Computer Science - 2009 Wilson, D. C., Pala, O., Tolone, W. J., & Xiang, W.-N. (2009). Recommendation-based geovisualization support for reconstitution in critical infrastructure protection. Proceedings of SPIE - The International Society for Optical Engineering, 7346. https://doi.org/10.1117/12.818718 Wisniewski, P. K., Wilson, D. C., Pala, O., & Lipford, H. R. (2009). Grounding geovisualization interface design: A study of interactive map use. Conference on Human Factors in Computing Systems - Proceedings, 3757–3762. https://doi.org/10.1145/1520340.1520567 Enck, W., Moyer, T., McDaniel, P., Sen, S., Sebos, P., Spoerel, S., … Aiello, W. (2009). Configuration management at massive scale: system design and experience. IEEE Journal on Selected Areas in Communications, 27(3), 323–335. Enck, W., Ongtang, M., McDaniel, P. D., & others. (2009). Understanding Android Security. IEEE Security & Privacy, 7(1), 50–57. Ongtang, M., McLaughlin, S., Enck, W., & McDaniel, P. (2009). Semantically rich application-centric security in Android. Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340–349. https://doi.org/10.1002/sec.360 Enck, W., Ongtang, M., & McDaniel, P. (2009). On lightweight mobile phone application certification. Proceedings of the 16th ACM conference on Computer and communications security, 235–245. Traynor, P., Enck, W., McDaniel, P., & Porta, T. L. (2009). Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Transactions on Networking (TON), 17(1), 40–53. Heckman, S. S. (2009). A systematic model building process for predicting actionable static analysis alerts. North Carolina State University. Heckman, S., & Williams, L. (2009). A model building process for identifying actionable static analysis alerts. 2009 International Conference on Software Testing Verification and Validation, 161–170. Ramamurthy, B., Rouskas, G. N., & Sivalingam, K. M. (Eds.). (2009). Next-Generation Internet Architectures and Protocols. https://doi.org/10.1017/cbo9780511920950 Second International Conference on Software Testing Verification and Validation, ICST 2009, Denver, Colorado, USA, April 1-4, 2009. (2009). Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4815321 Denney, E., Giannakopoulou, D., & Pasareanu, C. S. (Eds.). (2009). First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009. Bertolini, C., Peres, G., d’Amorim, M., & Mota, A. (2009). An Empirical Evaluation of Automated Black Box Testing Techniques for Crashing GUIs. Second International Conference on Software Testing Verification and Validation, ICST 2009, Denver, Colorado, USA, April 1-4, 2009, 21–30. https://doi.org/10.1109/ICST.2009.27 Takaki, M., Cavalcanti, D., Gheyi, R., Iyoda, J., d’Amorim, M., & Prudêncio, R. B. C. (2009). A Comparative Study of Randomized Constraint Solvers for Random-Symbolic Testing. First NASA Formal Methods Symposium - NFM 2009, Moffett Field, California, USA, April 6-8, 2009., 56–65. Castillo, C., Rouskas, G. N., Harfoush, K., & ACM. (2009). Resource Co-Allocation for Large-Scale Distributed Environments. Hpdc'09: 18th Acm International Symposium on High Performance Distributed Computing, 131–140. Yetginer, E., Rouskas, G. N., & Ulema, M. (2009). Power Efficient Traffic Grooming in Optical WDM Networks. Globecom 2009 - 2009 Ieee Global Telecommunications Conference, Vols 1-8, 1838–1843. Karmous-Edwards, G., Vishwanath, A., Reeves, D., Battestilli, L., Vegesna, P., Rouskas, G. N., & IEEE. (2009). ERONs: Dynamic Lightpath Networking via Overlay Control of Static Optical Connections. Ondm: 2009 International Conference on Optical Network Design and Modeling, 1–6. Vishwanath, A., Sivaraman, V., Rouskas, G. N., & IEEE. (2009). Considerations for Sizing Buffers in Optical Packet Switched Networks. Ieee Infocom 2009 - Ieee Conference on Computer Communications, Vols 1-5, 1323–1331. https://doi.org/10.1109/INFCOM.2009.5062047 Lv, Q., Rouskas, G. N., & IEEE. (2009). An Economic Model for Pricing Tiered Network Services. 2009 Ieee International Conference on Communications, Vols 1-8, 1470–1475. Baldine, I., Dutta, R., Rouskas, G., & IEEE. (2009). A Unified Architecture for Cross Layer Design in the Future Optical Internet. 2009 35th European Conference on Optical Communication (Ecoc). Guo, Z. (2009). Fault-Tolerant Control Allocation of Unmanned Flying-Wings Flight Vehicles (Honors Undergraduate Thesis). Tsinghua University. Guo, Z., Lu, L., Xi, S., & Sun, F. (2009). An Effective Dimension Reduction Approach to Chinese Document Classification Using Genetic Algorithm. https://doi.org/10.1007/978-3-642-01510-6_55 Drachen, A., Yannakakis, G., Jhala, A., & Hitchens, M. (2009). Towards data-driven drama management: Issues in data collection and annotation. Breaking New Ground: Innovation in Games, Play, Practice and Theory - Proceedings of DiGRA 2009. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84873387529&partnerID=MN8TOARS Jhala, A., Schwartz, M., Mart?inez, H. P., & Yannakakis, G. (2009). Investigating the interplay between camera viewpoints, game information, and challenge. Proceedings of the 5th Artificial Intelligence and Interactive Digital Entertainment Conference, AIIDE 2009, 52–57. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883119479&partnerID=MN8TOARS Burelli, P., & Jhala, A. (2009). CamOn: A real-time autonomous camera control system. Proceedings of the 5th Artificial Intelligence and Interactive Digital Entertainment Conference, AIIDE 2009, 187–188. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883057908&partnerID=MN8TOARS Jhala, A., & Van Velsen, M. (2009). Challenges in development and design of interactive narrative authoring systems, a panel. AAAI Spring Symposium - Technical Report, SS-09-06, 64–66. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-70350545919&partnerID=MN8TOARS Burelli, P., & Jhala, A. (2009). Dynamic artificial potential fields for autonomous camera control. Proceedings of the 5th Artificial Intelligence and Interactive Digital Entertainment Conference, AIIDE 2009, 8–13. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883057112&partnerID=MN8TOARS Pérez Martínez, H., Jhala, A., & Yannakakis, G. N. (2009). Analyzing the impact of camera viewpoint on player psychophysiology. Proceedings - 2009 3rd International Conference on Affective Computing and Intelligent Interaction and Workshops, ACII 2009. https://doi.org/10.1109/ACII.2009.5349592 Jhala, A., & Young, R. M. (2009). Evaluation of intelligent camera control systems based on cognitive models of comprehension. FDG 2009 - 4th International Conference on the Foundations of Digital Games, Proceedings, 327–328. https://doi.org/10.1145/1536513.1536569 Karmous-Edwards, G., Vishwanath, A., Reeves, D., Battestilli, L., Vegesna, P., & Rouskas, G. (2009). ERONs: Dynamic lightpath networking via overlay control of static optical connections. In 2009 International Conference On Optical Network Design and Modeling (ONDM) (p. 1). Piscataway, NJ: IEEE. Barnes, T., Dahlberg, T., Buch, K., & Bean, K. (2009). The STARS Leadership Corps: An innovative computer science learning community. Learning Communities Journal, 1(2), 5–18. Xiong, K., Perros, H., & Blake, S. (2009). Bandwidth provisioning in ADSL access networks. International Journal of Network Management, 19(5), 427–444. https://doi.org/10.1002/nem.718 Vikas, G. A., Padia, K., Iyer, H. S., Darshan, V. R., Prasad, N. P. G., Srinivas, A., … Olariu, S. (2009). A Dynamic GPS-Free Localization Technique using Progressive Interpolation. International Conference on Computer Networks and Mobile Computing. PADIA, K., VIKAS, G. A., IYER, H. S., DARSHAN, V. R., PRASAD, N. P. G. A. N. E. S. H., & SRINIVAS, A. (2009). A Localization Algorithm for a GPS-Free System with Static Parameter Tuning. Computer And Network Technology-Proceedings Of The International Conference On Iccnt 2009, 37–41. Williams, L., Gegick, M., & Meneely, A. (2009). Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer. In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009 (pp. 122–134). https://doi.org/10.1007/978-3-642-00199-4_11 Gegick, M., Rotella, P., & Williams, L. (2009). Toward Non-security Failures as a Predictor of Security Faults and Failures. In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009. (pp. 135–149). https://doi.org/10.1007/978-3-642-00199-4_12 Gehringer, E. F. (2009). Improving scores on course evaluations: experienced faculty tell what works. Proceedings of the 2009 ASEE Annual Conference and Exposition, 2009–1742. Washington, DC: American Society for Engineering Education. Gehringer, E. F. (2009). Personal vs. professional e-mail: the Palin case. 2009 ASEE Annual Conference and Exposition, 2009–1719. Washington, DC: American Society for Engineering Education. Gehringer, E. F., Droujkova, M., Gummadi, A., & Nallapeta, M. (2009). Game mechanics and social networking for co-production of course materials. 2009 39th IEEE Frontiers in Education Conference, W2C–1-W1C–2. https://doi.org/10.1109/FIE.2009.5350564 Jiang, Y., & Shen, X. (2009). Speculation with Little Wasting: Saving Cost in Software Speculation Through Transparent Learning (No. WM-CS-2009-08). Williamsburg, VA: Computer Science Department, The College of William and Mary. Zhang, E. Z., Jiang, Y., Guo, Z., & Shen, X. (2009). Streamlining GPU Applications On the Fly – Thread Divergence Elimination through Runtime Thread-Data Remapping (No. WM-CS-2009-08). Williamsburg, VA: Computer Science Department, The College of William and Mary. Shen, X., & Jiang, Y. (2009). Co-Run Locality Prediction for Proactive Shared-Cache Management (Technical Report No. WM-CS-2009-03). Computer Science Department, The College of William and Mary. Zhang, E. Z., Jiang, Y., & Shen, X. (2009). A Systematic Measurement of the Influence of Non-Uniform Cache Sharing on the Performance of Modern Multithreaded Programs (Technical Report No. WM-CS-2009-04). Computer Science Department, The College of William and Mary. Shen, X., Jiang, Y., Zhang, E. Z., Tan, K., Mao, F., & Gethers, M. (2009). Program Seminal Behaviors: Automating Input Characterization for Large-Scope Proactive Behavior Prediction (Technical Report No. WM-CS-2009-07). Computer Science Department, The College of William and Mary. Hang, C.-W., & Singh, M. P. (2009). Selecting Trustworthy Services: Learning a Bayesian Network. Workshop on Trust in Agent Societies, Seventh International Conference on Autonomous Agents & Multi-Agent Systems. Presented at the Seventh International Conference on Autonomous Agents & Multi-Agent Systems, Budapest, Hungary. Gay, G., Menzies, T., Jalali, O., Mundy, G., Gilkerson, B., Feather, M., & Kiper, J. (2009). Finding robust solutions in requirements models. Automated Software Engineering, 17(1), 87–116. https://doi.org/10.1007/s10515-009-0059-7 Mao, F., Zhang, E. Z., & Shen, X. (2009). Influence of program inputs on the selection of garbage collectors. Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '09. Presented at the the 2009 ACM SIGPLAN/SIGOPS international conference. https://doi.org/10.1145/1508293.1508307 Vatsavai, R. R. (2009). Incremental Clustering Algorithm for Earth Science Data Mining. In G. Allen, J. Nabrzyski, E. Seidel, G. D. van Albada, J. Dongarra, & P. M. A. Sloot (Eds.), Computational Science – ICCS 2009 (pp. 375–384). https://doi.org/10.1007/978-3-642-01973-9_42 Liu, Y., Zhang, E. Z., & Shen, X. (2009). A cross-input adaptive framework for GPU program optimizations. 2009 IEEE International Symposium on Parallel & Distributed Processing. Presented at the Distributed Processing (IPDPS). https://doi.org/10.1109/ipdps.2009.5160988 Tian, K., Jiang, Y., & Shen, X. (2009). A study on optimally co-scheduling jobs of different lengths on chip multiprocessors. Proceedings of the 6th ACM conference on Computing frontiers - CF '09. Presented at the the 6th ACM conference. https://doi.org/10.1145/1531743.1531752 Miller, G. L., Phillips, T., & Sheehy, D. R. (2009). The Centervertex Theorem for Wedge Depth. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Vancouver, British Columbia, Canada. Choi, H., Enck, W., Shin, J., McDaniel, P. D., & La Porta, T. F. (2009). ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks. Wireless Networks, 15(4), 525–539. https://doi.org/10.1007/S11276-007-0067-0 Howard, B. E., Sick, B., & Heber, S. (2009). Practical Quality Assessment of Microarray Data by Simulation of Differential Gene Expression. In Bioinformatics Research and Applications (pp. 18–27). https://doi.org/10.1007/978-3-642-01551-9_3 Zhao, S., Kim, J., & Heber, S. (2009). Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates. In Bioinformatics Research and Applications (pp. 272–283). https://doi.org/10.1007/978-3-642-01551-9_27 Kim, J., Zhao, S., Howard, B. E., & Heber, S. (2009). Mining of cis-Regulatory Motifs Associated with Tissue-Specific Alternative Splicing. In Bioinformatics Research and Applications (pp. 260–271). https://doi.org/10.1007/978-3-642-01551-9_26 Shen, X., Mao, F., Tian, K., & Zhang, E. Z. (2009). The study and handling of program inputs in the selection of garbage collectors. ACM SIGOPS Operating Systems Review, 43(3), 48. https://doi.org/10.1145/1618525.1618531 Zhong, Y., Shen, X., & Ding, C. (2009). Program locality analysis using reuse distance. ACM Transactions on Programming Languages and Systems, 31(6), 1–39. https://doi.org/10.1145/1552309.1552310 Mao, F., & Shen, X. (2009). Cross-Input Learning and Discriminative Prediction in Evolvable Virtual Machines. 2009 International Symposium on Code Generation and Optimization. Presented at the 2009 7th Annual IEEE/ACM International Symposium on Code Generation and Optimization (CGO). https://doi.org/10.1109/cgo.2009.10 Jiang, Y., Mao, F., & Shen, X. (2009). Speculation with Little Wasting: Saving Cost in Software Speculation through Transparent Learning. 2009 15th International Conference on Parallel and Distributed Systems. Presented at the 2009 15th International Conference on Parallel and Distributed Systems. https://doi.org/10.1109/ICPADS.2009.130 Harris, J., & Young, R. M. (2009). Proactive Mediation in Plan-Based Narrative Environments. IEEE Transactions on Computational Intelligence and AI in Games, 1(3), 233–244. https://doi.org/10.1109/tciaig.2009.2035610 D’Arco, P., Scafuro, A., & Visconti, I. (2009). Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. In Algorithmic Aspects of Wireless Sensor Networks (pp. 76–87). https://doi.org/10.1007/978-3-642-05434-1_9 Armenatzoglou, N., Marketakis, Y., Kriara, L., Apostolopoulos, E., Papavasiliou, V., Kampas, D., … Antoniou, G. (2009). FleXConf: A Flexible Conference Assistant Using Context-Aware Notification Services. In Lecture Notes in Computer Science (pp. 108–117). https://doi.org/10.1007/978-3-642-05290-3_20 Friedl, A., Ubik, S., Kapravelos, A., Polychronakis, M., & Markatos, E. P. (2009). Realistic Passive Packet Loss Measurement for High-Speed Networks. In Traffic Monitoring and Analysis (pp. 1–7). https://doi.org/10.1007/978-3-642-01645-5_1 Zahid, S., Shahzad, M., Khayam, S. A., & Farooq, M. (2009). Keystroke-Based User Identification on Smart Phones. In Lecture Notes in Computer Science (pp. 224–243). https://doi.org/10.1007/978-3-642-04342-0_12 Turhan, B., Menzies, T., Bener, A. B., & Di Stefano, J. (2009). On the relative value of cross-company and within-company data for defect prediction. Empirical Software Engineering, 14(5), 540–578. https://doi.org/10.1007/s10664-008-9103-7 Orrego, A., Menzies, T., & El-Rawas, O. (2009). On the Relative Merits of Software Reuse. In Trustworthy Software Development Processes (pp. 186–197). https://doi.org/10.1007/978-3-642-01680-6_18 Menzies, T., Williams, S., Elrawas, O., Baker, D., Boehm, B., Hihn, J., … Madachy, R. (2009). Accurate estimates without local data? Software Process: Improvement and Practice, 14(4), 213–225. https://doi.org/10.1002/spip.414 Ashley, K., Lynch, C., Pinkwart, N., & Aleven, V. (2009). Toward Modeling and Teaching Legal Case-Based Adaptation with Expert Examples. In Case-Based Reasoning Research and Development (pp. 45–59). https://doi.org/10.1007/978-3-642-02998-1_5 Yang, S., Pappas, K. M., Hauser, L. J., Land, M. L., Chen, G.-L., Hurst, G. B., … Brown, S. D. (2009). Improved genome annotation for Zymomonas mobilis. Nature Biotechnology, 27(10), 893–894. https://doi.org/10.1038/nbt1009-893 Belnap, C. P., Pan, C., VerBerkmoes, N. C., Power, M. E., Samatova, N. F., Carver, R. L., … Banfield, J. F. (2009). Cultivation and quantitative proteomic analyses of acidophilic microbial communities. The ISME Journal, 4(4), 520–530. https://doi.org/10.1038/ismej.2009.139 Wang, C., Zhang, Z., Ma, X., Vazhkudai, S. S., & Mueller, F. (2009). Improving the availability of supercomputer job input data using temporal replication. Computer Science - Research and Development, 23(3-4), 149–157. https://doi.org/10.1007/s00450-009-0082-8 Jhala, A., & Young, R. M. (2009). Comparing Effects of Different Cinematic Visualization Strategies on Viewer Comprehension. In Interactive Storytelling: Vol. 5915 LNCS (pp. 26–37). https://doi.org/10.1007/978-3-642-10643-9_6 Robison, J., Rowe, J., McQuiggan, S., & Lester, J. (2009). Predicting User Psychological Characteristics from Interactions with Empathetic Virtual Agents. In Intelligent Virtual Agents (pp. 330–336). https://doi.org/10.1007/978-3-642-04380-2_36 Min, W.-H., & Cheong, Y.-G. (2009). An interactive-content technique based approach to generating personalized advertisement for privacy protection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 185–191). https://doi.org/10.1007/978-3-642-02559-4_21 Afrati, F., Chandrachud, M., Chirkova, R., & Mitra, P. (2009). Approximate Rewriting of Queries Using Views. In Advances in Databases and Information Systems (pp. 164–178). https://doi.org/10.1007/978-3-642-03973-7_13 Kormilitsin, M., Chirkova, R., Fathi, Y., & Stallmann, M. (2009). Systematic Exploration of Efficient Query Plans for Automated Database Restructuring. In Advances in Databases and Information Systems (pp. 133–148). https://doi.org/10.1007/978-3-642-03973-7_11 Boyer, K. E., Phillips, R., Wallis, M. D., Vouk, M. A., & Lester, J. C. (2009). Investigating the role of student motivation in computer science education through one-on-one tutoring. Computer Science Education, 19(2), 111–135. https://doi.org/10.1080/08993400902937584 Mouallem, P., Barreto, R., Klasky, S., Podhorszki, N., & Vouk, M. (2009). Tracking Files in the Kepler Provenance Framework. In Lecture Notes in Computer Science (pp. 273–282). https://doi.org/10.1007/978-3-642-02279-1_21 Hudson, B., Miller, G. L., Phillips, T., & Sheehy, D. (2009). Size Complexity of Volume Meshes vs. Surface Meshes. Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms. Presented at the Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms. https://doi.org/10.1137/1.9781611973068.113 Miller, G. L., & Sheehy, D. R. (2009). Approximate center points with proofs. Proceedings of the 25th annual symposium on Computational geometry - SCG '09. Presented at the the 25th annual symposium. https://doi.org/10.1145/1542362.1542395 Integrating Marine Observatories into a System-of-Systems: Messaging in the US Ocean Observatories Initiative. (2009). OCEANS - ANCHORAGE. Retrieved from https://publons.com/publon/21294453/ Chopra, A. K., & Singh, M. P. (2009). Multiagent Commitment Alignment. Proceedings of the 8th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 1, 937–944. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899835693&partnerID=MN8TOARS Sollenberger, D. J., & Singh, M. P. (2009). Koko: Engineering affective applications. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 2, 1451–1452. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899794043&partnerID=MN8TOARS Sollenberger, D. J., & Singh, M. P. (2009). Koko: Architecture and methodology for engineering social affective applications. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 2, 1174–1175. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899796109&partnerID=MN8TOARS Udupi, Y. B., & Singh, M. P. (2009). Formal aspects of classifying and selecting business services. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 2, 1296–1297. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899889033&partnerID=MN8TOARS Hang, C.-W., Wang, Y., & Singh, M. P. (2009). Operators for Propagating Trust and their Evaluation in Social Networks. Proceedings of the 8th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 2, 1025–1032. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84896062976&partnerID=MN8TOARS Torroni, P., Yolum, P., Singh, M. P., Alberti, M., Chesani, F., Gavanelli, M., … Mello, P. (2009). Modelling interactions via commitments and expectations. In Handbook of Research on Multi-Agent Systems: Semantics and Dynamics of Organizational Models (pp. 263–284). https://doi.org/10.4018/978-1-60566-256-5.ch011 Arrott, M., Chave, A. D., Farcas, C., Farcas, E., Kleinert, J. E., Krueger, I., … Vernon, F. L. (2009). Integrating marine observatories into a system-of-systems: Messaging in the US ocean observatories initiative. MTS/IEEE Biloxi - Marine Technology for Our Future: Global and Local Challenges, OCEANS 2009. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-77951528644&partnerID=MN8TOARS Telang, P. R., & Singh, M. P. (2009). Enhancing tropos with commitments a business metamodel and methodology. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 417–435). https://doi.org/10.1007/978-3-642-02463-4_22 Enhancing Tropos with Commitments A Business Metamodel and Methodology. (2009). Lecture Notes in Computer Science. Retrieved from https://publons.com/publon/21294448/ Baldoni, M., Desai, N., Baroglio, C., Patti, V., Chopra, A. K., & Singh, M. P. (2009). Choice, interoperability, and conformance in interaction protocols and service choreographies. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 1, 608–615. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899803605&partnerID=MN8TOARS Sollenberger, D. J., & Singh, M. P. (2009). Architecture for affective social games. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 79–94). https://doi.org/10.1007/978-3-642-11198-3_6 Telang, P. R., & Singh, M. P. (2009). Business modeling via commitments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 111–125). https://doi.org/10.1007/978-3-642-10739-9_9 Kormilitsin, M., Chirkova, R., Fathi, Y., & Stallmann, M. (2009). Systematic exploration of efficient query plans for automated database restructuring. East European Conference on Advances in Databases and Information Systems, 133–148. Rose, P., Kumar, M., Ajmeri, N., Agrawal, M., Sivakumar, V., & Ghaisas, S. (2009). A method and framework for domain knowledge assisted requirements evolution (k-re). CONSEG 2009 - Proceedings of the International Conference on Software Engineering, 87–97. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84898822394&partnerID=MN8TOARS Kaltofen, E., Yang, Z., & Zhi, L. (2009). A proof of the monotone column permanent (MCP) conjecture for dimension 4 via sums-of-squares of rational functions. Proceedings of the 2009 conference on Symbolic numeric computation - SNC '09. Presented at the the 2009 conference. https://doi.org/10.1145/1577190.1577204 Gehringer, E. F. (2009). Propagating software-based educational innovations. Proceedings of the ASEE Southeast Conference. Presented at the ASEE Southeast Conference, Marietta, GA. Gehringer, E. F. (2009). Working effectively with teaching assistants. Proceedings of the 2009 ASEE Annual Conference and Exposition. Presented at the 2009 ASEE Annual Conference and Exposition, Austin, TX. Gehringer, E. F., & Miller, C. S. (2009). Student-generated active-learning exercises. Proceedings of the 40th ACM technical symposium on Computer science education - SIGCSE '09. Presented at the the 40th ACM technical symposium. https://doi.org/10.1145/1508865.1508897 Chen, J., DiPasquale, J., Ko, L., & Orphanides, A. (2009). CONFERENCE REPORT: Code4Lib 2009. Code4Lib Journal. Retrieved from https://journal.code4lib.org/articles/998 Perros, H. G. (2009). Computer simulation techniques: the definitive introduction! Raleigh, NC: Harry Perros. Breaux, T. D. (2009). Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach. Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, 225–230. Maxwell, J. C., & Anton, A. I. (2009). Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts. PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110. https://doi.org/10.1109/re.2009.21 Ma, X., Kim, S., & Harfoush, K. (2009). Towards Realistic Physical Topology Models for Internet Backbone Networks. 2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42. https://doi.org/10.1109/honet.2009.5423064 Wei, W., Du, J., Yu, T., & Gu, X. (2009). SecureMR: A Service Integrity Assurance Framework for Map Reduce. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82. https://doi.org/10.1109/acsac.2009.17 Park, Y., & Reeves, D. S. (2009). Identification of bot commands by run-time execution monitoring. 25th Annual Computer Security Applications Conference, 321–330. https://doi.org/10.1109/acsac.2009.37 Azab, A. M., Ning, P., Sezer, E. C., & Zhang, X. (2009). HIMA: A Hypervisor-Based Integrity Measurement Agent. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+. https://doi.org/10.1109/acsac.2009.50 Yavuz, A. A., & Ning, P. (2009). BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228. https://doi.org/10.1109/acsac.2009.28 Li, N., Xie, T., Tillmann, N., Halleux, J., & Schulte, W. (2009). Reggae: Automated Test Generation for Programs using Complex Regular Expressions. 2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 515–519. https://doi.org/10.1109/ase.2009.67 Acharya, M., & Kommineni, V. (2009). Mining health models for performance monitoring of services. 2009 ieee/acm international conference on automated software engineering, proceedings, 409–420. Sollenberger, D. J., & Singh, M. P. (2009). Architecture for affective social games. Agents for games and simulations: trends in techniques, concepts and design, 5920, 79–94. Thummalapenta, S., & Xie, T. (2009). Alattin: Mining Alternative Patterns for Detecting Neglected Conditions. 2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 283–294. https://doi.org/10.1109/ase.2009.72 Awekar, A., & Samatova, N. F. (2009). Fast matching for all pairs similarity search. 2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 1, 295–300. https://doi.org/10.1109/wi-iat.2009.52 Breimyer, P., Green, N., Kumar, V., & Samatova, N. F. (2009). BioDEAL: community generation of biological annotations. BMC Medical Informatics and Decision Making, 9. Meneely, A., & Williams, L. (2009). Secure open source collaboration: An empirical study of linus' law. CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462. https://doi.org/10.1145/1653662.1653717 Liu, Y., Ning, P., & Reiter, M. K. (2009). False data injection attacks against state estimation in electric power grids. CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32. https://doi.org/10.1145/1653662.1653666 Telang, P. R., & Singh, M. P. (2009). Business modeling via commitments. Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125. Thomas, J. M., & Young, R. M. (2009). Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments. Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114. Kil, C., Sezer, E. C., Azab, A. M., Ning, P., & Zhang, X. (2009). Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+. https://doi.org/10.1109/dsn.2009.5270348 Xie, T., Tillmann, N., Halleux, J., & Schulte, W. (2009). Fitness-Guided Path Exploration in Dynamic Symbolic Execution. 2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 359-+. https://doi.org/10.1109/dsn.2009.5270315 Smith, B. H., & Williams, L. (2009). Should software testers use mutation analysis to augment a test set? JOURNAL OF SYSTEMS AND SOFTWARE, 82(11), 1819–1832. https://doi.org/10.1016/j.jss.2009.06.031 Mentre, O., Janod, E., Rabu, P., Hennion, M., Leclercq-Hugeux, F., Kang, J., … Petit, S. (2009). Incommensurate spin correlation driven by frustration in BiCu2PO6. PHYSICAL REVIEW B, 80(18). https://doi.org/10.1103/physrevb.80.180413 Ma, X., Vazhkudai, S. S., & Zhang, Z. (2009). Improving Data Availability for Better Access Performance: A Study on Caching Scientific Data on Distributed Desktop Workstations. JOURNAL OF GRID COMPUTING, 7(4), 419–438. https://doi.org/10.1007/s10723-009-9122-7 Scott, S. L., Engelmann, C., Vallee, G. R., Naughton, T., Tikotekar, A., Ostrouchov, G., … Varma, J. (2009, April). A Tunable Holistic Resiliency Approach for High-Performance Computing Systems. ACM SIGPLAN NOTICES, Vol. 44, pp. 305–306. https://doi.org/10.1145/1594835.1504227 Mukherjee, B., Subramaniam, S., Jukan, A., Sivalingam, K., & Dutta, R. (2009, December). Special issue: Selected papers from The Second International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2008). OPTICAL SWITCHING AND NETWORKING, Vol. 6, pp. 225–226. https://doi.org/10.1016/j.osn.2009.09.002 Gong, Z. H., Ramaswamy, P., Gu, X. H., & Ma, X. S. (2009). SigLM: signature-driven load management for cloud computing infrastructures. Iwqos: 2009 ieee 17th international workshop on quality of service, 226–234. Wang, R., Du, W., Liu, X., & Ning, P. (2009). ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks. ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1). https://doi.org/10.1145/1653760.1653769 Deodhar, S., & Tharp, A. L. (2009). Shift Hashing for Memory-Constrained Applications. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, pp. 531–536. https://doi.org/10.1109/compsac.2009.77 Liu, A., Ning, P., & Wang, C. (2009). Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+. https://doi.org/10.1109/infcom.2009.5062038 Hwang, J. H., Xie, T., Chen, F., & Liu, A. X. (2009). Fault Localization for Firewall Policies. 2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+. https://doi.org/10.1109/srds.2009.38 Warrier, A., Janakiraman, S., Ha, S., & Rhee, I. (2009). DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks. IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 262–270. https://doi.org/10.1109/infcom.2009.5061929 Singh, M. P., Chopra, A. K., & Desai, N. (2009). Commitment-Based Service-Oriented Architecture. COMPUTER, 42(11), 72–79. https://doi.org/10.1109/MC.2009.347 Sivamani, E., Starmer, J. D., & Qu, R. (2009). Sequence analysis of rice rubi3 promoter gene expression cassettes for improved transgene expression. PLANT SCIENCE, 177(6), 549–556. https://doi.org/10.1016/j.plantsci.2009.08.006 Otto, P. N. (2009). Reasonableness meets requirements: regulating security and privacy in software. Duke Law Journal, 59(2), 309–342. Wang, Z., Jiang, X. X., Cui, W. D., Wang, X. Y., & Grace, M. (2009). ReFormat: Automatic reverse engineering of encrypted messages. Computer security - esorics 2009, proceedings, 5789, 200–215. Sridhar, R., Ravindra, P., & Anyanwu, K. (2009). RAPID: Enabling scalable ad-hoc analytics on the semantic web. Semantic web - iswc 2009, proceedings, 5823, 715–730. https://doi.org/10.1007/978-3-642-04930-9_45 Rouskas, G. N., & Baradwaj, N. (2009). On Bandwidth Tiered Service. IEEE-ACM TRANSACTIONS ON NETWORKING, 17(6), 1780–1793. https://doi.org/10.1109/TNET.2009.2017928 Sperling, E. A., Vinther, J., Moy, V. N., Wheeler, B. M., Semon, M., Briggs, D. E. G., & Peterson, K. J. (2009). MicroRNAs resolve an apparent conflict between annelid systematics and their fossil record. Proceedings of the Royal Society of London. Series B, 276(1677), 4315–4322. Anbalagan, P., & Vouk, M. (2009). An empirical study of security problem reports in Linux distributions. International symposium on empirical software engineering and, 482–485. Noeth, M., Ratn, P., Mueller, F., Schulz, M., & Supinski, B. R. (2009, August). ScalaTrace: Scalable compression and replay of communication traces for high-performance computing. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 69, pp. 696–710. https://doi.org/10.1016/j.jpdc.2008.09.001 Smith, B. H., & Williams, L. (2009). On guiding the augmentation of an automated test suite via mutation analysis. EMPIRICAL SOFTWARE ENGINEERING, 14(3), 341–369. https://doi.org/10.1007/s10664-008-9083-7 Andrews, G. E., Corteel, S., & Savage, C. D. (2009). ON q-SERIES IDENTITIES ARISING FROM LECTURE HALL PARTITIONS. INTERNATIONAL JOURNAL OF NUMBER THEORY, 5(2), 327–337. https://doi.org/10.1142/S1793042109002134 Schaffer, H. E., Averitt, S. F., Hoit, M. I., Peeler, A., Sills, E. D., & Vouk, M. A. (2009, July). NCSU's Virtual Computing Lab: A Cloud Computing Solution. COMPUTER, Vol. 42, pp. 94–97. https://doi.org/10.1109/mc.2009.230 Hwang, J. H., Xie, T., & Hu, V. C. (2009). Detection of Multiple-Duty-Related Security Leakage in Access Control Policies. 2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74. https://doi.org/10.1109/ssiri.2009.63 Zhang, Q., Wei, W., & Yu, T. (2009). On the Modeling of Honest Players in Reputation Systems. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819. https://doi.org/10.1007/s11390-009-9271-y Iyer, P., Dutta, R., & Savage, C. D. (2009). Minimizing transceivers in optical path networks. JOURNAL OF OPTICAL NETWORKING, 8(5), 454–461. https://doi.org/10.1364/JON.8.000454 Hao, D., Zhang, L., Xie, T., Mei, H., & Sun, J.-S. (2009). Interactive Fault Localization Using Test Information. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 962–974. https://doi.org/10.1007/s11390-009-9270-z Chang, C. S., Ku, S., Diamond, P. H., Lin, Z., Parker, S., Hahm, T. S., & Samatova, N. (2009, May). Compressed ion temperature gradient turbulence in diverted tokamak edge. PHYSICS OF PLASMAS, Vol. 16. https://doi.org/10.1063/1.3099329 Choi, K., Kim, M.-hui, Chae, K.-J., Park, J.-J., & Joo, S.-S. (2009). An Efficient Data Fusion and Assurance Mechanism using Temporal and Spatial Correlations for Home Automation Networks. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 55(3), 1330–1336. https://doi.org/10.1109/TCE.2009.5277996 Desai, N., Chopra, A. K., & Singh, M. P. (2009). Amoeba: A Methodology for Modeling and Evolving Cross-Organizational Business Processes. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 19(2). https://doi.org/10.1145/1571629.1571632 Chen, P. F., Steen, R. G., Yezzi, A., & Krim, H. (2009). brain MRi T-1-map and T-1-weighted image segmentation in a variational framework. International conference on acoustics speech and signal processing, 417–420. https://doi.org/10.1109/icassp.2009.4959609 Rogers, N. R., Drake, M. A., Daubert, C. R., McMahon, D. J., Bletsch, T. K., & Foegeding, E. A. (2009). The effect of aging on low-fat, reduced-fat, and full-fat Cheddar cheese texture. JOURNAL OF DAIRY SCIENCE, 92(10), 4756–4772. https://doi.org/10.3168/jds.2009-2156 Repantis, T., Gu, X., & Kalogeraki, V. (2009). QoS-Aware Shared Component Composition for Distributed Stream Processing Systems. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 20(7), 968–982. https://doi.org/10.1109/TPDS.2008.165 Gu, X. H., & Wang, H. X. (2009). Online anomaly prediction for robust cluster systems. Icde: 2009 ieee 25th international conference on data engineering, vols 1-3, 1000–1011. https://doi.org/10.1109/icde.2009.128 Jang, B., Lee, D., Chon, K., & Kim, H. (2009). DNS Resolution with Renewal Using Piggyback. JOURNAL OF COMMUNICATIONS AND NETWORKS, 11(4), 416–427. https://doi.org/10.1109/JCN.2009.6391355 Mountrouidou, X., & Perros, H. (2009). A discrete-time queueing network model of a hub-based OBS architecture. TELECOMMUNICATION SYSTEMS, 41(3), 173–184. https://doi.org/10.1007/s11235-009-9157-x Jiang, Z., & Savage, C. D. (2009, September 6). On the existence of symmetric chain decompositions in a quotient of the Boolean lattice. DISCRETE MATHEMATICS, Vol. 309, pp. 5278–5283. https://doi.org/10.1016/j.disc.2007.11.036 Chen, W., Schmidt, M. C., & Samatova, N. F. (2009). On parameterized complexity of the Multi-MCS problem. THEORETICAL COMPUTER SCIENCE, 410(21-23), 2024–2032. https://doi.org/10.1016/j.tcs.2008.12.060 Aouada, D., & Krim, H. (2009). NOVEL SIMILARITY INVARIANT FOR SPACE CURVES USING TURNING ANGLES AND ITS APPLICATION TO OBJECT RECOGNITION. 2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, pp. 1277–1280. https://doi.org/10.1109/icassp.2009.4959824 Won, H., Cai, H., Eun, D. Y., Guo, K., Netravali, A., Rhee, I., & Sabnani, K. (2009, September). Multicast Scheduling in Cellular Data Networks. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, Vol. 8, pp. 4540–4549. https://doi.org/10.1109/twc.2009.080330 Zhong, H., Xie, T., Zhang, L., Pei, J., & Mei, H. (2009). MAPO: mining and recommending API usage patterns. Ecoop 2009 - object-oriented programming, 5653, 318–343. Lascelles, B. D. X., King, S., Roe, S., Marcellin-Little, D. J., & Jones, S. (2009). Expression and Activity of COX-1 and 2 and 5-LOX in Joint Tissues from Dogs with Naturally Occurring Coxofemoral Joint Osteoarthritis. JOURNAL OF ORTHOPAEDIC RESEARCH, 27(9), 1204–1208. https://doi.org/10.1002/jor.20864 Karmous-Edwards, G., Vishwanath, A., Reeves, D. S., Battestilli, L., Vegesna, P. B., & Rouskas, G. N. (2009). Edge-Reconfigurable Optical Networks (ERONs): Rationale, Network Design, and Evaluation. Journal of Lightwave Technology, 27(12), 1837–1845. https://doi.org/10.1109/JLT.2009.2021279 Rhee, I., Warrier, A., Min, J., & Xu, L. (2009). DRAND: Distributed Randomized TDMA Scheduling for Wireless Ad Hoc Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING, 8(10), 1384–1396. https://doi.org/10.1109/TMC.2009.59 Xie, T., Thummalapenta, S., Lo, D., & Liu, C. (2009). DATA MINING FOR SOFTWARE ENGINEERING. COMPUTER, 42(8), 55–62. https://doi.org/10.1109/MC.2009.256 Shields, I., Shields, B. J., & Savage, C. D. (2009, September 6). An update on the middle levels problem. DISCRETE MATHEMATICS, Vol. 309, pp. 5271–5277. https://doi.org/10.1016/j.disc.2007.11.010 Mitchell, N. (2009). [Review of plans unraveled: the foreign policy of the garter administration]. International History Review, 31(2), 463–465. Evans, T. M., Chall, S., Zhao, X. L., & Rhyne, T. M. (2009). Visualization and analysis of microstructure in three-dimensional discrete numerical models. Journal of Computing in Civil Engineering, 23(5), 277–287. https://doi.org/10.1061/(ASCE)0887-3801(2009)23:5(277) Howard, B. E., Sick, B., & Heber, S. (2009). Unsupervised assessment of microarray data quality using a Gaussian mixture model. BMC BIOINFORMATICS, 10. https://doi.org/10.1186/1471-2105-10-191 Sarkar, A., Mueller, F., Ramaprasad, H., & Mohan, S. (2009, July). Push-Assisted Migration of Real-Time Tasks in Multi-Core Processors. ACM SIGPLAN NOTICES, Vol. 44, pp. 80–89. https://doi.org/10.1145/1543136.1542464 Deng, Z., Xie, L., Liu, B., Wu, K., Zhao, D., & Yu, T. (2009). Coupling winds to ocean surface currents over the global ocean. OCEAN MODELLING, 29(4), 261–268. https://doi.org/10.1016/j.ocemod.2009.05.003 He, Q., & Anton, A. I. (2009). Requirements-based Access Control Analysis and Policy Specification (ReCAPS). INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993–1009. https://doi.org/10.1016/j.infsof.2008.11.005 Sharlin, E., Watson, B., Sutphen, S., Liu, L., Lederer, R., & Frazer, J. (2009). A tangible user interface for assessing cognitive mapping ability. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 67(3), 269–278. https://doi.org/10.1016/j.ijhcs.2008.09.014 Schmidt, M. C., Samatova, N. F., Thomas, K., & Park, B.-H. (2009). A scalable, parallel algorithm for maximal clique enumeration. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 69(4), 417–428. https://doi.org/10.1016/j.jpdc.2009.01.003 Yi, S., Labate, D., Easley, G. R., & Krim, H. (2009). A Shearlet Approach to Edge Analysis and Detection. IEEE TRANSACTIONS ON IMAGE PROCESSING, 18(5), 929–941. https://doi.org/10.1109/TIP.2009.2013082 Alnowibet, K. A., & Perros, H. (2009). Nonstationary analysis of the loss queue and of queueing networks of loss queues. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 196(3), 1015–1030. https://doi.org/10.1016/j.ejor.2007.10.066 Cai, H., Eun, D. Y., Ha, S., Rhee, I., & Xu, L. (2009). Stochastic convex ordering for multiplicative decrease internet congestion control. COMPUTER NETWORKS, 53(3), 365–381. https://doi.org/10.1016/j.comnet.2008.10.012 Chen, D., Chirkova, R., & Sadri, F. (2009). Query optimization using restructured views: Theory and experiments. INFORMATION SYSTEMS, 34(3), 353–370. https://doi.org/10.1016/j.is.2008.10.002 Murphy, J., & Perros, H. (2009). Optical burst switching. IET Communications, 3(3), 331–333. Mountrouidou, X., & Perros, H. (2009). On the departure process of burst aggregation algorithms in optical burst switching. COMPUTER NETWORKS, 53(3), 247–264. https://doi.org/10.1016/j.comnet.2008.09.019 Harfoush, K., Bestavros, A., & Byers, J. (2009). Measuring Capacity Bandwidth of Targeted Path Segments. IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80–92. https://doi.org/10.1109/TNET.2008.2008702 Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). Denial of service attacks and defenses in decentralized trust management. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101. https://doi.org/10.1007/s10207-008-0068-8 Battestilli, L., Perros, H., & Chukova, S. (2009). Burst lost probabilities in a queuing network with simultaneous resource possession: a single-node decomposition approach. IET Communications, 3(3), 441–453. https://doi.org/10.1049/iet-com:20070426 Saeidi, R., Mohammadi, H. R. S., Ganchev, T., & Rodman, R. D. (2009). Particle Swarm Optimization for Sorted Adapted Gaussian Mixture Models. IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 17(2), 344–353. https://doi.org/10.1109/TASL.2008.2010278 Thomas, S., Williams, L., & Xie, T. (2009). On automated prepared statement generation to remove SQL injection vulnerabilities. INFORMATION AND SOFTWARE TECHNOLOGY, 51(3), 589–598. https://doi.org/10.1016/j.infsof.2008.08.002 Xing, C., Bitzer, D. L., Alexander, W. E., Vouk, M. A., & Stomp, A.-M. (2009). Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation. NUCLEIC ACIDS RESEARCH, 37(2), 591–601. https://doi.org/10.1093/nar/gkn917 Yiltas, D., & Zaim, A. H. (2009). Evaluation of call blocking probabilities in LEO satellite networks. INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 27(2), 103–115. https://doi.org/10.1002/sat.928 Wheeler, B. M., Heimberg, A. M., Moy, V. N., Sperling, E. A., Holstein, T. W., Heber, S., & Peterson, K. J. (2009). The deep evolution of metazoan microRNAs. EVOLUTION & DEVELOPMENT, 11(1), 50–68. https://doi.org/10.1111/j.1525-142X.2008.00302.x Breaux, T. D., Anton, A. I., & Spafford, E. H. (2009). A distributed requirements management framework for legal compliance and accountability. COMPUTERS & SECURITY, 28(1-2), 8–17. https://doi.org/10.1016/j.cose.2008.08.001