward Chow, Paul J. Fong, and Ganesh Godavari, “An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET),” Proceedings of The 18th International Conference on Advanced Information Networking and Applications, Volume: 2, ,March 29-31, 2004, pp. 436 – 438.
[Chow03a] C. Edward Chow, Ganesh Godavari, and Yu Cai, “LSWS: Linux-based Secure Web Switch,” Proceedings of IASTED Conference on Applied Informatics, February 2003.
[Chow03b] C. Edward Chow and Chandra Prakash , “Enhance Features and Performance of a Linux-based Content Switch,” IASTED Conference on Applied Informatics, February 2003.
[Chow01a] C. Edward Chow and Indira Semwal, “Web Load Balancing Through More Accurate Server Report,” Proceeding of 2nd International Conference of Parallel and Distributed Computing, Applications, and Technologies, July-9-11 2001, Taipei, Taiwan, pp.117-124.
[Chow01b] C. Edward Chow and Weihong Wang, “The Design and Implementation of Linux LVS-based Content Switch”, Proceeding of 2nd International Conference of Parallel and Distributed Computing, Applications, and Technologies, July-9-11 2001,, Taipei, Taiwan, pp. 204-211.
[Chow01c] C. Edward Chow, Ganesh Godavari, and Jianhua Xie, “Content Switch Rules and their Conflict Detection,” Proceeding of 2nd International Conference of Parallel and Distributed Computing, Applications, and Technologies, July-9-11 2001, Taipei, Taiwan, pp. 325-330.
[Chow01d] J. He, C. Edward Chow, Jihui Yang‡ and Takafumi Chujo, “An algorithm for the measurement of available bandwidth,” Proc. IEEE ICN’01, July 2001.
[Chow99a]C. Edward Chow, Jingsha He and Tomohiko Taniguchi, “NetLobars: A Simulation System for Web System Design and Evaluation,” Proceedings of ICCC’99, Tokyo, Japan, , Sept. 14-16.
[Chow99b] C. Edward Chow and Hedlind E. Jonas, "POCAT: Power Control and Channel assignment Tool for Wireless Networks," 1999 IEEE International Performance, Computer, and Communications Conference, Feb. 10-12, 1999.
[Chow99c] C. Edward Chow and Anders Hansmats, "Design and Analysis of One Prong Network Restoration Algorithms," 1999 IEEE International Performance, Computer, and Communications Conference, Feb. 10-12,
1999.
[Chow95a] C.-H. E. Chow, J. Bicknell, and S. Syed, “Performance Analysis of Fast Link Restoration Algorithms,” International Journal of Communication Systems, Vol. 8, pp. 325-345, 1995.
[Chow95b] C.-H. E. Chow, “Resource Allocation for Multiparty Connections,” Journal of Systems and Software, 1995.
[Chow93] 3] C.-H. E. Chow, S. McCaughey, and S. Syed, “RREACT: A Distributed Protocol for Rapid Restoration of Active Communication Trunks,” Proceedings of 2nd IEEE Network Management and Control Workshop, pp. 391-406, Sept. 21-23, 1993.
[Delo05] Delooze, Lori. Applying Soft-Computing Techniques to Intrusion Detection, Computer Science Department, Ph.D. Dissertation, University of Colorado at Colorado Springs, 2005.
[Del06] Delooze, Lori, and Jugal Kalita. “Applying Soft Computing Techniques to Intrusion Detection”, Proceedings of Cyber Security and Information Infrastructure Research (CS&IIR) Workshop, Oak Ridge National Laboratory, pp. 70-99, Oak Ridge, TN, May 2006.
[Gill02] K.H. Gillespie, L.R. Hilsen, E.C. Wadsworth (Eds.). A Guide to Faculty Development: Practical Advice, Examples and Resources, Anker Publishing Company, Inc., Bolton, MA, 2002.
[Goda05] Ganesh Godavari and Edward Chow, "Secure Information Sharing Using Attribute Certicates and Role Based Access Cont," Proceeding of 2005 International Conference on Secure and Management, June 2005, pp. 269-276.
[Julk98] Hekki Julkuen and C. Edward Chow, "Enhance Network Security with Dynamic Packet Filter," Proceeding of International Conference on Computer Communications and Networks, Oct. 12-15, 1998, pp. 165-168.
[Murt06] Murthy Andukuri, “Efficient Asymmetric Secure iSCSI,” UCCS Master Thes] is, 2006.
http://cs.uccs.edu/~gsc/pub/master/msanduku/doc/report_final.doc.
[Sorc06] Sorcinelli, Mary, Ann Austin, Pamela Eddy and Andrea Beach. Creating the Future of Faculty Development, Anker Publishing Company, Inc., Bolton, MA, 2006.
[Wilk04] David Wilkinson, C. Edward Chow, and Yu Cai, “Enhanced Secure Dynamic DNS Update with Indirect Route,” Proceedings of fifth IEEE Systems, Man and Cybernetics Information Assurance Workshop 10-11, June 2004, pp. 335-341.
[Wils06] Wilson, William, and Jugal Kalita. “Combining Incremental Clustering and Signature Creation for Intrusion Detection”, Proceedings of Cyber Security and Information Infrastructure Research (CS&IIR) Workshop, Oak Ridge National Laboratory, pp. 110-113, Oak Ridge, TN, May 2006.
[zhou04a] Xiaobo Zhou and Cheng-Zhong Xu , Harmonic proportional bandwidth allocation and scheduling for service differentiation on streaming servers, IEEE Transactions on Parallel and Distributed Systems, Vo. 15, No. 9, pp. 835 - 848, September 2004.
[Zhou04b] Xiaobo Zhou, Yu Cai, Ganesh K. Godavari, C. Edward Chow, “An Adaptive Process Allocation Strategy for Proportional Responsiveness Differentiation on Web Servers,” Proceedings of IEEE International Conference on Web Services, 2004, 6-9 July 2004. pp.142 – 149.
[Zhou05a] Jianbin Wei, Xiaobo Zhou, and Cheng-Zhong Xu , Robust processing rate allocation for proportional slowdown differentiation on Internet servers, IEEE Transactions on Computers, Vol. 54, No. 8, pp. 964 - 977, August 2005.
[Zhou05b] Xiaobo Zhou, Yu Cai, C. Edward Chow, and Marijke Augusteijn, "Two-tier Resource Allocation for Slowdown Differentiation on Cluster-based Servers," Prof. of the 34th IEEE International Conference on Parallel Processing (ICPP), IEEE Computer Society, pp. 31- 38, Oslo, Norway, June 2005.
[Zhou06a] Xiaobo Zhou, Jianbin Wei, and Cheng-Zhong Xu, Resource allocation for session-based two dimensional service differentiation on e-Commerce servers, IEEE Transactions on Parallel and Distributed Systems, Vol. 17, No. 8, pp. 838 - 850, August 2006
[Zhou06b] Xiaobo Zhou, Yu Cai, and Edward Chow, An integrated approach with feedback control for robust Web QoS design, Computer Communications, Elsevier, Vol. 29, No. 16, pp. 3158 - 3169, October 2006.
[Zhou07a] Xiaobo Zhou, Dennis Ippoliti, and Terrance Boult, Hop-count based probabilistic packet dropping: congestion mitigation with loss differentiation, Computer Communications, Elsevier, Vol. 30, No. 18, pp. 3859 – 3869, December 2007.
[Zhou07b] Xiaobo Zhou, Jianbin Wei, and Cheng-Zhong Xu, Quality-of-service differentiation on the Internet: a taxonomy, Journal of Network and Computer Applications, Elsevier, Vol. 30, No. 1, pp. 354-383, January 2007.
[Zhou08a] Xiaobo Zhou and Dennis Ippoliti, “Resource allocation optimization for quantitative service differentiation on server clusters”, Journal of Parallel and Distributed Computing, Elsevier, Vol. 68, No. 9, pp. 1250 – 1262, Sep 2008.
[Zhou08b] Xiaobo Zhou, Dennis Ippoliti, and Liqiang Zhang, “Packet Scheduling with Buffer Management for Fair Bandwidth Sharing and Delay Differentiation”, Computer Communications, Elsevier, Vol. 31, No. 17, pp. 4072- 4080, Nov 2008.
[Zhou09] Liqiang Zhang, Yujen Chen, and Xiaobo Zhou, “Rate Avalanche: Effects on the Performance of Multi-rate 802.11 Wireless Networks”, A special issue of Journal of Simulation, Modeling, Practice and Theory, Vol. 17, No. 3, pp. 487 – 503, Elsevier, 2009.
[Zhou09a] Michael Lemmon, Christian Poellabauer, Liqiang Zhang, and Xiaobo Zhou, Self-adaptive and Self-Organizing Wireless Networking Systems, ACM Transactions on Autonomous and Adaptive Systems, to appear in 2009.
[Zhou09b] Liqiang Zhang, Xiaobo Zhou, Guihai Chen, Christian Poellabauer, Cross-layer Designs in Wireless and Ad Hoc Networks, International Journal of Wireless and Mobile Computing, to appear in 2009.
[Zhou08a] Xiaobo Zhou and Liqiang Zhang, Resource Management and Routing in Wireless Mesh Networks, Computer Communications, Elsevier, Vol. 31, No. 7, 2008.
[Zhou08b] Xiaobo Zhou and Liqiang Zhang, Modeling, Testbeds, and Applications of Wireless Mesh Networks, Computer Communications, Elsevier, Vol. 31, No. 8, 2008.
[Zhou08c] Xiaobo Zhou, Bin Xiao, and Edwin Sha, Recent Advances in Ubiquitous Computing, International Journal of Pervasive Computing and Communications, Emerald Group, Vol. 4, No. 2, 2008.
[Zhou08d] Xiaobo Zhou and Cheng-Zhong Xu, Distributed Denial of Service and Intrusion Detection, Journal of Network and Computer Applications, Elsevier, Vol. 30, No. 3, 2007.