Computer Science - 2014 Pala, O., Wilson, D., Bent, R., Linger, S., & Arnold, J. (2014). Accuracy of service area estimation methods used for critical infrastructure recovery. In IFIP Advances in Information and Communication Technology (Vol. 441, pp. 173–191). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84908286528&partnerID=MN8TOARS Enck, W., & Xie, T. (2014). Tutorial: Text Analytics for Security. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 1540–1541. Ho, T.-H., Dean, D., Gu, X., & Enck, W. (2014). PREC: practical root exploit containment for android devices. Proceedings of the 4th ACM conference on Data and application security and privacy, 187–198. Gionta, J., Azab, A., Enck, W., Ning, P., & Zhang, X. (2014). SEER: practical memory virus scanning as a service. Proceedings of the 30th Annual Computer Security Applications Conference, 186–195. Nadkarni, A., Tendulkar, V., & Enck, W. (2014). NativeWrap: ad hoc smartphone application creation for end users. Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, 13–24. Liu, Q., Bae, J., Watson, B., McLaughhlin, A., & Enck, W. (2014). Modeling and sensing risky user behavior on mobile devices. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 33. Davis, A., Shashidharan, A., Liu, Q., Enck, W., McLaughlin, A., & Watson, B. (2014). Insecure behaviors on mobile devices under stress. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 31. Yang, W., Xiao, X., Pandita, R., Enck, W., & Xie, T. (2014). Improving mobile application security via bridging user expectations and application behaviors. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 32. Nadkarni, A., Sheth, A., Weinsberg, U., Taft, N., & Enck, W. (2014). GraphAudit: Privacy Auditing for Massive Graph Mining. North Carolina State University. Dept. of Computer Science. Gionta, J., Azab, A., Enck, W., Ning, P., & Zhang, X. (2014). Dacsa: A decoupled architecture for cloud security analysis. Proceedings of the 7th Workshop on Cyber Security Experimentation and Test. Tendulkar, V., & Enck, W. (2014). An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities. ArXiv Preprint ArXiv:1410.7745. Heuser, S., Nadkarni, A., Enck, W., & Sadeghi, A.-R. (2014). ASM: A Programmable Interface for Extending Android Security. USENIX Security Symposium, 1005–1019. Heuser, S., Nadkarni, A., Enck, W., & Sadeghi, A.-R. (2014). ${$ASM$}$: A Programmable Interface for Extending Android Security. 23rd USENIX Security Symposium (USENIX Security 14), 1005–1019. Talebi, S., Bampis, E., Lucarelli, G., Katib, I., & Rouskas, G. N. (2014). Spectrum Assignment in Optical Networks: A Multiprocessor Scheduling Perspective. Journal of Optical Communications and Networking, 6(8), 754. https://doi.org/10.1364/jocn.6.000754 Yahav, E. (Ed.). (2014). Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings. https://doi.org/10.1007/978-3-319-13338-6 Borges, M., Filieri, A., d’Amorim, M., Pasareanu, C. S., & Visser, W. (2014). Compositional solution space quantification for probabilistic software analysis. ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014, 123–132. https://doi.org/10.1145/2594291.2594329 Liu, T., Araújo, M., d’Amorim, M., & Taghdiri, M. (2014). A Comparative Study of Incremental Constraint Solving Approaches in Symbolic Execution. Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 284–299. https://doi.org/10.1007/978-3-319-13338-6_21 Phan, Q.-S., Malacaria, P., Pasareanu, C. S., & d’Amorim, M. (2014). Quantifying information leaks using reliability analysis. 2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014, 105–108. https://doi.org/10.1145/2632362.2632367 Rimsa, A., d’Amorim, M., Pereira, F. M. Q., & Silva Bigonha, R. (2014). Efficient static checker for tainted variable attacks. Sci. Comput. Program., 80, 91–105. https://doi.org/10.1016/j.scico.2013.03.012 O’Boyle, M. F. P., & Pingali, K. (Eds.). (2014). ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014. Retrieved from http://dl.acm.org/citation.cfm?id=2594291 Rungta, N., & Tkachuk, O. (Eds.). (2014). 2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014. Retrieved from http://dl.acm.org/citation.cfm?id=2632362 Guo, Z., & Baruah, S. (2014). Implementing mixed-criticality systems upon a preemptive varying-speed processor. Leibniz Transactions on Embedded Systems (LITES), 1(2), 3:1–3:19. https://doi.org/10.4230/LITES-v001-i002-a003 Cheng, W., Zhang, X., Guo, Z., Shi, Y., & Wang, W. (2014). Graph Regularized Dual Lasso for Robust eQTL Mapping. Proceedings of the 22nd Annual International Conference on Intelligent Systems for Molecular Biology (ISMB). Presented at the 22nd Annual International Conference on Intelligent Systems for Molecular Biology (ISMB), Boston, MA, USA. Guo, Z., & Baruah, S. (2014). Mixed-Criticality Scheduling upon Varying-Speed Multiprocessors. Presented at the 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC). https://doi.org/10.1109/dasc.2014.50 Baruah, S., & Guo, Z. (2014). Scheduling Mixed-Criticality Implicit-Deadline Sporadic Task Systems upon a Varying-Speed Processor. Presented at the 2014 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2014.15 Cheng, W., Zhang, X., Guo, Z., Shi, Y., & Wang, W. (2014). Graph-regularized dual Lasso for robust eQTL mapping. Bioinformatics, 30(12), i139–i148. https://doi.org/10.1093/bioinformatics/btu293 Kuttal, S. K., Sarma, A., & Rothermel, G. (2014). On the benefits of providing versioning support for end users. ACM Transactions on Computer-Human Interaction, 21(2), 1–43. https://doi.org/10.1145/2560016 Riedl, M., & Young, R. M. (2014). The Importance of Narrative as an Affective Instructional Strategy. In R. Sottilare, A. Graesser, X. Hu, & B. Goldberg (Eds.), Design Recommendations for Intelligent Tutoring Systems (Vol. 2, pp. 57–70). Springer Verlag. Humble, T. S., McCaskey, A. J., Bennink, R. S., Billings, J. J., Dazevedo, E. D., Sullivan, B. D., … Seddiqi, H. (2014). An integrated programming and development environment for adiabatic quantum optimization. Computational Science and Discovery, 7(1). https://doi.org/10.1088/1749-4680/7/1/015006 Klymko, C., Sullivan, B. D., & Humble, T. S. (2014). Adiabatic quantum programming: Minor embedding with hard faults. Quantum Information Processing, 13(3), 709–729. https://doi.org/10.1007/s11128-013-0683-9 Obrien, M. P., & Sullivan, B. D. (2014). Locally Estimating Core Numbers. Proceedings - IEEE International Conference on Data Mining, ICDM, 2015-January(January), 460–469. https://doi.org/10.1109/ICDM.2014.136 Leece, M., & Jhala, A. (2014). Sequential Pattern mining in StarCraft:Brood War for short and long-term goals. AAAI Workshop - Technical Report, WS-14-15, 8–13. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974846142&partnerID=MN8TOARS Horswill, I., Jhala, A., Dill, K., Orkin, J., Shaker, N., Si, M., … Young, R. M. (2014). Preface. Proceedings of the 10th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2014, xiii-xiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84916910001&partnerID=MN8TOARS Bates, D., & Jhala, A. (2014). Multi-modal analysis of movies for rhythm extraction. AAAI Workshop - Technical Report, WS-14-06, 14–17. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974856015&partnerID=MN8TOARS Sarratt, T., & Jhala, A. (2014). Leveraging communication for player modeling and cooperative play. AAAI Workshop - Technical Report, WS-14-19, 14–17. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974830954&partnerID=MN8TOARS Morgens, S.-M., & Jhala, A. (2014). EduCam: Cinematic vocabulary for educational videos. AAAI Workshop - Technical Report, WS-14-06, 57–60. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974817717&partnerID=MN8TOARS Alston, C., & Jhala, A. (2014). Automating camera control in games using gaze. AAAI Workshop - Technical Report, WS-14-06, 7–13. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974817401&partnerID=MN8TOARS Sarratt, T., Pynadath, D. V., & Jhala, A. (2014). Converging to a player model in Monte-Carlo Tree Search. IEEE Conference on Computatonal Intelligence and Games, CIG. https://doi.org/10.1109/CIG.2014.6932881 Maltzahn, C., Jhala, A., Mateas, M., & Whitehead, J. (2014). Gamification of private digital data archive management. ACM International Conference Proceeding Series, 33–37. https://doi.org/10.1145/2594776.2594783 Leece, M., & Jhala, A. (2014). Opponent state modeling in RTS games with limited information using Markov random fields. IEEE Conference on Computatonal Intelligence and Games, CIG. https://doi.org/10.1109/CIG.2014.6932877 Zhang, B., & Jhala, A. (2014). Mid-scale shot classification for detecting narrative transitions in movie clips. AAAI Workshop - Technical Report, WS-14-06, 64–71. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974777472&partnerID=MN8TOARS Sarratt, T., Morgens, S.-M., & Jhala, A. (2014). Domain-specific sentiment classification for games-related tweets. AAAI Workshop - Technical Report, WS-14-17, 32–34. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84974816757&partnerID=MN8TOARS Battestilli, L., Silverberg, L., & Eischen, J. (2014). CAD Apps: Computer aided design applications for the MAE curriculum. Workshop presented at the Annual MathWorks Curriculum Conference. Battestilli, L. (2014). SHE++ Documentary Screening and Discussion. Panel presented at the NCSU Women In Computer Science, (WiCS) program, NC State University, Raleigh, NC. Sheshadri, V., Lynch, C., & Barnes, T. (2014). InVis: An EDM Tool for Graphical Rendering and Analysis of Student Interaction Data. In S. Gutierrez-Santos & O. C. Santos (Eds.), EDM 2014 Extended Proceedings: Workshop Proceedings of the 7th International Conference on Educational Data Mining. London, United Kingdom: CEUR-WS. Mostafavi, B., & Barnes, T. (2014). Evaluation of Logic Proof Problem Difficulty Through Student Performance Data. In S. Gutierrez-Santos & O. C (Eds.), EDM 2014 Extended Proceedings: Workshop Proceedings of the 7th International Conference on Educational Data Mining. London, United Kingdom: CEUR-WS. Peters, J., Jauhari, S., & Barnes, T. (2014). Extracting temporal features using BCIpy. Proceedings of the Workshop on Utilizing EEG Input in Intelligent Tutoring Systems. Presented at the Intelligent Tutoring Systems (ITS2014), Honolulu, Hawaii. Nickel, A., Barnes, T., Payton, J., & Wikstrom, E. (2014, April 3). Balancing physical and cognitive challenge: A study of players psychological responses to exergame play. Presented at the Foundations of Digital Games, Fort Lauderdale, FL. Eagle, M., & Barnes, T. (2014). Exploring differences in problem solving with data-driven approach maps. Educational Data Mining, 76–83. Peddycord, B., III, Hicks, A., & Barnes, T. (2014). Generating hints for programming problems using intermediate output. Educational Data Mining, 92–98. Eagle, M., Polamreddi, V., Mostafavi, B., & Barnes, T. (2014). Exploration of student's use of rule application references in a propositional logic tutor. Educational Data Mining, 249–252. Burns, R., Eugene, W., Barnes, T., Chandler, S., Harwell, M., & Omokaro, O. (2014). Reflections from a computational service learning trip to Haiti. The Journal of Computing Sciences in Colleges, 29(3), 43–50. https://doi.org/10.5555/2544322.2544331 Wang, L., Ni, H., Yang, R., Pappu, V., Fenn, M. B., & Pardalos, P. M. (2014). Feature selection based on meta-heuristics for biomedicine. Optimization Methods and Software, 29(4), 703–719. https://doi.org/10.1080/10556788.2013.834900 Wang, L., Ni, H., Yang, R., Fei, M., & Ye, W. (2014). A simple human learning optimization algorithm. In Communications in Computer and Information Science (Vol. 462, pp. 56–65). https://doi.org/10.1007/978-3-662-45261-5_7 Perros, H. G. (2014). Comments on: Queueing models for the analysis of communication systems. TOP, 22(2), 458–459. https://doi.org/10.1007/S11750-014-0329-9 Sessoms, M., & Anyanwu, K. (2014). Enabling a Package Query Paradigm on the Semantic Web: Model and Algorithms. In A. Hameurlain, J. Küng, & R. Wagner (Eds.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XIII (pp. 1–32). https://doi.org/10.1007/978-3-642-54426-2_1 King, J., & Williams, L. (2014). Log Your CRUD: Design Principles for Software Logging Mechanisms. Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5:1–5:10. https://doi.org/10.1145/2600176.2600183 Riaz, M., Slankas, J., King, J., & Williams, L. (2014). Using Templates to Elicit Implied Security Requirements from Functional Requirements - a Controlled Experiment. Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 22:1–22:10. https://doi.org/10.1145/2652524.2652532 Young, R. M., Ware, S., Cassell, B., & Robertson, J. (2014). Plans and Planning in Narrative Generation: A Review of Plan-Based Approaches to the Generation of Story, Discourse and Interactivity in Narratives. Sprache Und Datenverarbeitung, 17(1-2), 41–64. Hardin, E., Mitasova, H., Tateosian, L., & Overton, M. (2014). GIS-based Analysis of Coastal Lidar Time-Series. https://doi.org/10.1007/978-1-4939-1835-5 Nicol, D. M., Singh, M. P., & Williams, L. A. (Eds.). (2014). HoTSoS '14 : proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS) : April 08-09 2014, Raleigh, NC, USA. New York: ACM. Gehringer, E. F. (2014). A Survey of Methods for Improving Review Quality. In Lecture Notes in Computer Science (pp. 92–97). https://doi.org/10.1007/978-3-319-13296-9_10 Doyle, M., Williams, L., Cohn, M., & Rubin, K. S. (2014). Agile Software Development in Practice. In Lecture Notes in Business Information Processing (pp. 32–45). https://doi.org/10.1007/978-3-319-06862-6_3 Maali, F., Ravindra, P., Anyanwu, K., & Decker, S. (2014). SYRql: A Dataflow Language for Large Scale Processing of RDF Data. In The Semantic Web – ISWC 2014 (pp. 147–163). https://doi.org/10.1007/978-3-319-11964-9_10 Sheehy, D. R. (2014). The Persistent Homology of Distance Functions under Random Projection. SOCG: Symposium on Computational Geometry. Presented at the 30th International Symposium on Computational Geometry, Kyoto, Japan. https://doi.org/10.1145/2582112.2582126 Ding, Y., Zhou, M., Zhao, Z., Eisenstat, S., & Shen, X. (2014). Finding the limit. Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14. Presented at the the 19th international conference. https://doi.org/10.1145/2541940.2541945 Zhao, Z., Wu, B., & Shen, X. (2014). Challenging the "embarrassingly sequential". Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14. Presented at the the 19th international conference. https://doi.org/10.1145/2541940.2541989 Wang, W., Wang, Z., Wu, C., Yew, P.-C., Shen, X., Yuan, X., … Guan, Y. (2014). Localization of concurrency bugs using shared memory access pairs. Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14. Presented at the the 29th ACM/IEEE international conference. https://doi.org/10.1145/2642937.2642972 Zhao, Z., Zhou, M., & Shen, X. (2014). SatScore. Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '14 Adjunct. Presented at the the 2014 ACM International Joint Conference. https://doi.org/10.1145/2632048.2632080 De Maio, G., Kapravelos, A., Shoshitaishvili, Y., Kruegel, C., & Vigna, G. (2014). PExy: The Other Side of Exploit Kits. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132–151). https://doi.org/10.1007/978-3-319-08509-8_8 Partington, S., Murphy, E., Bowen, E., Lacombe, D., Piras, G., Cottrell, L., & Menzies, T. (2014). Choose to Change: The West Virginia Early Childhood Obesity Prevention Project. Journal of Nutrition Education and Behavior, 46(4), S197. https://doi.org/10.1016/J.JNEB.2014.04.213 Menzies, T., & Mernik, M. (2014). Special issue on realizing artificial intelligence synergies in software engineering. Software Quality Journal, 22(1), 49–50. https://doi.org/10.1007/S11219-014-9228-4 Lynch, C. F., Ashley, K. D., & Chi, M. (2014). Can Diagrams Predict Essay Grades? In Intelligent Tutoring Systems (pp. 260–265). https://doi.org/10.1007/978-3-319-07221-0_32 Chi, M., Jordan, P., & VanLehn, K. (2014). When Is Tutorial Dialogue More Effective Than Step-Based Tutoring? In Intelligent Tutoring Systems (pp. 210–219). https://doi.org/10.1007/978-3-319-07221-0_25 Zou, X., Lakshminarasimhan, S., Boyuka, D. A., II, Ranshous, S., Tang, H., Klasky, S., & Samatova, N. F. (2014). Fast Set Intersection through Run-Time Bitmap Construction over PForDelta-Compressed Indexes. In Lecture Notes in Computer Science (pp. 668–679). https://doi.org/10.1007/978-3-319-09873-9_56 Tang, H., Zou, X., Jenkins, J., Boyuka, D. A., II, Ranshous, S., Kimpe, D., … Samatova, N. F. (2014). Improving Read Performance with Online Access Pattern Analysis and Prefetching. In Lecture Notes in Computer Science (pp. 246–257). https://doi.org/10.1007/978-3-319-09873-9_21 Jenkins, J., Zou, X., Tang, H., Kimpe, D., Ross, R., & Samatova, N. F. (2014). RADAR: Runtime Asymmetric Data-Access Driven Scientific Data Replication. In Lecture Notes in Computer Science (pp. 296–313). https://doi.org/10.1007/978-3-319-07518-1_19 Harenberg, S., Bello, G., Gjeltema, L., Ranshous, S., Harlalka, J., Seay, R., … Samatova, N. (2014). Community detection in large-scale networks: a survey and empirical evaluation. Wiley Interdisciplinary Reviews: Computational Statistics, 6(6), 426–439. https://doi.org/10.1002/WICS.1319 Min, W., Ha, E. Y., Rowe, J., Mott, B., & Lester, J. (2014). Deep learning-based goal recognition in open-ended digital games. Proceedings of the 10th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2014, 37–43. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84916877257&partnerID=MN8TOARS Cateté, V., Wassell, K., & Barnes, T. (2014). Use and development of entertainment technologies in after school STEM program. SIGCSE '14: Proceedings of the 45th ACM technical symposium on Computer science education, 163–168. https://doi.org/10.1145/2538862.2538952 Hicks, A., Cateté, V., & Barnes, T. (2014). Part of the game: Changing level creation to identify and filter low quality user-generated levels. Foundations of Digital Games (FDG). Presented at the Foundations of Digital Games (FDG2014), Fort Lauderdale, FL. Cateté, V. (2014). CS outreach to high school enrollment: bridging the gap. Proceedings of the tenth annual conference on International computing education research, 143–144. https://doi.org/10.1145/2632320.2632323 Cateté, V., Hicks, A., Barnes, T., & Lynch, C. (2014). Snag'em: Graph Data Mining for a Social Networking Game. In S. Gutierrez-Santos & O. C. Santos (Eds.), EDM 2014 Extended Proceedings: Workshop Proceedings of the 7th International Conference on Educational Data Mining (Vol. 6, p. 10). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84922311434&partnerID=MN8TOARS You better be honest: Discouraging free-riding and false-reporting in mobile crowdsourcing. (2014). 2014 IEEE Global Communications Conference. https://doi.org/10.1109/glocom.2014.7037593 Christensen, J., Bae, J. H., Watson, B., & Rappa, M. (2014). Understanding Which Graph Depictions Are Best for Viewers. In Smart Graphics (pp. 174–177). https://doi.org/10.1007/978-3-319-11650-1_17 Kc, K., & Freeh, V. W. (2014). Tuning Hadoop Map Slot Value Using CPU Metric. In Big Data Benchmarks, Performance Optimization, and Emerging Hardware (pp. 141–153). https://doi.org/10.1007/978-3-319-13021-7_11 Lapo, R. A., Gogny, M., Chatagnon, G., Lalanne, V., Harfoush, K., Assane, M., … Mallem, M. Y. (2014). Equine digital veins are more sensitive to superoxide anions than digital arteries. European Journal of Pharmacology, 740, 66–71. https://doi.org/10.1016/J.EJPHAR.2014.06.016 Ananthakrishnan, S. K., & Mueller, F. (2014). ScalaJack: Customized Scalable Tracing with In-situ Data Analysis. In Lecture Notes in Computer Science (pp. 13–25). https://doi.org/10.1007/978-3-319-09873-9_2 Lagadapati, M., Mueller, F., & Engelmann, C. (2014). Tools for Simulation and Benchmark Generation at Exascale. In Tools for High Performance Computing 2013 (pp. 19–24). https://doi.org/10.1007/978-3-319-08144-1_2 Matsuda, N., Griger, C. L., Barbalios, N., Stylianides, G. J., Cohen, W. W., & Koedinger, K. R. (2014). Investigating the effect of meta-cognitive scaffolding for learning by teaching. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 104–113). https://doi.org/10.1007/978-3-319-07221-0_13 MacLellan, C. J., Koedinger, K. R., & Matsuda, N. (2014). Authoring tutors with simstudent: An evaluation of efficiency and model quality. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 551–560). https://doi.org/10.1007/978-3-319-07221-0_70 Barnes, T., Catete, V., Hicks, A., & Peddycord, B. (2014). Making games and apps in introductory computer science (abstract only). Proceedings of the 45th ACM technical symposium on Computer science education - SIGCSE '14, 739–739. https://doi.org/10.1145/2538862.2539000 Miller, G. L., & Sheehy, D. R. (2014). A New Approach to Output-Sensitive Construction of Voronoi Diagrams and Delaunay Triangulations. Discrete & Computational Geometry, 52(3), 476–491. https://doi.org/10.1007/s00454-014-9629-y Oudot, S. Y., & Sheehy, D. R. (2014). Zigzag Zoology: Rips Zigzags for Homology Inference. Foundations of Computational Mathematics, 15(5), 1151–1186. https://doi.org/10.1007/s10208-014-9219-7 Buchet, M., Chazal, F., Oudot, S. Y., & Sheehy, D. R. (2014). Efficient and Robust Persistent Homology for Measures. Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms. Presented at the Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms. https://doi.org/10.1137/1.9781611973730.13 The Thing Itself Speaks Accountability as a Foundation for Requirements in Sociotechnical Systems. (2014). IEEE 7TH INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND LAW (RELAW). Retrieved from https://publons.com/publon/21294415/ The Science of Security: Introduction from the Perspective of Secure Collaboration. (2014). 1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY. https://doi.org/10.1145/2602945.2602956 Murukannaiah, P. K., & Singh, M. P. (2014). Xipho: Extending tropos to engineer context-aware personal agents. 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2014, 1, 309–316. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84908533940&partnerID=MN8TOARS Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier. (2014). 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG). https://doi.org/10.1109/ITNG.2014.99 Murukannaiah, P. K., Fogues, R., & Singh, M. P. (2014). Platys: A framework for supporting context-aware personal agents. 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2014, 2, 1689–1690. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84911364009&partnerID=MN8TOARS Nicol, D. M., & Singh, M. P. (2014). Message from the program chairs. ACM International Conference Proceeding Series. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84906819223&partnerID=MN8TOARS Zhang, Z., & Singh, M. P. (2014). ReNew: A semi-supervised framework for generating domain-specific lexicons and sentiment analysis. 52nd Annual Meeting of the Association for Computational Linguistics, ACL 2014 - Proceedings of the Conference, 1, 542–551. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84906923074&partnerID=MN8TOARS Yuan, G., Murukannaiah, P. K., Zhang, Z., & Singh, M. P. (2014). Exploiting sentiment homophily for link prediction. RecSys 2014 - Proceedings of the 8th ACM Conference on Recommender Systems, 17–24. https://doi.org/10.1145/2645710.2645734 Determining Team Hierarchy from Broadcast Communications. (2014). Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-319-13734-6_35 Kalia, A. K., Zhang, Z., & Singh, M. P. (2014). Estimating trust from agents' interactions via commitments. In Frontiers in Artificial Intelligence and Applications (Vol. 263, pp. 1043–1044). https://doi.org/10.3233/978-1-61499-419-0-1043 Kalia, A. K., Buchler, N., Ungvarsky, D., Govindan, R., & Singh, M. P. (2014). Determining team hierarchy from broadcast communications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8851, pp. 493–507). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84914173058&partnerID=MN8TOARS Gao, X., & Singh, M. P. (2014). Extracting normative relationships from business contracts. 13th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2014, 1, 101–108. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84911401191&partnerID=MN8TOARS Christiaanse, R., Ghose, A., Noriega, P., & Singh, M. P. (2014). Characterizing artificial socio-cognitive technical systems. CEUR Workshop Proceedings, 1283, 336–346. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84910069753&partnerID=MN8TOARS Parsons, S., Atkinson, K., Li, Z., McBurney, P., Sklar, E., Singh, M., … Rowe, J. (2014). Argument schemes for reasoning about trust. Argument and Computation, 5(2-3), 160–190. https://doi.org/10.1080/19462166.2014.913075 Balik, S. P., Mealin, S. P., Stallmann, M. F., Rodman, R. D., Glatz, M. L., & Sigler, V. J. (2014). Including blind people in computing through access to graphs. Proceedings of the 16th international ACM SIGACCESS conference on Computers & accessibility, 91–98. Kalia, A. K., Ajmeri, N., Chan, K., Cho, J.-H., Adalı, S., & Singh, M. P. (2014). A Model of Trust, Moods, and Emotions in Multiagent Systems, and its Empirical Evaluation. Proceedings of the 16th AAMAS Workshop on Trust in Agent Societies (Trust), 1740, 1–11. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85006168135&partnerID=MN8TOARS Boyer, B., Comer, M. T., & Kaltofen, E. L. (2014). Sparse Polynomial Interpolation by Variable Shift in the Presence of Noise and Outliers in the Evaluations. In Computer Mathematics (pp. 183–197). https://doi.org/10.1007/978-3-662-43799-5_16 Kaltofen, E. L. (2014). Symbolic Computation and Complexity Theory Transcript of My Talk. In Computer Mathematics (pp. 3–7). https://doi.org/10.1007/978-3-662-43799-5_1 Kaltofen, E. L. (2014). Cleaning-up data for sparse model synthesis. Proceedings of the 2014 Symposium on Symbolic-Numeric Computation - SNC '14. Presented at the the 2014 Symposium. https://doi.org/10.1145/2631948.2631949 Boyer, B., & Kaltofen, E. L. (2014). Numerical linear system solving with parametric entries by error correction. Proceedings of the 2014 Symposium on Symbolic-Numeric Computation - SNC '14. Presented at the the 2014 Symposium. https://doi.org/10.1145/2631948.2631956 Dumas, J.-G., & Kaltofen, E. (2014). Essentially optimal interactive certificates in linear algebra. Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation - ISSAC '14. Presented at the the 39th International Symposium. https://doi.org/10.1145/2608628.2608644 Kaltofen, E. L., & Pernet, C. (2014). Sparse polynomial interpolation codes and their decoding beyond half the minimum distance. Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation - ISSAC '14. Presented at the the 39th International Symposium. https://doi.org/10.1145/2608628.2608660 Kaltofen, E. L., & Yang, Z. (2014). Sparse multivariate function recovery with a high error rate in the evaluations. Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation - ISSAC '14. Presented at the the 39th International Symposium. https://doi.org/10.1145/2608628.2608637 Gehringer, E. F. (2014). A survey of methods for improving review quality. Proceedings of the 13th International Conference on Web-Based Learning: Peer-Review, Peer-Assessment, and Self-Assessment in Education. Presented at the The 13th International Conference on Web-Based Learning: Peer-Review, Peer-Assessment, and Self-Assessment in Education, Talinn, Estonia. Gehringer, E. F. (2014). Optimizing your teaching load. 2014 ASEE Annual Conference & Exposition. Presented at the 2014 ASEE Annual Conference & Exposition, Indianapolis, Indiana. https://doi.org/10.18260/1-2--22894 Price, T. W., & Young, R. M. (2014). Towards an Extended Declarative Representation for Camera Planning. Workshops at the Twenty-Eighth AAAI Conference on Artificial Intelligence. Ravindra, P. (2014). Towards optimization of RDF analytical queries on MapReduce. 2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW), 335–339. Li, C., Yang, Y., Dai, H. W., Yan, S. G., Mueller, F., & Zhou, H. Y. (2014). Understanding the tradeoffs between software-managed vs. hardware-managed caches in GPUs. Ieee international symposium on performance analysis of systems and, 231–241. Chopra, A. K., Dalpiaz, F., Aydemir, F. B., Giorgini, P., Mylopoulos, J., & Singh, M. P. (2014). Protos: Foundations for engineering innovative sociotechnical systems. 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014 - Proceedings, 53–62. https://doi.org/10.1109/re.2014.6912247 Barik, T., Lubick, K., Christie, S., & Murphy-Hill, E. (2014). How Developers Visualize Compiler Messages: A Foundational Approach to Notification Construction. 2014 SECOND IEEE WORKING CONFERENCE ON SOFTWARE VISUALIZATION (VISSOFT), pp. 87–96. https://doi.org/10.1109/vissoft.2014.24 Riaz, M., King, J., Slankas, J., & Williams, L. (2014). Hidden in plain sight: Automatically identifying security requirements from natural language artifacts. 2014 ieee 22nd international requirements engineering conference (re), 183–192. https://doi.org/10.1109/re.2014.6912260 Hibshi, H., Breaux, T., Riaz, M., & Williams, L. (2014). Towards a framework to measure security expertise in requirements analysis. 2014 IEEE 1st Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE), 13–18. https://doi.org/10.1109/espre.2014.6890522 Chen, G., Wu, B., Li, D., & Shen, X. (2014). PORPLE: An Extensible Optimizer for Portable Data Placement on GPU. 2014 47TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE (MICRO), pp. 88–100. https://doi.org/10.1109/micro.2014.20 Wei, W., & Yu, T. (2014). Integrity assurance for outsourced databases without DBMS modification. Data and applications security and privacy xxviii, 8566, 1–16. Boyuka, D. A., II, Lakshminarasimhan, S., Zou, X., Gong, Z., Jenkins, J., Schendel, E. R., … Samatova, N. F. (2014). Transparent In Situ Data Transformations in ADIOS. 2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), pp. 256–266. https://doi.org/10.1109/ccgrid.2014.73 Dreher, P., & Kallumkal, G. (2014). Toward implementation of a software defined cloud on a supercomputer. 2014 ieee international conference on cloud engineering (ic2e), 580–585. Rivers, A. T., Vouk, M. A., & Williams, L. (2014). On Coverage-Based Attack Profiles. 2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), pp. 5–6. https://doi.org/10.1109/sere-c.2014.15 Zimmer, C., & Mueller, F. (2014). NoCMsg: Scalable NoC-Based Message Passing. 2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), pp. 186–195. https://doi.org/10.1109/ccgrid.2014.19 Carpenter, S. E., & Dagnino, A. (2014). Is agile too fragile for space-based systems engineering? 2014 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), 38–45. Barik, T. (2014). Improving error notification comprehension through visual overlays in IDEs. 2014 ieee symposium on visual languages and human-centric computing (vl/hcc 2014), 177–178. Ge, X., Shepherd, D., Damevski, K., & Murphy-Hill, E. (2014). How developers use multi-recommendation system in local code search. 2014 ieee symposium on visual languages and human-centric computing (vl/hcc 2014), 69–76. https://doi.org/10.1109/vlhcc.2014.6883025 Johnson, B. (2014). Enhancing tools' intelligence for improved program analysis tool usability. 2014 ieee symposium on visual languages and human-centric computing (vl/hcc 2014), 191–192. Anyanwu, K., Ravindra, P., & Kim, H. (2014). Algebraic optimization of RDF graph pattern queries on MapReduce. Large Scale and Big Data: Processing and Management, 183–227. https://doi.org/10.1201/b17112-7 Farnan, N. L., Lee, A. J., Chrysanthis, P. K., & Yu, T. (2014). PAQO: Preference-aware query optimization for decentralized database systems. 2014 ieee 30th international conference on data engineering (icde), 424–435. https://doi.org/10.1109/icde.2014.6816670 Qian, T., Mueller, F., & Xin, Y. F. (2014). A real-time distributed hash table. 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). https://doi.org/10.1109/rtcsa.2014.6910537 Kalia, A. K., Buchler, N., Ungvarsky, D., Govindan, R., & Singh, M. P. (2014). Determining team hierarchy from broadcast communications. Social informatics, socinfo 2014, 8851, 493–507. Tanwir, S. (2014). VBR video traffic models. Hoboken, NJ: John Wiley & Sons, Inc. Chopra, A. K., & Singh, M. P. (2014). The thing itself speaks: Accountability as a foundation for requirements in sociotechnical systems. 2014 IEEE 7th International Workshop on Requirements Engineering and Law, RELAW 2014 - Proceedings, 22–24. https://doi.org/10.1109/RELAW.2014.6893477 Choo, E., Park, Y., & Siyamwala, H. (2014). Identifying malicious metering data in advanced metering infrastructure. 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE), 490–495. Stewart, W. J. (2014). A first course in probability. [Place of publication not identified]: [CreateSpace Independent Publishing Platform]. Chen, W., Chen, Z., Samatova, N. F., Peng, L., Wang, J., & Tang, M. (2014). Solving the maximum duo-preservation string mapping problem with linear programming. THEORETICAL COMPUTER SCIENCE, 530, 1–11. https://doi.org/10.1016/j.tcs.2014.02.017 Singh, M. P. (2014). Bliss: Specifying Declarative Service Protocols. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), pp. 235–242. https://doi.org/10.1109/scc.2014.39 Qian, T., Chakrabortty, A., Mueller, F., & Xin, Y. F. (2014). A real-time distributed storage system for multi-resolution virtual synchrophasor. 2014 ieee pes general meeting - conference & exposition. https://doi.org/10.1109/pesgm.2014.6939832 Baran, M., Padmanabhan, A., Chouhan, S., Yuan, X. Y., Smith, J., & Mayfield, H. (2014). A model based fault locating method for distribution systems. 2014 ieee pes general meeting - conference & exposition. https://doi.org/10.1109/pesgm.2014.6939019 Bozkurt, A., Roberts, D. L., Sherman, B. L., Brugarolas, R., Mealin, S., Majikes, J., … Loftin, R. (2014). Toward Cyber-Enhanced Working Dogs for Search and Rescue. IEEE INTELLIGENT SYSTEMS, 29(6), 32–39. https://doi.org/10.1109/mis.2014.77 Zhou, M. Z., Shen, X., Gao, Y. Q., & Yiu, G. (2014). Space-efficient multi-versioning for input-adaptive feedback-driven program optimizations. ACM SIGPLAN Notices, 49(10), 763–776. https://doi.org/10.1145/2714064.2660229 Zhao, Z., Wu, B., Zhou, M., Ding, Y., Sun, J., Shen, X., & Wu, Y. (2014, October). Call Sequence Prediction through Probabilistic Calling Automata. ACM SIGPLAN NOTICES, Vol. 49, pp. 745–762. https://doi.org/10.1145/2714064.2660221 Baikadi, A., Rowe, J., Mott, B., & Lester, J. (2014). Generalizability of goal recognition models in narrative-centered learning environments. User modeling, adaptation, and personalization, umap 2014, 8538, 278–289. https://doi.org/10.1007/978-3-319-08786-3_24 Niehaus, J., & Young, R. M. (2014). Cognitive models of discourse comprehension for narrative generation. Literary and Linguistic Computing, 29(4), 561–582. https://doi.org/10.1093/llc/fqu056 Beam, A. L., Motsinger-Reif, A., & Doyle, J. (2014). Bayesian neural networks for detecting epistasis in genetic association studies. BMC Bioinformatics, 15(1), 368. https://doi.org/10.1186/s12859-014-0368-0 Babaoglu, A. C., & Dutta, R. (2014). A GENI Meso-Scale Experiment of a Verification Service. 2014 THIRD GENI RESEARCH AND EDUCATIONAL EXPERIMENT WORKSHOP (GREE), pp. 65–68. https://doi.org/10.1109/gree.2014.13 Ravindra, P., & Anyanwu, K. (2014). Nesting Strategies for Enabling Nimble MapReduce Dataflows for Large RDF Data. INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 10(1), 1–26. https://doi.org/10.4018/ijswis.2014010101 Ge, X., Shepherd, D., Damevski, K., & Murphy-Hill, E. (2014). How the Sando search tool recommends queries. 2014 Software Evolution Week - IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), 425–428. https://doi.org/10.1109/csmr-wcre.2014.6747210 Elliott, J., Hoemmen, M., & Mueller, F. (2014). Evaluating the Impact of SDC on the GMRES Iterative Solver. 2014 IEEE 28TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM. https://doi.org/10.1109/ipdps.2014.123 Kalia, A. K., Zhang, Z., & Singh, M. P. (2014). Estimating trust from agents' interactions via commitments. 21st european conference on artificial intelligence (ecai 2014), 263, 1043–1044. Chi, M., Jordan, P., & VanLehn, K. (2014). When is tutorial dialogue more effective than step-based tutoring? Intelligent tutoring systems, its 2014, 8474, 210–219. Petherbridge, D. T., & Dulberg, M. S. (2014). The importance of governance ongoing engagement with the campus community around the CMS. Research on Course Management Systems in Higher Education, 221–238. Eagle, M., & Barnes, T. (2014). Survival analysis on duration data in intelligent tutors. Intelligent tutoring systems, its 2014, 8474, 178–187. https://doi.org/10.1007/978-3-319-07221-0_22 Yi, S., & Krim, H. (2014). Subspace Learning of Dynamics on a Shape Manifold: A Generative Modeling Approach. IEEE TRANSACTIONS ON IMAGE PROCESSING, 23(11), 4907–4919. https://doi.org/10.1109/tip.2014.2358200 Rowe, J. P., Lobene, E. V., Mott, B. W., & Lester, J. C. (2014). Serious games go informal: a museum-centric perspective on intelligent game-based learning. Intelligent tutoring systems, its 2014, 8474, 410–415. https://doi.org/10.1007/978-3-319-07221-0_51 Bae, J., & Watson, B. (2014). Reinforcing Visual Grouping Cues to Communicate Complex Informational Structure. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 20(12), 1973–1982. https://doi.org/10.1109/tvcg.2014.2346998 Jenkins, J., Dinan, J., Balaji, P., Peterka, T., Samatova, N. F., & Thakur, R. (2014). Processing MPI Derived Datatypes on Noncontiguous GPU-Resident Data. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(10), 2627–2637. https://doi.org/10.1109/tpds.2013.234 Eagle, M., & Barnes, T. (2014). Modeling student dropout in tutoring systems. Intelligent tutoring systems, its 2014, 8474, 676–678. https://doi.org/10.1007/978-3-319-07221-0_104 Gao, X., & Singh, M. P. (2014). Mining Contracts for Business Events and Temporal Constraints in Service Engagements. IEEE TRANSACTIONS ON SERVICES COMPUTING, 7(3), 427–439. https://doi.org/10.1109/tsc.2013.21 Min, W., Mott, B. W., Rowe, J. P., & Lester, J. C. (2014). Leveraging semi-supervised learning to predict student problem-solving performance in narrative-centered learning environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 664–665). https://doi.org/10.1007/978-3-319-07221-0_99 Vail, A. K., & Boyer, K. E. (2014). Identifying effective moves in tutoring: On the refinement of dialogue act annotation schemes. Intelligent tutoring systems, its 2014, 8474, 199–209. Ahn, G.-J., Enck, W., & Shin, D. (2014). Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 11, pp. 209–210. https://doi.org/10.1109/tdsc.2014.2312738 He, X., Dai, H., & Ning, P. (2014). Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(8), 4374–4388. https://doi.org/10.1109/twc.2014.2320973 Liess, S., Kumar, A., Snyder, P. K., Kawale, J., Steinhaeuser, K., Semazzi, F. H. M., … Kumar, V. (2014). Different Modes of Variability over the Tasman Sea: Implications for Regional Climate. JOURNAL OF CLIMATE, 27(22), 8466–8486. https://doi.org/10.1175/jcli-d-13-00713.1 Hicks, A., Peddycord, B., & Barnes, T. (2014). Building games to learn from their players: Generating hints in a serious game. Intelligent tutoring systems, its 2014, 8474, 312–317. https://doi.org/10.1007/978-3-319-07221-0_39 Ware, S. G., Young, R. M., Harrison, B., & Roberts, D. L. (2014). A Computational Model of Plan-Based Narrative Conflict at the Fabula Level. IEEE Transactions on Computational Intelligence and AI in Games, 6(3), 271–288. https://doi.org/10.1109/tciaig.2013.2277051 Gu, D. W., Jiang, X. X., Xue, Y. B., Zou, W., & Guo, L. (2014). Protecting communications infrastructure against cyber attacks. China Communications, 11(8), I-. Wang, H., & Rouskas, G. N. (2014). Hierarchical traffic grooming: A tutorial. COMPUTER NETWORKS, 69, 147–156. https://doi.org/10.1016/j.comnet.2014.04.019 Wang, T., Krim, H., & Viniotis, Y. (2014). Analysis and Control of Beliefs in Social Networks. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 62(21), 5552–5564. https://doi.org/10.1109/tsp.2014.2352591 Murukannaiah, P. K., & Singh, M. P. (2014). Understanding Location-Based User Experience. IEEE INTERNET COMPUTING, 18(6), 72–76. https://doi.org/10.1109/mic.2014.127 Schreiner, D., Nguyen, T.-M., Russo, G., Heber, S., Patrignani, A., Ahrne, E., & Scheiffele, P. (2014). Targeted Combinatorial Alternative Splicing Generates Brain Region-Specific Repertoires of Neurexins. NEURON, 84(2), 386–398. https://doi.org/10.1016/j.neuron.2014.09.011 Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-G., Cox, L. P., … Sheth, A. N. (2014). TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 32(2). https://doi.org/10.1145/2619091 Emrani, S., Chintakunta, H., & Krim, H. (2014). Real time detection of harmonic structure: A case for topological signal analysis. International conference on acoustics speech and signal processing. https://doi.org/10.1109/icassp.2014.6854240 Chung, W. C., Hsu, C. J., Lai, K. C., Li, K. C., & Chung, Y. C. (2014). Maintenance of cooperative overlays in multi-overlay networks. IET Communications, 8(15), 2676–2683. Wilkerson, A. C., Chintakunta, H., & Krim, H. (2014). Computing persistent features in big data: A distributed dimension reduction approach. International conference on acoustics speech and signal processing. https://doi.org/10.1109/icassp.2014.6853548 Wolf, T., Griffioen, J., Calvert, K., Dutta, R., Rouskas, G., Baldin, I., & Nagurney, A. (2014). ChoiceNet: Toward an Economy Plane for the Internet. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 44(3), 58–65. https://doi.org/10.1145/2656877.2656886 Fan, W., & Perros, H. (2014). A novel trust management framework for multi-cloud environments based on trust service providers. KNOWLEDGE-BASED SYSTEMS, 70, 392–406. https://doi.org/10.1016/j.knosys.2014.07.018 Tanwir, S., & Perros, H. (2014). VBR Video Traffic Models. In VBR VIDEO TRAFFIC MODELS (pp. 1–148). https://doi.org/10.1002/9781118931066 Faghmous, J. H., Banerjee, A., Shekhar, S., Steinbach, M., Kumar, V., Ganguly, A. R., & Samatova, N. (2014). Theory-Guided Data Science for Climate Change. COMPUTER, 47(11), 74–78. https://doi.org/10.1109/mc.2014.335 Zhang, Y., Yang, M., Yang, Z., Gu, G., Ning, P., & Zang, B. (2014). Permission Use Analysis for Vetting Undesirable Behaviors in Android Apps. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(11), 1828–1842. https://doi.org/10.1109/tifs.2014.2347206 Perros, H. (2014). Networking services : QoS, signaling, processes. CreateSpace Independent Publishing Platform. Lakshminarasimhan, S., Zou, X., Boyuka, D. A., II, Pendse, S. V., Jenkins, J., Vishwanath, V., … Samatova, N. F. (2014). DIRAQ: scalable in situ data- and resource-aware indexing for optimized query performance. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 17(4), 1101–1119. https://doi.org/10.1007/s10586-014-0358-z Supak, S. K., Devine, H. A., Brothers, G. L., Rich, S. R., & Shen, W. (2014). An Open Source Web-Mapping System for Tourism Planning and Marketing. JOURNAL OF TRAVEL & TOURISM MARKETING, 31(7), 835–853. https://doi.org/10.1080/10548408.2014.890153 Talebi, S., Alam, F., Katib, L., Khamis, M., Salama, R., & Rouskas, G. N. (2014). [Review of Spectrum management techniques for elastic optical networks: A survey]. OPTICAL SWITCHING AND NETWORKING, 13, 34–48. https://doi.org/10.1016/j.osn.2014.02.003 Roberts, D. L., & Isbell, C. L., Jr. (2014). Lessons on Using Computationally Generated Influence for Shaping Narrative Experiences. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, 6(2), 188–202. https://doi.org/10.1109/tciaig.2013.2287154 Geleji, G., & Perros, H. (2014). Jitter analysis of an MMPP-2 tagged stream in the presence of an MMPP-2 background stream. APPLIED MATHEMATICAL MODELLING, 38(14), 3380–3400. https://doi.org/10.1016/j.apm.2013.11.055 Horswill, I. D., Montfort, N., & Young, R. M. (2014). Guest Editorial: Computational Narrative and Games. IEEE Transactions on Computational Intelligence and AI in Games, 6(2), 93–96. https://doi.org/10.1109/tciaig.2014.2325879 Sabourin, J. L., & Lester, J. C. (2014). Affect and Engagement in Game-Based Learning Environments. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 5(1), 45–56. https://doi.org/10.1109/t-affc.2013.27 Lee, S. Y., Rowe, J. P., Mott, B. W., & Lester, J. C. (2014). A Supervised Learning Framework for Modeling Director Agent Strategies in Educational Interactive Narrative. IEEE TRANSACTIONS ON COMPUTATIONAL INTELLIGENCE AND AI IN GAMES, 6(2), 203–215. https://doi.org/10.1109/tciaig.2013.2292010 Bae, B.-C., & Young, R. M. (2014). A Computational Model of Narrative Generation for Surprise Arousal. IEEE Transactions on Computational Intelligence and AI in Games, 6(2), 131–143. https://doi.org/10.1109/tciaig.2013.2290330 Murphy-Hill, E. (2014). The Future of Social Learning in Software Engineering. COMPUTER, 47(1), 48–54. https://doi.org/10.1109/mc.2013.406 Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2014). TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones. COMMUNICATIONS OF THE ACM, 57(3), 99–106. https://doi.org/10.1145/2494522 Lester, J. C., Spires, H. A., Nietfeld, J. L., Minogue, J., Mott, B. W., & Lobene, E. V. (2014). Designing game-based learning environments for elementary science education: A narrative-centered learning perspective. INFORMATION SCIENCES, 264, 4–18. https://doi.org/10.1016/j.ins.2013.09.005 Rhee, J., Riley, R., Lin, Z., Jiang, X., & Xu, D. (2014). Data-Centric OS Kernel Malware Characterization. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 72–87. https://doi.org/10.1109/tifs.2013.2291964 Rastogi, V., Chen, Y., & Jiang, X. (2014). Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 9(1), 99–108. https://doi.org/10.1109/tifs.2013.2290431 Canary, H., Taylor, R. M., II, Quammen, C., Pratt, S., Gomez, F. A., O'Shea, B., & Healey, C. G. (2014). Visualizing likelihood density functions via optimal region projection. COMPUTERS & GRAPHICS-UK, 41, 62–71. https://doi.org/10.1016/j.cag.2014.02.005 Tateosian, L., Mitasova, H., Thakur, S., Hardin, E., Russ, E., & Blundell, B. (2014). Visualizations of coastal terrain time series. INFORMATION VISUALIZATION, 13(3), 266–282. https://doi.org/10.1177/1473871613487086 Srikanth, H., Banerjee, S., Williams, L., & Osborne, J. (2014). Towards the prioritization of system test cases. SOFTWARE TESTING VERIFICATION & RELIABILITY, 24(4), 320–337. https://doi.org/10.1002/stvr.1500 Du, J., Dean, D. J., Tan, Y., Gu, X., & Yu, T. (2014). Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739. https://doi.org/10.1109/tpds.2013.62 Emrani, S., Gentimis, T., & Krim, H. (2014). Persistent Homology of Delay Embeddings and its Application to Wheeze Detection. IEEE SIGNAL PROCESSING LETTERS, 21(4), 459–463. https://doi.org/10.1109/lsp.2014.2305700 Liu, Q., Logan, J., Tian, Y., Abbasi, H., Podhorszki, N., Choi, J. Y., … Yu, W. (2014). Hello ADIOS: the challenges and lessons of developing leadership class I/O frameworks. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 26(7), 1453–1473. https://doi.org/10.1002/cpe.3125 Fritz, T., Murphy, G. C., Murphy-Hill, E., Ou, J., & Hill, E. (2014). Degree-of-Knowledge: Modeling a Developer's Knowledge of Code. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 23(2). https://doi.org/10.1145/2512207 Kier, M. W., Blanchard, M. R., Osborne, J. W., & Albert, J. L. (2014). The Development of the STEM Career Interest Survey (STEM-CIS). RESEARCH IN SCIENCE EDUCATION, 44(3), 461–481. https://doi.org/10.1007/s11165-013-9389-3 Geleji, G., & Perros, H. (2014). Jitter analysis of an IPP tagged traffic stream in an {IPP,M}/M/1 queue. ANNALS OF TELECOMMUNICATIONS, 69(5-6), 283–294. https://doi.org/10.1007/s12243-013-0362-y Telang, P. R., Kalia, A. K., & Singh, M. P. (2014). Engineering Service Engagements via Commitments. IEEE INTERNET COMPUTING, 18(3), 46–54. https://doi.org/10.1109/mic.2013.86 Chintakunta, H., & Krim, H. (2014). Distributed Localization of Coverage Holes Using Topological Persistence. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 62(10), 2531–2541. https://doi.org/10.1109/tsp.2014.2314063 Chirkova, R. (2014). Combined-Semantics Equivalence and Minimization of Conjunctive Queries. COMPUTER JOURNAL, 57(5), 775–795. https://doi.org/10.1093/comjnl/bxt032 Liu, X., Rouskas, G. N., He, F., & Xiong, H. (2014). Multipoint Control Protocol With Look-Ahead for Wavelength Division Multiplexed Ethernet Passive Optical Network. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 6(2), 104–113. https://doi.org/10.1364/jocn.6.000104 Kediyal, P. C., & Singh, M. P. (2014). Licit: Administering Usage Licenses in Federated Environments. IEEE TRANSACTIONS ON SERVICES COMPUTING, 7(1), 96–108. https://doi.org/10.1109/tsc.2013.1 Jeong, J., Lee, K., Yi, Y., Rhee, I., & Chong, S. (2014). ExMin: A routing metric for novel opportunity gain in Delay Tolerant Networks. COMPUTER NETWORKS, 59, 184–196. https://doi.org/10.1016/j.bjp.2013.11.006 Pei, J., Liu, X. B., Pardalos, P. M., Fan, W. J., Yang, S. L., & Wang, L. (2014). Application of an effective modified gravitational search algorithm for the coordinated scheduling problem in a two-stage supply chain. International Journal of Advanced Manufacturing Technology, 70(1-4), 335–348.