Works (52)

2017 journal article

A novel framework for software defined based secure storage systems

Simulation Modelling Practice and Theory, 77, 407–423.

By: A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2017 chapter

Cost Analysis Comparing HPC Public Versus Private Cloud Computing

In Communications in Computer and Information Science (pp. 294–316).

By: P. Dreher, D. Nair, E. Sills & M. Vouk

Source: Crossref
Added: February 24, 2020

2016 journal article

Assessing Run-time Overhead of Securing Kepler

Procedia Computer Science, 80, 2281–2286.

By: D. Kim & M. Vouk

Source: Crossref
Added: February 24, 2020

2016 conference paper

Cross-institutional research cyberinfrastructure for data intensive science

2016 ieee high performance extreme computing conference (hpec).

By: W. Lenhardt, M. Conway, E. Scott, B. Blanton, A. Krishnamurthy, M. Hadzikadic, M. Vouk, A. Wilson

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Embedding cloud computing inside supercomputer architectures

Proceedings of the 6th International Conference on Cloud Computing and Services Science, Vol 2 (closer), 296–301.

By: P. Dreher & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Software defined cloud: Survey, system and evaluation

Future Generations Computer Systems, 58, 56–74.

By: Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

CS/SE instructors can improve student writing without reducing class time devoted to technical content: Experimental results

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, vol 2, 455–464.

By: P. Anderson, S. Heckman, M. Vouk, D. Wright, M. Carter, J. Burge, G. Gannod

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Enhancing security of Hadoop in a public cloud

2015 6th International Conference on Information and Communication Systems (ICICS), 38–43.

By: X. Yu, P. Ning & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

SDDC: A software defined datacenter experimental framework

2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud) and International Conference on Open and Big (OBD), 189–194.

By: A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

SDIoT: a software defined based internet of things framework

Journal of Ambient Intelligence and Humanized Computing, 6(4), 453–461.

By: Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk & A. Rindos

Source: Crossref
Added: February 24, 2020

2015 conference paper

SDSecurity: A software defined security experimental framework

2015 IEEE International Conference on Communication Workshop, 1871–1876.

By: A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

SDStorage: A software defined storage experimental framework

2015 IEEE International Conference on Cloud Engineering (IC2E 2015), 341–346.

By: A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Securing scientific workflows

2015 IEEE International Conference on Software Quality, Reliability and Security - Companion (QRS-C 2015), 95–104.

By: D. Kim & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Securing software application chains in a cloud

2015 2nd International Conference on Information Science and Security (ICISS), 50–53.

By: D. Kim & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2014 conference paper

On coverage-based attack profiles

2014 IEEE Eighth International Conference on Software Security and Reliability - Companion (sere-c 2014), 5–6.

By: A. Rivers, M. Vouk & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

Constructing next generation academic cloud services

International Journal of Cloud Computing, 2(2/3), 104–122.

By: M. Vouk, S. Averitt, P. Dreher, D. Kekas, A. Kurth, M. Hoit, P. Mugge, A. Peeler ...

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Non-operational testing of software for security issues

2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 21–22.

By: S. Subramani, M. Vouk & L. Williams

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Locally invertible multidimensional convolutional encoders

IEEE Transactions on Information Theory, 58(3), 1774–1782.

By: R. Lobo, D. Bitzer & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2011 conference paper

Communication genres: Integrating communication into the software engineering curriculum

2011 24th IEEE-CS Conference on Software Engineering Education and Training (CSEET), 21–30.

By: M. Carter, M. Vouk, G. Gannod, J. Burge, P. Anderson & M. Hoffman

Source: NC State University Libraries
Added: August 6, 2018

2010 chapter

A Fault-Tolerance Architecture for Kepler-Based Distributed Scientific Workflows

In Lecture Notes in Computer Science (pp. 452–460).

By: P. Mouallem, D. Crawl, I. Altintas, M. Vouk & U. Yildiz

Source: Crossref
Added: February 24, 2020

2010 conference paper

A fault-tolerance architecture for kepler-based distributed scientific workflows

Scientific and statistical database management, 6187, 452–460.

By: P. Mouallem, D. Crawl, I. Altintas, M. Vouk & U. Yildiz

Source: NC State University Libraries
Added: August 6, 2018

2010 chapter

Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models

In Intelligent Tutoring Systems (pp. 55–64).

By: K. Boyer, R. Phillips, A. Ingram, E. Ha, M. Wallis, M. Vouk, J. Lester

Source: Crossref
Added: February 24, 2020

2009 conference paper

An empirical study of security problem reports in Linux distributions

International symposium on empirical software engineering and, 482–485.

By: P. Anbalagan & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation

Nucleic Acids Research, 37(2), 591–601.

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Investigating the role of student motivation in computer science education through one-on-one tutoring

Computer Science Education, 19(2), 111–135.

By: K. Boyer, R. Phillips, M. Wallis, M. Vouk & J. Lester

Source: Crossref
Added: February 24, 2020

2009 journal article

NCSU's virtual computing lab: A cloud computing solution

Computer, 42(7), 94–97.

By: H. Schaffer, S. Averitt, M. Hoit, A. Peeler, E. Sills & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2009 chapter

Tracking Files in the Kepler Provenance Framework

In Lecture Notes in Computer Science (pp. 273–282).

By: P. Mouallem, R. Barreto, S. Klasky, N. Podhorszki & M. Vouk

Source: Crossref
Added: February 24, 2020

2008 chapter

A Model for Sharing of Confidential Provenance Information in a Query Based System

In Lecture Notes in Computer Science (pp. 62–69).

By: M. Nagappan & M. Vouk

Source: Crossref
Added: February 24, 2020

2008 journal article

Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course

International Journal of Engineering Education, 24(4), 659–670.

By: L. Layman, L. Williams, K. Slaten, S. Berenson & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2008 chapter

Balancing Cognitive and Motivational Scaffolding in Tutorial Dialogue

In Intelligent Tutoring Systems (pp. 239–249).

By: K. Boyer, R. Phillips, M. Wallis, M. Vouk & J. Lester

Source: Crossref
Added: February 24, 2020

2007 chapter

Automation of Network-Based Scientific Workflows

In IFIP The International Federation for Information Processing (pp. 35–61).

By: M. Vouk, I. Altintas, R. Barreto, J. Blondin, Z. Cheng, T. Critchlow, A. Khan, S. Klasky ...

Source: Crossref
Added: February 24, 2020

2007 journal article

Simulation of Fusion Plasmas: Current Status and Future Direction

Plasma Science and Technology, 9(3), 312–387.

By: D. Batchelor, M. Beck, A. Becoulet, R. Budny, C. Chang, P. Diamond, J. Dong, G. Fu ...

Source: Crossref
Added: February 24, 2020

2007 review

Simulation of fusion plasmas: Current status and future direction

[Review of ]. Plasma Science & Technology, 9(3), 312–387.

By: D. Batchelor, M. Beck, A. Becoulet, R. Budny, C. Chang, P. Diamond, J. Dong, G. Fu ...

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Classification of Escherichia coli K-12 ribosome binding sites

IEEE Engineering in Medicine and Biology Magazine, 25(1), 90–97.

By: E. May, M. Vouk & D. Bitzer

Source: NC State University Libraries
Added: August 6, 2018

2006 chapter

Locally Invertible Multivariate Polynomial Matrices

In Coding and Cryptography (pp. 427–441).

By: R. Lobo, D. Bitzer & M. Vouk

Source: Crossref
Added: February 24, 2020

2006 journal article

Locally invertible multivariate polynomial matrices

Lecture Notes in Computer Science, (3969), 427–441.

By: R. Lobo, D. Bitzer & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

On the value of static analysis for fault detection in software

IEEE Transactions on Software Engineering, 32(4), 240–253.

By: J. Zheng, L. Williams, N. Nagappan, W. Snipes, J. Hudepohl & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Predicting Shine-Dalgarno sequence locations exposes genome annotation errors

PLoS Computational Biology, 2(5), 454–466.

By: J. Starmer, A. Stomp, M. Vouk & D. Bitzer

Source: NC State University Libraries
Added: August 6, 2018

2006 conference paper

The relationship between high school mathematics and career choices among high achieving young women

Pme 30: proceedings of the 30th conference of the international group for the psychology of mathematics education, vol 1, 220–220.

By: S. Berenson, J. Michael & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2006 journal article

Theoretical analysis of the SABUL congestion control algorithm

Telecommunication Systems, 31(2-3), 115–139.

By: P. Oothongsap, Y. Viniotis & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Experimental analysis of the q-matrix method in knowledge discovery

In Foundations of intelligent systems: 15th international symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005: Proceedings (Vol. 3488, pp. 603–611).

By: T. Barnes, D. Bitzer & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

An error-correcting code framework for genetic sequence analysis

Journal of the Franklin Institute, 341(02-Jan), 89–109.

By: E. May, M. Vouk, D. Bitzer & D. Rosnick

Source: NC State University Libraries
Added: August 6, 2018

2004 journal article

Coding theory based models for protein translation initiation in prokaryotic organisms

Bio Systems, 76(Aug-Oct 2004), 249–260.

By: E. May, M. Vouk, D. Bitzer & D. Rosnick

Source: NC State University Libraries
Added: August 6, 2018

2004 chapter

Experimental analysis of the SABUL congestion control algorithm

In Networking 2004: Networking technologies, services, and protocols: Performance of computer and communication networks, mobile and wireless commuication: Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004 ; Proceedings (Vol. 3042, pp. 1433–1439).

By: P. Oothongsap, Y. Viniotis & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2003 chapter

Construction of reliable software in resource-constrained environments

In Case studies in reliability and maintenance (Wiley series in probability and statistics).

By: M. Vouk & A. Rivers

Source: NC State University Libraries
Added: August 6, 2018

2001 journal article

Alcatel - North Carolina State University Virtual Laboratory for End-to-End Quality of Service Engineering

Alcatel Telecommunications Review, (3), 227–231.

By: T. Labbe, A. Mohammed, J. Streck & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

1999 journal article

Productivity analysis of object-oriented software developed in a commercial environment

Software, Practice & Experience, 29(10), 833–847.

By: T. Potok, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

1999 journal article

Workflow and end-user quality of service issues in Web-based education

IEEE Transactions on Knowledge and Data Engineering, 11(4), 673–687.

By: M. Vouk, D. Bitzer & R. Klevans

Source: NC State University Libraries
Added: August 6, 2018

1998 personal communication

On locally invertible rate-1/n convolutional encoders

By: D. Bitzer, A. Dholakia, H. Koorapaty & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

1997 journal article

Technology for support of network-based education workflows in North Carolina: NC State-Fujitsu education partnership final report for the period June 1, 1996-December 31, 1996

TR (Center for Advanced Computing and Communication), (3).

By: S. Rajala, M. Vouk, A. Nilsson, T. Miller, R. Schrag, J. Burke, C. Brawner, I. Viniotis, H. Perros

Source: NC State University Libraries
Added: August 6, 2018

1995 patent

System for encoding and decoding of convolutionally encoded data

Washington, DC: U.S. Patent and Trademark Office.

By: D. Bitzer, M. Vouk, V. Srinivasan, S. Lo, A. Dholakia, E. Gonzalez, T. Lee, L. Wang, H. Koorapaty

Source: NC State University Libraries
Added: August 6, 2018

conference paper

Discovering tutorial dialogue strategies with hidden Markov models

Boyer, K. E., Ha, E. Y., Wallis, M. D., Phillips, R., Vouk, M. A., & Lester, J. C. Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 141–148.

By: K. Boyer, E. Ha, M. Wallis, R. Phillips, M. Vouk & J. Lester

Source: NC State University Libraries
Added: August 6, 2018