Computer Science - 2005 Choi, H., Enck, W., Shin, J., McDaniel, P., & La Porta, T. F. (2005). Secure reporting of traffic forwarding activity in mobile ad hoc networks. Presented at the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. https://doi.org/10.1109/mobiquitous.2005.53 Choi, H., Enck, W., Shin, J., McDaniel, P., & La Porta, T. F. (2005). Secure reporting of traffic forwarding activity in mobile ad hoc networks. The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 12–21. Rowaihy, H., Enck, W., McDaniel, P., & La Porta, T. (2005). Limiting sybil attacks in structured peer-to-peer networks. IEEE Infocom Mini-Symposium. Enck, W., Traynor, P., McDaniel, P., & La Porta, T. (2005). Exploiting open functionality in SMS-capable cellular networks. Proceedings of the 12th ACM conference on Computer and communications security, 393–404. Rouskas, G. N. (2005). Scheduling Algorithms for Unicast, Multicast, and Broadcast. In K. Sivalingam & S. Subramanian (Eds.), The International Series in Engineering and Computer Science (pp. 171–188). https://doi.org/10.1007/0-306-47021-7_8 d’Amorim, M., & Havelund, K. (2005). Event-based runtime verification of java programs. ACM SIGSOFT Software Engineering Notes, 30(4), 1–7. https://doi.org/10.1145/1082983.1083249 d’Amorim, M., & Rosu, G. (2005). Efficient Monitoring of omega-Languages. Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings, 364–378. https://doi.org/10.1007/11513988_36 Etessami, K., & Rajamani, S. K. (Eds.). (2005). Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings. https://doi.org/10.1007/b138445 d’Amorim, M., & Rosu, G. (2005). An Equational Specification for the Scheme Language. J. UCS, 11(7), 1327–1348. https://doi.org/10.3217/jucs-011-07-1327 Teng, J., Rouskas, G. N., & Pattavina, A. (2005). Routing path optimization in optical burst switched networks. 2005 Conference on Optical Network Design and Modelling, Proceedings, 1–10. Yang, L., Rouskas, G. N., Boutaba, R., Almeroth, K., Puigjaner, R., Shen, S., & Black, J. P. (2005). Path switching in OBS networks. In Networking 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (Vol. 3462, pp. 406–418). Chen, B., Dutta, R., Rouskas, G. N., & IEEE. (2005). On the Application of K-Center Algorithms to Hierarchical Traffic Grooming. 2nd International Conference on Broadband Networks (Broadnets 2005), 295-+. Baldine, I., Mehrotra, P., Rouskas, G., Bragg, A., Stevenson, D., & IEEE. (2005). An Intra- and Inter-Domain Routing Architecture for Optical Burst Switched (OBS) Networks. 2nd International Conference on Broadband Networks (Broadnets 2005), 150-+. https://doi.org/10.1109/ICBN.2005.1589726 Chen, B., Rouskas, G. N., Dutta, R., & IEEE. (2005). A Framework for Hierarchical Traffic Grooming in WDM Networks of General Topology. 2nd International Conference on Broadband Networks (Broadnets 2005), 167-+. Jhala, A., & Young, R. M. (2005). A discourse planning approach to cinematic camera control for narratives in virtual environments. Proceedings of the National Conference on Artificial Intelligence, 1, 307–312. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-29344452737&partnerID=MN8TOARS Jhala, A., Bares, W., & Young, R. M. (2005). Towards an intelligent storyboarding tool for 3D games. ACM International Conference Proceeding Series, 265, 367–368. https://doi.org/10.1145/1178477.1178551 Matsuda, N. (2005). Natural language processing in educational systems. In H. Tanaka (Ed.), Encyclopedia of Artificial Intelligence. Tokyo, Japan: Japan Society of Artificial Intelligence. Matsuda, N. (2005). Instructional strategies. In H. Tanaka (Ed.), Encyclopedia of Artificial Intelligence. Tokyo, Japan: Japan Society of Artificial Intelligence. Kaltofen, E., & Yui, N. (2005). Explicit construction of the hilbert class fields of imaginary quadratic fields with class numbers 7 and 11. In EUROSAM 84 (pp. 310–320). https://doi.org/10.1007/bfb0032853 Battest, T., & Perros, H. (2005). Optical burst switching for the next generation Internet. IEEE Potentials, 23(5), 40–43. https://doi.org/10.1109/mp.2005.1368915 Shen, X., & Ding, C. (2005). Parallelization of Utility Programs Based on Behavior Phase Analysis (No. TR876). Rochester, NY: Computer Science Dept., University of Rochester. Michael Young, R. (2005). Internet-Based Games. In M. P. Singh (Ed.), The Practical Handbook of Internet Computing. https://doi.org/10.1201/9780203507223.ch11 Maximilien, E. M., & Singh, M. P. (2005). Multiagent System for Dynamic Web Services Selection. Proceedings of the AAMAS Workshop on Service-Oriented Computing and Agent-Based Engineering (SOCABE), 1–10. Utrecht, The Netherlands: AAMAS. Dignum, F., Dignum, V., Koenig, S., Kraus, S., Singh, M. P., & Wooldridge, M. (Eds.). (2005). Proceedings of the 4th International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS). Utrecht, The Netherlands: ACM Press. Moro, G., Sartori, C., & Singh, M. P. (Eds.). (2005). Agents and Peer-to-Peer Computing. https://doi.org/10.1007/b104265 Shen, X., Zhong, Y., & Ding, C. (2005). Phase-Based Miss Rate Prediction Across Program Inputs. In Lecture Notes in Computer Science (pp. 42–55). https://doi.org/10.1007/11532378_5 Ding, C., Zhang, C., Shen, X., & Ogihara, M. (2005). Gated memory control for memory monitoring, leak detection and garbage collection. Proceedings of the 2005 workshop on Memory system performance - MSP '05. Presented at the the 2005 workshop. https://doi.org/10.1145/1111583.1111593 Shen, X., Gao, Y., Ding, C., & Archambault, R. (2005). Lightweight reference affinity analysis. Proceedings of the 19th annual international conference on Supercomputing - ICS '05. Presented at the the 19th annual international conference. https://doi.org/10.1145/1088149.1088167 Yu, G.-X., Park, B.-H., Chandramohan, P., Munavalli, R., Geist, A., & Samatova, N. F. (2005). In silico Discovery of Enzyme–Substrate Specificity-determining Residue Clusters. Journal of Molecular Biology, 352(5), 1105–1117. https://doi.org/10.1016/j.jmb.2005.08.008 Suters, W. H., Abu-Khzam, F. N., Zhang, Y., Symons, C. T., Samatova, N. F., & Langston, M. A. (2005). A New Approach and Faster Exact Methods for the Maximum Common Subgraph Problem. In Lecture Notes in Computer Science (pp. 717–727). https://doi.org/10.1007/11533719_73 Wang, P., Ning, P., & Reeves, D. S. (2005). Network Access Control for Mobile Ad-Hoc Networks. In Information and Communications Security (pp. 350–362). https://doi.org/10.1007/11602897_30 Rouskas, G. N., Neri, F., Pattavina, A., Bregni, S., & Maier, G. (2005). Selected papers from Optical Network Design and Modeling (ONDM) 2005 conference. Optical Switching and Networking, 2(4), 199–200. https://doi.org/10.1016/j.osn.2006.02.001 Rouskas, G. N., & Neri, F. (2005). Selected papers from the BROADNETS 2004 Optical Networking Symposium. Optical Switching and Networking, 2(2), 71. https://doi.org/10.1016/j.osn.2005.06.002 Chen, B., Rouskas, G. N., & Dutta, R. (2005). Traffic grooming in WDM ring networks to minimize the maximum electronic port cost. Optical Switching and Networking, 2(1), 1–18. https://doi.org/10.1016/j.osn.2005.01.002 Neri, F., & Rouskas, G. N. (2005). Editorial. Optical Switching and Networking, 1(1), 1–2. https://doi.org/10.1016/j.osn.2004.11.003 Kaltofen, E., Morozov, D., & Yuhasz, G. (2005). Generic matrix multiplication and memory management in linBox. Proceedings of the 2005 international symposium on Symbolic and algebraic computation - ISSAC '05. Presented at the the 2005 international symposium. https://doi.org/10.1145/1073884.1073915 Kaltofen, E., & Koiran, P. (2005). On the complexity of factoring bivariate supersparse (Lacunary) polynomials. Proceedings of the 2005 international symposium on Symbolic and algebraic computation - ISSAC '05. Presented at the the 2005 international symposium. https://doi.org/10.1145/1073884.1073914 Gu, X., & Yu, P. S. (2005). Adaptive Load Diffusion for Stream Joins. In Middleware 2005 (pp. 411–420). https://doi.org/10.1007/11587552_22 Semantic Association Identification and Knowledge Discovery for National Security Applications. (2005). Journal of Database Management. https://doi.org/10.4018/jdm.2005010103 SemRank. (2005). Proceedings of the 14th international conference on World Wide Web - WWW '05. https://doi.org/10.1145/1060745.1060766 Li, J., Talebi, Z. A., Chirkova, R., & Fathi, Y. (2005). A Formal Model for the Problem of View Selection for Aggregate Queries. In Advances in Databases and Information Systems (pp. 125–138). https://doi.org/10.1007/11547686_10 Wu, Y., An, H., Krim, H., Vo, K., Lee, J.-M., & Lin, W. (2005). Intracranial vascular transfer function in acute stroke patients. Journal of Cerebral Blood Flow & Metabolism, 25(1_suppl), S394–S394. https://doi.org/10.1038/sj.jcbfm.9591524.0394 Babu, S., Schmugge, S., Inugala, R., Rao, S., Barnes, T., & Hodges, L. F. (2005). Marve: A Prototype Virtual Human Interface Framework for Studying Human-Virtual Human Interaction. In Intelligent Virtual Agents (pp. 120–133). https://doi.org/10.1007/11550617_11 Matsuda, N., Cohen, W. W., & Koedinger, K. R. (2005). Applying programming by demonstration in an intelligent authoring tool for cognitive tutors. AAAI Workshop - Technical Report, WS-05-04, 1–8. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33646048713&partnerID=MN8TOARS Falcone, R., Barber, S., Sabater-Mir, J., & Singh, M. (2005). Trusting agents for trusting electronic societies: Theory and applications in HCI and e-commerce - Preface. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-77049101012&partnerID=MN8TOARS Maximilien, E. M., & Singh, M. P. (2005). Toward Web services interaction styles. Proceedings - 2005 IEEE International Conference onServices Computing, SCC 2005, I, 147–154. https://doi.org/10.1109/SCC.2005.101 Maximilien, E. M., & Singh, M. P. (2005). Self-adjusting trust and selection for web services. Proceedings - Second International Conference on Autonomic Computing, ICAC 2005, 2005, 385–386. https://doi.org/10.1109/ICAC.2005.53 Mallya, A. U., Desai, N., Chopra, A. K., & Singh, M. P. (2005). OWL-P: OWL for protocol and processes. Proceedings of the International Conference on Autonomous Agents, 15–16. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33644797124&partnerID=MN8TOARS Kraus, S., Singh, M. P., Koenig, S., & Wooldridge, M. (2005). Proceedings of the International Conference on Autonomous Agents: Introduction. Proceedings of the International Conference on Autonomous Agents, 1443–1444. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33644803821&partnerID=MN8TOARS Mallya, A. U., & Singh, M. P. (2005). Modeling exceptions via commitment protocols. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05, 273–280. https://doi.org/10.1145/1082473.1082492 Wan, F., & Singh, M. P. (2005). Formalizing and achieving multiparty agreements via commitments. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05, 899–906. https://doi.org/10.1145/1082473.1082591 Wan, F., & Singh, M. P. (2005). Enabling persistent Web services via commitments. Information Technology and Management, 6(1), 41–60. https://doi.org/10.1007/s10799-004-7774-3 Wan, F., & Singh, M. P. (2005). Analyzing multiparty agreements with commitments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 85–96). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-26944458859&partnerID=MN8TOARS Singh, M. P., & Lei, Y. (2005). An evaluation of e-business metamodels. 17th International Conference on Software Engineering and Knowledge Engineering, SEKE 2005, 88–93. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84886893879&partnerID=MN8TOARS Mallya, A. U., & Singh, M. P. (2005). A semantic approach for designing e-business protocols. Lecture Notes in Computer Science, 3387, 111–123. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-24144480932&partnerID=MN8TOARS Mallya, A. U., & Singh, M. P. (2005). A semantic approach for designing commitment protocols. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 3396, 33–49. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-26844566333&partnerID=MN8TOARS Singh, M. P., & Huhns, M. N. (2005). Service-Oriented Computing. Retrieved from http://www.csc.ncsu.edu/faculty/mpsingh/books/SOC/ Maximilien, E. M., & Singh, M. P. (2005). Agent-based trust model involving multiple qualities. Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05, 653–660. https://doi.org/10.1145/1082473.1082552 Li, X. Y., Stallmann, M. F., & Brglez, F. (2005). Effective bounding techniques for solving unate and binate covering problems. Proceedings of the 42nd annual Design Automation Conference, 385–390. Gehringer, E. F. (2005). The Memogate affair: A case study on privacy in computer networks. Proceedings of the 2005 ASEE Annual Conference and Exposition. Presented at the 2005 ASEE Annual Conference and Exposition, Portland, OR. Gehringer, E. F. (2005). Reuse of homework and test questions: when, why, and how to maintain security? 34th Annual Frontiers in Education, 2004. FIE 2004. Presented at the 34th Annual Frontiers in Education, 2004. FIE 2004. https://doi.org/10.1109/fie.2004.1408702 Kachru, S., & Gehringer, E. F. (2005). A comparison of J2EE and .NET as platforms for teaching web services. 34th Annual Frontiers in Education, 2004. FIE 2004. Presented at the 34th Annual Frontiers in Education, 2004. FIE 2004. https://doi.org/10.1109/fie.2004.1408754 Mountrouidou, X., Perros, H. G., & Beshai, M. (2005). Performance Evaluation of an Optical Burst Switching Scheme for Grid Networks. 2ND INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS (BROADNETS 2005), pp. 515-+. https://doi.org/10.1109/icbn.2005.1589775 Borges, R., Linthicum, K. J., Weeks, T. W., & Gehrke, T. (2005). Gallium nitride materials including thermally conductive regions. Washington, DC: U.S. Patent and Trademark Office. Seo, S., Kang, J., & Ryu, K. H. (2005). Multivariate stream data reduction in sensor network applications. In Embedded and ubiquitous computing--EUC 2005 workshops: EUC 2005 workshops: UISW, NCUS, SecUbiq, USN and TAUES, Nagasaki, Japan, December 6-9, 2005: Proceedings (Vol. 3823, pp. 198–207). Berlin: Springer. Wang, P., Ning, P., & Reeves, D. S. (2005). Network access control for mobile ad-hoc networks. Information and Communications Security, 3783, 350–362. Femal, M. E., & Freeh, V. W. (2005). Safe overprovisioning: Using power limits to increase aggregate throughput. In T. N. V. B. Falsafi (Ed.), Power-aware computer systems: 4th International Workshop, PACS 2004, Portland, OR, USA, December 5, 2004 (Lecture notes in computer science; 3471) (Vol. 3471, pp. 150–164). https://doi.org/10.1007/11574859_11 Sun, K., Ning, P., & Wang, C. (2005). Fault-tolerant cluster-wise clock synchronization for wireless sensor networks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2(3), 177–189. https://doi.org/10.1109/TDSC.2005.36 Kang, J. W., Yang, J. O., Xu, W. H., & Chopra, P. (2005). Integrating heterogeneous microarray data sources using correlation signatures. In B. Ludascher & L. Raschid (Eds.), Data integration in the life sciences: Second international workshop, DILS 2005, San Diego, CA, USA, July 20-22, 2005: Proceedings (Vol. 3615, pp. 105–120). Berlin; New York: Springer. Afrati, F., Chirkova, R., Gupta, S., & Loftis, C. (2005). Designing and using views to improve performance of aggregate queries (extended abstract). In B. C. O. L. Zhou & X. Meng (Eds.), Database systems for advanced applications: 10th international conference, DASFAA 2005, Beijing, China, April 17-20, 2005: Proceedings (Lecture notes in computer science ; 3454) (Vol. 3453, pp. 548–554). https://doi.org/10.1007/11408079_48 Perros, H. G. (2005). Connection-Oriented Networks: SONET/SDH, ATM, MPLS and Optical Networks. In CONNECTION-ORIENTED NETWORKS: SONET/SDH, ATM, MPLS AND OPTICAL NETWORKS (pp. 1–332). https://doi.org/10.1002/0470016361 Teng, J., & Rouskas, G. (2005). A detailed analysis and performance comparison of wavelength reservation schemes for optical burst switched networks. PHOTONIC NETWORK COMMUNICATIONS, 9(3), 311–335. https://doi.org/10.1007/s11107-004-6435-0 Ben Hamza, A., He, Y., Krim, H., & Willsky, A. (2005). A multiscale approach to pixel-level image fusion. Integrated Computer-Aided Engineering, 12(2), 135–146. https://doi.org/10.3233/ica-2005-12201 Abdulla, P., Baier, C., Iyer, S. P., & Jonsson, B. (2005). Simulating perfect channels with probabilistic lossy channels. INFORMATION AND COMPUTATION, 197(1-2), 22–40. https://doi.org/10.1016/j.ic.2004.12.001 Price, E. W., & Carbone, I. (2005). SNAP: workbench management tool for evolutionary population genetic analysis. BIOINFORMATICS, 21(3), 402–404. https://doi.org/10.1093/bioinformatics/bti003 Cleaveland, R., Iyer, S. P., & Narasimha, M. (2005). Probabilistic temporal logics via the modal mu-calculus. THEORETICAL COMPUTER SCIENCE, 342(2-3), 316–350. https://doi.org/10.1016/j.tcs.2005.03.048 Harris, J., & Young, R. M. (2005). Proactive mediation in plan-based narrative environments. In Intelligent Virtual Agents: 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005: Proceedings (Vol. 3661, pp. 292–304). New York: Springer. Semazzi, F. H. M., Scroggs, J. S., Pouliot, G. A., McKee-Burrows, A. L., Norman, M., Poojary, V., & Tsai, Y. M. (2005). On the accuracy of semi-Lagrangian numerical simulation of internal gravity wave motion in the atmosphere. JOURNAL OF THE METEOROLOGICAL SOCIETY OF JAPAN, 83(5), 851–869. https://doi.org/10.2151/jmsj.83.851 Kang, J., Lee, D., & Mitra, P. (2005). Identifying value mappings for data integration: An unsupervised approach. In Web information systems engineering--WISE 2005: 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005: Proceedings (Lecture notes in computer science; 3806) (Vol. 3806, pp. 544–551). Berlin: Springer-Verlag. Zhu, S. C., Yao, C., Liu, D. G., Setia, S., & Jajodia, S. (2005). Efficient security mechanisms for overlay multicast-based content distribution. In A. K. J. Ioannidis & M. Yung (Eds.), Applied cryptography and network security: Third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005: Proceedings (Lecture notes in computer science; 3531) (Vol. 3531, pp. 40–55). Berlin; New York: Springer. Afrati, F., Chirkova, R., Gergatsoulis, M., & Pavlaki, V. (2005). Designing views to efficiently answer real SQL queries. In J-D. Zucker & L. Saitta (Eds.), Abstraction, reformulation and approximation: 6th international symposium, SARA 2005, Airth Castle, Scotland, UK, July 26-29, 2005: proceedings (Lecture notes in computer science, Lecture notes in artificial intelligence; 3607) (Vol. 3607, pp. 332–346). https://doi.org/10.1007/11527862_26 Riedl, M. O., & Young, R. M. (2005). An objective character believability evaluation procedure for multi-agent story generation systems. In Intelligent Virtual Agents: 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005: Proceedings (Vol. 3661, pp. 278–291). New York: Springer. Afrati, F., & Chirkova, R. (2005). Selecting and using views to compute aggregate queries (extended abstract). In T. Eiter & L. Libkin (Eds.), Database theory: ICDT 2005, 10th international conference, Edinburgh, UK, January 5-7, 2005: Proceedings (Lecture notes in computer science ; 3363) (Vol. 3363, pp. 383–397). https://doi.org/10.1007/978-3-540-30570-5_26 Huhns, M. N., Singh, M. P., Burstein, M., Decker, K., Durfee, E., Finin, D., … Zavala, L. (2005). Research directions for service-oriented multiagent systems. IEEE INTERNET COMPUTING, 9(6), 65–70. https://doi.org/10.1109/MIC.2005.132 Chen, B., Dutta, R., & Rouskas, G. (2005). On the application of k-center algorithms in heirarchical traffic grooming. In Proceedings of the Second International IEEE/Create-net workshop on traffic grooming (pp. 167–176). Los Alamitos, CA: IEEE Computer Society. Poliannikov, O. V., & Krim, H. (2005). Identification of a discrete planar symmetric shape from a single noisy view. IEEE TRANSACTIONS ON IMAGE PROCESSING, 14(12), 2051–2059. https://doi.org/10.1109/TIP.2005.859387 Zhu, Y. F., & Mueller, F. (2005). Feedback EDF scheduling of real-time tasks exploiting dynamic voltage scaling. REAL-TIME SYSTEMS, 31(1-3), 33–63. https://doi.org/10.1007/s11241-005-2744-3 Rhyne, T. M., Dennis, B., Kocherlakota, S., Sawant, A., Tateosian, L., & Healey, C. G. (2005). Designing a visualization framework for multidimensional data. IEEE Computer Graphics and Applications, 25(6), 15-. Xie, T., & Notkin, D. (2005, October). Checking inside the black box: Regression testing by comparing value spectra. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, Vol. 31, pp. 869–883. https://doi.org/10.1109/TSE.2005.107 Lei, Y., & Iyer, S. P. (2005). An approach to unfolding asynchronous communication protocols. In I. J. H. J. Fitzgerald & A. Tarlecki (Eds.), FM 2005: Formal methods: International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005: proceedings (Lecture notes in computer science ; 3582) (Vol. 3582, pp. 334–349). Berlin; New York: Springer. Teng, J., & Rouskas, G. (2005). Traffic engineering approach to path selection in optical burst switching networks. Journal of Optical Networking, 4(11), 759–777. https://doi.org/10.1364/JON.4.000759 Yang, L., & Rouskas, G. N. (2005). Path Switching in OBS Networks. In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (Vol. 3462, pp. 406–418). https://doi.org/10.1007/11422778_33 Unal, G., Krim, H., & Yezzi, A. (2005). Fast incorporation of optical flow into active polygons. IEEE TRANSACTIONS ON IMAGE PROCESSING, 14(6), 745–759. https://doi.org/10.1109/TIP.2005.847286 Hazard, C. J., Kimport, K. R., & Johnson, D. H. (2005). Emergent behavior in two complex cellular automata rule sets. COMPLEXITY, 10(5), 45–55. https://doi.org/10.1002/cplx.20089 Sichitiu, M. L., & Dutta, R. (2005). Benefits of multiple battery levels for the lifetime of large wireless sensor networks. In Networking 2005: Networking technologies, services, and protocols: Performance of computer and communication networks: Mobile and wireless communication systems: 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005: Proceedings (Lecture notes in computer science; 3462) (Vol. 3462, pp. 1440–1444). https://doi.org/10.1007/11422778_133 Puttasubbappa, V. S., & Perros, H. G. (2005). An approximate queueing model for limited-range wavelength conversion in an OBS switch. In Networking 2005: Networking technologies, services, and protocols: Performance of computer and communication networks: Mobile and wireless communication systems: 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005: Proceedings (Lecture notes in computer science; 3462) (Vol. 3462, pp. 697–708). https://doi.org/10.1007/11422778_56 Mallya, A. U., & Singh, M. P. (2005). A semantic approach for designing commitment protocols. Lecture Notes in Computer Science, 3396, 33–49. https://doi.org/10.1007/978-3-540-32258-0_3 Earp, J. B., Anton, A. I., Aiman-Smith, L., & Stufflebeam, W. H. (2005). Examining Internet privacy policies within the context of user privacy values. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237. https://doi.org/10.1109/tem.2005.844927 Yolum, P., & Singh, M. P. (2005). Engineering self-organizing referral networks for trustworthy service selection. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 35(3), 396–407. https://doi.org/10.1109/tsmca.2005.846401 Langville, A. N., & Meyer, C. D. (2005). A survey of eigenvector methods for Web information retrieval. SIAM REVIEW, 47(1), 135–161. https://doi.org/10.1137/S0036144503424786 Wang, W. Y., Liang, W., & Agarwal, A. K. (2005). Integration of authentication and mobility management in third generation and WLAN data networks. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 5(6), 665–678. https://doi.org/10.1002/wcm.335 Unal, G., Yezzi, A., & Krim, H. (2005). Information-theoretic active polygons for unsupervised texture segmentation. INTERNATIONAL JOURNAL OF COMPUTER VISION, 62(3), 199–220. https://doi.org/10.1007/s11263-005-4880-6 Zhu, Y. F., & Mueller, F. (2005, July). Feedback EDF scheduling exploiting hardware-assisted asynchronous dynamic voltage scaling. ACM SIGPLAN NOTICES, Vol. 40, pp. 203–212. https://doi.org/10.1145/1070891.1065939 Mallya, A. U., & Singh, M. P. (2005). A semantic approach for designing e-business protocols. IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 3387, 111–123. https://doi.org/10.1007/978-3-540-30581-1_10 Psarros, M., Heber, S., Sick, M., Thoppae, G., Harshman, K., & Sick, B. (2005). RACE: Remote Analysis Computation for gene Expression data. NUCLEIC ACIDS RESEARCH, 33, W638–W643. https://doi.org/10.1093/nar/gki490 Gehring, R., Merwe, D., Pierce, A. N., Baynes, R. E., Craigmill, A. L., & Riviere, J. E. (2005). Multivariate meta-analysis of pharmacokinetic studies of ampicillin trihydrate in cattle. AMERICAN JOURNAL OF VETERINARY RESEARCH, 66(1), 108–112. https://doi.org/10.2460/ajvr.2005.66.108 Cai, G., & Wurman, P. R. (2005). Monte Carlo approximation in incomplete information, sequential auction games. Decision Support Systems, 39(2), 153–168. https://doi.org/10.1016/j.das.2003.10.004 Barnes, T., Bitzer, D., & Vouk, M. (2005). Experimental Analysis of the Q-Matrix Method in Knowledge Discovery. In Lecture Notes in Computer Science (Vol. 3488, pp. 603–611). https://doi.org/10.1007/11425274_62 Wan, F., & Singh, M. P. (2005). Analyzing multiparty agreements with commitments. Lecture Notes in Computer Science, 3508, 85–96. https://doi.org/10.1007/11426714_6 Huhns, M. N., & Singh, M. P. (2005). Service-oriented computing: Key concepts and principles. IEEE INTERNET COMPUTING, 9(1), 75–81. https://doi.org/10.1109/MIC.2005.21 Mayr, R. (2005, February 9). Weak bisimilarity and regularity of context-free processes is EXPITIME-hard. THEORETICAL COMPUTER SCIENCE, Vol. 330, pp. 553–575. https://doi.org/10.1016/j.tcs.2004.10.008 Kaltofen, E., & Villard, G. (2005). On the complexity of computing determinants. COMPUTATIONAL COMPLEXITY, 13(3-4), 91–130. https://doi.org/10.1007/s00037-004-0185-3 Gupta, A., Kripakaran, P., Mahinthakumar, G. K., & Baugh, J. W. (2005). Genetic algorithm-based decision support for optimizing seismic response of piping systems. Journal of Structural Engineering, 131(3), 389–398. https://doi.org/10.1061/(asce)0733-9445(2005)131:3(389) Ufer, S. (2005). 2D/3D chemical sensors and methods of fabricating and operating the same. Washington, DC: U.S. Patent and Trademark Office. Singh, M. P. (2005). The practical handbook of internet computing. Boca Raton, FL: Chapman & Hall/CRC. Brglez, F., Li, X. Y., & Stallmann, M. F. (2005). On SAT instance classes and a method for reliable performance experiments with SAT solvers. ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 43(1-4), 1–34. https://doi.org/10.1007/s10472-005-0417-5 Singh, M. P., & Huhns, M. N. (2005). Service-oriented computing: Semantics, processes, agents. https://doi.org/10.1002/0470091509 St Amant, R., Freed, A. R., & Ritter, F. E. (2005, March). Specifying ACT-R models of user interaction with a GOMS language. COGNITIVE SYSTEMS RESEARCH, Vol. 6, pp. 71–88. https://doi.org/10.1016/j.cogsys.2004.09.008 Teng, J., & Rouskas, G. N. (2005). Wavelength selection in OBS networks using traffic engineering and priority-based concepts. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 23(8), 1658–1669. https://doi.org/10.1109/JSAC.2005.851794 Chen, X. Z., & Hartwig, R. E. (2005). The semi-iterative method applied to the hyper-power iteration. NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS, 12(9), 895–910. https://doi.org/10.1002/nla.429 Desai, N., Mallya, A. U., Chopra, A. K., & Singh, M. P. (2005). Interaction Protocols as design abstractions for business processes. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 31(12), 1015–1027. https://doi.org/10.1109/TSE.2005.140 Srinivasarao, K., & Dutta, R. (2005). Traffic-partitioning approaches to grooming ring access networks. JOURNAL OF OPTICAL NETWORKING, 4(9), 602–614. https://doi.org/10.1364/JON.4.000602 Janke, L. W., & Winstead, N. N. (2005). Start where you are and use what you have. Raleigh, N.C.: N.N. Winstead? Puttasubbappa, V. S., & Perros, H. G. (2005). Quality of service in an optical burst switching ring. PHOTONIC NETWORK COMMUNICATIONS, 9(3), 357–371. https://doi.org/10.1007/s11107-004-6438-x Rhee, I., & Xu, L. S. (2005, October). Limitations of equation-based congestion control. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, Vol. 35, pp. 49–60. https://doi.org/10.1145/1090191.1080099 Bestavros, A., Byers, J. W., & Harfoush, K. A. (2005). Inference and labeling of metric-induced network topologies. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 16(11), 1053–1065. https://doi.org/10.1109/tpds.2005.138 Heber, S., & Savage, C. D. (2005). Common intervals of trees. INFORMATION PROCESSING LETTERS, 93(2), 69–74. https://doi.org/10.1016/j.ipl.2004.09.016 Chen, B., Rouskas, G., & Dutta, R. (2005). Applying clustering techniques to general topology traffic grooming. In Proceedings of IEEE / Create-net broadnets 2005 (pp. 308–314). Piscataway, N.J.: IEEE. Haskell, S. R. R., Payne, M., Webb, A., Riviere, J., & Craigmill, A. L. (2005, March 15). Antidotes in food animal practice. JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, Vol. 226, pp. 884–887. https://doi.org/10.2460/javma.2005.226.884