Computer Science - 2017 Andow, B., Acharya, A., Li, D., Enck, W., Singh, K., & Xie, T. (2017). UiRef: analysis of sensitive user inputs in Android applications. Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 23–34. Nadkarni, A., Verma, A., Tendulkar, V., & Enck, W. (2017). Reliable Ad Hoc Smartphone Application Creation for End Users. In Intrusion Detection and Prevention for Mobile Ecosystems (pp. 65–98). CRC Press Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300 …. Heuser, S., Reaves, B., Pendyala, P. K., Carter, H., Dmitrienko, A., Enck, W., … Traynor, P. (2017). Phonion: Practical Protection of Metadata in Telephony Networks. Proceedings on Privacy Enhancing Technologies, 2017(1), 170–187. Chen, H., Li, N., Enck, W., Aafer, Y., & Zhang, X. (2017). Analysis of SEAndroid Policies: Combining MAC and DAC in Android. Proceedings of the 33rd Annual Computer Security Applications Conference, 553–565. Wang, R., Azab, A. M., Enck, W., Li, N., Ning, P., Chen, X., … Cheng, Y. (2017). SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 612–624. Nadkarni, A., Enck, W., Jha, S., & Staddon, J. (2017). Policy by Example: An Approach for Security Policy Specification. ArXiv Preprint ArXiv:1707.03967. Shu, R., Gu, X., & Enck, W. (2017). A Study of Security Vulnerabilities on Docker Hub. Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 269–280. Acar, Y., Stransky, C., Wermke, D., Mazurek, M., & Fahl, S. (2017). Security developer studies with github users: Exploring a convenience sample. USENIX Symposium on Usable Privacy and Security (SOUPS) 2017, 81–95. Stransky, C., Acar, Y., Nguyen, D. C., Wermke, D., Kim, D., Redmiles, E. M., … Fahl, S. (2017). Lessons learned from using an online platform to conduct large-scale, online controlled security experiments with software developers. 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). Acar, Y., Stransky, C., Wermke, D., Weir, C., Mazurek, M. L., & Fahl, S. (2017). Developers need support, too: A survey of security advice for software developers. 2017 IEEE Cybersecurity Development (SecDev), 22–26. Nguyen, D. C., Wermke, D., Acar, Y., Backes, M., Weir, C., & Fahl, S. (2017). A stitch in time: Supporting android developers in writing secure code. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1065–1077. Gitinabard, N., Lynch, C. F., Heckman, S., & Barnes, T. (2017). Identifying Student Communities in Blended Courses. ArXiv Preprint ArXiv:1710.04129. Vellukunnel, M., Buffum, P., Boyer, K. E., Forbes, J., Heckman, S., & Mayer-Patel, K. (2017). Deconstructing the Discussion Forum: Student Questions and Computer Science Learning. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 603–608. Bahler, D., Battestilli, L., DeMaria, M., Healey, C., Heckman, S., Heil, M., … others. (2017). Conversations (oral history interviews) with members of North Carolina State University Computer Science Department by Carol Lee and Carolyn Miller. Smith, A. J., Boyer, K. E., Forbes, J., Heckman, S., & Mayer-Patel, K. (2017). My Digital Hand: A Tool for Scaling Up One-to-One Peer Teaching in Support of Computer Science Learning. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 549–554. Heckman, S., Carver, J. C., & Sherriff, M. (2017). Designing Empirical Education Research Studies (DEERS): Creating an Answerable Research Question. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 737–737. Gitinabard, N., Xue, L., Lynch, C. F., Heckman, S., & Barnes, T. (2017). A Social Network Analysis on Blended Courses. ArXiv Preprint ArXiv:1709.10215. Test suite parallelization in open-source projects: a study on its usage and impact. (2017). Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 - November 03, 2017, 838–848. https://doi.org/10.1109/ASE.2017.8115695 Rosu, G., Penta, M. D., & Nguyen, T. N. (Eds.). (2017). Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, Urbana, IL, USA, October 30 - November 03, 2017. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8106906 Souto, S., d’Amorim, M., & Gheyi, R. (2017). Balancing soundness and efficiency for practical testing of configurable systems. Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017, 632–642. https://doi.org/10.1109/ICSE.2017.64 Souto, S., & d’Amorim, M. (2017). Time-Space Efficient Regression Testing for Configurable Systems. CoRR, abs/1702.03457. Retrieved from http://arxiv.org/abs/1702.03457 S. (Ed.). (2017). Proceedings of the 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, May 20-28, 2017. Retrieved from http://dl.acm.org/citation.cfm?id=3097368 Perez, A., Abreu, R., & d’Amorim, M. (2017). Prevalence of Single-Fault Fixes and Its Impact on Fault Localization. 2017 IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, Tokyo, Japan, March 13-17, 2017, 12–22. https://doi.org/10.1109/ICST.2017.9 Xie, T., Cai, Y., Liu, X., Wang, X., Acharya, M. P., d’Amorim, M., & Ma, X. (2017). Preface. J. Comput. Sci. Technol., 32(6), 1057–1059. https://doi.org/10.1007/s11390-017-1782-3 2017 IEEE International Conference on Software Testing, Verification and Validation, ICST 2017, Tokyo, Japan, March 13-17, 2017. (2017). Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7922464 Guo, Z., Bhuiyan, A., Saifullah, A., Guan, N., & Xiong, H. (2017). Energy-Efficient Multi-Core Scheduling for Real-Time DAG Tasks. Proceedings of the 29th Euromicro Conference on Real-Time Systems (ECRTS). Presented at the 29th Euromicro Conference on Real-Time Systems (ECRTS), Dubrovnik, Croatia. Guo, Z. (2017). Regarding the Optimality of Speedup Bounds of Mixed-Criticality Schedulability Tests. In Mixed Criticality on Multicore/Manycore Platforms (Dagstuhl Seminar No. 17131). Guo, Z. (2017). Guaranteeing some service upon mode switch in mixed-criticality systems. In Mixed Criticality on Multicore/Manycore Platforms (Dagstuhl Seminar No. 17131). Retrieved from https://www.ece.ucf.edu/~zsguo/pubs/conference_workshop/Dagstuhl17131.pdf Guo, Z., Zhang, Y., Wang, L., & Zhang, Z. (2017). Work-in-Progress: Cache-Aware Partitioned EDF Scheduling for Multi-core Real-Time Systems. Presented at the 2017 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2017.00054 Zhang, Y., Guo, Z., Wang, L., Xiong, H., & Zhang, Z. (2017). Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip Cache. Presented at the 2017 IEEE Trustcom/BigDataSE/ICESS. https://doi.org/10.1109/trustcom/bigdatase/icess.2017.317 Yang, Y., Wunsch, D., Guo, Z., & Yin, Y. (2017). Hamiltonian-Driven Adaptive Dynamic Programming Based on Extreme Learning Machine. https://doi.org/10.1007/978-3-319-59072-1_24 Yang, Y., Guo, Z., Wunsch, D., & Yin, Y. (2017). Off-policy reinforcement learning for robust control of discrete-time uncertain linear systems. Presented at the 2017 36th Chinese Control Conference (CCC). https://doi.org/10.23919/chicc.2017.8027737 Vaidhun, S., Arefin, S., Guo, Z., Xiong, H., & Das, S. K. (2017). Response time in mixed-critical pervasive systems. Presented at the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). https://doi.org/10.1109/uic-atc.2017.8397530 Zhang, Z., Guo, Z., & Koutsoukos, X. (2017). Handling write backs in multi-level cache analysis for WCET estimation. Presented at the RTNS '17: 25th International Conference on Real-Time Networks and Systems. https://doi.org/10.1145/3139258.3139269 Santinelli, L., & Guo, Z. (2017). On the Criticality of Probabilistic Worst-Case Execution Time Models. https://doi.org/10.1007/978-3-319-69483-2_4 Bian, J., Xiong, H., Cheng, W., Hu, W., Guo, Z., & Fu, Y. (2017). Multi-party Sparse Discriminant Learning. Presented at the 2017 IEEE International Conference on Data Mining (ICDM). https://doi.org/10.1109/icdm.2017.86 Xiong, H., Cheng, W., Hu, W., Bian, J., & Guo, Z. (2017). AWDA: An Adaptive Wishart Discriminant Analysis. Presented at the 2017 IEEE International Conference on Data Mining (ICDM). https://doi.org/10.1109/icdm.2017.62 Guo, Z., Sruti, S., Ward, B. C., & Baruah, S. (2017). Sustainability in Mixed-Criticality Scheduling. Presented at the 2017 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2017.00010 Xiong, H., Zhang, D., Guo, Z., Chen, G., & Barnes, L. E. (2017). Near-Optimal Incentive Allocation for Piggyback Crowdsensing. IEEE Communications Magazine, 55(6), 120–125. https://doi.org/10.1109/mcom.2017.1600748 Jernigan, W., Horvath, A., Lee, M., Burnett, M., Cuilty, T., Kuttal, S., … Oleson, A. (2017). General principles for a Generalized Idea Garden. Journal of Visual Languages & Computing, 39, 51–65. https://doi.org/10.1016/j.jvlc.2017.04.005 Jiang, S., Zhu, X., Guo, L., & Liu, J. (2017). Publicly verifiable boolean query over outsourced encrypted data. IEEE Transactions on Cloud Computing, 7(3), 799–813. Feng, B., Liu, J., Zhang, C., & Fang, Y. (2017). Communication through symbol silence: Towards free control messages in indoor wlans. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), 880–888. Niu, Y., Wei, L., Zhang, C., Liu, J., & Fang, Y. (2017). An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain. 2017 IEEE/CIC International Conference on Communications in China (ICCC), 1–6. Muzi, I., O’Brien, M. P., Reidl, F., & Sullivan, B. D. (2017). Being even slightly shallow makes life hard. Leibniz International Proceedings in Informatics, LIPIcs, 83. https://doi.org/10.4230/LIPIcs.MFCS.2017.79 Sullivan, B. D., & Van Der Poel, A. (2017). A fast parameterized algorithm for Co-Path Set. Leibniz International Proceedings in Informatics, LIPIcs, 63. https://doi.org/10.4230/LIPIcs.IPEC.2016.28 Asymptotic analysis of equivalences and core-structures in kronecker-style graph models. (2017). Proceedings - IEEE International Conference on Data Mining, ICDM, 829–834. https://doi.org/10.1109/ICDM.2016.81 Goodrich, T. D., Sullivan, B. D., & Humble, T. S. (2017). Optimizing Adiabatic Quantum Program Compilation using a Graph-Theoretic Framework. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85095056109&partnerID=MN8TOARS Muzi, I., O’Brien, M. P., Reidl, F., & Sullivan, B. D. (2017). Being even slightly shallow makes life hard. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85094429786&partnerID=MN8TOARS O’Brien, M. P., & Sullivan, B. D. (2017). An experimental evaluation of a bounded expansion algorithmic pipeline. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85092949285&partnerID=MN8TOARS Kloster, K., Kuinke, P., O’Brien, M. P., Reidl, F., Villaamil, F. S., Sullivan, B. D., & Van Der Poel, A. (2017). A practical fpt algorithm for flow decomposition and transcript assembly. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85094353595&partnerID=MN8TOARS Kloster, K., Král, D., & Sullivan, B. D. (2017). Walk entropy and walk-regularity. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85094268676&partnerID=MN8TOARS Summeryille, A., Behrooz, M., Mateas, M., & Jhala, A. (2017). What does that ?-Block do? Learning latent causal affordances from mario play traces. AAAI Workshop - Technical Report, WS-17-01 - WS-17-15, 991–998. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85031928570&partnerID=MN8TOARS Behrooz, M., & Jhala, A. (2017). Modeling social interestingness in conversational stories. ACM International Conference Proceeding Series. https://doi.org/10.1145/3014812.3014880 Guimaraes, M., Santos, P., & Jhala, A. (2017). Prom week meets Skyrim. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 3, 1790–1792. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85046476949&partnerID=MN8TOARS Guimaraes, M., Santos, P., & Jhala, A. (2017). CiF-CK: An architecture for social NPCS in commercial games. 2017 IEEE Conference on Computational Intelligence and Games, CIG 2017, 126–133. https://doi.org/10.1109/CIG.2017.8080425 Guimaraes, M., Santos, P., & Jhala, A. (2017). Prom week meets skyrim: Developing a social agent architecture in a commercial game. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 3, 1562–1564. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85046418617&partnerID=MN8TOARS Song, Y., Guo, Y., & Gehringer, E. F. (2017). An exploratory study of reliability of ranking vs. rating in peer assessment. International Journal of Educational and Pedagogical Sciences, 11(10). https://doi.org/doi.org/10.5281/zenodo.1132399 Battestilli, L., & Awasthi, A. (2017). Two-stage Programming Projects: Individual Work Followed by Peer Collaboration (Technical Report No. TR-2017-3). Raleigh, NC: North Carolina State University. Battestilli, L., & Le, T. (2017, April 3). The Value of Organized Study Groups in Large Classes. Presented at the NCSU Teaching and Learning Symposium, McKimmon Conference and Training Center, NC State University, Raleigh, NC. Yedida, R. (2017). Complexity Classes and NP-Completeness. Presented at the PES University, Bangalore, India. Devarajan, R., Benson, J. R., Caira, D. J., Sethi, S., Cox, J. A., Healey, C. G., … Padia, K. (2017, July). Automatically constructing training sets for electronic sentiment analysis. Google Patents. Lee, D., & Krim, H. (2017). 3D face recognition in the Fourier domain using deformed circular curves. Multidimensional Systems and Signal Processing, 28(1), 105–127. https://doi.org/10.1007/S11045-015-0334-7 Ranshous, S., Chaudhary, M., & Samatova, N. F. (2017). Efficient Outlier Detection in Hyperedge Streams Using MinHash and Locality-Sensitive Hashing. In C. Cherifi, H. Cherifi, M. Karsai, & M. Musolesi (Eds.), Complex Networks & Their Applications VI. COMPLEX NETWORKS 2017 (pp. 105–116). https://doi.org/10.1007/978-3-319-72150-7_9 Chaudhary, M. S., Ranshous, S., & Samatova, N. F. (2017). A Community-Driven Graph Partitioning Method for Constraint-Based Causal Discovery. In C. Cherifi, H. Cherifi, M. Karsai, & M. Musolesi (Eds.), Complex Networks & Their Applications VI. COMPLEX NETWORKS 2017 (pp. 253–264). https://doi.org/10.1007/978-3-319-72150-7_21 Tateosian, L., & Tabrizian, P. (2017). Blending tools for a Smooth Introduction to 3D Geovisualization. Pedagogy of Data Visualization Workshop (PDVW). Presented at the IEEE VIS: Visualization & Visual Analytics, Phoenix, AZ. Wu, B., & Shen, X. (2017). Software-level task scheduling on GPUs. In Advances in GPU Research and Practice (pp. 83–103). https://doi.org/10.1016/b978-0-12-803738-6.00004-5 Shen, X., & Wu, B. (2017). Data placement on GPUs. In Advances in GPU Research and Practice (pp. 105–123). https://doi.org/10.1016/b978-0-12-803738-6.00005-7 Liu, Z., Cody, C., Barnes, T., Lynch, C., & Rutherford, T. (2017). The Antecedents of and Associations with Elective Replay in An Educational Game: Is Replay Worth It? Educational Data Mining (EDM2017). Presented at the International Conference on Educational Data Mining (EDM), Wuhan, China. Matsuda, N. (2017). Intelligent Pedagogical Agents. In H. Matsubara (Ed.), Encyclopedia of Artificial Intelligence (pp. 1152–1153). Tokyo, Japan: Japan Society of Artificial Intelligence. Matsuda, N. (2017). Instructional Strategy. In H. Matsubara (Ed.), Encyclopedia of Artificial Intelligence (pp. 1157–1159). Tokyo, Japan: Japan Society of Artificial Intelligence. Matsuda, N. (2017). Natural language processing in educational systems. In H. Matsubara (Ed.), Encyclopedia of Artificial Intelligence (p. 1101). Tokyo, Japan: Society of Artificial Intelligence. Cavanna, N. J., Khoury, M., & Sheehy, D. R. (2017). Supporting Ruled Polygons. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Ottawa, Ontario. Ajmeri, N. (2017). Engineering Socially Intelligent Personal Agents via Norms. In K. Larson, M. Winikoff, S. Das, & E. H. Durfee (Eds.), Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS) (pp. 1822–1823). Retrieved from https://research-information.bris.ac.uk/en/publications/a57d9424-afc0-4e03-a80f-991adf4697c5 Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2017). Arnor: Modeling Social Intelligence via Norms to Engineer Privacy-Aware Personal Agents. Proceedings of the 16th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 230–238. Retrieved from https://research-information.bris.ac.uk/en/publications/1abb3707-460c-4cf4-aba0-fefca322f6d8 Price, T., Zhi, R., & Barnes, T. (2017). Evaluation of a Data-driven Feedback Algorithm for Open-ended Programming. Educational Data Mining (EDM2017). Presented at the International Conference on Educational Data Mining (EDM), Wuhan, China. Wang, P., Rowe, J., Min, W., Mott, B., & Lester, J. (2017). Interactive narrative personalization with deep reinforcement learning. IJCAI International Joint Conference on Artificial Intelligence, 3852–3858. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85031928990&partnerID=MN8TOARS Wang, P., Rowe, J., Min, W., Mott, B., & Lester, J. (2017). Simulating player behavior for data-driven interactive narrative personalization. Proceedings of the 13th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2017, 255–261. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85055706729&partnerID=MN8TOARS Min, W., Mott, B., Rowe, J., Taylor, R., Wiebe, E., Boyer, K. E., & Lester, J. (2017). Multimodal goal recognition in open-world digital games. Proceedings of the 13th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2017, 80–86. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85051737443&partnerID=MN8TOARS Min, W., Mott, B., Rowe, J., & Lester, J. (2017). Deep LSTM-based goal recognition models for open-world digital games. AAAI Workshop - Technical Report, WS-17-01 - WS-17-15, 851–858. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85046086839&partnerID=MN8TOARS Subramaniam, M., & Cateté, V. (2017). A pathway to strengthening support for Beauty and Joy of Computing teachers. Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 779–780. https://doi.org/10.1145/3017680.3022458 Catete, V. M. (2017). A Framework for the Rapid Creation of Quality-Assured Programming Rubrics for New K-12 Computer Science Teachers. North Carolina State University. Type-based Semantic Optimization for Scalable RDF Graph Pattern Matching. (2017). Proceedings of the 26th International Conference on World Wide Web. https://doi.org/10.1145/3038912.3052655 QoS-Aware and Reliable Traffic Steering for Service Function Chaining in Mobile Networks. (2017). IEEE Journal on Selected Areas in Communications. https://doi.org/10.1109/jsac.2017.2760158 Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing. (2017). IEEE Journal on Selected Areas in Communications. https://doi.org/10.1109/jsac.2017.2659229 Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers. (2017). IEEE INFOCOM 2017 - IEEE Conference on Computer Communications. https://doi.org/10.1109/infocom.2017.8056945 Robust Incentive Tree Design for Mobile Crowdsensing. (2017). 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). https://doi.org/10.1109/icdcs.2017.145 An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications. (2017). 2017 IEEE International Conference on Edge Computing (EDGE). https://doi.org/10.1109/ieee.edge.2017.50 The Critical Network Flow Problem: Migratability and Survivability. (2017). IEEE/ACM Transactions on Networking. https://doi.org/10.1109/tnet.2017.2747588 Jafargholi, Z., Scafuro, A., & Wichs, D. (2017). Adaptively Indistinguishable Garbled Circuits. In Theory of Cryptography (pp. 40–71). https://doi.org/10.1007/978-3-319-70503-3_2 Baldimtsi, F., Papadopoulos, D., Papadopoulos, S., Scafuro, A., & Triandopoulos, N. (2017). Server-Aided Secure Computation with Off-line Parties. In Computer Security – ESORICS 2017 (pp. 103–123). https://doi.org/10.1007/978-3-319-66402-6_8 Pandita, R., Jetley, R., Sudarsan, S., Menzies, T., & Williams, L. (2017). TMAP: Discovering relevant API methods through text mining of API documentation. Journal of Software: Evolution and Process, 29(12), e1845. https://doi.org/10.1002/SMR.1845 Lin, C., & Chi, M. (2017). A Comparisons of BKT, RNN and LSTM for Learning Gain Prediction. In Lecture Notes in Computer Science (pp. 536–539). https://doi.org/10.1007/978-3-319-61425-0_58 Majikes, J. J., Yuschak, S., Walker, K., Brugarolas, R., Mealin, S., Foster, M., … Roberts, D. L. (2017). Stimulus Control for Semi-autonomous Computer Canine-Training. In Biomimetic and Biohybrid Systems (pp. 279–290). https://doi.org/10.1007/978-3-319-63537-8_24 Ranshous, S., Joslyn, C. A., Kreyling, S., Nowak, K., Samatova, N. F., West, C. L., & Winters, S. (2017). Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph. In Financial Cryptography and Data Security (pp. 248–263). https://doi.org/10.1007/978-3-319-70278-0_16 Chen, L., Yu, T., & Chirkova, R. (2017). Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition. In Data and Applications Security and Privacy XXXI (pp. 142–163). https://doi.org/10.1007/978-3-319-61176-1_8 Healey, C. G., Hao, L., & Hutchinson, S. E. (2017). Lessons Learned: Visualizing Cyber Situation Awareness in a Network Security Domain. In Theory and Models for Cyber Situation Awareness (pp. 47–65). https://doi.org/10.1007/978-3-319-61152-5_3 Sawyer, R., Rowe, J., & Lester, J. (2017). Balancing Learning and Engagement in Game-Based Learning Environments with Multi-objective Reinforcement Learning. In Lecture Notes in Computer Science (pp. 323–334). https://doi.org/10.1007/978-3-319-61425-0_27 Ocumpaugh, J., Andres, J. M., Baker, R., DeFalco, J., Paquette, L., Rowe, J., … Sottilare, R. (2017). Affect Dynamics in Military Trainees Using vMedic: From Engaged Concentration to Boredom to Confusion. In Lecture Notes in Computer Science (pp. 238–249). https://doi.org/10.1007/978-3-319-61425-0_20 Albanese, M., Cooke, N., Coty, G., Hall, D., Healey, C., Jajodia, S., … Yen, J. (2017). Computer-Aided Human Centric Cyber Situation Awareness. In Theory and Models for Cyber Situation Awareness (pp. 3–25). https://doi.org/10.1007/978-3-319-61152-5_1 Dreher, P., Nair, D., Sills, E., & Vouk, M. (2017). Cost Analysis Comparing HPC Public Versus Private Cloud Computing. In Communications in Computer and Information Science (pp. 294–316). https://doi.org/10.1007/978-3-319-62594-2_15 Bhat, S., Udechukwu, R., Dutta, R., & Rouskas, G. N. (2017). Network service orchestration in heterogeneous 5G networks using an open marketplace. IET Networks, 6(6), 149–156. https://doi.org/10.1049/IET-NET.2017.0058 Sawyer, R., Smith, A., Rowe, J., Azevedo, R., & Lester, J. (2017). Is More Agency Better? The Impact of Student Agency on Game-Based Learning. In Lecture Notes in Computer Science: Vol. 10331 LNAI (pp. 335–346). https://doi.org/10.1007/978-3-319-61425-0_28 Sawyer, R., Smith, A., Rowe, J., Azevedo, R., & Lester, J. (2017). Enhancing student models in game-based learning with facial expression recognition. UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 192–201. https://doi.org/10.1145/3079628.3079686 Yarzebinski, E., Dumdumaya, C., Rodrigo, M. M. T., Matsuda, N., & Ogan, A. (2017). Regional cultural differences in how students customize their avatars in technology-enhanced learning. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 598–601). https://doi.org/10.1007/978-3-319-61425-0_73 Dumdumaya, C., Banawan, M., Rodrigo, M. M., Ogan, A., Yarzebinski, E., & Matsuda, N. (2017). Investigating the effects of cognitive and metacognitive scaffolding on learners using a learning by teaching environment. Proceedings of the 25th International Conference on Computers in Education, ICCE 2017 - Main Conference Proceedings, 1–10. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85051544348&partnerID=MN8TOARS Chen, G., Zhang, L., Budhiraja, R., Shen, X., & Wu, Y. (2017). Efficient support of position independence on non-volatile memory. Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture - MICRO-50 '17. Presented at the the 50th Annual IEEE/ACM International Symposium. https://doi.org/10.1145/3123939.3124543 Zheng, Z., Oh, C., Zhai, J., Shen, X., Yi, Y., & Chen, W. (2017). Versapipe. Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture - MICRO-50 '17. Presented at the the 50th Annual IEEE/ACM International Symposium. https://doi.org/10.1145/3123939.3123978 Guan, H., Shen, X., & Krim, H. (2017). Egeria. Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis on - SC '17. Presented at the the International Conference for High Performance Computing, Networking, Storage and Analysis. https://doi.org/10.1145/3126908.3126961 Ding, Y., & Shen, X. (2017). GLORE: generalized loop redundancy elimination upon LER-notation. Proceedings of the ACM on Programming Languages, 1(OOPSLA), 1–28. https://doi.org/10.1145/3133898 Price, T. W., Brown, N. C. C., Piech, C., & Rivers, K. (2017). Sharing and Using Programming Log Data (Abstract Only). Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 729. https://doi.org/10.1145/3017680.3022366 Price, T., Dong, Y., & Lipovac, D. (2017). iSnap: Towards Intelligent Tutoring in Novice Programming Environments. SIGCSE '17: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 483–488. https://doi.org/10.1145/3017680.3017762 King, T. C., Günay, A., Chopra, A. K., & Singh, M. P. (2017). Tosca: Operationalizing Commitments Over Information Protocols. Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence. Presented at the Twenty-Sixth International Joint Conference on Artificial Intelligence. https://doi.org/10.24963/ijcai.2017/37 Cavanna, N. J., Gardner, K. P., & Sheehy, D. R. (2017). When and Why the Topological Coverage Criterion Works. Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. Presented at the Proceedings of the Twenty-Eighth Annual ACM-SIAM Symposium on Discrete Algorithms. https://doi.org/10.1137/1.9781611974782.177 Cateté, V., & Barnes, T. (2017). Application of the Delphi Method in Computer Science Principles Rubric Creation. Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education - ITiCSE '17, Part F128680, 164–169. https://doi.org/10.1145/3059009.3059042 Peddycord-Liu, Z., Cody, C., Kessler, S., Barnes, T., Lynch, C. F., & Rutherford, T. (2017). Using Serious Game Analytics to Inform Digital Curricular Sequencing. Proceedings of the Annual Symposium on Computer-Human Interaction in Play - CHI PLAY '17. Presented at the the Annual Symposium. https://doi.org/10.1145/3116595.3116620 Splee: A Declarative Information-Based Language for Multiagent Interaction Protocols. (2017). AAMAS'17: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS. Retrieved from https://publons.com/publon/21294377/ SoSharP: Recommending Sharing Policies in Multiuser Privacy Scenarios. (2017). IEEE Internet Computing. https://doi.org/10.1109/MIC.2018.326150611 How Good is a Security Policy against Real Breaches? A HIPAA Case Study. (2017). Proceedings - International Conference on Software Engineering. https://doi.org/10.1109/ICSE.2017.55 Arnor: Modeling Social Intelligence via Norms to Engineer Privacy-Aware Personal Agents. (2017). AAMAS'17: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS. Retrieved from https://publons.com/publon/21294376/ Elmessiry, A., Cooper, W. O., Catron, T. F., Karrass, J., Zhang, Z., & Singh, M. P. (2017). Triaging Patient Complaints: Monte Carlo Cross-Validation of Six Machine Learning Classifiers. JMIR Medical Informatics. https://doi.org/10.2196/medinform.7140 Argenta, C., & Doyle, J. (2017). Discrete multi-agent plan recognition: Recognizing teams, goals, and plans from action sequences. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 212–228). https://doi.org/10.1007/978-3-319-53354-4_12 Stallmann, M., & Oudjit, A. (2017). Efficient Algorithms for Finding 2-Medians of a Tree. North Carolina State University. Dept. of Computer Science. Kafali, O., Ajmeri, N., & Singh, M. P. (2017). Formal understanding of tradeoffs among liveness and safety requirements. Proceedings - 2016 IEEE 24th International Requirements Engineering Conference Workshops, REW 2016, 17–18. https://doi.org/10.1109/REW.2016.20 Kafali, O., Ajmeri, N., & Singh, M. P. (2017). Normative requirements in sociotechnical systems. Proceedings - 2016 IEEE 24th International Requirements Engineering Conference Workshops, REW 2016, 259–260. https://doi.org/10.1109/REW.2016.21 Ajmeri, N., Murukannaiah, P. K., Guot, H., & Singh, M. P. (2017). Arnor: Modeling social intelligence via norms to engineer privacy-Aware personal agents. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 1, 230–238. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85046117998&partnerID=MN8TOARS Ajmeri, N., & Singh, M. P. (2017). Engineering socially intelligent personal agents via norms. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 3, 1822–1823. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85046418467&partnerID=MN8TOARS Kafalı, Ö., Ajmeri, N., & Singh, M. P. (2017). Kont: Computing Tradeoffs in Normative Multiagent Systems. Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 3006–3012. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85027718735&partnerID=MN8TOARS Ajmeri, N., Hang, C.-W., Parsons, S. D., & Singh, M. P. (2017). Aragorn: Eliciting and Maintaining Secure Service Policies. Computer, 50(12), 50–58. https://doi.org/10.1109/MC.2017.4451210 Dumas, J.-G., Kaltofen, E. L., Villard, G., & Zhi, L. (2017). Polynomial Time Interactive Proofs for Linear Algebra with Exponential Matrix Dimensions and Scalars Given by Polynomial Time Circuits. Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation - ISSAC '17. Presented at the the 2017 ACM. https://doi.org/10.1145/3087604.3087640 Kaltofen, E. L., Pernet, C., Storjohann, A., & Waddell, C. (2017). Early Termination in Parametric Linear System Solving and Rational Function Vector Recovery with Error Correction. Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation - ISSAC '17. Presented at the the 2017 ACM. https://doi.org/10.1145/3087604.3087645 Babik, D., Tinapple, D., Gehringer, E., & Pramudianto, F. (2017). The effect of visualization on students' miscalibration in the context of online peer assessment. Proceedings of Western Decision Sciences Institute 2017 Annual Meeting. Presented at the Western Decision Sciences Institute 2017 Annual Meeting, Vancouver, BC. Retrieved from http://wdsinet.org/Annual_Meetings/2017_Proceedings/CR%20PDF/cr60.pdf Altuntas, A., & Baugh, J. (2017). Verifying Concurrency in an Adaptive Ocean Circulation Model. Proceedings of the First International Workshop on Software Correctness for HPC Applications - Correctness'17. https://doi.org/10.1145/3145344.3145346 Chirkova, R., & Yu, T. (2017). Exact Detection of Information Leakage: Decidability and Complexity. TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1–23. https://doi.org/10.1007/978-3-662-55608-5_1 Yang, R., Xu, M., He, J., Ranshous, S., & Samatova, N. F. (2017). An Intelligent Weighted Fuzzy Time Series Model Based on a Sine-Cosine Adaptive Human Learning Optimization Algorithm and Its Application to Financial Markets Forecasting. ADVANCED DATA MINING AND APPLICATIONS, ADMA 2017, Vol. 10604, pp. 595–607. https://doi.org/10.1007/978-3-319-69179-4_42 Sheshadri, K., Ajmeri, N., & Staddon, J. (2017). No (Privacy) News is Good News: An Analysis of New York Times and Guardian Privacy News from 2010-2016. 2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), pp. 159–168. https://doi.org/10.1109/PST.2017.00027 Lee, D., & Krim, H. (2017). Sampling Density Criterion for Circular Structured Light 3D Imaging. PROCEEDINGS OF THE 12TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER VISION, IMAGING AND COMPUTER GRAPHICS THEORY AND APPLICATIONS (VISIGRAPP 2017), VOL 6, pp. 478–483. https://doi.org/10.5220/0006147504780483 Yang, R. X., Xu, M. Y., Jones, P., & Samatova, N. (2017). Real time utility-based recommendation for revenue optimization via an adaptive online top-K high utility itemsets mining model. 2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). https://doi.org/10.1109/fskd.2017.8393050 Hsu, C. J., Freeh, V. W., & Villanustre, F. (2017). Trilogy: data placement to improve performance and robustness of cloud computing. 2017 IEEE International Conference on Big Data (Big Data), 2442–2451. https://doi.org/10.1109/bigdata.2017.8258202 Yang, T., Yin, B. C., Li, H., Shahzad, M., Uhlig, S., Cui, B., & Li, X. M. (2017). Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed. 2017 IEEE International Conference on Big Data (Big Data), 837–846. https://doi.org/10.1109/bigdata.2017.8257999 Xu, M. Y., Yang, R. X., Ranshous, S., Li, S. J., & Samatova, N. F. (2017). Leveraging External Knowledge for Phrase-based Topic Modeling. 2017 conference on technologies and applications of artificial intelligence (taai), 29–32. https://doi.org/10.1109/taai.2017.25 Zhang, Y., Lin, C., Chi, M., Ivy, J., Capan, M., & Huddleston, J. M. (2017). LSTM for septic shock: Adding unreliable labels to reliable predictions. 2017 IEEE International Conference on Big Data (Big Data), 1233–1242. https://doi.org/10.1109/bigdata.2017.8258049 Min, W., Frankosky, M. H., Mott, B. W., Wiebe, E. N., Boyer, K. E., & Lester, J. C. (2017). Inducing Stealth Assessors from Game Interaction Data. ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2017, Vol. 10331, pp. 212–223. https://doi.org/10.1007/978-3-319-61425-0_18 Price, T. W., Zhi, R., & Barnes, T. (2017). Hint Generation Under Uncertainty: The Effect of Hint Quality on Help-Seeking Behavior. ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2017, Vol. 10331, pp. 311–322. https://doi.org/10.1007/978-3-319-61425-0_26 Tan, R., Chirkova, R., Gadepally, V., & Mattson, T. G. (2017). Enabling query processing across heterogeneous data models: A survey. 2017 IEEE International Conference on Big Data (Big Data), 3211–3220. https://doi.org/10.1109/bigdata.2017.8258302 Kim, H., Ravindra, P., & Anyanwu, K. (2017). A semantics-aware storage framework for scalable processing of knowledge graphs on hadoop. 2017 IEEE International Conference on Big Data (Big Data), 193–202. https://doi.org/10.1109/bigdata.2017.8257927 Lin, C., & Chi, M. (2017). A Comparisons of BKT, RNN and LSTM for Learning Gain Prediction. Artificial intelligence in education, aied 2017, 10331, 536–539. Pezzullo, L. G., Wiggins, J. B., Frankosky, M. H., Min, W., Boyer, K. E., Mott, B. W., … Lester, J. C. (2017). "Thanks Alisha, Keep in Touch": Gender Effects and Engagement with Virtual Learning Companions. ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2017, Vol. 10331, pp. 299–310. https://doi.org/10.1007/978-3-319-61425-0_25 Perkins, P., & Heber, S. (2017). riboStreamR: A web application for quality control, analysis, and visualization of Ribo-seq data. International conference on computational advances in bio and medical. https://doi.org/10.1109/iccabs.2017.8114317 Jin, R., He, X., Dai, H., Dutta, R., & Ning, P. (2017). Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), pp. 72–83. https://doi.org/10.1109/pac.2017.32 Carpenter, S. E., & Harfoush, K. (2017). SafeRelay: Improving safety in the time-constrained VANET with geoaddresing relay. 2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES), 44–50. https://doi.org/10.1109/icves.2017.7991899 Prasad, S. K., Aghajarian, D., McDermott, M., Shah, D., Mokbel, M., Puri, S., … Wang, S. (2017). Parallel Processing over Spatial-Temporal Datasets from Geo, Bio, Climate and Social Science Communities: A Research Roadmap. 2017 IEEE 6TH INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS 2017), pp. 232–250. https://doi.org/10.1109/bigdatacongress.2017.39 ElMessiry, A., Zhang, Z., Cooper, W. O., Catron, T. F., Karrass, J., & Singh, M. P. (2017). Leveraging Sentiment Analysis for Classifying Patient Complaints. ACM-BCB' 2017: PROCEEDINGS OF THE 8TH ACM INTERNATIONAL CONFERENCE ON BIOINFORMATICS, COMPUTATIONAL BIOLOGY,AND HEALTH INFORMATICS, pp. 44–51. https://doi.org/10.1145/3107411.3107421 Shriver, D., Elbaum, S., & Stolee, K. T. (2017). At the end of synthesis: Narrowing program candidates. 2017 IEEE/ACM 39th International Conference on Software Engineering: New Ideas and Emerging Technologies Results Track (ICSE-NIER), 19–22. Mudrick, N. V., Taub, M., Azevedo, R., Rowe, J., & Lester, J. (2017). Toward affect-sensitive virtual human tutors: The influence of facial expressions on learning and emotion. International conference on affective computing and intelligent, 184–189. https://doi.org/10.1109/acii.2017.8273598 Connors, C., & Vatsavai, R. R. (2017). Semi-supervised deep generative models for change detection in very high resolution imagery. 2017 ieee international geoscience and remote sensing symposium (igarss), 1063–1066. https://doi.org/10.1109/igarss.2017.8127139 Bhat, S., Udechukwu, R., Dutta, R., & Rouskas, G. (2017). On service composition algorithm for open marketplaces of network services. 2017 european conference on networks and communications (eucnc). https://doi.org/10.1109/eucnc.2017.7980657 Chen, Z., Ramachandra, B., & Vatsavai, R. R. (2017). Hierarchical change detection framework for biomass monitoring. 2017 ieee international geoscience and remote sensing symposium (igarss), 620–623. https://doi.org/10.1109/igarss.2017.8127030 Price, T. W., Liu, Z., Catete, V., & Barnes, T. (2017). Factors Influencing Students' Help-Seeking Behavior while Programming with Human and Computer Tutors. PROCEEDINGS OF THE 2017 ACM CONFERENCE ON INTERNATIONAL COMPUTING EDUCATION RESEARCH (ICER 17), pp. 127–135. https://doi.org/10.1145/3105726.3106179 Kalia, A. K., Buchler, N., DeCostanza, A., & Singh, M. P. (2017). Computing Team Process Measures From the Structure and Content of Broadcast Collaborative Communications. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 4(2), 26–39. https://doi.org/10.1109/tcss.2017.2672980 Murukannaiah, P. K., Ajmeri, N., & Singh, M. P. (2017). Toward Automating Crowd RE. 2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), pp. 512–515. https://doi.org/10.1109/re.2017.74 Luo, X., Mueller, F., Carns, P., Jenkins, J., Latham, R., Ross, R., & Snyder, S. (2017). ScalaIOExtrap: Elastic I/O Tracing and Extrapolation. 2017 31ST IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 585–594. https://doi.org/10.1109/ipdps.2017.45 Cleghern, Z., Lahiri, S., Ozaltin, O., & Roberts, D. L. (2017). Predicting future states in dota 2 using value-split models of time series attribute data. Proceedings of the 12th International Conference on the Foundations of Digital Games (FDG'17). Price, T., & Barnes, T. (2017). Position paper: Block-based programming should offer intelligent support for learners. 2017 IEEE Blocks and Beyond Workshop (B&B), 65–68. https://doi.org/10.1109/blocks.2017.8120414 Tsan, J., Rodriguez, F. J., Boyer, K. E., & Lynch, C. (2017). Let's work together: Improving block-based environments by supporting synchronous collaboration. 2017 IEEE Blocks and Beyond Workshop (B&B), 53–56. https://doi.org/10.1109/blocks.2017.8120411 Ning, L., Pittman, R., & Shen, X. (2017). LCD: A Fast Contrastive Divergence Based Algorithm for Restricted Boltzmann Machine. 2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), pp. 1015–1020. https://doi.org/10.1109/icdm.2017.131 Terrell, J., Kofink, A., Middleton, J., Rainear, C., Murphy-Hill, E., Parnin, C., & Stallings, J. (2017). Gender differences and bias in open source: pull request acceptance of women versus men. PeerJ Computer Science. Li, Z. F., & Thuente, D. J. (2017). Extensions and improvements of jump-stay rendezvous algorithms for cognitive radios. International conference on selected topics in mobile and wireless, 77–84. https://doi.org/10.1109/mownet.2017.8045952 Dong, Y., & Barnes, T. (2017). Evaluation of a Template-based Puzzle Generator for an Educational Programming Game. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF DIGITAL GAMES (FDG'17). https://doi.org/10.1145/3102071.3106347 Amos-Binks, A., Clark, J., Weston, K., Winters, M., & Harfoush, K. (2017). Efficient attack plan recognition using automated planning. 2017 ieee symposium on computers and communications (iscc), 1001–1006. https://doi.org/10.1109/iscc.2017.8024656 Thomaz, L. A., Silva, A. F., Silva, E. A. B., Netto, S. L., & Krim, H. (2017). Detection of abandoned objects using robust subspace recovery with intrinsic video alignment. 2017 ieee international symposium on circuits and systems (iscas), 599–602. https://doi.org/10.1109/iscas.2017.8050385 Alexander, R., & Martens, C. (2017). Deriving quests from open world mechanics. Proceedings of the 12th International Conference on the Foundations of Digital Games (FDG'17). https://doi.org/10.1145/3102071.3102098 Alexander, R., & Martens, C. (2017). Deriving Quests from Open World Mechanics. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF DIGITAL GAMES (FDG'17). https://doi.org/10.1145/3102071.3102096 Zhu, Q., Wo, B., Shen, X., Shen, L., & Wang, Z. (2017). Co-Run Scheduling with Power Cap on Integrated CPU-GPU Systems. 2017 31ST IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 967–977. https://doi.org/10.1109/ipdps.2017.124 Do, L. N. Q., Ali, K., Livshits, B., Bodden, E., Smith, J., & Murphy-Hill, E. (2017). Cheetah: Just-in-Time Taint Analysis for Android Apps. PROCEEDINGS OF THE 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C 2017), pp. 39–42. https://doi.org/10.1109/icse-c.2017.20 Reaves, B., Blue, L., Abdullah, H., Vargas, L., Traynor, P., & Shrimpton, T. (2017). Authenticall: Efficient identity and content authentication for phone calls. Proceedings of the 26th Usenix Security Symposium (USENIX Security '17), 575–592. Morrison, H., & Martens, C. (2017). A Generative Model of Group Conversation. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF DIGITAL GAMES (FDG'17). https://doi.org/10.1145/3102071.3116218 Shapiro, H. G., Peterson, M. N., Stevenson, K. T., Frew, K. N., & Langerhans, R. B. (2017). Wildlife species preferences differ among children in continental and island locations. ENVIRONMENTAL CONSERVATION, 44(4), 389–396. https://doi.org/10.1017/s0376892917000133 Taub, M., Mudrick, N. V., Azevedo, R., Millar, G. C., Rowe, J., & Lester, J. (2017). Using multi-channel data with multi-level modeling to assess in-game performance during gameplay with CRYSTAL ISLAND. COMPUTERS IN HUMAN BEHAVIOR, 76, 641–655. https://doi.org/10.1016/j.chb.2017.01.038 Choi, H. S., Geden, M., & Feng, J. (2017). More visual mind wandering occurrence during visual task performance: Modality of the concurrent task affects how the mind wanders. PLOS ONE, 12(12). https://doi.org/10.1371/journal.pone.0189667 Bhangale, U., Durbha, S. S., King, R. L., Younan, N. H., & Vatsavai, R. (2017). High performance GPU computing based approaches for oil spill detection from multi-temporal remote sensing data. REMOTE SENSING OF ENVIRONMENT, 202, 28–44. https://doi.org/10.1016/j.rse.2017.03.024 Tokarz, D. A., Heffelfinger, A. K., Jima, D. D., Gerlach, J., Shah, R. N., Rodriguez-Nunez, I., … Yoder, J. A. (2017). Disruption of Trim9 function abrogates macrophage motility in vivo. JOURNAL OF LEUKOCYTE BIOLOGY, 102(6), 1371–1380. https://doi.org/10.1189/jlb.1a0816-371r Rowe, E., Asbell-Clarke, J., Baker, R. S., Eagle, M., Hicks, A. G., Barnes, T. M., … Edwards, T. (2017). Assessing implicit science learning in digital games. COMPUTERS IN HUMAN BEHAVIOR, 76, 617–630. https://doi.org/10.1016/j.chb.2017.03.043 Argenta, C., & Doyle, J. (2017). Probabilistic multi-agent plan recognition as planning (P-Maprap): Recognizing teams, goals, and plans from action sequences. ICAART 2017 - Proceedings of the 9th International Conference on Agents and Artificial Intelligence, 2, 575–582. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85068733514&partnerID=MN8TOARS Traynor, P., Butler, K., Bowers, J., & Reaves, B. (2017). FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE SECURITY & PRIVACY, Vol. 15, pp. 85–89. https://doi.org/10.1109/msp.2017.3681060 Hihn, J., Saing, M., Huntington, E., Johnson, J., Menzies, T., & Mathew, G. (2017). The NASA analogy software cost model: A web-based cost analysis tool. 2017 ieee aerospace conference. https://doi.org/10.1109/aero.2017.7943730 Mohassel, P., Rosulek, M., & Scafuro, A. (2017). Sublinear Zero-Knowledge Arguments for RAM Programs. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT I, Vol. 10210, pp. 501–531. https://doi.org/10.1007/978-3-319-56620-7_18 Fogues, R. L., Murukannaiah, P. K., Such, J. M., & Singh, M. P. (2017). SoSharP: Recommending Sharing Policies in Multiuser Privacy Scenarios. IEEE INTERNET COMPUTING, 21(6), 28–36. https://doi.org/10.1109/mic.2017.4180836 Sarkar, S., & Parnin, C. (2017). Characterizing and Predicting Mental Fatigue during Programming Tasks. 2017 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON EMOTION AWARENESS IN SOFTWARE ENGINEERING (SEMOTION 2017), pp. 32–37. https://doi.org/10.1109/semotion.2017.2 Lynch, C. F. (2017). Who prophets from big data in education? New insights and new challenges. THEORY AND RESEARCH IN EDUCATION, 15(3), 249–271. https://doi.org/10.1177/1477878517738448 Nair, V., Menzies, T., Siegmund, N., & Apel, S. (2017). Using Bad Learners to Find Good Configurations. ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 257–267. https://doi.org/10.1145/3106237.3106238 Karpatne, A., Atluri, G., Faghmous, J. H., Steinbach, M., Banerjee, A., Ganguly, A., … Kumar, V. (2017). Theory-Guided Data Science: A New Paradigm for Scientific Discovery from Data. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 29(10), 2318–2331. https://doi.org/10.1109/tkde.2017.2720168 Ford, D., Barik, T., Rand-Pickett, L., & Parnin, C. (2017). The Tech-Talk Balance: What Technical Interviewers Expect from Technical Candidates. 2017 IEEE/ACM 10TH INTERNATIONAL WORKSHOP ON COOPERATIVE AND HUMAN ASPECTS OF SOFTWARE ENGINEERING (CHASE 2017), pp. 43–48. https://doi.org/10.1109/chase.2017.8 Williams, L. (2017). The Rising Tide Lifts All Boats: The Advancement of Science in Cyber Security (Invited Talk). ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 1–1. https://doi.org/10.1145/3106237.3121272 Singh, M. P., & Chopra, A. K. (2017). The Internet of Things and Multiagent Systems: Decentralized Intelligence in Distributed Computing. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), pp. 1738–1747. https://doi.org/10.1109/icdcs.2017.304 Rowe, J. P., Lobene, E. V., Mott, B. W., & Lester, J. C. (2017). Play in the Museum: Design and Development of a Game-Based Learning Exhibit for Informal Science Education. INTERNATIONAL JOURNAL OF GAMING AND COMPUTER-MEDIATED SIMULATIONS, 9(3), 96–113. https://doi.org/10.4018/ijgcms.2017070104 Dai, T., Dean, D., Wang, P., Gu, X., & Lu, S. (2017). Hytrace: A Hybrid Approach to Performance Bug Diagnosis in Production Cloud Infrastructures. PROCEEDINGS OF THE 2017 SYMPOSIUM ON CLOUD COMPUTING (SOCC '17), pp. 641–641. https://doi.org/10.1145/3127479.3132562 Williams, L., & Baldwin, D. (2017, November). Highlights of the ACM Student Research Competition. COMMUNICATIONS OF THE ACM, Vol. 60, pp. 5–5. https://doi.org/10.1145/3145811 Ding, Y. F., Ning, L., Guan, H., & Shen, X. (2017). Generalizations of the theory and deployment of triangular inequality for compiler-based strength reduction. ACM SIGPLAN Notices, 52(6), 33–48. https://doi.org/10.1145/3140587.3062377 Shahzad, M., & Liu, A. X. (2017). Fast and Accurate Tracking of Population Dynamics in RFID Systems. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), pp. 836–846. https://doi.org/10.1109/icdcs.2017.58 Chen, G. Y., Zhao, Y., Shen, X., & Zhou, H. Y. (2017). EffiSha: A software framework for enabling efficient preemptive scheduling of GPU. ACM SIGPLAN Notices, 52(8), 3–16. https://doi.org/10.1145/3155284.3018748 Shen, X. (2017). Bridging the gap between memory performance and massive parallelism: The critical role of programming systems innovations (keynote). ACM SIGPLAN Notices, 52(9), 1–1. https://doi.org/10.1145/3156685.3092569 Zhao, Y., Liao, C. H., & Shen, X. (2017). An infrastructure for HPC knowledge sharing and reuse. ACM SIGPLAN Notices, 52(8), 461–462. https://doi.org/10.1145/3155284.3019023 Yang, T., Liu, A. X., Shahzad, M., Yang, D., Fu, Q., Xie, G., & Li, X. (2017). A Shifting Framework for Set Queries. IEEE-ACM TRANSACTIONS ON NETWORKING, 25(5), 3116–3131. https://doi.org/10.1109/tnet.2017.2730227 Horton, T. E., & Amant, R. S. (2017). A Partial Contour Similarity-Based Approach to Visual Affordances in Habile Agents. IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, 9(3), 269–280. https://doi.org/10.1109/tcds.2017.2702599 Yuan, G., Hang, C.-W., Huhns, M. N., & Singh, M. P. (2017). A Mechanism for Cooperative Demand-Side Management. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), pp. 361–371. https://doi.org/10.1109/icdcs.2017.300 Jones, P., Medd, D., Ramakrishnan, S., Shah, R., Keyton, J., & Samatova, N. (2017). Towards Automatic Linkage of Knowledge Worker's Claims with Associated Evidence from Screenshots. 2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017), pp. 17–22. https://doi.org/10.1109/bigdataservice.2017.21 Shin, K., Joe-Wong, C., Ha, S., Yi, Y., Rhee, I., & Reeves, D. S. (2017). T-Chain: A General Incentive Scheme for Cooperative Computing. IEEE-ACM TRANSACTIONS ON NETWORKING, 25(4), 2122–2137. https://doi.org/10.1109/tnet.2017.2685560 Bahmani, A., & Mueller, F. (2017). Scalable communication event tracing via clustering. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 109, 230–244. https://doi.org/10.1016/j.jpdc.2017.06.008 Rezaei, A., Mueller, F., Hargrove, P., & Roman, E. (2017). DINO: Divergent node cloning for sustained redundancy in HPC. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 109, 350–362. https://doi.org/10.1016/j.jpdc.2017.06.010 Darabseh, A., Al-Ayyoub, M., Jararweh, Y., Benkhelifa, E., Vouk, M., & Rindos, A. (2017). A novel framework for software defined based secure storage systems. SIMULATION MODELLING PRACTICE AND THEORY, 77, 407–423. https://doi.org/10.1016/j.simpat.2016.05.003 Liu, Z., Zhi, R., Hicks, A., & Barnes, T. (2017). Understanding problem solving behavior of 6-8 graders in a debugging game. COMPUTER SCIENCE EDUCATION, 27(1), 1–29. https://doi.org/10.1080/08993408.2017.1308651 King, J., Stallings, J., Riaz, M., & Williams, L. (2017). To log, or not to log: using heuristics to identify mandatory log events - a controlled experiment. EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2684–2717. https://doi.org/10.1007/s10664-016-9449-1 Lee, D., & Krim, H. (2017). System input-output theoretic three-dimensional measurement based on circular-shaped structured light patterns. OPTICAL ENGINEERING, 56(7). https://doi.org/10.1117/1.oe.56.7.073104 Menzies, T., Yang, Y., Mathew, G., Boehm, B., & Hihn, J. (2017). Negative results for software effort estimation. EMPIRICAL SOFTWARE ENGINEERING, 22(5), 2658–2683. https://doi.org/10.1007/s10664-016-9472-2 Riaz, M., King, J., Slankas, J., Williams, L., Massacci, F., Quesada-Lopez, C., & Jenkins, M. (2017). Identifying the implied: Findings from three differentiated replications on the use of security requirements templates. EMPIRICAL SOFTWARE ENGINEERING, 22(4), 2127–2178. https://doi.org/10.1007/s10664-016-9481-1 Ramachandran, L., Gehringer, E. F., & Yadav, R. K. (2017). Automated Assessment of the Quality of Peer Reviews using Natural Language Processing Techniques. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 27(3), 534–581. https://doi.org/10.1007/s40593-016-0132-x Menzies, T., Nichols, W., Shull, F., & Layman, L. (2017). Are delayed issues harder to resolve? Revisiting cost-to-fix of defects throughout the lifecycle. EMPIRICAL SOFTWARE ENGINEERING, 22(4), 1903–1935. https://doi.org/10.1007/s10664-016-9469-x Mitchell, N. (2017). [Review of A superpower transformed: The remaking of American foreign relations in the 1970s]. Cold War History, 17(2), 198–200. Aminrostamkolaee, B., Scroggs, J. S., Borghei, M. S., Safdari-Vaighani, A., Mohammadi, T., & Pourkazemi, M. H. (2017). Valuation of a hypothetical mining project under commodity price and exchange rate uncertainties by using numerical methods. RESOURCES POLICY, 52, 296–307. https://doi.org/10.1016/j.resourpol.2017.04.004 Chen, G., Ding, Y., & Shen, X. (2017). Sweet KNN: An Efficient KNN on GPU through Reconciliation between Redundancy Removal and Regularity. 2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), pp. 621–632. https://doi.org/10.1109/icde.2017.116 Yang, T., Liu, L., Yan, Y., Shahzad, M., Shen, Y., Li, X., … Xie, G. (2017). SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items. 2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), pp. 103–106. https://doi.org/10.1109/icde.2017.50 Jin, Y., Tseng, H.-W., Papakonstantinou, Y., & Swanson, S. (2017). KAML: A Flexible, High-Performance Key-Value SSD. 2017 23RD IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA), pp. 373–384. https://doi.org/10.1109/hpca.2017.15 Tateosian, L. G., Glatz, M., Shukunobe, M., & Chopra, P. (2017). GazeGIS: A Gaze-Based Reading and Dynamic Geographic Information System. EYE TRACKING AND VISUALIZATION: FOUNDATIONS, TECHNIQUES, AND APPLICATIONS, ETVIS 2015, pp. 129–147. https://doi.org/10.1007/978-3-319-47024-5_8 Lee, D., & Krim, H. (2017). Determination of a Sampling Criterion for 3D Reconstruction. JOURNAL OF IMAGING SCIENCE AND TECHNOLOGY, 61(4). https://doi.org/10.2352/j.imagingsci.technol.2017.61.4.040501 Ge, Xi, Shepherd, D. C., Damevski, K., & Murphy-Hill, E. (2017). Design and evaluation of a multi-recommendation system for local code search. JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 39, 1–9. https://doi.org/10.1016/j.jvlc.2016.07.002 Shahzad, M., Liu, A. X., & Samuel, A. (2017). Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures. IEEE TRANSACTIONS ON MOBILE COMPUTING, 16(10), 2726–2741. https://doi.org/10.1109/tmc.2016.2635643 Altuntas, A., & Baugh, J. (2017). Adaptive subdomain modeling: A multi-analysis technique for ocean circulation models. OCEAN MODELLING, 115, 86–104. https://doi.org/10.1016/j.ocemod.2017.05.009 Kayal, P., & Perros, H. (2017). A comparison of IoT application layer protocols through a smart parking implementation. Proceedings of the 2017 20th conference on innovations in clouds, internet and networks (icin), 331–336. https://doi.org/10.1109/icin.2017.7899436 Xu, M., Yang, R., Harenberg, S., & Samatova, N. F. (2017). A Lifelong Learning Topic Model Structured Using Latent Embeddings. 2017 11TH IEEE INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), pp. 260–261. https://doi.org/10.1109/icsc.2017.15 Orphanides, A. K., & Nam, C. S. (2017). [Review of Touchscreen interfaces in context: A systematic review of research into touchscreens across settings, populations, and implementations]. APPLIED ERGONOMICS, 61, 116–143. https://doi.org/10.1016/j.apergo.2017.01.013 Fogues, R. L., Murukannaiah, P. K., Such, J. M., & Singh, M. P. (2017). Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making. ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION, 24(1). https://doi.org/10.1145/3038920 Shahzad, M., & Singh, M. P. (2017). Continuous Authentication and Authorization for the Internet of Things. IEEE INTERNET COMPUTING, 21(2), 86–90. https://doi.org/10.1109/mic.2017.33 Parnin, C., Helms, E., Atlee, C., Boughton, H., Ghattas, M., Glover, A., … Williams, L. (2017). The Top 10 Adages in Continuous Deployment. IEEE SOFTWARE, 34(3), 86–95. https://doi.org/10.1109/ms.2017.86 Talebi, S., & Rouskas, G. N. (2017). On Distance-Adaptive Routing and Spectrum Assignment in Mesh Elastic Optical Networks. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 9(5), 456–465. https://doi.org/10.1364/jocn.9.000456 Krishna, R., Menzies, T., & Layman, L. (2017). Less is more: Minimizing code reorganization using XTREE. INFORMATION AND SOFTWARE TECHNOLOGY, 88, 53–66. https://doi.org/10.1016/j.infsof.2017.03.012 Kessentini, M., & Menzies, T. (2017, September). A guest editorial: special issue on search based software engineering and data mining. AUTOMATED SOFTWARE ENGINEERING, Vol. 24, pp. 573–574. https://doi.org/10.1007/s10515-017-0217-2 Ali, K., Liu, A. X., Wang, W., & Shahzad, M. (2017). Recognizing Keystrokes Using WiFi Devices. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1175–1190. https://doi.org/10.1109/jsac.2017.2680998 Lee, H. W., Sichitiu, M. L., & Thuente, D. (2017). NEAT: Network link emulation with adaptive time dilation. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 104, 88–98. https://doi.org/10.1016/j.jpdc.2017.01.013 Lytle, N., Floryan, M., & Amin, D. (2017). Experience, experiment, evaluate: A framework for assessing experiential games. International Journal of Serious Games, 4(1), 15–30. Wang, W., Liu, A. X., Shahzad, M., Ling, K., & Lu, S. (2017). Device-Free Human Activity Recognition Using Commercial WiFi Devices. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1118–1131. https://doi.org/10.1109/jsac.2017.2679658 Bouguettaya, A., Singh, M., Huhns, M., Sheng, Q. Z., Dong, H., Yu, Q., … Papazoglou, M. (2017). [Review of A Service Computing Manifesto: The Next 10 Years]. COMMUNICATIONS OF THE ACM, 60(4), 64–72. https://doi.org/10.1145/2983528 Pei, J., Liu, X. B., Pardalos, P. M., Fan, W. J., & Yang, S. L. (2017). Scheduling deteriorating jobs on a single serial-batching machine with multiple job types and sequence-dependent setup times. Annals of Operations Research, 249(1-2), 175–195. Barnes, T., Boyer, K., Hsiao, S. I.-H., Le, N.-T., & Sosnovsky, S. (2017). Preface for the Special Issue on AI-Supported Education in Computer Science. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 27(1), 1–4. https://doi.org/10.1007/s40593-016-0123-y Chen, G., Shen, X., Wu, B., & Li, D. (2017). Optimizing Data Placement on GPU Memory: A Portable Approach. IEEE Transactions on Computers, 66(3), 473–487. https://doi.org/10.1109/tc.2016.2604372 Mostafavi, B., & Barnes, T. (2017). Evolution of an Intelligent Deductive Logic Tutor Using Data-Driven Elements. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 27(1), 5–36. https://doi.org/10.1007/s40593-016-0112-1 Wiggins, J. B., Grafsgaard, J. F., Boyer, K. E., Wiebe, E. N., & Lester, J. C. (2017). Do You Think You Can? The Influence of Student Self-Efficacy on the Effectiveness of Tutorial Dialogue for Computer Science. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 27(1), 130–153. https://doi.org/10.1007/s40593-015-0091-7 He, X., Dai, H., Ning, P., & Dutta, R. (2017). A Leader-Follower Controlled Markov Stopping Game for Delay Tolerant and Opportunistic Resource Sharing Networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(3), 615–627. https://doi.org/10.1109/jsac.2017.2659581 Choi, H.-M., & Ji, C.-R. (2017, March). Twist-3 Distribution Amplitudes of Pion in the Light-Front Quark Model. FEW-BODY SYSTEMS, Vol. 58. https://doi.org/10.1007/s00601-016-1208-8 Gruen, M. E., Alfaro-Cordoba, M., Thomson, A. E., Worth, A. C., Staicu, A.-M., & Lascelles, B. D. X. (2017). The Use of Functional Data Analysis to Evaluate Activity in a Spontaneous Model of Degenerative Joint Disease Associated Pain in Cats. PLOS ONE, 12(1). https://doi.org/10.1371/journal.pone.0169576 Liu, X., Li, K., Liu, A. X., Guo, S., Shahzad, M., Wang, A. L., & Wu, J. (2017). Multi-Category RFID Estimation. IEEE-ACM TRANSACTIONS ON NETWORKING, 25(1), 264–277. https://doi.org/10.1109/tnet.2016.2594481 Steenbock, T., Shultz, D. A., Kirk, M. L., & Herrmann, C. (2017). Influence of Radical Bridges on Electron Spin Coupling. JOURNAL OF PHYSICAL CHEMISTRY A, 121(1), 216–225. https://doi.org/10.1021/acs.jpca.6b07270 Stallmann, M. F. (2017). Algorithm Animation with Galant. IEEE COMPUTER GRAPHICS AND APPLICATIONS, 37(1), 8–14. https://doi.org/10.1109/mcg.2017.2 Kurte, K. R., Durbha, S. S., King, R. L., Younan, N. H., & Vatsavai, R. (2017). Semantics-Enabled Framework for Spatial Image Information Mining of Linked Earth Observation Data. IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 10(1), 29–44. https://doi.org/10.1109/jstars.2016.2547992 Dominguez, I. X., Goodwin, P. R., Roberts, D. L., & St Amant, R. (2017). Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 33(1), 44–54. https://doi.org/10.1080/10447318.2016.1232229 Pruden, M., Kerkhoff, S. N., Spires, H. A., & Lester, J. (2017). Enhancing Writing Achievement Through a Digital Learning Environment: Case Studies of Three Struggling Adolescent Male Writers. READING & WRITING QUARTERLY, 33(1), 1–19. https://doi.org/10.1080/10573569.2015.1059780 Majikes, J., Brugarolas, R., Winters, M., Yuschak, S., Mealin, S., Walker, K., … Roberts, D. L. (2017). Balancing noise sensitivity, response latency, and posture accuracy for a computer-assisted canine posture training system. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 98, 179–195. https://doi.org/10.1016/j.ijhcs.2016.04.010 Fang, S., Liu, Y., Shen, W. B., Zhu, H. J., & Wang, T. (2017). Virtual multipath attack and defense for location distinction in wireless networks. IEEE Transactions on Mobile Computing, 16(2), 566–580. Zhu, Q., Wu, B., Shen, X., Shen, K., Shen, L., & Wang, Z. (2017). Understanding co-run performance on CPU-GPU integrated processors: observations, insights, directions. Frontiers of Computer Science, 11(1), 130–146. https://doi.org/10.1007/s11704-016-5468-8