Computer Science - 2008 Butler, K., Enck, W., Hursti, H., McLaughlin, S., Traynor, P., & McDaniel, P. (2008). Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST. Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop. Traynor, P., Butler, K., Enck, W., & McDaniel, P. (2008). Realizing massive-scale conditional access systems through attribute-based cryptosystems. In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS). Butler, K. R. B., Enck, W., Traynor, P., Plasterr, J., & McDaniel, P. D. (2008). Privacy Preserving Web-based Email. Algorithms, Architectures and Information Systems Security, 3, 349. https://doi.org/10.1007/11961635_8 Enck, W., McDaniel, P., & Jaeger, T. (2008). Pinup: Pinning user files to known applications. 2008 Annual Computer Security Applications Conference (ACSAC), 55–64. Enck, W., Ongtang, M., & McDaniel, P. (2008). Mitigating Android software misuse before it happens. Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008. Traynor, P., Enck, W., Mcdaniel, P., & La Porta, T. (2008). Exploiting open functionality in SMS-capable cellular networks. Journal of Computer Security, 16(6), 713–742. Enck, W., Butler, K., Richardson, T., McDaniel, P., & Smith, A. (2008). Defending against attacks on main memory persistence. 2008 Annual Computer Security Applications Conference (ACSAC), 65–74. Heckman, S. S., & Williams, L. A. (2008). A measurement framework of alert characteristics for false positive mitigation models. North Carolina State University. Dept. of Computer Science. Heckman, S., & Williams, L. (2008). On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques. Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, 41–50. Dutta, R., Kamal, A. E., & Rouskas, G. N. (Eds.). (2008). Traffic Grooming for Optical Networks. https://doi.org/10.1007/978-0-387-74518-3 Rouskas, G. N., & Dutta, R. (2008). Hierarchical Traffic Grooming. In R. Dutta, A. E. Kamal, & G. N. Rouskas (Eds.), Optical Networks (pp. 73–88). https://doi.org/10.1007/978-0-387-74518-3_6 Dutta, R., Kamal, A. E., & Rouskas, G. N. (2008). Introduction. https://doi.org/10.1007/978-0-387-74518-3_1 Dutta, R., Kamal, A. E., & Rouskas, G. N. (2008). Grooming Mechanisms in SONET/SDH and Next-Generation SONET/SDH. https://doi.org/10.1007/978-0-387-74518-3_4 Gvero, T., Gligoric, M., Lauterburg, S., d’Amorim, M., Marinov, D., & Khurshid, S. (2008). State extensions for java pathfinder. 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, 863–866. https://doi.org/10.1145/1368088.1368224 d’Amorim, M., Lauterburg, S., & Marinov, D. (2008). Delta Execution for Efficient State-Space Exploration of Object-Oriented Programs. IEEE Trans. Software Eng., 34(5), 597–613. https://doi.org/10.1109/TSE.2008.37 Sch\"a, W. (Ed.). (2008). 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008. ACM. Lv, Q., Rouskas, G. N., & IEEE. (2008). On optimal sizing of tiered network services. In 27th Ieee Conference on Computer Communications (Infocom), Vols 1-5 (pp. 1–5). Castillo, C., Rouskas, G. N., Harfoush, K., & IEEE. (2008). Efficient resource management using advance reservations for heterogeneous Grids. 2008 Ieee International Symposium on Parallel & Distributed Processing, Vols 1-8, 916–927. Karmous-Edwards, G., Reeves, D., Rouskas, G., Battestilli, L., Vegesna, P., Vishwanath, A., & IEEE. (2008). Edge Reconfigurable Optical Network (ERON): Enabling Dynamic Sharing of Static Lightpaths. 2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 332–334. https://doi.org/10.1109/BROADNETS.2008.4769097 Rouskas, G. N., Dutta, R., Baldine, I., & IEEE. (2008). A New Internet Architecture to Enable Software Defined Optics and Evolving Optical Switching Models. 2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 71–76. https://doi.org/10.1109/BROADNETS.2008.4769046 Iyer, M., Rouskas, G. N., Dutta, R., & IEEE. (2008). A Hierarchical Model for Multigranular Optical Networks. 2008 5th International Conference on Broadband Communications, Networks and Systems (Broadnets 2008), 444–451. https://doi.org/10.1109/BROADNETS.2008.4769124 Liang, Y., Liu, X., Wang, Z., Li, J., Cao, B., Cao, Z., … Zhang, Y. (2008). THU and ICRC at TRECVID 2008. National Institute of Standards and Technology. Jhala, A., Rawls, C., Munilla, S., & Young, R. M. (2008). Longboard: A sketch based intelligent storyboarding tool for creating machinima. Proceedings of the 21th International Florida Artificial Intelligence Research Society Conference, FLAIRS-21, 386–391. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-55849084267&partnerID=MN8TOARS Cheong, Y.-G., Jhala, A., Bae, B.-C., & Young, R. M. (2008). Automatically generating summary visualizations from game logs. Proceedings of the 4th Artificial Intelligence and Interactive Digital Entertainment Conference, AIIDE 2008, 167–172. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84858960339&partnerID=MN8TOARS Pujolle, G., & Perros, H. (2008). Special issue: QoS, control, and security in next generation networks. Telecommunication Systems, 39(3-4), 169–169. https://doi.org/10.1007/S11235-008-9121-1 Arshad, F., Ramay, S. R., Tanwir, S., Battestilli, L., & Zaidi, S. M. H. (2008). Advance Reservation and Dynamic Scheduling of Point to Multipoint Lightpaths. 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies. Presented at the 2008 International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET). https://doi.org/10.1109/honet.2008.4810211 Mao, F., & Shen, X. (2008). Cross-Input Learning and Discriminative Prediction in Evolvable Virtual Machines (No. WM-CS-2008-06). Williamsburg, VA: Computer Science Department, The College of William and Mary. Liu, Y., Zhang, E. Z., & Shen, X. (2008). A Cross-Input Adaptive Framework for GPU Program Optimization (No. WM-CS-2008-09). Williamsburg, VA: Computer Science Department, The College of William and Mary. Mao, F., & Shen, X. (2008). LU Decomposition on Cell Broadband Engine (Technical Report No. WM-CS-2008-08). Computer Science Department, The College of William and Mary. Falcone, R., Barber, S., Sabater-Mir, J., & Singh, M. P. (Eds.). (2008). Trust in Agent Societies: 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12 -13, 2008. Revised Selected and Invited Papers. https://doi.org/10.1007/978-3-540-92803-4 Boella, G., Pigozzi, G., Singh, M. P., & Verhagen, H. (Eds.). (2008, July). Proceedings of the 3rd International Workshop on Normative Multiagent Systems (NorMAS). Luxembourg. Menzies, T. (2008). Editorial, special issue, repeatable experiments in software engineering. Empirical Software Engineering, 13(5), 469–471. https://doi.org/10.1007/s10664-008-9087-3 Etzkorn, L., & Menzies, T. (2008). Special issue on information retrieval for program comprehension. Empirical Software Engineering, 14(1), 1–4. https://doi.org/10.1007/s10664-008-9097-1 Jhala, A. (2008). Exploiting Structure and Conventions of Movie Scripts for Information Retrieval and Text Mining. In Interactive Storytelling: Vol. 5334 LNCS (pp. 210–213). https://doi.org/10.1007/978-3-540-89454-4_27 Jiang, Y., & Shen, X. (2008). Adaptive Software Speculation for Enhancing the Cost-Efficiency of Behavior-Oriented Parallelization. 2008 37th International Conference on Parallel Processing. Presented at the 2008 37th International Conference on Parallel Processing (ICPP). https://doi.org/10.1109/icpp.2008.50 Jiang, Y., Shen, X., Chen, J., & Tripathi, R. (2008). Analysis and approximation of optimal co-scheduling on chip multiprocessors. Proceedings of the 17th international conference on Parallel architectures and compilation techniques - PACT '08. Presented at the the 17th international conference. https://doi.org/10.1145/1454115.1454146 Maduko, A., Anyanwu, K., Sheth, A., & Schliekelman, P. (2008). Graph Summaries for Subgraph Frequency Estimation. In S. Bechhofer, M. Hauswirth, J. Hoffmann, & M. Koubarakis (Eds.), The Semantic Web: Research and Applications. ESWC 2008. (pp. 508–523). https://doi.org/10.1007/978-3-540-68234-9_38 Miller, G. L., Phillips, T., & Sheehy, D. R. (2008). Linear-size meshes. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Montreal, Quebec, Canada. Derryberry, J., Sleator, D. D., Sheehy, D. R., & Woo, M. (2008). Achieving Spatial Adaptivity while Finding Approximate Nearest Neighbors. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Montreal, Quebec, Canada. Tanwir, S., Battestilli, L., Perros, H., & Karmous-Edwards, G. (2008). Dynamic scheduling of network resources with advance reservations in optical grids. International Journal of Network Management, 18(2), 79–105. https://doi.org/10.1002/nem.680 Shen, X., & Shaw, J. (2008). Scalable Implementation of Efficient Locality Approximation. In Languages and Compilers for Parallel Computing (pp. 202–216). https://doi.org/10.1007/978-3-540-89740-8_14 Vatsavai, R. R., Shekhar, S., & Bhaduri, B. (2008). A Learning Scheme for Recognizing Sub-classes from Model Trained on Aggregate Classes. In Lecture Notes in Computer Science (pp. 967–976). https://doi.org/10.1007/978-3-540-89689-0_100 Jiang, Y., & Shen, X. (2008). Exploration of the Influence of Program Inputs on CMP Co-scheduling. In Lecture Notes in Computer Science (pp. 263–273). https://doi.org/10.1007/978-3-540-85451-7_29 Shahzad, M., Zahid, S., & Farooq, M. (2008). A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols. In Parallel Problem Solving from Nature – PPSN X (pp. 1130–1139). https://doi.org/10.1007/978-3-540-87700-4_112 Menzies, T., Benson, M., Costello, K., Moats, C., Northey, M., & Richardson, J. (2008). Learning better IV&V practices. Innovations in Systems and Software Engineering, 4(2), 169–183. https://doi.org/10.1007/S11334-008-0046-3 Menzies, T., Elrawas, O., Boehm, B., Madachy, R., Hihn, J., Baker, D., & Lum, K. (2008). Accurate Estimates without Calibration? In Making Globally Distributed Software Development a Success Story (pp. 210–221). https://doi.org/10.1007/978-3-540-79588-9_19 Pinkwart, N., Lynch, C., Ashley, K., & Aleven, V. (2008). Re-evaluating LARGO in the Classroom: Are Diagrams Better Than Text for Teaching Argumentation Skills? In Intelligent Tutoring Systems (pp. 90–100). https://doi.org/10.1007/978-3-540-69132-7_14 Chi, M., & VanLehn, K. (2008). Eliminating the Gap between the High and Low Students through Meta-cognitive Strategy Instruction. In Intelligent Tutoring Systems (pp. 603–613). https://doi.org/10.1007/978-3-540-69132-7_63 Roberts, D. L., & Roberts, F. S. (2008). Locating sensors in paths and cycles: The case of 2-identifying codes. European Journal of Combinatorics, 29(1), 72–82. https://doi.org/10.1016/j.ejc.2006.12.006 Roberts, D. L., Isbell, C. L., Jr., & Littman, M. L. (2008). Optimization problems involving collections of dependent objects. Annals of Operations Research, 163(1), 255–270. https://doi.org/10.1007/S10479-008-0350-1 Roberts, D. L., Isbell, C., Riedl, M., Bogost, I., & Furst, M. L. (2008). On the Use of Computational Models of Influence for Managing Interactive Virtual Experiences. In Interactive Storytelling (pp. 268–272). https://doi.org/10.1007/978-3-540-89454-4_34 Lin, H., Ma, X., Li, J., Yu, T., & Samatova, N. (2008). Adaptive Request Scheduling for Parallel Scientific Web Services. In Lecture Notes in Computer Science (pp. 276–294). https://doi.org/10.1007/978-3-540-69497-7_19 Abu-Khzam, F. N., Rizk, M. A., Abdallah, D. A., & Samatova, N. F. (2008). The Buffered Work-Pool Approach for Search-Tree Based Optimization Algorithms. In Parallel Processing and Applied Mathematics (pp. 170–179). https://doi.org/10.1007/978-3-540-68111-3_19 Rowe, J. P., Ha, E. Y., & Lester, J. C. (2008). Archetype-Driven Character Dialogue Generation for Interactive Narrative. In Intelligent Virtual Agents (pp. 45–58). https://doi.org/10.1007/978-3-540-85483-8_5 McQuiggan, S. W., Rowe, J. P., Lee, S., & Lester, J. C. (2008). Story-Based Learning: The Impact of Narrative on Learning Experiences and Outcomes. In Intelligent Tutoring Systems (pp. 530–539). https://doi.org/10.1007/978-3-540-69132-7_56 McQuiggan, S. W., Goth, J., Ha, E., Rowe, J. P., & Lester, J. C. (2008). Student Note-Taking in Narrative-Centered Learning Environments: Individual Differences and Learning Effects. In Intelligent Tutoring Systems (pp. 510–519). https://doi.org/10.1007/978-3-540-69132-7_54 McQuiggan, S. W., Robison, J. L., & Lester, J. C. (2008). Affective Transitions in Narrative-Centered Learning Environments. In Intelligent Tutoring Systems (pp. 490–499). https://doi.org/10.1007/978-3-540-69132-7_52 Min, W.-H., Shim, E.-S., Kim, Y.-J., & Cheong, Y.-G. (2008). Planning-integrated story graph for interactive narratives. MM'08 - Proceedings of the 2008 ACM International Conference on Multimedia, with co-located Symposium and Workshops, 27–32. https://doi.org/10.1145/1462014.1462021 Cheong, Y.-G., Kim, Y.-J., Min, W.-H., Shim, E.-S., & Kim, J.-Y. (2008). PRISM: A framework for authoring interactive narratives. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 297–308). https://doi.org/10.1007/978-3-540-89454-4_37 Anyanwu, K., Murukannaiah, P. K., & Maduko, A. (2008). Structure Discovery Queries in Disk-Based Semantic Web Databases. 2008 Fourth International Conference on Semantics, Knowledge and Grid, 336–342. https://doi.org/10.1109/SKG.2008.108 Barnes, T., & Stamper, J. (2008). Toward Automatic Hint Generation for Logic Proof Tutoring Using Historical Student Data. In Intelligent Tutoring Systems (pp. 373–382). https://doi.org/10.1007/978-3-540-69132-7_41 Nagappan, M., & Vouk, M. A. (2008). A Model for Sharing of Confidential Provenance Information in a Query Based System. In Lecture Notes in Computer Science (pp. 62–69). https://doi.org/10.1007/978-3-540-89965-5_8 Boyer, K. E., Phillips, R., Wallis, M., Vouk, M., & Lester, J. (2008). Balancing Cognitive and Motivational Scaffolding in Tutorial Dialogue. In Intelligent Tutoring Systems (pp. 239–249). https://doi.org/10.1007/978-3-540-69132-7_28 Matsuda, N., Cohen, W. W., Sewall, J., Lacerda, G., & Koedinger, K. R. (2008). Why tutored problem solving may be better than example study: Theoretical implications from a simulated-student study. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 111–121). https://doi.org/10.1007/978-3-540-69132-7-16 Chudnovsky, M., Seymour, P., & Sullivan, B. (2008). Cycles in dense digraphs. Combinatorica, 28(1), 1–18. https://doi.org/10.1007/S00493-008-2331-Z Danciger, J., Devadoss, S. L., Mugno, J., Sheehy, D., & Ward, R. (2008). Shape deformation in continuous map generalization. GeoInformatica, 13(2), 203–221. https://doi.org/10.1007/s10707-008-0049-0 Jiang, Y., & Shen, X. (2008, April). Adaptive speculation in behavior-oriented parallelization. 2008 IEEE International Symposium on Parallel and Distributed Processing. https://doi.org/10.1109/ipdps.2008.4536403 Singh, M. P. (2008). Semantical considerations on dialectical and practical commitments. Proceedings of the National Conference on Artificial Intelligence, 1, 176–181. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-57749190779&partnerID=MN8TOARS Desai, N., Narendra, N. C., & Singh, M. P. (2008). Checking Correctness of Business Contracts via Commitments. Proceedings of the 7th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 2, 787–794. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899949549&partnerID=MN8TOARS Desai, N., & Singh, M. P. (2008). On the enactability of business protocols. Proceedings of the National Conference on Artificial Intelligence, 2, 1126–1131. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-57749188042&partnerID=MN8TOARS Huai, J., Shan, M. C., Singh, M. P., Zhang, J., Casati, F., & Hsu, M. (2008). ICWS 2008: Message from the program chairs. Proceedings of the IEEE International Conference on Web Services, ICWS 2008. https://doi.org/10.1109/ICWS.2008.5 Udupi, Y. B., & Singh, M. P. (2008). Design patterns for policy-based service engagements. Proceedings - 2008 IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008, 97–100. https://doi.org/10.1109/POLICY.2008.38 Chopra, A. K., & Singh, M. P. (2008). Constitutive Interoperability. Proceedings of the 7th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 2, 797–804. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899983406&partnerID=MN8TOARS Chopra, A. K., & Singh, M. P. (2008). Interoperation in protocol enactment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 36–49). https://doi.org/10.1007/978-3-540-77564-5_3 Hang, C.-W., Wang, Y., & Singh, M. P. (2008). An adaptive probabilistic trust model and its evaluation. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 3, 1449–1452. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899977303&partnerID=MN8TOARS Wicker, A. W., & Doyle, J. (2008). Comparing preferences expressed by cp-networks (extended abstract). AAAI Workshop - Technical Report, WS-08-09, 128–133. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-66149165890&partnerID=MN8TOARS Doyle, J. (2008). Cognitive mechanics: Natural intelligence beyond biology and computation. AAAI Fall Symposium - Technical Report, FS-08-06, 35–37. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-77952157352&partnerID=MN8TOARS Watson, B., Brink, D., Lograsso, T. A., Devajaran, D., Rhyne, T.-M., & Patel, H. (2008). Visualizing very large layered graphs with quilts. North Carolina State University. Dept. of Computer Science. Watson, B. A., Brink, D., Stallmann, M., Devajaran, R., Rakow, M., Rhyne, T.-M., & Patel, H. (2008). Matrix depictions for large layered graphs (No. TR-2008-17). Dept. Computer Science, North Carolina State University. Kormilitsin, M., Chirkova, R., Fathi, Y., & Stallmann, M. (2008). View and index selection for query-performance improvement: quality-centered algorithms and heuristics. Proceedings of the 17th ACM conference on Information and knowledge management, 1329–1330. Talebi, Z. A., Chirkova, R., Fathi, Y., & Stallmann, M. (2008). Exact and inexact methods for selecting views and indexes for OLAP performance improvement. Proceedings of the 11th international conference on Extending database technology: Advances in database technology, 311–322. Kaltofen, E., & Koiran, P. (2008). Expressing a fraction of two determinants as a determinant. Proceedings of the twenty-first international symposium on Symbolic and algebraic computation - ISSAC '08. Presented at the the twenty-first international symposium. https://doi.org/10.1145/1390768.1390790 Kaltofen, E., Li, B., Yang, Z., & Zhi, L. (2008). Exact certification of global optimality of approximate factorizations via rationalizing sums-of-squares with floating point scalars. Proceedings of the twenty-first international symposium on Symbolic and algebraic computation - ISSAC '08. Presented at the the twenty-first international symposium. https://doi.org/10.1145/1390768.1390792 Gehringer, E. F. (2008). Understanding and relating to your international students. Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA. Gehringer, E. F. (2008). Damage control: What to do when things don’t work. Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA. Gehringer, E. F. (2008). Assessing students’ wiki contributions. Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA. Meneely, A., Williams, L., & Gehringer, E. F. (2008). Rose: A repository of education-friendly open-source projects. Proceedings of the 13th annual conference on Innovation and technology in computer science education - ITiCSE '08. Presented at the ITiCSE '08, Madrid, Spain. https://doi.org/10.1145/1384271.1384276 Orphanides, A. K. (2008, April 25). Extraction of natural-language dates and comparison of dates in hypothesis and text to identify negative textual entailment. University of North Carolina at Chapel Hill. Retrieved from https://ils.unc.edu/MSpapers/3403.pdf Lin, H. S., Balaji, P., Poole, R., Sosa, C., Ma, X. S., & Feng, W. C. (2008). Massively parallel genomic sequence search on the Blue Gene/P architecture. International Conference for High Performance Computing, Networking, Storage and Analysis, 522–532. Wang, C.-C., & Harfoush, K. (2008). Shortest-path routing in randomized DHT-based Peer-to-Peer systems. COMPUTER NETWORKS, 52(18), 3307–3317. https://doi.org/10.1016/j.comnet.2008.07.014 Breaux, T. D., Anton, A. I., & Doyle, J. (2008). Semantic Parameterization: A Process for Modeling Domain Descriptions. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2). https://doi.org/10.1145/1416563.1416565 Small, M. T., Atkins, C. E., Gordon, S. G., Birkenheuer, A. J., Booth-Sayer, M. A., Keene, B. W., … Miller, M. W. (2008). Use of a nitinol gooseneck snare catheter for removal of adult Dirofilaria immitis in two cats. JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 233(9), 1441–1445. https://doi.org/10.2460/javma.233.9.1441 Xiong, K., & Perros, H. (2008). Trustworthy Web services provisioning for differentiated customer services. TELECOMMUNICATION SYSTEMS, 39(3-4), 171–185. https://doi.org/10.1007/s11235-008-9126-9 Aouada, D., Dreisigmeyer, D. W., & Krim, H. (2008). Geometric modeling of rigid and non-rigid 3D shapes using the global geodesic function. Pattern Recognition, 935–942. https://doi.org/10.1109/cvprw.2008.4563075 Fourneau, J. M., Plateau, B., & Stewart, W. J. (2008). An algebraic condition for product form in stochastic automata networks without synchronizations. Performance Evaluation, 65(11-12), 854–868. https://doi.org/10.1016/j.peva.2008.04.007 Chen, B., Rouskas, G. N., & Dutta, R. (2008). On Hierarchical Traffic Grooming in WDM Networks. IEEE-ACM TRANSACTIONS ON NETWORKING, 16(5), 1226–1238. https://doi.org/10.1109/TNET.2007.906655 Layman, L., Williams, L., Slaten, K., Berenson, S., & Vouk, M. (2008). Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course. International Journal of Engineering Education, 24(4), 659–670. Rhee, L., Shin, M., Hong, S., Lee, K., & Chong, S. (2008). On the Levy-walk nature of human mobility. 27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 1597–1605. Wang, Z., Jiang, X. X., Cui, W. D., & Wang, X. Y. (2008). Countering persistent kernel rootkits through systematic hook discovery. Recent advances in intrusion detection, raid 2008, 5230, 21–38. Liu, D., Ning, P., Liu, A., Wang, C., & Du, W. K. (2008). Attack-resistant location estimation in wireless sensor networks. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4). https://doi.org/10.1145/1380564.1380570 Freeh, V. W., Kappiah, N., Lowenthal, D. K., & Bletsch, T. K. (2008). Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in MPI programs. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 68(9), 1175–1185. https://doi.org/10.1016/j.jpdc.2008.04.007 Ning, P., Liu, A., & Du, W. (2008). Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 4(1). https://doi.org/10.1145/1325651.1325652 Wilhelm, R., Engblom, J., Ermedahl, A., Holsti, N., Thesing, S., Whalley, D., … Stenstrom, P. (2008). [Review of The worst-case execution-time problem - Overview of methods and survey of tools]. ACM Transactions on Embedded Computing Systems, 7(3). Lee, D. H., Chen, Y., Lee, K.-A., & Hong, S. (2008). A differential HBT power cell and its model. MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, 50(9), 2262–2268. https://doi.org/10.1002/mop.23684 Gao, Y., Huang, A. Q., Krishnaswami, S., Richmond, J., & Agarwal, A. K. (2008). Comparison of static and switching characteristics of 1200 V 4H-SiCBJT and 1200 V Si-IGBT. IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, Vol. 44, pp. 887–893. https://doi.org/10.1109/TIA.2008.921408 Rhee, I., Warrier, A., Aia, M., Min, J., & Sichitiu, M. L. (2008). Z-MAC: A hybrid MAC for wireless sensor networks. IEEE-ACM TRANSACTIONS ON NETWORKING, 16(3), 511–524. https://doi.org/10.1109/TNET.2007.900704 Nagappan, N., Maximilien, E. M., Bhat, T., & Williams, L. (2008). Realizing quality improvement through test driven development: results and experiences of four industrial teams. EMPIRICAL SOFTWARE ENGINEERING, 13(3), 289–302. https://doi.org/10.1007/s10664-008-9062-z Watson, B., Mueller, P., Wonka, P., Sexton, C., Veryovka, O., & Fuller, A. (2008). Procedural urban modeling in practice. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 28(3), 18–26. https://doi.org/10.1109/MCG.2008.58 Watson, B., & Wonka, P. (2008). Procedural methods for urban modeling. IEEE COMPUTER GRAPHICS AND APPLICATIONS, Vol. 28, pp. 16–17. https://doi.org/10.1109/mcg.2008.57 Zhu, Y., & Mueller, F. (2008). Exploiting synchronous and asynchronous DVS for feedback EDF scheduling on an embedded platform. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 7(1). https://doi.org/10.1145/1324969.1324972 Savage, C. D., & Yee, A. J. (2008). Euler's partition theorem and the combinatorics of l-sequences. JOURNAL OF COMBINATORIAL THEORY SERIES A, 115(6), 967–996. https://doi.org/10.1016/j.jcta.2007.11.006 Csallner, C., Smaragdakis, Y., & Xie, T. (2008). DSD-Crasher: A hybrid analysis tool for bug finding. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, Vol. 17. https://doi.org/10.1145/1348250.1348254 Pan, C., Oda, Y., Lankford, P. K., Zhang, B., Samatova, N. F., Pelletier, D. A., … Hettich, R. L. (2008). Characterization of anaerobic catabolism of p-coumarate in Rhodopseudomonas palustris by integrating transcriptomics and quantitative proteomics. MOLECULAR & CELLULAR PROTEOMICS, 7(5), 938–948. https://doi.org/10.1074/mcp.M700147-MCP200 Gao, Y., Huang, A. Q., Agarwal, A. K., & Zhang, Q. (2008). Theoretical and experimental analyses of safe operating area (SOA) of 1200-V 4H-SiC BJT. IEEE TRANSACTIONS ON ELECTRON DEVICES, 55(8), 1887–1893. https://doi.org/10.1109/TED.2008.926682 Liu, D., Ning, P., & Du, W. (2008). Group-based key predistribution for wireless sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 4(2). https://doi.org/10.1145/1340771.1340777 El Ouafdi, A. F., Ziou, D., & Krim, H. (2008, July). A smart stochastic approach for manifolds smoothing. COMPUTER GRAPHICS FORUM, Vol. 27, pp. 1357–1364. https://doi.org/10.1111/j.1467-8659.2008.01275.x St Amant, R., & Horton, T. E. (2008). Revisiting the definition of animal tool use. Animal Behaviour, 75(4), 1199–1208. https://doi.org/10.1016/j.anbehav.2007.09.028 Hwang, H. Y., Kim, S. J., Sung, D. K., & Song, N.-O. (2008). Performance analysis of IEEE 802.11e EDCA with a virtual collision handier. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 57(2), 1293–1297. https://doi.org/10.1109/TVT.2007.911611 Chopra, P., Kang, J., Yang, J., Cho, H., Kim, H. S., & Lee, M. G. (2008). Microarray data mining using landmark gene-guided clustering. BMC Bioinformatics, 9. Bouabdallah, N., Pujolle, G., & Perros, H. (2008). Multipoint-to-point lightpaths in all-optical networks: Dimensioning and cost analysis. PERFORMANCE EVALUATION, 65(3-4), 262–285. https://doi.org/10.1016/j.peva.2007.06.021 Kaltofen, E., May, J. P., Yang, Z., & Zhi, L. (2008). Approximate factorization of multivariate polynomials using singular value decomposition. JOURNAL OF SYMBOLIC COMPUTATION, 43(5), 359–376. https://doi.org/10.1016/j.jsc.2007.11.005 Zhang, Q., Yu, T., & Ning, P. (2008, March). A framework for identifying compromised nodes in wireless sensor networks. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11. https://doi.org/10.1145/1341731.1341733 Harris, C., Gehrke, T., Weeks, T. W., & Basceri, C. (2008). Method of manufacturing gallium nitride based high-electron mobility devices. Washington, DC: U.S. Patent and Trademark Office. Harris, C., Gehrke, T., Weeks, T. W., & Basceri, C. (2008). Gallium nitride based high-electron mobility devices. Washington, DC: U.S. Patent and Trademark Office. Shin, M., Chong, S., & Rhee, I. (2008, April). Dual-resource TCP/AQM for processing-constrained networks. IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 16, pp. 435–449. https://doi.org/10.1109/TNET.2007.900415 Wurman, P. R., D'Andrea, R., & Mountz, M. (2008). Coordinating hundreds of cooperative, autonomous vehicles in warehouses. AI Magazine, 29(1), 9–19. Zhang, B., Park, B.-H., Karpinets, T., & Samatova, N. F. (2008). From pull-down data to protein interaction networks and complexes with biological relevance. BIOINFORMATICS, 24(7), 979–986. https://doi.org/10.1093/bioinformatics/btn036 Sbeity, I., Brenner, L., Plateau, B., & Stewart, W. J. (2008). Phase-type distributions in stochastic automata networks. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 186(3), 1008–1028. https://doi.org/10.1016/j.ejor.2007.02.019 Alspaugh, T. A., & Anton, A. I. (2008). Scenario support for effective requirements. INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220. https://doi.org/10.1016/j.infsof.2006.12.003 McQuiggan, S. W., Mott, B. W., & Lester, J. C. (2008). Modeling self-efficacy in intelligent tutoring systems: An inductive approach. USER MODELING AND USER-ADAPTED INTERACTION, 18(1-2), 81–123. https://doi.org/10.1007/s11257-007-9040-y Wellenius, P., Suresh, A., & Muth, J. F. (2008). Bright, low voltage europium doped gallium oxide thin film electroluminescent devices. APPLIED PHYSICS LETTERS, 92(2). https://doi.org/10.1063/1.2824846 Gu, X., Wen, Z., Yu, P. S., & Shae, Z.-Y. (2008). peerTalk: A peer-to-peer multiparty voice-over-IP system. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 19(4), 515–528. https://doi.org/10.1109/TPDS.2007.70766 Healey, C. G., Kocherlakota, S., Rao, V., Mehta, R., & Amant, R. S. (2008). Visual perception and mixed-initiative interaction for assisted visualization design. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 14(2), 396–411. https://doi.org/10.1109/TVCG.2007.70436 Ripeanu, M., Singh, M. P., & Vazhkudai, S. S. (2008). Virtual organizations. IEEE INTERNET COMPUTING, Vol. 12, pp. 10–12. https://doi.org/10.1109/mic.2008.48 Chakravarty, P., & Singh, M. P. (2008). Incorporating events into cross-organizational business processes. IEEE INTERNET COMPUTING, 12(2), 46–53. https://doi.org/10.1109/MIC.2008.35 Breaux, T. D., & Anton, A. I. (2008). Analyzing regulatory rules for privacy and security requirements. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20. https://doi.org/10.1109/TSE.2007.70746 Di Penta, M., Lombardi, P., Taneja, K., & Troiano, L. (2008). Search-based inference of dialect grammars. Soft Computing (Berlin, Germany), 12(1), 51–66.