Computer Science - 2012 Barrera, D., Enck, W., & Oorschot, P. C. (2012). Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. IEEE MoST: Mobile Security Technologies Workshop. Tendulkar, V., Snyder, R., Pletcher, J., Butler, K., Shashidharan, A., & Enck, W. (2012). Abusing cloud-based browsers for fun and profit. Proceedings of the 28th Annual Computer Security Applications Conference, 219–228. Carter, M., Fornaro, R., Heckman, S. S., & Heil, M. (2012). Developing a learning progression that integrates communication in an undergraduate CD/SE curriculum. North Carolina State University. Dept. of Computer Science. Borges, M., d’Amorim, M., Anand, S., Bushnell, D. H., & Pasareanu, C. S. (2012). Symbolic Execution with Interval Solving and Meta-heuristic Search. Fifth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Montreal, QC, Canada, April 17-21, 2012, 111–120. https://doi.org/10.1109/ICST.2012.91 Antoniol, G., Bertolino, A., & Labiche, Y. (Eds.). (2012). Fifth IEEE International Conference on Software Testing, Verification and Validation, ICST 2012, Montreal, QC, Canada, April 17-21, 2012. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6200016 El-Bawab, T. S., Esfandiari, M., Rouskas, G., Jayasumana, A., Kincaid, M., Effenberger, F., … Baniewicz, P. (2012). TOWARD SPECIALIZED UNDERGRADUATE TELECOMMUNICATION ENGINEERING EDUCATION IN THE US. Ieee Communications Magazine, 50(9), 14–16. Liu, Q., Guo, Z., & Wang, J. (2012). A one-layer recurrent neural network for constrained pseudoconvex optimization and its application for dynamic portfolio optimization. Neural Networks, 26, 99–109. https://doi.org/10.1016/j.neunet.2011.09.001 Guo, Y., Sun, F., & Guo, Z. (2012). Control Allocation of Flying-Wing with Multi-Effectors Based on T-S Fuzzy Model. In International Conference on Mechanical and Electrical Technology, 3rd, (ICMET-London 2011), Volumes 1–3 (pp. 231–235). https://doi.org/10.1115/1.859810.paper38 Liu, E. Y., Guo, Z., Zhang, X., Jojic, V., & Wang, W. (2012). Metric Learning from Relative Comparisons by Minimizing Squared Residual. Presented at the 2012 IEEE 12th International Conference on Data Mining (ICDM). https://doi.org/10.1109/icdm.2012.38 Liu, J. Q., Song, K., Pan, T., Zha, J. H., Fan, Y., & Zhong, C. (2012). Ultra-wideband (UWB) bandpass filter with inductance-loaded Y-shaped multiple-mode resonator. The 2012 International Workshop on Microwave and Millimeter Wave Circuits and System Technology, 1–4. Li, Q., Luo, Y. L., Zha, J. H., & Liu, J. Q. (2012). A novel power dependent input distribution network for Doherty amplifier efficiency improvement. The 2012 International Workshop on Microwave and Millimeter Wave Circuits and System Technology, 1–3. Liu, J. Q., Song, K. J., & Fan, Y. (2012). UWB BPF with triple notched bands using novel dual-mode SIR and asymmetrical coupling structure. Journal of Electromagnetic Waves and Applications, 26(16), 2112–2120. Zha, J. H., Luo, Y. L., Li, Q., & Liu, J. Q. (2012). A Doherty power amplifier with an improved $π$-type output network. The 2012 International Workshop on Microwave and Millimeter Wave Circuits and System Technology, 1–4. Karpouzis, K., Yannakakis, G., Paiva, A., Nielsen, J. H., Vasalou, A., & Jhala, A. (2012). User modelling and adaptive, natural interaction for conflict resolution. Proceedings of the 12th IEEE International Conference on Advanced Learning Technologies, ICALT 2012, 692–693. https://doi.org/10.1109/ICALT.2012.234 Chen, S., Duensing, A., Kong, P., Jhala, A., Wardrip-Fruin, N., & Mateas, M. (2012). RoleModelVis: A visualization of logical story models. Proceedings of the 8th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2012, 198–199. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883084862&partnerID=MN8TOARS Bulitko, V., Riedl, M., Jhala, A., Buro, M., & Sturtevant, N. (2012). Recap of the seventh AAAI conference on artificial intelligence and interactive digital entertainment (AIIDE). AI Magazine, 33(1), 51–54. https://doi.org/10.1609/aimag.v33i1.2399 Swanson, R., & Jhala, A. (2012). Rich computational model of conflict for virtual characters. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 502–504). https://doi.org/10.1007/978-3-642-33197-8-59 Swanson, R., Escoffery, D., & Jhala, A. (2012). Learning visual composition preferences from an annotated corpus generated through gameplay. 2012 IEEE Conference on Computational Intelligence and Games, CIG 2012, 363–370. https://doi.org/10.1109/CIG.2012.6374178 Weber, B. G., Mateas, M., & Jhala, A. (2012). Learning from demonstration for goal-driven autonomy. Proceedings of the National Conference on Artificial Intelligence, 2, 1176–1182. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84868271383&partnerID=MN8TOARS Componation, P. J., Collopy, P. D., Reed, G. S., Shapiro, D., & Jhala, A. (2012). Development of a research agenda to explore value-based software design. Annual International Conference of the American Society for Engineering Management 2012, ASEM 2012 - Agile Management: Embracing Change and Uncertainty in Engineering Management, 820–830. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883343870&partnerID=MN8TOARS Gehringer, E. F. (2012). Applications for supporting collaboration in the classroom. Proceedings of the 2012 ASEE Annual Conference and Exposition, (2012-4769). American Society for Engineering Education. Nickel, A., Kinsey, H., Barnes, T., & Wartell, Z. (2012). Supporting an Interval Training Program with the Astrojumper Video Game. Electronic Proceedings of Meaningful Play 2012. Presented at the Meaningful Play 2012, East Lansing, MI, USA. Retrieved from https://meaningfulplay.msu.edu/proceedings2012/mp2012_submission_118.pdf Eagle, M., Johnson, M., & Barnes, T. (2012). Interaction networks: generating high level hints based on network community clusterings. Proceedings of the 5th International Conference on Educational Data Mining (EDM 2012), 164–167. Chania, Greece. Toyose, H., Nishino, N., Asaba, N., & Matsuda, N. (2012). An empirical study on the effect of Kansei-database for middle school students to learn Waka-reading comprehension. Japan Journal of Educational Technology, 36(2), 125–134. Padia, K., AlNoamany, Y., & Weigle, M. C. (2012). Visualizing digital collections at archive-it. Proceedings of the 12th ACM/IEEE-CS joint conference on Digital Libraries, 15–18. Secure Logging and Auditing in Electronic Health Records Systems: What Can We Learn from the Payment Card Industry. (2012). Presented as part of the 3rd USENIX Workshop on Health Security and Privacy. Presented at the Bellevue, WA. Retrieved from https://www.usenix.org/conference/healthsec12/workshop-program/presentation/King King, J. T., Smith, B., & Williams, L. (2012). Modifying Without a Trace: General Audit Guidelines Are Inadequate for Open-source Electronic Health Record Audit Mechanisms. Proceedings of the 2Nd ACM SIGHIT International Health Informatics Symposium, 305–314. https://doi.org/10.1145/2110363.2110399 King, J., Smith, B., & Williams, L. (2012). Audit Mechanisms in Electronic Health Record Systems: Protected Health Information May Remain Vulnerable to Undetected Misuse. 3(2), 23–42. https://doi.org/10.4018/jcmam.2012040102 Gehringer, E. F. (2012). Applications for supporting collaboration in the classroom. 2012 ASEE Annual Conference & Exposition. Presented at the 2012 ASEE Annual Conference & Exposition, San Antonio, TX. https://doi.org/10.18260/1-2--20956 Keung, J., Kocaguneli, E., & Menzies, T. (2012). Finding conclusion stability for selecting the best effort predictor in software effort estimation. Automated Software Engineering, 20(4), 543–567. https://doi.org/10.1007/S10515-012-0108-5 Singh, M. P. (2012). Commitments in Multiagent Systems: Some History, Some Confusions, Some Controversies, Some Prospects. In F. Paglieri, L. Tummolini, R. Falcone, & M. Miceli (Eds.), The Goals of Cognition: Essays in Honour of Cristiano Castelfranchi (pp. 613–638). Retrieved from https://www.csc2.ncsu.edu/faculty/mpsingh/papers/mas/Commitments-for-MAS.pdf Vouk, M. A. (2012). A Note on Uncertainty in Real-Time Analytics. In A. M. Dienstfrey & R. F. Boisvert (Eds.), Uncertainty Quantification in Scientific Computing. WoCoUQ 2011 (pp. 312–318). https://doi.org/10.1007/978-3-642-32677-6_20 Shen, X., Liu, Y., Zhang, E. Z., & Bhamidipati, P. (2012). An Infrastructure for Tackling Input-Sensitivity of GPU Program Optimizations. International Journal of Parallel Programming, 41(6), 855–869. https://doi.org/10.1007/S10766-012-0236-3 Parnin, C., Bird, C., & Murphy-Hill, E. (2012). Adoption and use of Java generics. Empirical Software Engineering, 18(6), 1047–1089. https://doi.org/10.1007/S10664-012-9236-6 Balakrishnan, S., Rinaldo, A., Singh, A., Sheehy, D. R., & Wasserman, L. (2012). Minimax Rates for Homology Inference. AISTATS: AI and Statistics. Presented at the 15th International Conference on Artificial Intelligence and Statistics, La Palma, Canary Islands. Sheehy, D. R. (2012). A Multicover Nerve for Geometric Inference. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Charlottetown, Prince Edward Island. Vatsavai, R. R., & Graesser, J. (2012). Probabilistic Change Detection Framework for Analyzing Settlement Dynamics Using Very High-resolution Satellite Imagery. Procedia Computer Science, 9, 907–916. https://doi.org/10.1016/j.procs.2012.04.097 Zhang, E. Z., Jiang, Y., & Shen, X. (2012). The Significance of CMP Cache Sharing on Contemporary Multithreaded Applications. IEEE Transactions on Parallel and Distributed Systems, 23(2), 367–374. https://doi.org/10.1109/TPDS.2011.130 Guo, Z., Wu, B., & Shen, X. (2012). One stone two birds. Proceedings of the 26th ACM international conference on Supercomputing - ICS '12. Presented at the the 26th ACM international conference. https://doi.org/10.1145/2304576.2304583 Wu, B., Zhao, Z., Shen, X., Jiang, Y., Gao, Y., & Silvera, R. (2012). Exploiting inter-sequence correlations for program behavior prediction. Proceedings of the ACM international conference on Object oriented programming systems languages and applications - OOPSLA '12. Presented at the the ACM international conference. https://doi.org/10.1145/2384616.2384678 Scafuro, A., & Visconti, I. (2012). On Round-Optimal Zero Knowledge in the Bare Public-Key Model. In Advances in Cryptology – EUROCRYPT 2012 (pp. 153–171). https://doi.org/10.1007/978-3-642-29011-4_11 Cho, C., Ostrovsky, R., Scafuro, A., & Visconti, I. (2012). Simultaneously Resettable Arguments of Knowledge. In Theory of Cryptography (pp. 530–547). https://doi.org/10.1007/978-3-642-28914-9_30 Menzies, T., & Shepperd, M. (2012). Special issue on repeatable results in software engineering prediction. Empirical Software Engineering, 17(1-2), 1–17. https://doi.org/10.1007/S10664-011-9193-5 Kim, Y. S., Kang, B. H., Ryu, S. H., Compton, P., Han, S. C., & Menzies, T. (2012). Crowd-Sourced Knowledge Bases. In Knowledge Management and Acquisition for Intelligent Systems (pp. 258–271). https://doi.org/10.1007/978-3-642-32541-0_23 Ware, S. G., Young, R. M., Harrison, B., & Roberts, D. L. (2012). Four Quantitative Metrics Describing Narrative Conflict. In Interactive Storytelling (pp. 18–29). https://doi.org/10.1007/978-3-642-34851-8_2 Fendt, M. W., Harrison, B., Ware, S. G., Cardona-Rivera, R. E., & Roberts, D. L. (2012). Achieving the Illusion of Agency. In Interactive Storytelling (pp. 114–125). https://doi.org/10.1007/978-3-642-34851-8_11 Jenkins, J., Arkatkar, I., Lakshminarasimhan, S., Shah, N., Schendel, E. R., Ethier, S., … Samatova, N. F. (2012). Analytics-Driven Lossless Data Compression for Rapid In-situ Indexing, Storing, and Querying. In Lecture Notes in Computer Science (pp. 16–30). https://doi.org/10.1007/978-3-642-32597-7_2 Fiala, D., Ferreira, K. B., Mueller, F., & Engelmann, C. (2012). A Tunable, Software-Based DRAM Error Detection and Correction Library for HPC. In Euro-Par 2011: Parallel Processing Workshops (pp. 251–261). https://doi.org/10.1007/978-3-642-29740-3_29 Mueller, F., Wu, X., Schulz, M., de Supinski, B. R., & Gamblin, T. (2012). ScalaTrace: Tracing, Analysis and Modeling of HPC Codes at Scale. In Applied Parallel and Scientific Computing (pp. 410–418). https://doi.org/10.1007/978-3-642-28145-7_40 Swanson, R., & Jhala, A. (2012). Rich Computational Model of Conflict for Virtual Characters. In Intelligent Virtual Agents (pp. 502–504). https://doi.org/10.1007/978-3-642-33197-8_59 Meluso, A., Zheng, M., Spires, H. A., & Lester, J. (2012). Enhancing 5th graders’ science content knowledge and self-efficacy through game-based learning. Computers & Education, 59(2), 497–504. https://doi.org/10.1016/j.compedu.2011.12.019 Grafsgaard, J. F., Boyer, K. E., & Lester, J. C. (2012). Toward a Machine Learning Framework for Understanding Affective Tutorial Interaction. In Intelligent Tutoring Systems (pp. 52–58). https://doi.org/10.1007/978-3-642-30950-2_7 Lee, S. Y., Mott, B. W., & Lester, J. C. (2012). Real-Time Narrative-Centered Tutorial Planning for Story-Based Learning. In Intelligent Tutoring Systems (pp. 476–481). https://doi.org/10.1007/978-3-642-30950-2_61 Sabourin, J., Rowe, J., Mott, B. W., & Lester, J. C. (2012). Exploring Inquiry-Based Problem-Solving Strategies in Game-Based Learning Environments. In Intelligent Tutoring Systems (pp. 470–475). https://doi.org/10.1007/978-3-642-30950-2_60 Shores, L. R., Hoffmann, K. F., Nietfeld, J. L., & Lester, J. C. (2012). The Role of Sub-problems: Supporting Problem Solving in Narrative-Centered Learning Environments. In Intelligent Tutoring Systems (pp. 464–469). https://doi.org/10.1007/978-3-642-30950-2_59 Sabourin, J., Shores, L. R., Mott, B. W., & Lester, J. C. (2012). Predicting Student Self-regulation Strategies in Game-Based Learning Environments. In Intelligent Tutoring Systems (pp. 141–150). https://doi.org/10.1007/978-3-642-30950-2_19 Reaves, B., & Morris, T. (2012). Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. International Journal of Critical Infrastructure Protection, 5(3-4), 154–174. https://doi.org/10.1016/j.ijcip.2012.10.001 Reaves, B., & Morris, T. (2012). An open virtual testbed for industrial control system security research. International Journal of Information Security, 11(4), 215–229. https://doi.org/10.1007/S10207-012-0164-7 Scan-Sharing for Optimizing RDF Graph Pattern Matching on MapReduce. (2012). 2012 IEEE Fifth International Conference on Cloud Computing. https://doi.org/10.1109/cloud.2012.14 To nest or not to nest, when and how much. (2012). Proceedings of the 4th International Workshop on Semantic Web Information Management - SWIM '12. https://doi.org/10.1145/2237867.2237872 Hong, S., & Anyanwu, K. (2012). HIP: Information Passing for Optimizing Join-Intensive Data Processing Workloads on Hadoop. In Lecture Notes in Computer Science (pp. 384–391). https://doi.org/10.1007/978-3-642-32597-7_33 QoS-aware service selection in virtualization-based Cloud computing. (2012). 2012 14th Asia-Pacific Network Operations and Management Symposium (APNOMS). https://doi.org/10.1109/apnoms.2012.6356046 Huang, R., Chirkova, R., & Fathi, Y. (2012). Deterministic View Selection for Data-Analysis Queries: Properties and Algorithms. In Advances in Databases and Information Systems (pp. 195–208). https://doi.org/10.1007/978-3-642-33074-2_15 Lee, D., & Krim, H. (2012). System Identification: 3D Measurement Using Structured Light System. In Advanced Concepts for Intelligent Vision Systems (pp. 1–11). https://doi.org/10.1007/978-3-642-33140-4_1 Miller, S. A., Smith, A., Bahram, S., & St. Amant, R. (2012). A glove for tapping and discrete 1D/2D input. International Conference on Intelligent User Interfaces, Proceedings IUI, 101–104. https://doi.org/10.1145/2166966.2166986 Matsuda, N., Cohen, W. W., Koedinger, K. R., Keiser, V., Raizada, R., Yarzebinski, E., … Stylianides, G. (2012). Studying the effect of tutor learning using a teachable agent that asks the student tutor for explanations. Proceedings 2012 4th IEEE International Conference on Digital Game and Intelligent Toy Enhanced Learning, DIGITEL 2012, 25–32. https://doi.org/10.1109/DIGITEL.2012.12 Matsuda, N., Yarzebinski, E., Keiser, V., Raizada, R., Stylianides, G., & Koedinger, K. R. (2012). Motivational factors for learning by teaching: The effect of a competitive game show in a virtual peer-Learning Environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 101–111). https://doi.org/10.1007/978-3-642-30950-2_14 Carlson, R., Keiser, V., Matsuda, N., Koedinger, K. R., & Penstein Rosé, C. (2012). Building a conversational simstudent. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 563–569). https://doi.org/10.1007/978-3-642-30950-2_73 Namatame, M., & Matsuda, N. (2012). An application of peer review for art education: A tablet PC becomes a language for students who are hard of hearing. Proceedings 2012 17th IEEE International Conference on Wireless, Mobile and Ubiquitous Technology in Education, WMUTE 2012, 190–192. https://doi.org/10.1109/WMUTE.2012.43 Ogan, A., Finkelstein, S., Mayfield, E., D’Adamo, C., Matsuda, N., & Cassell, J. (2012). "Oh, dear Stacy!" Social interaction, elaboration, and learning with teachable agents. Conference on Human Factors in Computing Systems - Proceedings, 39–48. https://doi.org/10.1145/2207676.2207684 Boyce, A., Campbell, A., Pickford, S., Culler, D., & Barnes, T. (2012). Maximizing learning and guiding behavior in free play user generated content environments. Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education - ITiCSE '12. Presented at the the 17th ACM annual conference. https://doi.org/10.1145/2325296.2325303 Nickel, A., Kinsey, H., Haack, H., Pendergrass, M., & Barnes, T. (2012). Interval training with Astrojumper. 2012 IEEE Virtual Reality (VR). Presented at the 2012 IEEE Virtual Reality (VR). https://doi.org/10.1109/vr.2012.6180931 Doran, K., Boyce, A., Hicks, A., Payton, J., & Barnes, T. (2012). Creation of a game-based digital layer for increased museum engagement among digital natives. 2012 Second International Workshop on Games and Software Engineering: Realizing User Engagement with Game Engineering Techniques (GAS). Presented at the 2012 2nd International Workshop on Games and Software Engineering (GAS). https://doi.org/10.1109/gas.2012.6225924 Eagle, M. J., & Barnes, T. (2012). A learning objective focused methodology for the design and evaluation of game-based tutors. Proceedings of the 43rd ACM technical symposium on Computer Science Education - SIGCSE '12. Presented at the the 43rd ACM technical symposium. https://doi.org/10.1145/2157136.2157170 Powell, E., Brinkman, R., Barnes, T., & Catete, V. (2012). Table tilt. Proceedings of the International Conference on the Foundations of Digital Games - FDG '12, 242–245. https://doi.org/10.1145/2282338.2282386 Jin, W., Barnes, T., Stamper, J., Eagle, M. J., Johnson, M. W., & Lehmann, L. (2012). Program Representation for Automatic Hint Generation for a Data-Driven Novice Programming Tutor. In Intelligent Tutoring Systems (pp. 304–309). https://doi.org/10.1007/978-3-642-30950-2_40 Johnson, M. W., Okimoto, T., & Barnes, T. (2012). Leveraging Game Design to Promote Effective User Behavior of Intelligent Tutoring Systems. In Intelligent Tutoring Systems (pp. 597–599). https://doi.org/10.1007/978-3-642-30950-2_82 Lehmann, L., Wilson, D.-M., & Barnes, T. (2012). Using Individualized Feedback and Guided Instruction via a Virtual Human Agent in an Introductory Computer Programming Course. In Intelligent Tutoring Systems (pp. 612–614). https://doi.org/10.1007/978-3-642-30950-2_87 Eagle, M. J., & Barnes, T. (2012). Data-Driven Method for Assessing Skill-Opportunity Recognition in Open Procedural Problem Solving Environments. In Intelligent Tutoring Systems (pp. 615–617). https://doi.org/10.1007/978-3-642-30950-2_88 Doran, K., Boyce, A., Finkelstein, S., & Barnes, T. (2012). Outreach for improved student performance. Proceedings of the 17th ACM annual conference on Innovation and technology in computer science education - ITiCSE '12. Presented at the the 17th ACM annual conference. https://doi.org/10.1145/2325296.2325348 Sheehy, D. R. (2012). New Bounds on the Size of Optimal Meshes. Computer Graphics Forum, 31(5), 1627–1635. https://doi.org/10.1111/j.1467-8659.2012.03168.x Sheehy, D. R. (2012). Linear-size approximations to the vietoris-rips filtration. Proceedings of the 2012 symposuim on Computational Geometry - SoCG '12. Presented at the the 2012 symposuim. https://doi.org/10.1145/2261250.2261286 Tang, Y., Hang, C.-W., Parsons, S., & Singh, M. (2012). Towards argumentation with symbolic dempster-shafer evidence. In Frontiers in Artificial Intelligence and Applications (Vol. 245, pp. 462–469). https://doi.org/10.3233/978-1-61499-111-3-462 Chopra, A. K., & Singh, M. P. (2012). The evolution of interoperability. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 90–94). https://doi.org/10.1007/978-3-642-29113-5_8 Telang, P. R., & Singh, M. P. (2012). Specifying and verifying cross-organizational business models: An agent-oriented approach. IEEE Transactions on Services Computing, 5(3), 305–318. https://doi.org/10.1109/TSC.2011.4 Singh, M. P. (2012). Semantics and Verification of Information-Based Protocols. AAMAS '12: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, 2, 1149–1156. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899461141&partnerID=MN8TOARS Telang, P. R., Singh, M. P., & Yorke-Smith, N. (2012). Relating goal and commitment semantics. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 22–37). https://doi.org/10.1007/978-3-642-31915-0_2 Telang, P. R., & Singh, M. P. (2012). Comma: A Commitment-Based Business Modeling Methodology and its Empirical Evaluation. AAMAS '12: Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems, 2, 1073–1080. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899460865&partnerID=MN8TOARS Brazier, F., Dignum, V., Huhns, M. N., Derksen, C., Dignum, F., Lessner, T., … Singh, M. P. (2012). Agent-based organisational governance of services. Multiagent and Grid Systems, 8(1), 3–18. https://doi.org/10.3233/MGS-2012-0187 Manavalan, P., & Singh, M. P. (2012). Emerging Properties of Knowledge Sharing Referral Networks: Considerations of Effectiveness and Fairness. In Lecture Notes in Computer Science: Vol. 6573 LNAI (pp. 13–23). https://doi.org/10.1007/978-3-642-31809-2_2 Feng, Z., Pelechrinis, K., Krishnamurthy, S., Swami, A., Wu, F., & Singh, M. P. (2012). Collaborative assessment of functional reliability in wireless networks. 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 425–433. https://doi.org/10.1109/MASS.2012.6502543 Hang, C.-W., Kalia, A. K., & Singh, M. P. (2012). Behind the curtain: Service selection via trust in composite services. Proceedings - 2012 IEEE 19th International Conference on Web Services, ICWS 2012, 9–16. https://doi.org/10.1109/ICWS.2012.96 Parsons, S., Atkinson, K., Haigh, K., Levitt, K., McBurney, P., Rowe, J., … Sklar, E. (2012). Argument schemes for reasoning about trust. In Frontiers in Artificial Intelligence and Applications (Vol. 245, pp. 430–441). https://doi.org/10.3233/978-1-61499-111-3-430 Stallmann, M. F. (2012). A heuristic for bottleneck crossing minimization and its performance on general crossing minimization: Hypothesis and experimental study. Journal of Experimental Algorithmics (JEA), 17, 1–3. Gopalan, R., Antón, A., & Doyle, J. (2012). UCON LEGAL. Proceedings of the 2nd ACM SIGHIT symposium on International health informatics - IHI '12, 227–236. https://doi.org/10.1145/2110363.2110391 Wicker, A. W., & Doyle, J. (2012). Leveraging Multiple Mechanisms for Information Propagation. Advanced Agent Technology, pp. 1–2. https://doi.org/10.1007/978-3-642-27216-5_1 Guo, F., Kaltofen, E. L., & Zhi, L. (2012). Certificates of impossibility of Hilbert-Artin representations of a given degree for definite polynomials and functions. Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation - ISSAC '12. Presented at the the 37th International Symposium. https://doi.org/10.1145/2442829.2442859 Comer, M. T., Kaltofen, E. L., & Pernet, C. (2012). Sparse polynomial interpolation and Berlekamp/Massey algorithms that correct outlier errors in input values. Proceedings of the 37th International Symposium on Symbolic and Algebraic Computation - ISSAC '12. Presented at the the 37th International Symposium. https://doi.org/10.1145/2442829.2442852 Kaltofen, E. L., Li, B., Yang, Z., & Zhi, L. (2012). Exact certification in global polynomial optimization via sums-of-squares of rational functions with rational coefficients. Journal of Symbolic Computation, 47(1), 1–15. https://doi.org/10.1016/j.jsc.2011.08.002 Ramachandran, L., & Gehringer, E. F. (2012). An automated approach to assessing the quality of code reviews. Proceedings of the 2012 ASEE Annual Conference and Exposition. Presented at the 2012 ASEE Annual Conference and Exposition, San Antonio, TX. Ramachandran, L., & Gehringer, E. F. (2012). Automatic quality assessment for peer reviews of student work. 2012 ASEE Annual Conference & Exposition. Presented at the 2012 ASEE Annual Conference & Exposition, San Antonio, TX. https://doi.org/10.18260/1-2--21005 Iyengar, B., Gehringer, E., Wolf, M., & Manivannan, K. (2012). Scalable concurrent and parallel mark. Proceedings of the 2012 international symposium on Memory Management - ISMM '12. Presented at the the 2012 international symposium. https://doi.org/10.1145/2258996.2259006 Iyengar, B., Tene, G., Wolf, M., & Gehringer, E. (2012). The Collie. Proceedings of the 2012 international symposium on Memory Management - ISMM '12. Presented at the the 2012 international symposium. https://doi.org/10.1145/2258996.2259009 Ramachandran, L., & Gehringer, E. F. (2012). A word-order based graph representation for relevance identification. Proceedings of the 21st ACM international conference on Information and knowledge management - CIKM '12. Presented at the the 21st ACM international conference. https://doi.org/10.1145/2396761.2398632 The effects of construction related costs on the optimization of steel frames. (2012). Structural Engineering and Mechanics, 43(1), 31–51. https://doi.org/10.12989/sem.2012.43.1.031 Chirkova, R., & Yang, J. (2012). Materialized views. Boston, [Massachusetts]: now Pub. Deuskar, G., Pathak, P. H., & Dutta, R. (2012). Packet aggregation based back-pressure scheduling in multi-hop wireless networks. 2012 ieee wireless communications and networking conference (wcnc), 1263–1268. https://doi.org/10.1109/wcnc.2012.6213972 Oh, Y. H., & Thuente, D. J. (2012). Enhanced security of random seed DSSS algorithms against seed jamming attacks. 2012 ieee global communications conference (globecom), 801–806. https://doi.org/10.1109/glocom.2012.6503211 Liu, Z. Y., & Rouskas, G. (2012). A fast path-based ILP formulation for offline RWA in mesh optical networks. 2012 ieee global communications conference (globecom), 2990–2995. https://doi.org/10.1109/glocom.2012.6503572 Sarkar, A., Mueller, F., & Ramaprasad, H. (2012). Static task partitioning for locked caches in multi-core real-time systems. Cases'12: proceedings of the 2012 ACM International Conference on Compilers, Architectures and Synthesis for Embedded Systems, 161–170. https://doi.org/10.1145/2380403.2380434 Bouterse, B., & Perros, H. (2012). Scheduling cloud capacity for time- varying customer demand. 2012 IEEE 1st International Conference on Cloud Networking (cloudnet). https://doi.org/10.1109/cloudnet.2012.6483668 Gonzalez, D. L., II, Chen, Z., Tetteh, I. K., Pansombut, T., Semazzi, F., Kumar, V., … Samatova, N. F. (2012). Hierarchical Classifier-Regression Ensemble for Multi-Phase Non-Linear Dynamic System Response Prediction: Application to Climate Analysis. 12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2012), pp. 781–788. https://doi.org/10.1109/icdmw.2012.133 Wang, H., Liu, Z. Y., & Rouskas, G. N. (2012). Scalable traffic grooming in optical networks. 2012 asia communications and photonics conference (acp). Grafsgaard, J. F., Fulton, R. M., Boyer, K. E., Wiebe, E. N., & Lester, J. C. (2012). Multimodal analysis of the implicit affective channel in computer-mediated textual communication. ICMI '12: Proceedings of the ACM International Conference on Multimodal Interaction, 145–152. https://doi.org/10.1145/2388676.2388708 Anjum, B., & Perros, H. (2012). End-to-end delay percentiles for video traces using a MAP2 approximation. 2012 15th International Telecommunications Network Strategy and Planning Symposium (NETWORKS). https://doi.org/10.1109/netwks.2012.6381676 Fiala, D., Mueller, F., Engelmann, C., Riesen, R., Ferreira, K., & Brightwell, R. (2012). Detection and correction of silent data corruption for large-scale high-performance computing. International conference for high performance computing networking. https://doi.org/10.1109/sc.2012.49 Jenkins, J., Schendel, E. R., Lakshminarasimhan, S., Boyuka, D. A., Rogers, T., Ethier, S., … Samatova, N. F. (2012). Byte-precision level of detail processing for variable precision analytics. International conference for high performance computing networking. https://doi.org/10.1109/sc.2012.26 Iyengar, B., Tene, G., Wolf, M., & Gehringer, E. (2012, November). The Collie: A Wait-Free Compacting Collector. ACM SIGPLAN NOTICES, Vol. 47, pp. 85–95. https://doi.org/10.1145/2426642.2259009 Iyengar, B., Gehringer, E., Wolf, M., & Manivannan, K. (2012, November). Scalable Concurrent and Parallel Mark. ACM SIGPLAN NOTICES, Vol. 47, pp. 61–71. https://doi.org/10.1145/2426642.2259006 Selvanayagam, A. H. A., Wang, Y. G., Jiang, H. Q., Lee, K., & Rhee, I. (2012). Reducing redundant cross-ISP traffic in peer-to-peer systems via explicit coordination. 2012 ieee consumer communications and networking conference (ccnc), 603–607. https://doi.org/10.1109/ccnc.2012.6181137 Ge, X., DuBose, Q. L., & Murphy-Hill, E. (2012). Reconciling manual and automatic refactoring. 2012 34th international conference on software engineering (icse), 211–221. https://doi.org/10.1109/icse.2012.6227192 Pandita, R., Xiao, X. S., Zhong, H., Xie, T., Oney, S., & Paradkar, A. (2012). Inferring method specifications from natural language API descriptions. 2012 34th international conference on software engineering (icse), 815–825. https://doi.org/10.1109/icse.2012.6227137 Murphy-Hill, E. (2012). Continuous social screencasting to facilitate software tool discovery. 2012 34th international conference on software engineering (icse), 1317–1320. https://doi.org/10.1109/icse.2012.6227090 Saovapakhiran, B., Devetsikiotis, M., Michailidis, G., & Viniotis, Y. (2012). Average delay SLAs in cloud computing. 2012 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2012.6364548 Mealin, S., & Murphy-Hill, E. (2012). An exploratory study of blind software developers. 2012 IEEE symposium on visual languages and human-centric computing (vl/hcc), 71–74. https://doi.org/10.1109/vlhcc.2012.6344485 Saovapakhiran, B., Michailidis, G., & Devetsikiotis, M. (2012). An algorithm for joint guidance and power control for electric vehicles in the smart grid. 2012 ieee international conference on communications (icc). https://doi.org/10.1109/icc.2012.6364112 Johnson, B. (2012). A study on improving static analysis tools: Why are we not using them? 2012 34th international conference on software engineering (icse), 1607–1609. Xiao, X. S., Tillmann, N., Fahndrich, M., Halleux, J., & Moskal, M. (2012). User-aware privacy control via extended static-information-flow analysis. 2012 proceedings of the 27th ieee/acm international conference on automated software engineering (ase), 80–89. Hwang, J. H., Xie, T., El Kateb, D., Mouelhi, T., & Le Traon, Y. (2012). Selection of regression system tests for security policy evolution. 2012 proceedings of the 27th ieee/acm international conference on automated software engineering (ase), 266–269. https://doi.org/10.1145/2351676.2351719 Padmanabhan, K., Wilson, K., Rocha, A. M., Wang, K., Mihelcic, J. R., & Samatova, N. F. (2012). In-silico identification of phenotype-biased functional modules. PROTEOME SCIENCE, 10. https://doi.org/10.1186/1477-5956-10-s1-s2 Yi, S., Krim, H., & Norris, L. K. (2012). Human activity modeling as Brownian motion on shape manifold. Scale space and variational methods in computer vision, 6667, 628–639. https://doi.org/10.1007/978-3-642-24785-9_53 Xiong, K., Wang, R., Du, W., & Ning, P. (2012). Containing Bogus Packet Insertion Attacks for Broadcast Authentication in Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 8(3). https://doi.org/10.1145/2240092.2240094 Chen, Z. Z., Hendrix, W., & Samatova, N. F. (2012). Community-based anomaly detection in evolutionary networks. Journal of Intelligent Information Systems, 39(1), 59–85. https://doi.org/10.1007/s10844-011-0183-2 Xiao, X. S., Thummalapenta, S., & Xie, T. (2012). Advances on improving automation in developer testing. Advances in Computers, Vol 85, 85, 165–212. Lee, D., & Krim, H. (2012). A sampling theorem for a 2D surface. Scale space and variational methods in computer vision, 6667, 556–567. https://doi.org/10.1007/978-3-642-24785-9_47 El-Bawab, T. S., Esfandiari, M., Rouskas, G., Jayasumana, A., Kincaid, M., Effenberger, F., … Baniewicz, P. (2012, September). TOWARD SPECIALIZED UNDERGRADUATE TELECOMMUNICATION ENGINEERING EDUCATION IN THE US. IEEE COMMUNICATIONS MAGAZINE, Vol. 50, pp. 14–16. https://doi.org/10.1109/mcom.2012.6295705 Healey, C. G., & Sawant, A. P. (2012). On the Limits of Resolution and Visual Angle in Visualization. ACM TRANSACTIONS ON APPLIED PERCEPTION, 9(4). https://doi.org/10.1145/2355598.2355603 Schmidt, M. C., Rocha, A. M., Padmanabhan, K., Shpanskaya, Y., Banfield, J., Scott, K., … Samatova, N. F. (2012). NIBBS-Search for Fast and Accurate Prediction of Phenotype-Biased Metabolic Systems. PLOS COMPUTATIONAL BIOLOGY, 8(5). https://doi.org/10.1371/journal.pcbi.1002490 Healey, C. G., & Dennis, B. M. (2012). Interest Driven Navigation in Visualization. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 18(10), 1744–1756. https://doi.org/10.1109/tvcg.2012.23 Yavuz, A. A., Ning, P., & Reiter, M. K. (2012). BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 15(2). https://doi.org/10.1145/2240276.2240280 Guo, L., Harfoush, K., & Xu, H. (2012). An Analytical Model for the Node Degree in Wireless Ad Hoc Networks. WIRELESS PERSONAL COMMUNICATIONS, 66(2), 291–306. https://doi.org/10.1007/s11277-011-0339-y Meneely, A., Smith, B., & Williams, L. (2012). Validating Software Metrics: A Spectrum of Philosophies. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 21(4). https://doi.org/10.1145/2377656.2377661 Mueller, F., Wu, X., Schulz, M., Supinski, B. R., & Gamblin, T. (2012). ScalaTrace: Tracing, analysis and modeling of HPC codes at scale. Applied parallel and scientific computing, pt ii, 7134, 410–418. Bass, S. A., Petersen, H., Quammen, C., Canary, H., Healey, C. G., & Taylor, R. M. (2012). Probing the QCD critical point with relativistic heavy-ion collisions. Central European Journal of Physics, 10(6), 1278–1281. https://doi.org/10.2478/s11534-012-0076-1 Lakshminarasimhan, S., Kumar, P., Liao, W. K., Choudhary, A., Kumar, V., & Samatova, N. F. (2012). On the path to sustainable, scalable, and energy-efficient data analytics: Challenges, promises, and future directions. 2012 International Green Computing Conference (IGCC). https://doi.org/10.1109/igcc.2012.6322265 Veliz-Cuba, A., Arthur, J., Hochstetler, L., Klomps, V., & Korpi, E. (2012). On the Relationship of Steady States of Continuous and Discrete Models Arising from Biology. BULLETIN OF MATHEMATICAL BIOLOGY, 74(12), 2779–2792. https://doi.org/10.1007/s11538-012-9778-1 Schendel, E. R., Jin, Y., Shah, N., Chen, J., Chang, C. S., Ku, S.-H., … Samatova, N. F. (2012). ISOBAR Preconditioner for Effective and High-throughput Lossless Data Compression. 2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), pp. 138–149. https://doi.org/10.1109/icde.2012.114 So, J. K., & Reeves, D. S. (2012). AntiLiar: Defending against cheating attacks in mesh based streaming. 2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125. https://doi.org/10.1109/p2p.2012.6335791 Wu, X., Deshpande, V., & Mueller, F. (2012). ScalaBenchGen: Auto-Generation of Communication Benchmarks Traces. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 1250–1260. https://doi.org/10.1109/ipdps.2012.114 Meyer, C. D., & Wessell, C. D. (2012). STOCHASTIC DATA CLUSTERING. SIAM JOURNAL ON MATRIX ANALYSIS AND APPLICATIONS, 33(4), 1214–1236. https://doi.org/10.1137/100804395 Tan, Y., Nguyen, H., Shen, Z., Gu, X., Venkatramani, C., & Rajan, D. (2012). PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 285–294. https://doi.org/10.1109/icdcs.2012.65 Natarajan, A., Ning, P., Liu, Y., Jajodia, S., & Hutchinson, S. E. (2012). NSDMiner: Automated discovery of network service dependencies. 2012 Proceedings IEEE infocom, 2507–2515. https://doi.org/10.1109/infcom.2012.6195642 Gong, Z., Lakshminarasimhan, S., Jenkins, J., Kolla, H., Ethier, S., Chen, J., … Samatova, N. F. (2012). Multi-level Layout Optimization for Efficient Spatio-temporal Queries on ISABELA-compressed Data. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 873–884. https://doi.org/10.1109/ipdps.2012.83 Gao, X., Singh, M. P., & Mehra, P. (2012). Mining Business Contracts for Service Exceptions. IEEE TRANSACTIONS ON SERVICES COMPUTING, 5(3), 333–344. https://doi.org/10.1109/tsc.2011.1 Zimmer, C., & Mueller, F. (2012). Low ContentionMapping of Real-Time Tasks onto a TilePro 64 Core Processor. 2012 IEEE 18TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), pp. 131–140. https://doi.org/10.1109/rtas.2012.36 Wicker, A. W., & Doyle, J. (2012). Leveraging multiple mechanisms for information propagation. Advanced agent technology, 7068, 1–2. Wu, X. X., Shen, Z. M., Wu, R., & Lin, Y. F. (2012). Jump-start cloud: Efficient deployment framework for large-scale cloud applications. Concurrency and Computation-Practice & Experience, 24(17), 2120–2137. Deng, Z., Xu, D., Zhang, X., & Jiang, X. (2012). IntroLib: Efficient and transparent library call introspection for malware forensics. DIGITAL INVESTIGATION, 9, S13–S23. https://doi.org/10.1016/j.diin.2012.05.013 Yi, S., Krim, H., & Norris, L. K. (2012). Human Activity as a Manifold-Valued Random Process. IEEE TRANSACTIONS ON IMAGE PROCESSING, 21(8), 3416–3428. https://doi.org/10.1109/tip.2012.2197008 Chen, F., Liu, A. X., Hwang, J., & Xie, T. (2012). First step towards automatic correction of firewall policy faults. ACM Transactions on Autonomous and Adaptive Systems, 7(2). Liu, Y., & Ning, P. (2012). Enhanced wireless channel authentication using time-synched link signature. 2012 Proceedings IEEE infocom, 2636–2640. https://doi.org/10.1109/infcom.2012.6195669 Ji, F., Aji, A. M., Dinan, J., Buntinas, D., Balaji, P., Feng, W. C., & Ma, X. S. (2012). Efficient Intranode communication in GPU-accelerated systems. Ieee international symposium on parallel and distributed processing, 1838–1847. Zhou, Y., & Jiang, X. (2012). Dissecting Android Malware: Characterization and Evolution. 2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 95–109. https://doi.org/10.1109/sp.2012.16 Elliott, J., Kharbas, K., Fiala, D., Mueller, F., Ferreira, K., & Engelmann, C. (2012). Combining Partial Redundancy and Checkpointing for HPC. 2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 615–626. https://doi.org/10.1109/icdcs.2012.56 Wolf, T., Griffioen, J., Calvert, K., Dutta, R., Rouskas, G., Baldine, I., & Nagurney, A. (2012). Choice as a Principle in Network Architecture. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 42(4), 105–106. https://doi.org/10.1145/2377677.2377703 Liu, Y., & Ning, P. (2012). BitTrickle: Defending against broadband and high-power reactive jamming attacks. 2012 Proceedings IEEE infocom, 909–917. https://doi.org/10.1109/infcom.2012.6195840 He, X. F., Dai, H. Y., & Ning, P. (2012). A Byzantine attack defender: The Conditional Frequency Check. 2012 ieee international symposium on information theory proceedings (isit). https://doi.org/10.1109/isit.2012.6284709 Supak, S., Luo, H., Tateosian, L., Fang, K., Harrell, J., Harrelson, C., … Devine, H. (2012). Who's Watching Your Food? A Flexible Framework for Public Health Monitoring. TRANSACTIONS IN GIS, 16(2), 89–104. https://doi.org/10.1111/j.1467-9671.2012.01309.x Ongtang, M., McLaughlin, S., Enck, W., & McDaniel, P. (2012). Semantically rich application-centric security in Android. SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673. https://doi.org/10.1002/sec.360 Yavuz, A. A., & Ning, P. (2012). Self-sustaining, efficient and forward-secure cryptographic constructions for Unattended Wireless Sensor Networks. AD HOC NETWORKS, 10(7), 1204–1220. https://doi.org/10.1016/j.adhoc.2012.03.006 Murukannaiah, P. K., & Singh, M. P. (2012). Platys Social: Relating Shared Places and Private Social Circles. IEEE INTERNET COMPUTING, 16(3), 53–59. https://doi.org/10.1109/mic.2011.106 Jenkins, J. P., Kanj, I. A., Xia, G., & Zhang, F. H. (2012). Local construction of spanners in the 3D space. IEEE Transactions on Mobile Computing, 11(7), 1140–1150. Padmanabhan, K., Wang, K., & Samatova, N. F. (2012). Functional Annotation of Hierarchical Modularity. PLOS ONE, 7(4). https://doi.org/10.1371/journal.pone.0033744 Chirkova, R., Libkin, L., & Reutter, J. L. (2012). Tractable XML data exchange via relations. FRONTIERS OF COMPUTER SCIENCE, 6(3), 243–263. https://doi.org/10.1007/s11704-012-2023-0 Elson, D., Rowe, J., Smith, A. M., Smith, G., & Tomai, E. (2012). Reports on the 2011 AAAI Fourth Artificial Intelligence for Interactive Digital Entertainment Conference Workshops. AI MAGAZINE, 33(1), 55–56. https://doi.org/10.1609/aimag.v33i1.2393 Pyun, Y. J., Park, Y., Reeves, D. S., Wang, X., & Ning, P. (2012). Interval-based flow watermarking for tracing interactive traffic. COMPUTER NETWORKS, 56(5), 1646–1665. https://doi.org/10.1016/j.comnet.2012.01.017 Lee, K., Hong, S., Kim, S. J., Rhee, I., & Chong, S. (2012). SLAW: Self-Similar Least-Action Human Walk. IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 515–529. https://doi.org/10.1109/tnet.2011.2172984 Mao, G., Wu, X., & Jiang, X. (2012). Intrusion Detection Models Based on Data Mining. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 5(1), 30–38. https://doi.org/10.1080/18756891.2012.670519 Jang, B., & Sichitiu, M. L. (2012). IEEE 802.11 Saturation Throughput Analysis in the Presence of Hidden Terminals. IEEE-ACM TRANSACTIONS ON NETWORKING, 20(2), 557–570. https://doi.org/10.1109/tnet.2011.2165322 Mukherjee, B., Dutta, R., Sivalingam, K., Vokkarane, V., & Jukan, A. (2012, April). Special Issue: Selected Papers from the Fourth International IEEE Symposium on Advanced Networks and Telecommunication Systems (IEEE ANTS 2010). OPTICAL SWITCHING AND NETWORKING, Vol. 9, pp. 145–146. https://doi.org/10.1016/j.osn.2012.01.001 Lin, H. S., Ma, X. S., & Feng, W. C. (2012). Reliable MapReduce computing on opportunistic resources. Cluster Computing-The Journal of Networks Software Tools and Applications, 15(2), 145–161. Comer, M. T., & Kaltofen, E. L. (2012). On the Berlekamp/Massey algorithm and counting singular Hankel matrices over a finite field. JOURNAL OF SYMBOLIC COMPUTATION, 47(4), 480–491. https://doi.org/10.1016/j.jsc.2011.09.008 Pathak, P. H., & Dutta, R. (2012). Centrality-based power control for hot-spot mitigation in multi-hop wireless networks. COMPUTER COMMUNICATIONS, 35(9), 1074–1085. https://doi.org/10.1016/j.comcom.2012.01.023 Maxwell, J. C., Anton, A. I., Swire, P., Riaz, M., & McCraw, C. M. (2012). A legal cross-references taxonomy for reasoning about compliance requirements. REQUIREMENTS ENGINEERING, 17(2), 99–115. https://doi.org/10.1007/s00766-012-0152-5 Langville, A. N., & Meyer, C. D. (2012, July). Who's #1? SCIENTIFIC AMERICAN, Vol. 307, pp. 21–21. https://doi.org/10.1038/scientificamerican0712-21 Williams, L. (2012). What Agile Teams Think of Agile Principles. COMMUNICATIONS OF THE ACM, 55(4), 71–76. https://doi.org/10.1145/2133806.2133823 Johnson, J. R., Kaltofen, E., & Park, H. (2012, July). Special Issue on Symbolic and Algebraic Computation Foundations, Algorithmics and Applications: ISSAC 2009. JOURNAL OF SYMBOLIC COMPUTATION, Vol. 47, pp. 751–751. https://doi.org/10.1016/j.jsc.2011.12.006 Wu, X., & Mueller, F. (2012). SCALAEXTRAP: Trace-Based Communication Extrapolation for SPMD Programs. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 34(1). https://doi.org/10.1145/2160910.2160914 Hang, C.-W., & Singh, M. P. (2012). Generalized framework for personalized recommendations in agent networks. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 25(3), 475–498. https://doi.org/10.1007/s10458-011-9186-1 Healey, C. G., & Enns, J. T. (2012). Attention and Visual Memory in Visualization and Computer Graphics. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 18(7), 1170–1188. https://doi.org/10.1109/tvcg.2011.127 Savage, C. D., & Viswanathan, G. (2012). The 1/k-Eulerian polynomials. Electronic Journal of Combinatorics, 19(1). Phadke, M. N., Pinto, L., Alabi, O., Harter, J., Taylor, R. M., II, Wu, X., … Healey, C. G. (2012). Exploring Ensemble Visualization. VISUALIZATION AND DATA ANALYSIS 2012, Vol. 8294. https://doi.org/10.1117/12.912419 Wang, C., Mueller, F., Engelmann, C., & Scott, S. L. (2012). Proactive process-level live migration and back migration in HPC environments. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 72(2), 254–267. https://doi.org/10.1016/j.jpdc.2011.10.009 Budanur, S., Mueller, F., & Gamblin, T. (2012). Memory Trace Compression and Replay for SPMD Systems Using Extended PRSDs. COMPUTER JOURNAL, 55(2), 206–217. https://doi.org/10.1093/comjnl/bxr071 Sagan, B. E., & Savage, C. D. (2012). Mahonian pairs. JOURNAL OF COMBINATORIAL THEORY SERIES A, 119(3), 526–545. https://doi.org/10.1016/j.jcta.2011.11.003 Shin, K., & Reeves, D. S. (2012). Winnowing: Protecting P2P systems against pollution through cooperative index filtering. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 35(1), 72–84. https://doi.org/10.1016/j.jnca.2011.02.015 Meleshko, S. V., Samatova, N. F., & Melechko, A. V. (2012). Group analysis of the thin film dewetting equation. INTERNATIONAL JOURNAL OF NON-LINEAR MECHANICS, 47(1), 9–13. https://doi.org/10.1016/j.ijnonlinmec.2011.08.005 Zhang, L., Ma, X., Lu, J., Xie, T., Tillmann, N., & Halleux, P. (2012). Environmental Modeling for Automated Cloud Application Testing. IEEE SOFTWARE, 29(2), 30–35. https://doi.org/10.1109/ms.2011.158 Lobo, R., Bitzer, D. L., & Vouk, M. A. (2012). Locally Invertible Multidimensional Convolutional Encoders. IEEE TRANSACTIONS ON INFORMATION THEORY, 58(3), 1774–1782. https://doi.org/10.1109/tit.2011.2178129 Sollenberger, D. J., & Singh, M. P. (2012). Koko: an architecture for affect-aware games. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 24(2), 255–286. https://doi.org/10.1007/s10458-010-9160-3 Savage, C. D., & Schuster, M. J. (2012). Ehrhart series of lecture hall polytopes and Eulerian polynomials for inversion sequences. JOURNAL OF COMBINATORIAL THEORY SERIES A, 119(4), 850–870. https://doi.org/10.1016/j.jcta.2011.12.005 Lee, J., Lee, J., Lee, K., & Chong, S. (2012). Commoncode: A code-reuse platform for wireless network experimentation. IEEE Communications Magazine, 50(3), 156–163.