Computer Science - 2007 Enck, W., McDaniel, P., Sen, S., Sebos, P., Spoerel, S., Greenberg, A., … Aiello, W. (2007). Configuration Management at Massive Scale: System Design and Experience. Proceedings of the USENIX Annual Technical Conference, 73–86. Retrieved from https://www.usenix.org/legacy/events/usenix07/tech/enck.html Enck, W., Rueda, S., Schiffman, J., Sreenivasan, Y., St Clair, L., Jaeger, T., & McDaniel, P. (2007). Protecting users from themselves. Proceedings of the 2007 ACM workshop on Computer security architecture, 29–36. Rowaihy, H., Enck, W., McDaniel, P., & La Porta, T. (2007). Limiting sybil attacks in structured p2p networks. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2596–2600. Johansen, L., Butler, K., Enck, W., Traynor, P., & McDaniel, P. (2007). Grains of SANs: Building Storage Area Networks from Memory Spots. Technical Report NASTR-0060-2007, Network and Security Research Center …. Sherriff, M. S., Heckman, S. S., Lake, J. M., & Williams, L. A. (2007). Using groupings of static analysis alerts to identify files likely to contain field failures. The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering: companion papers, 565–568. Sherriff, M., Heckman, S. S., Lake, M., & Williams, L. (2007). Identifying fault-prone files using static analysis alerts through singular value decomposition. Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, 276–279. Heckman, S. S. (2007). Adaptively ranking alerts generated from automated static analysis. XRDS: Crossroads, The ACM Magazine for Students, 14(1), 1–11. Heckman, S. S. (2007). Adaptive probabilistic model for ranking code-based static analysis alerts. 29th International Conference on Software Engineering (ICSE'07 Companion), 89–90. Rosenblum, D. S., & Elbaum, S. G. (Eds.). (2007). Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2007, London, UK, July 9-12, 2007. https://doi.org/10.1145/1273463 d’Amorim, M., Lauterburg, S., & Marinov, D. (2007). Delta execution for efficient state-space exploration of object-oriented programs. Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2007, London, UK, July 9-12, 2007, 50–60. https://doi.org/10.1145/1273463.1273472 Dutta, R., Rouskas, G. N., Baldine, I., Bragg, A., Stevenson, D., & IEEE. (2007). The SILO architecture for services integration, control, and optimization for the future Internet. 2007 Ieee International Conference on Communications, Vols 1-14, 1899–1904. https://doi.org/10.1109/ICC.2007.316 Rouskas, G. N., BaradwaJ, N., & IEEE. (2007). TDM emulation in packet-switched networks. 2007 Ieee International Conference on Communications, Vols 1-14, 1911–1916. https://doi.org/10.1109/ICC.2007.318 Stevenson, D., Dutta, R., Rouskas, G., Reeves, D., Baldine, I., & IEEE. (2007). On the suitability of composable services for the assurable future Internet. 2007 Ieee Military Communications Conference, Vols 1-8, 3695–3701. Iyer, M., Rouskas, G. N., Dutta, R., & IEEE. (2007). Hierarchical Grooming in Multigranular Networks. 2007 First International Symposium on Advanced Networks and Telecommunication Systems, 35–36. Rouskas, G. N., Baradwaj, N., & IEEE. (2007). Framework for tiered service in MPLS networks. Infocom 2007, Vols 1-5, 1577–1585. https://doi.org/10.1109/INFCOM.2007.185 Chen, B., Dutta, R., Rouskas, G. N., Tomkos, I., Neri, F., Pareta, J. S., … Lopez, S. S. (2007). Clustering for hierarchical traffic grooming in large scale mesh WDM networks. In Optical Network Design and Modeling, Proceedings (Vol. 4534, pp. 249–258). Baldine, I., Vellala, M., Wang, A., Rouskas, G., Dutta, R., Stevenson, D., & IEEE. (2007). A unified software architecture to enable cross-layer design in the future Internet. In Proceedings - 16th International Conference on Computer Communications and Networks, Vols 1-3 (pp. 26–32). Rouskas, G. N., Dwekat, Z., & IEEE. (2007). A practical and efficient implementation of WF(2)Q+. 2007 Ieee International Conference on Communications, Vols 1-14, 172–176. https://doi.org/10.1109/ICC.2007.36 Yuan, J., Guo, Z., Lv, L., Wan, W., Zhang, T., Wang, D., … Zhang, Y. (2007). THU and ICRC at TRECVID 2007. National Institute of Standards and Technology. Gehringer, E. (2007). Session details: Embedded systems and architecture. ACM SIGCSE Bulletin, 39(1). https://doi.org/10.1145/3263059 Kaltofen, E., Li, B., Sivaramakrishnan, K., Yang, Z., & Zhi, L. (2007). Lower bounds for approximate factorizations via semidefinite programming. In J. Verschelde & S. M. Watt (Eds.), Proceedings of the 2007 International Workshop on Symbolic-Numeric Computation (SNC '07) (pp. 203–204). New York, NY: ACM Press. Thorpe, S. R., Battestilli, L., Karmous-Edwards, G., Hutanu, A., MacLaren, J., Mambretti, J., … Jinno, M. (2007). G-lambda and EnLIGHTened: Wrapped In Middleware Co-allocating Compute and Network Resources Across Japan and the US. Presented at the 1st International ICST Conference on Networks for Grid Applications. https://doi.org/10.4108/gridnets.2007.2077 Battestilli, L., Hutanu, A., Karmous-Edwards, G., Katz, D. S., MacLaren, J., Mambretti, J., … Xin, Y. (2007). EnLIGHTened Computing: An architecture for co-allocating network, compute, and other grid resources for high-end applications. Presented at the 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies. https://doi.org/10.1109/honet.2007.4600261 Washington, N., & Perros, H. (2007). Performance Analysis of Traffic-Groomed Optical Networks Employing Alternate Routing Techniques. In L. Mason, T. Drwiega, & J. Yan (Eds.), Managing Traffic Performance in Converged Networks. ITC 2007 (pp. 1048–1059). https://doi.org/10.1007/978-3-540-72990-7_90 Tian, W., & Perros, H. (2007). Analysis and Provisioning of a Circuit-Switched Link with Variable-Demand Customers. In L. Mason, T. Drwirga, & J. Yan (Eds.), Managing Traffic Performance in Converged Networks. ITC 2007 (pp. 890–900). https://doi.org/10.1007/978-3-540-72990-7_77 Williams, L., Erdogmus, H., & Selby, R. (2007). Roadmapping Working Group 4 Results. In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 181–183). https://doi.org/10.1007/978-3-540-71301-2_53 Prechelt, L., & Williams, L. (2007). Industry-Research Collaboration Working Group Results. In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 153–157). https://doi.org/10.1007/978-3-540-71301-2_46 Williams, L. (2007). Structuring Families of Industrial Case Studies. In V. R. Basili, D. Rombach, K. Schneider, B. Kitchenham, D. Pfahl, & R. W. Selby (Eds.), Empirical Software Engineering Issues. Critical Assessment and Future Directions (pp. 134–134). https://doi.org/10.1007/978-3-540-71301-2_41 Shen, X., & Mao, F. (2007). Modeling Relations Between Inputs and Dynamic Behavior for General Programs (No. WM-CS-2007-07). Williamsburg, VA: Computer Science Department, The College of William and Mary. Shen, X., Jiang, Y., & Mao, F. (2007). CAPS: Contention-Aware Proactive Scheduling for CMPs (Technical Report No. WM-CS-2007-09). Computer Science Department, The College of William and Mary. Jiang, Y., & Shen, X. (2007). Study of the Effects of Program Inputs on Co-Scheduling (Technical Report No. WM-CS-2007-13). Computer Science Department, The College of William and Mary. Shen, X. (2007). A Hybrid Framework Bridging Locality Analysis and Cache-Aware Scheduling for CMPs (Technical Report No. WM-CS-2007-01). Computer Science Dept., The College of William and Mary. Tateosian, L. G., Healey, C. G., & Enns, J. T. (2007). Engaging viewers through nonphotorealistic visualizations. Proceedings of the 5th international symposium on Non-photorealistic animation and rendering - NPAR '07. Presented at the the 5th international symposium. https://doi.org/10.1145/1274871.1274886 Xin, Y., & Battestilli, L. (2007). A performance study on optical burst switched networks: the ring topology. Photonic Network Communications, 14(1), 63–70. https://doi.org/10.1007/s11107-007-0061-6 Vatsavai, R. R., Shekhar, S., & Burk, T. E. (2007). An efficient spatial semi-supervised learning algorithm. International Journal of Parallel, Emergent and Distributed Systems, 22(6), 427–437. https://doi.org/10.1080/17445760701207546 Zhong, Y., Dropsho, S. G., Shen, X., Studer, A., & Ding, C. (2007). Miss Rate Prediction Across Program Inputs and Cache Configurations. IEEE Transactions on Computers, 56(3), 328–343. https://doi.org/10.1109/tc.2007.50 Shen, X., Zhong, Y., & Ding, C. (2007). Predicting locality phases for dynamic memory optimization. Journal of Parallel and Distributed Computing, 67(7), 783–796. https://doi.org/10.1016/j.jpdc.2007.01.010 Shen, X., Shaw, J., Meeker, B., & Ding, C. (2007). Locality approximation using time. Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages - POPL '07. Presented at the the 34th annual ACM SIGPLAN-SIGACT symposium. https://doi.org/10.1145/1190216.1190227 Ding, C., Shen, X., Kelsey, K., Tice, C., Huang, R., & Zhang, C. (2007). Software behavior oriented parallelization. Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation - PLDI '07. Presented at the the 2007 ACM SIGPLAN conference. https://doi.org/10.1145/1250734.1250760 Lootah, W., Enck, W., & McDaniel, P. (2007). TARP: Ticket-based address resolution protocol. Computer Networks, 51(15), 4322–4337. https://doi.org/10.1016/j.comnet.2007.05.007 Park, B.-H., Ostrouchov, G., & Samatova, N. F. (2007). Sampling streaming data with replacement. Computational Statistics & Data Analysis, 52(2), 750–762. https://doi.org/10.1016/j.csda.2007.03.010 Neginhal, M., Harfoush, K., & Perros, H. (2007). Measuring Bandwidth Signatures of Network Paths. In I. F. Akyildiz, R. Sivakumar, E. Ekici, J. C. Oliveira, & J. McNair (Eds.), NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1072–1083). https://doi.org/10.1007/978-3-540-72606-7_92 McQuiggan, S. W., Lee, S., & Lester, J. C. (2007). Early Prediction of Student Frustration. In Affective Computing and Intelligent Interaction (pp. 698–709). https://doi.org/10.1007/978-3-540-74889-2_61 Lee, S., McQuiggan, S. W., & Lester, J. C. (2007). Inducing User Affect Recognition Models for Task-Oriented Environments. In User Modeling 2007 (pp. 380–384). https://doi.org/10.1007/978-3-540-73078-1_49 Chen, B., Dutta, R., & Rouskas, G. N. (2007). Clustering for Hierarchical Traffic Grooming in Large Scale Mesh WDM Networks. In Optical Network Design and Modeling (pp. 249–258). https://doi.org/10.1007/978-3-540-72731-6_28 Cushing, J. B., Nadkarni, N., Finch, M., Fiala, A., Murphy-Hill, E., Delcambre, L., & Maier, D. (2007). Component-based end-user database design for ecologists. Journal of Intelligent Information Systems, 29(1), 7–24. https://doi.org/10.1007/S10844-006-0028-6 SPARQ2L. (2007). Proceedings of the 16th international conference on World Wide Web - WWW '07. https://doi.org/10.1145/1242572.1242680 Estimating the cardinality of RDF graph patterns. (2007). Proceedings of the 16th international conference on World Wide Web - WWW '07. https://doi.org/10.1145/1242572.1242782 Stallmann, M. F., & Brglez, F. (2007). High-contrast algorithm behavior. Proceedings of the 2007 workshop on Experimental computer science - ExpCS '07. Presented at the the 2007 workshop. https://doi.org/10.1145/1281700.1281712 Sawant, A. P., Raina, R., & Healey, C. G. (2007). ChipViz: Visualizing Memory Chip Test Data. In Advances in Visual Computing (pp. 711–720). https://doi.org/10.1007/978-3-540-76856-2_70 Batchelor, D. A., Beck, M., Becoulet, A., Budny, R. V., Chang, C. S., Diamond, P. H., … Zonca, F. (2007). Simulation of Fusion Plasmas: Current Status and Future Direction. Plasma Science and Technology, 9(3), 312–387. https://doi.org/10.1088/1009-0630/9/3/13 Vouk, M. A., Altintas, I., Barreto, R., Blondin, J., Cheng, Z., Critchlow, T., … Silva, C. (2007). Automation of Network-Based Scientific Workflows. In IFIP The International Federation for Information Processing (pp. 35–61). https://doi.org/10.1007/978-0-387-73659-4_3 Matsuda, N., Cohen, W. W., Sewall, J., Lacerda, G., & Koedinger, K. R. (2007). Evaluating a simulated student using real students data for training and testing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 107–116). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-37249054311&partnerID=MN8TOARS Miller, G. L., Phillips, T., & Sheehy, D. (2007). Size Competitive Meshing Without Large Angles. In Automata, Languages and Programming (pp. 655–666). https://doi.org/10.1007/978-3-540-73420-8_57 Desai, N., Chopra, A. K., & Singh, M. P. (2007). Representing and reasoning about commitments in business processes. Proceedings of the National Conference on Artificial Intelligence, 2, 1328–1333. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-36349027545&partnerID=MN8TOARS Desai, N., Cheng, Z., Chopra, A. K., & Singh, M. P. (2007). Toward verification of commitment protocols and their compositions. Proceedings of the International Conference on Autonomous Agents, 144–146. https://doi.org/10.1145/1329125.1329165 Governance of cross-organizational service agreements: A policy-based approach. (2007). IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS. Retrieved from https://publons.com/publon/21294458/ Formalizing Communication Protocols for Multiagent Systems. (2007). 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. Retrieved from https://publons.com/publon/21294460/ Formal Trust Model for Multiagent Systems. (2007). 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE. Retrieved from https://publons.com/publon/21294461/ Udupi, Y. B., & Singh, M. P. (2007). Governance of cross-organizational service agreements: A policy-based approach. Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007, 36–43. https://doi.org/10.1109/SCC.2007.63 Desai, N., Chopra, A. K., Arrott, M., Spechte, B., & Singh, M. P. (2007). Engineering foreign exchange processes via commitment protocols. Proceedings - 2007 IEEE International Conference on Services Computing, SCC 2007, 514–521. https://doi.org/10.1109/SCC.2007.58 Fisher, M., Singh, M., Spears, D., & Wooldridge, M. (2007). Logic-Based Agent Verification. Journal of Applied Logic, 5(2), 193–195. https://doi.org/10.1016/j.jal.2005.12.012 Udupi, Y. B., & Singh, M. P. (2007). InterPol: A policy framework for managing trust and privacy in referral networks. Proceedings of the International Conference on Autonomous Agents, 1095–1097. https://doi.org/10.1145/1329125.1329332 Chakravarty, P., & Singh, M. P. (2007). An event-driven approach for agent-based business process enactment. Proceedings of the International Conference on Autonomous Agents, 1269–1271. https://doi.org/10.1145/1329125.1329383 Desai, N., & Singh, M. P. (2007). A modular action description language for protocol composition. Proceedings of the National Conference on Artificial Intelligence, 2, 962–967. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-36349036553&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2007). Enacting protocols by commitment concession. Proceedings of the International Conference on Autonomous Agents, 116–123. https://doi.org/10.1145/1329125.1329158 Udupi, Y. B., & Singh, M. P. (2007). Dynamics of contracts-based organizations: A formal approach based on institutions. Proceedings of the International Conference on Autonomous Agents, 82–84. https://doi.org/10.1145/1329125.1329149 Chopra, A. K., & Singh, M. P. (2007). Choice and interoperation in protocol enactment. Proceedings of the International Conference on Autonomous Agents, 132–134. https://doi.org/10.1145/1329125.1329161 Wicker, A. W., & Doyle, J. (2007). Interest-matching comparisons using CP-nets. Proceedings of the National Conference on Artificial Intelligence, 2, 1914–1915. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-36348991910&partnerID=MN8TOARS Anand, S. S., Bahls, D., Burghart, C. R., Burstein, M., Chen, H., Collins, J., … Wellman, M. (2007). AAAI-07 workshop reports. AI Magazine, 28(4), 119–128. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-39049150323&partnerID=MN8TOARS Doyle, J., Goldsmith, J., Junker, U., & Lang, J. (2007). AAAI Workshop - Technical Report: Preface. AAAI Workshop - Technical Report, WS-07-10. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-51849090045&partnerID=MN8TOARS Kormilitsin, M., Chirkova, R. Y., Fathi, Y., & Stallmann, M. F. (2007). View and index selection for query-performance improvement: Algorithms, heuristics and complexity. North Carolina State University. Dept. of Computer Science. Stallmann, M. F., Balik, S. P., Rodman, R. D., Bahram, S., Grace, M. C., & High, S. D. (2007). Proofchecker: an accessible environment for automata theory correctness proofs. ACM SIGCSE Bulletin, 39(3), 48–52. Stallmann, M. F., & Brglez, F. (2007). High-contrast algorithm behavior: observation, hypothesis, and experimental design. Proceedings of the 2007 workshop on Experimental computer science, 12. Boyer, K. E., Dwight, R. S., Miller, C. S., Raubenheimer, C. D., Stallmann, M. F., & Vouk, M. A. (2007). A case for smaller class size with integrated lab for introductory computer science. ACM SIGCSE Bulletin, 39(1), 341–345. Borwein, P., Kaltofen, E., & Mossinghoff, M. J. (2007). Irreducible polynomials and barker sequences. ACM Communications in Computer Algebra, 41(4), 118. https://doi.org/10.1145/1358183.1358185 Kaltofen, E., Yang, Z., & Zhi, L. (2007). Structured Low Rank Approximation of a Sylvester Matrix. In Trends in Mathematics (pp. 69–83). https://doi.org/10.1007/978-3-7643-7984-1_5 Gehringer, E. F. (2007). Using independent-study projects in your research and teaching program. Proceedings of the 2007 ASEE Annual Conference and Exposition. Presented at the 2007 ASEE Annual Conference and Exposition, Honolulu, HI. Gehringer, E. F. (2007). Active and collaborative learning strategies for teaching computing. Proceedings of the 2007 ASEE Annual Conference and Exposition. Presented at the 2007 ASEE Annual Conference and Exposition, Honolulu, HI. Gehringer, E. F., Ehresman, L. M., Conger, S. G., & Wagle, P. A. (2007). Reusable learning objects through peer review: The Expertiza approach. Innovate—Journal of Online Education, 3(6). Gambhir, M., Gehringer, E. F., & Solihin, Y. (2007). Animations of important concepts in parallel computer architecture. Proceedings of the 2007 workshop on Computer architecture education - WCAE '07. Presented at the the 2007 workshop. https://doi.org/10.1145/1275633.1275638 Blake, C., Kampov, J., Orphanides, A. K., West, D., & Lown, C. (2007). Unc-ch at duc 2007: Query expansion, lexical simplification and sentence selection strategies for multi-document summarization. Proceedings of Document Understanding Conference (DUC) Workshop. Agarwal, A. K., & Wang, W. (2007). AN EXPERIMENTAL STUDY ON SECURITY PROTOCOLS IN WLANS. WIRELESS NETWORK SECURITY, pp. 295–322. https://doi.org/10.1007/978-0-387-33112-6_12 Singh, M. P. (2007). Formalizing communication protocols for multiagent systems. IJCAI International Joint Conference on Artificial Intelligence, 1519–1524. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-75649138061&partnerID=MN8TOARS Wang, Y., & Singh, M. P. (2007). Formal trust model for multiagent systems. IJCAI International Joint Conference on Artificial Intelligence, 1551–1556. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84880909594&partnerID=MN8TOARS Abdulla, P. A., Mahata, P., & Mayr, R. (2007). Dense-timed petri nets: Checking zenoness, token liveness and boundedness. Logical Methods in Computer Science, 3(1). Abdulla, P. A., Ben Henda, N., & Mayr, R. (2007). Decisive Markov chains. Logical Methods in Computer Science, 3(4). Zhao, T. F., Wang, J., Huang, A. Q., & Agarwal, A. (2007). Comparisons of SiC MOSFET and Si IGBT based motor drive systems. Conference record of the 2007 IEEE Industry Applications Conference forty-second IAS annual meeting, 331–335. https://doi.org/10.1109/07ias.2007.51 Kumar, N. J., Asokan, V., Shivshankar, S., & Dean, A. G. (2007, February). Efficient software implementation of embedded communication protocol controllers using asynchronous software thread integration with time- and space-efficient procedure calls. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, Vol. 6. https://doi.org/10.1145/1210268.1210270 Rhee, I. (2007). Methods and systems for rate-based flow control between a sender and a receiver. Washington, DC: U.S. Patent and Trademark Office. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2007). Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 3(3). https://doi.org/10.1145/1267060.1267062 Weeks, T. W., & Linthicum, K. J. (2007). Gallium nitride material devices and methods of forming the same. Washington, DC: U.S. Patent and Trademark Office. Kripakaran, P., Gupta, A., & Baugh, J. W., Jr. (2007). A novel optimization approach for minimum cost design of trusses. COMPUTERS & STRUCTURES, 85(23-24), 1782–1794. https://doi.org/10.1016/j.compstruc.2007.04.006 Corteel, S., Gessel, I. M., Savage, C. D., & Wiif, H. S. (2007). The joint distribution of descent and major index over restricted sets of permutations. ANNALS OF COMBINATORICS, 11(3-4), 375–386. https://doi.org/10.1007/s00026-007-0325-y Otto, P. N., Anton, A. I., & Baumer, D. L. (2007). The ChoicePoint dilemma - How data brokers should handle the privacy of personal information. IEEE SECURITY & PRIVACY, 5(5), 15–23. https://doi.org/10.1109/MSP.2007.126 Yang, L., & Rouskas, G. N. (2007). Optimal wavelength sharing policies in OBS networks subject to QoS constraints. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 25(9), 40–49. https://doi.org/10.1109/JSAC-OCN.2007.029707 Kumar, S. V., Doby, T. A., Baugh, J. W., Brill, E. D., & Ranjithan, S. R. (2007). Closure to "optimal design of redundant water distribution networks using a cluster of workstations" by Sujay V. Kumar, Troy A. Doby, John W. Baugh Jr., E. Downey Brill, and S. Ranji Ranjithan. Journal of Water Resources Planning and Management, 133(6), 580–581. https://doi.org/10.1061/(asce)0733-9496(2007)133:6(580) Rhee, I., & Xu, L. (2007, August). Limitations of equation-based congestion control. IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 15, pp. 852–865. https://doi.org/10.1109/TNET.2007.893883 Needham, M. L., Webb, A. I., Baynes, R. E., Riviere, J. E., Craigmill, A. L., & Tell, L. A. (2007, November 15). Current update on drugs for game bird species. JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, Vol. 231, pp. 1506–1508. https://doi.org/10.2460/javma.231.10.1506 Strickland, D. C., McAllister, D., Coles, C. D., & Osborne, S. (2007). An evolution of virtual reality training designs for children with autism and fetal alcohol spectrum disorders. TOPICS IN LANGUAGE DISORDERS, 27(3), 226–241. https://doi.org/10.1097/01.TLD.0000285357.95426.72 Amant, R. S., Horton, T. E., & Ritter, F. E. (2007). Model-based evaluation of expert cell phone menu interaction. ACM Transactions on Computer-Human Interaction, 14(1). Strand, A. E., & Niehaus, J. M. (2007). KERNELPOP, a spatially explicit population genetic simulation engine. MOLECULAR ECOLOGY NOTES, 7(6), 969–973. https://doi.org/10.1111/j.1471-8286.2007.01832.x Warrier, A., Park, S., Min, J., & Rhee, I. (2007). How much energy saving does topology control offer for wireless sensor networks? - A practical study. COMPUTER COMMUNICATIONS, 30(14-15), 2867–2879. https://doi.org/10.1016/j.comcom.2007.05.019 Coffman, J., Healy, C., Mueller, F., & Whalley, D. (2007, July). Generalizing parametric timing analysis. ACM SIGPLAN NOTICES, Vol. 42, pp. 152–154. https://doi.org/10.1145/1273444.1254795 Zhu, Y., & Mueller, F. (2007, July). DVSleak: Combining leakage reduction and voltage scaling in feedback EDF scheduling. ACM SIGPLAN NOTICES, Vol. 42, pp. 31–40. https://doi.org/10.1145/1273444.1254772 Simpson, M., Raman, S., Lundquist, J. K., & Leach, M. (2007). A study of the variation of urban mixed layer heights. ATMOSPHERIC ENVIRONMENT, 41(33), 6923–6930. https://doi.org/10.1016/j.atmosenv.2006.08.029 Hagh-Shenas, H., Kim, S., & Interrante, V. (2007). Weaving versus blending: a quantitative assessment of the information carrying capacities of two alternative methods for conveying multivariate data with color. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, Vol. 13, pp. 1270–1277. https://doi.org/10.1109/TVCG.2007.70623 Huang, S., & Dutta, R. (2007, December 19). Spare capacity provisioning for quasi-static traffic. COMPUTER NETWORKS, Vol. 51, pp. 5011–5035. https://doi.org/10.1016/j.comnet.2007.08.006 Kaltofen, E., Yang, Z.-F., & Zhi, L.-H. (2007). On probabilistic analysis of randomization in hybrid symbolic-numeric algorithms. International Workshop on Symbolic-Numeric Computation: Proceedings. New York: ACM Press. Scarantino, C. W., Nagle, H. T., Kim, C.-S., Ufer, S., Fiering, J., & Kermani, B. G. (2007). Methods, computer program products, and devices for calibrating chronically tissue implanted sensors using chronically tissue. Washington, DC: U.S. Patent and Trademark Office. Iyer, P., Dutta, R., & Savage, C. D. (2007). Complexity of path traffic grooming. JOURNAL OF OPTICAL NETWORKING, 6(11), 1270–1281. https://doi.org/10.1364/JON.6.001270 Marathe, J., & Mueller, F. (2007). Source-code-correlated cache coherence characterization of OpenMP benchmarks. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 18(6), 818–834. https://doi.org/10.1109/TPDS.2007.1058 Li, L., Andersen, M. E., Heber, S., & Zhang, Q. (2007). Non-monotonic dose-response relationship in steroid hormone receptor-mediated gene expression. JOURNAL OF MOLECULAR ENDOCRINOLOGY, 38(5-6), 569–585. https://doi.org/10.1677/JME-07-0003 Gou, G., & Chirkova, R. (2007). [Review of Efficiently querying large XML data repositories: A survey]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 19(10), 1381–1403. https://doi.org/10.1109/tkde.2007.1060 Freeh, V. W., Lowenthal, D. K., Pan, F., Kappiah, N., Springer, R., Rountree, B. L., & Femal, M. E. (2007). Analyzing the energy-time trade-off in high-performance computing applications. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 18(6), 835–848. https://doi.org/10.1109/TPDS.2007.1026 Anton, A. I., Bertino, E., Li, N., & Yu, T. (2007). A roadmap for COMPREHENSIVE online privacy policy management. COMMUNICATIONS OF THE ACM, 50(7), 109–116. https://doi.org/10.1145/1272516.1272522 Afrati, F., Chirkova, R., Gergatsoulis, M., & Pavlaki, V. (2007). View selection for real conjunctive queries. ACTA INFORMATICA, 44(5), 289–321. https://doi.org/10.1007/s00236-007-0046-z Fornaro, R. J., Heil, M. R., & Tharp, A. L. (2007, August). Reflections on 10 years of sponsored senior design projects: Students win-clients win! JOURNAL OF SYSTEMS AND SOFTWARE, Vol. 80, pp. 1209–1216. https://doi.org/10.1016/j.jss.2006.09.052 Gegick, M., & Williams, L. (2007). On the design of more secure software-intensive systems by use of attack patterns. INFORMATION AND SOFTWARE TECHNOLOGY, 49(4), 381–397. https://doi.org/10.1016/j.infsof.2006.06.002 Kaltofen, E., & Yang, Z.-F. (2007). On exact and approximate interpolation of sparse rational functions. ISSAC 2007: International Symposium for Symbolic and Algebraic Computation: Proceedings. https://doi.org/10.1145/1277548.1277577 McQuiggan, S. W., & Lester, J. C. (2007, April). Modeling and evaluating empathy in embodied companion agents. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, Vol. 65, pp. 348–360. https://doi.org/10.1016/j.ijhcs.2006.11.015 Ha, S. T., Le, L., Rhee, I., & Xu, L. S. (2007). Impact of background traffic on performance of high-speed TCP variant protocols. Computer Networks (Amsterdam, Netherlands : 1999), 51(7), 1748–1762. https://doi.org/10.1016/j.comnet.2006.11.005 Wu, Y., An, H., Krim, H., & Lin, W. (2007). An independent component analysis approach for minimizing effects of recirculation in dynamic susceptibility contrast magnetic resonance imaging. JOURNAL OF CEREBRAL BLOOD FLOW AND METABOLISM, 27(3), 632–645. https://doi.org/10.1038/sj.jcbfm.9600374 Xu, L., & Perros, H. G. (2007). Performance analysis of an ingress switch in a JumpStart optical burst switching network. PERFORMANCE EVALUATION, 64(4), 315–346. https://doi.org/10.1016/j.peva.2006.05.012 Marathe, J., Mueller, F., Mohan, T., McKee, S. A., De Supinski, B. R., & Yoo, A. (2007). METRIC: Memory tracing via dynamic binary rewriting to identify cache inefficiencies. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 29(2). https://doi.org/10.1145/1216374.1216380 Yang, L., & Rouskas, G. N. (2007). Generalized wavelength sharing policies for absolute QoS guarantees in OBS networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 25(4), 93–104. https://doi.org/10.1109/TWC.2007.026706 Young, R. M. (2007). Story and discourse: A bipartite model of narrative generation in virtual worlds. Interaction Studies, 8(2), 177–208. https://doi.org/10.1075/is.8.2.02you Batchelor, D. A., Beck, M., Becoulet, A., Budny, R. V., Chang, C. S., Diamond, P. H., … a. (2007). [Review of Simulation of fusion plasmas: Current status and future direction]. Plasma Science & Technology, 9(3), 312–387. Bouabdallah, N., & Perros, H. (2007). Cost-effective single-hub WDM ring networks: A proposal and analysis. Computer Networks (Amsterdam, Netherlands : 1999), 51(13), 3878–3901. https://doi.org/10.1016/j.comnet.2007.04.014 Mitchell, N. (2007). [Review of Confronting the American dream: Nicaragua under US imperial rule.]. International History Review, 29(2), 382–383. Johnson, M. J., Maximilien, E. M., Ho, C.-W., & Williams, L. (2007). Incorporating performance testing in test-driven development. IEEE SOFTWARE, 24(3), 67-+. https://doi.org/10.1109/MS.2007.77 Subramaniam, K. V., & Lee, J. (2007). Ultrasonic assessment of early-age changes in the material properties of cementitious materials. MATERIALS AND STRUCTURES, 40(3), 301–309. https://doi.org/10.1617/s11527-006-9107-y Liu, D.-G., & Ning, P. (2007). Security for wireless sensor networks. New York: Springer. Anton, A. I., Earp, J. B., Vail, M. W., Jain, N., Gheen, C. M., & Frink, J. M. (2007). HIPAA's effect on web site privacy policies. IEEE SECURITY & PRIVACY, 5(1), 45–52. https://doi.org/10.1109/MSP.2007.7 Jackson, L. E., Rouskas, G. N., & Stallmann, M. F. M. (2007). The directional p-median problem: Definition, complexity, and algorithms. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 179(3), 1097–1108. https://doi.org/10.1016/j.ejor.2005.06.080 Secure data management in decentralized systems. (2007). https://doi.org/10.1007/978-0-387-27696-0 Agarwal, A. K., & Wang, W. (2007, February). On the impact of quality of protection in wireless local area networks with IP mobility. MOBILE NETWORKS & APPLICATIONS, Vol. 12, pp. 93–110. https://doi.org/10.1007/s11036-006-0009-6 Zhi, D., Keich, U., Pevzner, P., Heber, S., & Tang, H. (2007). Correcting base-assignment errors in repeat regions of shotgun assembly. IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 4(1), 54–64. https://doi.org/10.1109/TCBB.2007.1005 Mallya, A. U., & Singh, M. P. (2007, April). An algebra for commitment protocols. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, Vol. 14, pp. 143–163. https://doi.org/10.1007/s10458-006-7232-1 Baloch, S. H., & Krim, H. (2007). Flexible skew-symmetric shape model for shape representation, classification, and sampling. IEEE TRANSACTIONS ON IMAGE PROCESSING, 16(2), 317–328. https://doi.org/10.1109/TIP.2006.888348