Computer Science - 2020 Lima, I., Cândido, J., & d’Amorim, M. (2020). Practical detection of CMS plugin conflicts in large plugin sets. Information and Software Technology. https://doi.org/10.1016/j.infsof.2019.106212 Guo, Z., Zhang, Z., & Singh, M. (2020). In Opinion Holders’ Shoes: Modeling Cumulative Influence for View Change in Online Argumentation. Proceedings of The Web Conference 2020, 2388–2399. https://doi.org/10.1145/3366423.3380302 Yedida, R., Abrar, S. M., Melo-Filho, C., Muratov, E., Chirkova, R., & Tropsha, A. (2020). Text mining to identify and extract novel disease treatments from unstructured datasets. ArXiv. https://doi.org/10.48550/arxiv.2011.07959 Parsimonious computing: A minority training regime for effective prediction in large microarray expression data sets. (2020). ArXiv. https://doi.org/10.48550/arxiv.2005.08442 Yedida, R., & Menzies, T. (2020). On the value of oversampling for deep learning in software defect prediction. ArXiv. https://doi.org/10.48550/arxiv.2008.03835 Yang, X., Chen, J., Yedida, R., Yu, Z., & Menzies, T. (2020). How to Recognize Actionable Static Code Warnings (Using Linear SVMs). ArXiv. https://doi.org/10.48550/arxiv.2006.00444 Ruddell, B. L., Gao, H., Pala, O., Rushforth, R., & Sabo, J. (2020). Infrastructure. In The Food-Energy-Water Nexus. https://doi.org/10.1007/978-3-030-29914-9_10 Enck, W. (2020). Analysis of Access Control Enforcement in Android. Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 117–118. Andow, B., Mahmud, S. Y., Whitaker, J., Enck, W., Reaves, B., Singh, K., & Egelman, S. (2020). Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck. Proceedings of the 29th USENIX Security Symposium (USENIX Security'20). Polinsky, I., Martin, K., Enck, W., & Reiter, M. K. (2020). nm-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 235–246. Anjum, I., Miah, M. S., Zhu, M., Sharmin, N., Kiekintveld, C., Enck, W., & Singh, M. P. (2020). Optimizing Vulnerability-Driven Honey Traffic Using Game Theory. ArXiv Preprint ArXiv:2002.09069. Rahman, M. R., Enck, W., & Williams, L. (2020). Do configuration management tools make systems more secure? an empirical research plan. Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1–2. Mahmud, S. Y., Acharya, A., Andow, B., Enck, W., & Reaves, B. (2020). Cardpliance: PCI DSS compliance of android applications. Proceedings of the 29th USENIX Conference on Security Symposium, 1517–1533. Nair, V., Yu, Z., Menzies, T., Siegmund, N., & Apel, S. (2020). Finding Faster Configurations Using FLASH. IEEE Transactions on Software Engineering, 46(7), 794–811. https://doi.org/10.1109/TSE.2018.2870895 Wermke, D., Huaman, N., Stransky, C., Busch, N., Acar, Y., & Fahl, S. (2020). Cloudy with a Chance of Misconceptions: Exploring Users’ Perceptions and Expectations of Security and Privacy in Cloud Office Suites. Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 359–377. Gaweda, A. M., Lynch, C. F., Seamon, N., Oliveira, G., & Deliwa, A. (2020). Typing Exercises as Interactive Worked Examples for Deliberate Practice in CS Courses. In Proceedings of the Twenty-Second Australasian Computing Education Conference, 1–9. Gitinabard, N., Okoilu, R., Xu, Y., Heckman, S., Barnes, T., & Lynch, C. (2020). Student Teamwork on Programming Projects: What can GitHub logs show us? ArXiv Preprint ArXiv:2008.11262. Heckman, S., Schmidt, J. Y., & King, J. (2020). Integrating Testing Throughout the CS Curriculum. 2020 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 441–444. Simmons, J. M., & Rouskas, G. N. (2020). Routing and Wavelength (Spectrum) Assignment. In B. Mukherjee, I. Tomkos, M. Tornatore, P. Winzer, & Y. Zhao (Eds.), Springer Handbook of Optical Networks (pp. 447–484). https://doi.org/10.1007/978-3-030-16250-4_12 Hossain, M. S. B., Lee, Y., Hong, J., Choi, H., & Guo, Z. (2020). Predicting lower limb 3D kinematics during gait using reduced number of wearable sensors via deep learning. Proceedings of the 44th Meetings of the American Society of Biomechanics (ASB). Presented at the 44th Meetings of the American Society of Biomechanics (ASB). Singh, J., Santinelli, L., Reghenzani, F., Bletsas, K., & Guo, Z. (2020). Mixed Criticality Scheduling of Probabilistic Real-Time Systems. Proceeding of the 10th European Congress on Embedded Real Time Software and Systems. Presented at the 0th European Congress on Embedded Real Time Software and Systems, Toulouse, France. Saifullah, A., Fahmida, S., Modekurthy, V., Fisher, N., & Guo, Z. (2020). CPU Energy-Aware Parallel Real-Time Scheduling. Proceedings of the 32th Euromicro Conference on Real-Time Systems (ECRTS). Presented at the 32th Euromicro Conference on Real-Time Systems (ECRTS), Modena, Italy. Sun, J., Shi, R., Wang, K., Guan, N., & Guo, Z. (2020). Efficient Feasibility Analysis for Graph-based Real-Time Task Systems. International Conference on Embedded Software (EMSOFT). Presented at the International Conference on Embedded Software (EMSOFT). Bhuiyan, A., Reghenzani, F., Fornaciari, W., & Guo, Z. (2020). Optimizing Energy in Non-preemptive Mixed-Criticality Scheduling by Exploiting Probabilistic Information. International Conference on Embedded Software (EMSOFT). Presented at the International Conference on Embedded Software (EMSOFT). Sun, J., Li, F., Guan, N., Zhu, W., Xiang, M., Guo, Z., & Yi, W. (2020). On Computing Exact WCRT for DAG Tasks. Presented at the 2020 57th ACM/IEEE Design Automation Conference (DAC). https://doi.org/10.1109/dac18072.2020.9218744 Sun, J., Chi, Y., Xu, T., Cao, L., Guan, N., Guo, Z., & Yi, W. (2020). On the Volume Calculation for Conditional DAG Tasks: Hardness and Algorithms. Presented at the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE). https://doi.org/10.23919/date48585.2020.9116559 Vaidhun, S., Guo, Z., Bian, J., Xiong, H., & Das, S. K. (2020). Priority-based Multi-Flight Path Planning with Uncertain Sector Capacities. Presented at the 2020 12th International Conference on Advanced Computational Intelligence (ICACI). https://doi.org/10.1109/icaci49185.2020.9177760 Guo, Z., Yang, K., Yao, F., & Awad, A. (2020). Inter-task cache interference aware partitioned real-time scheduling. Presented at the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing. https://doi.org/10.1145/3341105.3374014 Sun, J., Li, J., Guo, Z., Zou, A., Zhang, X., Agrawal, K., & Baruah, S. (2020). Real-Time Scheduling upon a Host-Centric Acceleration Architecture with Data Offloading. Presented at the 2020 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). https://doi.org/10.1109/rtas48715.2020.00-17 Yang, K., Bhuiyan, A., & Guo, Z. (2020). F2VD. Presented at the ICCAD '20: IEEE/ACM International Conference on Computer-Aided Design. https://doi.org/10.1145/3400302.3415716 Agrawal, K., Baruah, S., Guo, Z., & Li, J. (2020). The safe and effective application of probabilistic techniques in safety-critical systems. Presented at the ICCAD '20: IEEE/ACM International Conference on Computer-Aided Design. https://doi.org/10.1145/3400302.3415674 Zsiros, J., Blalock, B., Craig, D., Vaidhun, S., Wang, A., & Guo, Z. (2020). GARDS: Generalized Autonomous Robotic Delivery System. Presented at the 2020 International Conference on Connected and Autonomous Driving (MetroCAD). https://doi.org/10.1109/metrocad48866.2020.00013 Huang, A., Makridis, C., Baker, M., Medeiros, M., & Guo, Z. (2020). Understanding the Impact of COVID-19 Intervention Policies on the Labor Market of the Hospitality and Retail Industries. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3637766 Bhuiyan, A., Reghenzani, F., Fornaciari, W., & Guo, Z. (2020). Optimizing Energy in Non-Preemptive Mixed-Criticality Scheduling by Exploiting Probabilistic Information. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3906–3917. https://doi.org/10.1109/tcad.2020.3012231 Kuttal, S., Bai, Y., Scott, E., & Sharma, R. (2020). Tug of perspectives: Mobile app users versus developers. International Journal of Computer Science and Information Security, 18(6), 83–94. Kuttal, S., Sun, M., Ghosh, A., & Sharma, R. (2020). Birds of a feather flock together? A study of developers’ flocking and migration behavior in GitHub and Stack Overflow. International Journal of Computer Science and Information Security, 18(6), 1–12. Kuttal, S., & Ghosh, A. (2020). Source code comments: Overlooked in the realm of code clone detection. International Journal of Computer Science and Information Security, 18(11), 11–22. https://doi.org/10.5281/zenodo.4361801 Bian, J., Xiong, H., Fu, Y., Huan, J., & Guo, Z. (2020). MP 2 SDA. ACM Transactions on Knowledge Discovery from Data, 14(3), 1–22. https://doi.org/10.1145/3374919 Agrawal, K., Baruah, S., Guo, Z., Li, J., & Vaidhun, S. (2020). Hard-Real-Time Routing in Probabilistic Graphs to Minimize Expected Delay. 2020 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss49844.2020.00017 Sun, J., Shi, R., Wang, K., Guan, N., & Guo, Z. (2020). Efficient Feasibility Analysis for Graph-Based Real-Time Task Systems. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 39(11), 3385–3397. https://doi.org/10.1109/tcad.2020.3012174 Huang, A., Makridis, C., Baker, M., Medeiros, M., & Guo, Z. (2020). Understanding the impact of COVID-19 intervention policies on the hospitality labor market. International Journal of Hospitality Management, 91, 102660. https://doi.org/10.1016/j.ijhm.2020.102660 Liu, S., Guan, N., Guo, Z., & Yi, W. (2020). MiniTEE—A Lightweight TrustZone-Assisted TEE for Real-Time Systems. Electronics, 9(7), 1130. https://doi.org/10.3390/electronics9071130 Bhuiyan, A., Liu, D., Khan, A., Saifullah, A., Guan, N., & Guo, Z. (2020). Energy-Efficient Parallel Real-Time Scheduling on Clustered Multi-Core. IEEE Transactions on Parallel and Distributed Systems, 31(9), 2097–2111. https://doi.org/10.1109/TPDS.2020.2985701 Robe, P., Kaur Kuttal, S., Zhang, Y., & Bellamy, R. (2020). Can Machine Learning Facilitate Remote Pair Programming? Challenges, Insights & Implications. Presented at the 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vl/hcc50065.2020.9127250 Kuttal, S. K., Myers, J., Gurka, S., Magar, D., Piorkowski, D., & Bellamy, R. (2020). Towards Designing Conversational Agents for Pair Programming: Accounting for Creativity Strategies and Conversational Styles. Presented at the 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vl/hcc50065.2020.9127276 Liu, J., Pang, Y., Ding, H., Cai, Y., Zhang, H., & Fang, Y. (2020). Optimizing IoT Energy Efficiency on Edge (EEE): a Cross-layer Design in a Cognitive Mesh Network. IEEE Transactions on Wireless Communications, 20(4), 2472–2486. Gai, N., Xue, K., He, P., Zhu, B., Liu, J., & He, D. (2020). An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid. 2020 16th International Conference on Mobility, Sensing and Networking (MSN), 73–80. Liu, J., Zhang, C., Wang, Y., Wei, L., & Liu, J. (2020). Cooperative Caching in a Content-Centric Network for High-Definition Map Delivery. 2020 3rd International Conference on Hot Information-Centric Networking (HotICN), 96–101. Li, J., Xue, K., Wei, D. S. L., Liu, J., & Zhang, Y. (2020). Energy efficiency and traffic offloading optimization in integrated satellite/terrestrial radio access networks. IEEE Transactions on Wireless Communications, 19(4), 2367–2381. Jiang, S., Liu, J., Wang, L., Zhou, Y., & Fang, Y. (2020). ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking. IEEE Transactions on Vehicular Technology, 69(9), 10252–10263. Jiang, S., Liu, J., Huang, L., Wu, H., & Zhou, Y. (2020). Vehicular Edge Computing Meets Cache: An Access Control Scheme for Content Delivery. ICC 2020-2020 IEEE International Conference on Communications (ICC), 1–6. Cao, Q., Li, Y., Wu, Z., Miao, Y., & Liu, J. (2020). Privacy-preserving conjunctive keyword search on encrypted data with enhanced fine-grained access control. World Wide Web, 23(2), 959–989. Fu, J., Liao, Z., Liu, J., Smith, S. C., & Wang, J. (2020). Memristor Based Variation Enabled Differentially Private Learning Systems for Edge Computing in IoT. IEEE Internet of Things Journal. Xing, Y., Han, J., Xue, K., Liu, J., Pan, M., & Hong, P. (2020). MPTCP Meets Big Data: Customizing Transmission Strategy for Various Data Flows. IEEE Network, 34(4), 35–41. Li, J., Xue, K., Liu, J., & Zhang, Y. (2020). A User-Centric Handover Scheme for Ultra-Dense LEO Satellite Networks. IEEE Wireless Communications Letters, 9(11), 1904–1908. Han, D., Chen, W., & Liu, J. (2020). Energy-Efficient UAV Communications under Stochastic Trajectory: A Markov Decision Process Approach. IEEE Transactions on Green Communications and Networking. Wan, K., Wang, Z., Wang, Y., Zhang, C., & Liu, J. (2020). Traffic Optimization for In-flight Internet Access via Air-to-ground Communications. 2020 IEEE/CIC International Conference on Communications in China (ICCC), 250–255. V, S. H. C., & Chopra, A. K. (2020). Fault Tolerance in Multiagent Systems. In Engineering Multi-Agent Systems (pp. 78–86). https://doi.org/10.1007/978-3-030-66534-0_5 Wang, W., Rao, Y., Shi, Y., Milliken, A., Martens, C., Barnes, T., & Price, T. W. (2020). Comparing feature engineering approaches to predict complex programming behaviors. CEUR Workshop Proceedings, 2734. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85096164837&partnerID=MN8TOARS Chen, C., Huang, C.-Y., Hou, Y., Shi, Y., Dai, E., & Wang, J. (2020). Test_positive at W-nut 2020 shared task-3: Joint event multi-task learning for slot filling in noisy text. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85098406978&partnerID=MN8TOARS Lavallee, B., Russell, H., Sullivan, B. D., & Poel, A. (2020). Approximating vertex cover using structural rounding. Proceedings of the Workshop on Algorithm Engineering and Experiments, 2020-January, 70–80. https://doi.org/10.1137/1.9781611976007.6 Reidl, F., & Sullivan, B. D. (2020). A color-avoiding approach to subgraph counting in bounded expansion classes. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85095561220&partnerID=MN8TOARS Xiao, Y., Zingle, G., Jia, Q., Akbar, S., Song, Y., Dong, M., … Gehringer, E. (2020). Problem detection in peer assessments between subjects by effective transfer learning and active learning. EDM 2020: 13th International Conference on Educational Data Mining, 516–523. Xiao, Y., Zingle, G., Jia, Q., Shah, H., Zhang, Y., Li, T., … Gehringer, E. (2020). Detecting Problem Statements in Peer Assessments. EDM 2020: 13th International Conference on Educational Data Mining, 704–709. Gehringer, E. (2020). Making large classes work for you and your students. 2020 ASEE Virtual Annual Conference. Presented at the 2020 ASEE Virtual Annual Conference. https://doi.org/10.18260/1-2--34944 Gehringer, E. (2020). A Course as Ecosystem: Melding Teaching, Research, and Practice. 2020 ASEE Virtual Annual Conference. Presented at the 2020 ASEE Virtual Annual Conference. https://doi.org/10.18260/1-2--33991 Klose, M., Desai, V., Song, Y., & Gehringer, E. (2020). EDM and Privacy: Ethics and Legalities of Data Collection, Usage, and Storage. EDM 2020: 13th International Conference on Educational Data Mining, 451–459. Retrieved from https://educationaldatamining.org/files/conferences/EDM2020/papers/paper_135.pdf Gehringer, E. F., Liu, X., Kariya, A., & Wang, G. (2020). Comparing and combining tests for plagiarism detection in online exams. EDM 2020: 13th International Conference on Educational Data Mining. Retrieved from https://educationaldatamining.org/files/conferences/EDM2020/papers/paper_179.pdf Singh, M. P., & Chopra, A. K. (2020). Clouseau: Generating Communication Protocols from Commitments. Proceedings of the AAAI Conference on Artificial Intelligence, 34(5), 7244–7252. https://doi.org/10.1609/aaai.v34i05.6215 Chopra, A. K., V, S. H. C., & Singh, M. P. (2020). An Evaluation of Communication Protocol Languages for Engineering Multiagent Systems. Journal of Artificial Intelligence Research, 69, 1351–1393. https://doi.org/10.1613/jair.1.12212 Guimaraes, M., Prada, R., Santos, P. A., Dias, J., Jhala, A., & Mascarenhas, S. (2020). The Impact of Virtual Reality in the Social Presence of a Virtual Agent. PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON INTELLIGENT VIRTUAL AGENTS (ACM IVA 2020). https://doi.org/10.1145/3383652.3423879 Zheng, G., Bagheri, H., Rothermel, G., & Wang, J. (2020). Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING (FASE 2020), Vol. 12076, pp. 29–52. https://doi.org/10.1007/978-3-030-45234-6_2 Oh, C., Zheng, Z., Shen, X., Zhai, J., & Yi, Y. (2020). GOPipe: A Granularity-Oblivious Programming Framework for Pipelined Stencil Executions on GPU. PACT '20: PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES, pp. 43–54. https://doi.org/10.1145/3410463.3414656 Tunde-Onadele, O., Lin, Y., He, J., & Gu, X. (2020). Self-Patch: Beyond Patch Tuesday for Containerized Applications. 2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS (ACSOS 2020), pp. 21–27. https://doi.org/10.1109/ACSOS49614.2020.00022 Behroozi, M., Shirolkar, S., Barik, T., & Parnin, C. (2020). Debugging Hiring: What Went Right and What Went Wrong in the Technical Interview Process. 2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN SOCIETY (ICSE-SEIS 2021), pp. 71–80. https://doi.org/10.1145/3377815.3381372 Price, T. W., Williams, J. J., Solyst, J., & Marwan, S. (2020). Engaging Students with Instructor Solutions in Online Programming Homework. PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20). https://doi.org/10.1145/3313831.3376857 Fayez, M., Katib, I., Rouskas, G. N., Gharib, T. F., Ahmed, H. K., & Faheem, H. M. (2020). A Scalable Solution to Network Design Problems: Decomposition with Exhaustive Routing Search. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM42002.2020.9322439 Gao, L., & Rouskas, G. N. (2020). Service Chain Rerouting for NFV Load Balancing. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM42002.2020.9322265 Brockelsby, W., & Dutta, R. (2020). Performance Implications of Problem Decomposition Approaches for SDN Pipelines. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM). https://doi.org/10.1109/GLOBECOM42002.2020.9322392 Smith, A., Mott, B., Taylor, S., Hubbard-Cheuoua, A., Minogue, J., Oliver, K., & Ringstaff, C. (2020). Toward a Block-Based Programming Approach to Interactive Storytelling for Upper Elementary Students. Interactive Storytelling, 111–119. https://doi.org/10.1007/978-3-030-62516-0_10 Mitev, R., Pazii, A., Miettinen, M., Enck, W., & Sadeghi, A.-R. (2020). LeakyPick: IoT Audio Spy Detector. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705. https://doi.org/10.1145/3427228.3427277 Lin, Y., Tunde-Onadele, O., & Gu, X. (2020). CDL: Classified Distributed Learning for Detecting Security Attacks in Containerized Applications. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 179–188. https://doi.org/10.1145/3427228.3427236 Kilari, V. T., Yu, R., Misra, S., & Xue, G. (2020). EARS: Enabling Private Feedback Updates in Anonymous Reputation Systems. 2020 IEEE Conference on Communications and Network Security (CNS). https://doi.org/10.1109/cns48642.2020.9162328 Zhou, K., Hao, Y., Mellor-Crummey, J., Meng, X., & Liu, X. (2020). GVPRoF: A Value Profiler for GPU-Based Clusters. PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20). https://doi.org/10.1109/SC41405.2020.00093 Jin, Y., Wang, H., Yu, T., Tang, X., Hoefler, T., Liu, X., & Zhai, J. (2020). SCALANA: Automating Scaling Loss Detection with Graph Analysis. PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20). https://doi.org/10.1109/SC41405.2020.00032 You, X., Yang, H., Luan, Z., Qian, D., & Liu, X. (2020). ZeroSpy: Exploring Software Inefficiency with Redundant Zeros. PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20). https://doi.org/10.1109/SC41405.2020.00033 Zhao, Q., Liu, X., & Chabbi, M. (2020). DRCCTPROF: A Fine-Grained Call Path Profiler for ARM-Based Clusters. PROCEEDINGS OF SC20: THE INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SC20). https://doi.org/10.1109/SC41405.2020.00034 Wang, D., Chen, X., Wu, H., Yu, R., & Zhao, Y. (2020). A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing Environment. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), pp. 1950–1955. https://doi.org/10.1109/TrustCom50675.2020.00266 Yoshizumi, A., Coffer, M. M., Collins, E. L., Gaines, M. D., Gao, X., Jones, K., … Tateosian, L. (2020). A Review of Geospatial Content in IEEE Visualization Publications. 2020 IEEE VISUALIZATION CONFERENCE - SHORT PAPERS (VIS 2020), pp. 51–55. https://doi.org/10.1109/VIS47514.2020.00017 Ferriter, K., Mueller, F., Bahmani, A., & Pan, C. (2020). VCFC: Structural and Semantic Compression and Indexing of Genetic Variant Data. 2020 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOMEDICINE, pp. 200–203. https://doi.org/10.1109/BIBM49941.2020.9313221 Shrikanth, N. C., & Menzies, T. (2020). Assessing Practitioner Beliefs about Software Defect Prediction. 2020 IEEE/ACM 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING IN PRACTICE (ICSE-SEIP), pp. 182–190. https://doi.org/10.1145/3377813.3381367 Boob, S., Mahmood, S., & Shahzad, M. (2020). Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 220–228. https://doi.org/10.1109/MASS50613.2020.00036 Zhang, S., Venkatnarayan, R. H., & Shahzad, M. (2020). A WiFi-based Home Security System. 2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 129–137. https://doi.org/10.1109/MASS50613.2020.00026 Gao, S., Korchiev, N., Samatova, V., & Anyanwu, K. (2020). Efficient Constrained Subgraph Extraction for Exploratory Discovery in Large Knowledge Graphs. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 623–630. https://doi.org/10.1109/BigData50022.2020.9378338 Sohn, H., Park, K., & Chi, M. (2020). MuLan: Multilevel Language-based Representation Learning for Disease Progression Modeling. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 1246–1255. https://doi.org/10.1109/BigData50022.2020.9377829 Khoshnevisan, F., & Chi, M. (2020). An Adversarial Domain Separation Framework for Septic Shock Early Prediction Across EHR Systems. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), pp. 64–73. https://doi.org/10.1109/BigData50022.2020.9378058 Ganji, A., Singh, A., & Shahzad, M. (2020). Characterizing the Impact of TCP Coexistence in Data Center Networks. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 388–398. https://doi.org/10.1109/ICDCS47774.2020.00035 Rahman, M. R., Mahdavi-Hezaveh, R., & Williams, L. (2020). A Literature Review on Mining Cyberthreat Intelligence from Unstructured Texts. 20TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2020), pp. 516–525. https://doi.org/10.1109/ICDMW51313.2020.00075 Rahman, A., Farhana, E., Parnin, C., & Williams, L. (2020). Gang of Eight: A Defect Taxonomy for Infrastructure as Code Scripts. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 752–764. https://doi.org/10.1145/3377811.3380409 Zhou, W., Zhao, Y., Zhang, G., & Shen, X. (2020). HARP: Holistic Analysis for Refactoring Python-Based Analytics Programs. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 506–517. https://doi.org/10.1145/3377811.3380434 Shen, D., & Chi, M. (2020). An Initial Study on Adapting DTW at Individual Query for Electrocardiogram Analysis. ADVANCED ANALYTICS AND LEARNING ON TEMPORAL DATA, AALTD 2019, Vol. 11986, pp. 213–228. https://doi.org/10.1007/978-3-030-39098-3_16 Shrestha, N., Botta, C., Barik, T., & Parnin, C. (2020). Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language? 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 691–701. https://doi.org/10.1145/3377811.3380352 Mathew, G., Parnin, C., & Stolee, K. T. (2020). SLACC: Simion-based Language Agnostic Code Clones. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 210–221. https://doi.org/10.1145/3377811.3380407 Guo, H., & Singh, M. P. (2020). Caspar: Extracting and Synthesizing User Stories of Problems from App Reviews. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), pp. 628–640. https://doi.org/10.1145/3377811.3380924 Yedida, R., Abrar, S. M., Melo-Filho, C., Muratov, E., Chirkova, R., & Tropsha, A. (2020). Text Mining to Identify and Extract Novel Disease Treatments From Unstructured Datasets (ArXiv Preprint No. 2011.07959). Khaidem, L., Yedida, R., & Theophilus, A. J. (2020). Optimizing Inter-nationality of Journals: A Classical Gradient Approach Revisited via Swarm Intelligence. In Communications in Computer and Information Science: Vol. 1290. Modeling, Machine Learning and Astronomy (Vol. 1290, pp. 3–14). https://doi.org/10.1007/978-981-33-6463-9_1 Sridhar, S., Saha, S., Shaikh, A., Yedida, R., & Saha, S. (2020). Parsimonious Computing: A Minority Training Regime for Effective Prediction in Large Microarray Expression Data Sets. 2020 International Joint Conference on Neural Networks (IJCNN), 1–8. https://doi.org/10.1109/ijcnn48605.2020.9207083 Yedida, R., Saha, S., & Prashanth, T. (2020). LipschitzLR: Using theoretically computed adaptive learning rates for fast convergence. APPLIED INTELLIGENCE, Vol. 9. https://doi.org/10.1007/s10489-020-01892-0 Imamoglu, E., & Kaltofen, E. L. (2020). A Note on Sparse Polynomial Interpolation in Dickson Polynomial Basis. ACM COMMUNICATIONS IN COMPUTER ALGEBRA, 54(4), 125–128. https://doi.org/10.1145/3465002.3465003 Das, A., Mueller, F., & Rountree, B. (2020). Aarohi: Making Real-Time Node Failure Prediction Feasible. 2020 IEEE 34TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM IPDPS 2020, pp. 1092–1101. https://doi.org/10.1109/IPDPS47924.2020.00115 Wilson, E., Singh, S., & Mueller, F. (2020). Just-in-time Quantum Circuit Transpilation Reduces Noise. IEEE INTERNATIONAL CONFERENCE ON QUANTUM COMPUTING AND ENGINEERING (QCE20), pp. 345–355. https://doi.org/10.1109/QCE49297.2020.00050 Chakraborty, J., Peng, K., & Menzies, T. (2020). Making Fair ML Software using Trustworthy Explanation. 2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), pp. 1229–1233. https://doi.org/10.1145/3324884.3418932 Shrikanth, N. C., & Menzies, T. (2020). What disconnects Practitioner Belief and Empirical Evidence ? 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2020), pp. 286–287. https://doi.org/10.1145/3377812.3390802 Xu, Y., Ye, C. C., Solihin, Y., & Shen, X. (2020). Hardware-Based Domain Virtualization for Intra-Process Isolation of Persistent Memory Objects. 2020 ACM/IEEE 47TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2020), pp. 680–692. https://doi.org/10.1109/ISCA45697.2020.00062 Deshotels, L., Carabas, C., Beichler, J., Deaconescu, R., & Enck, W. (2020). Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070. https://doi.org/10.1109/SP40000.2020.00023 Baldimtsi, F., Madathil, V., Scafuro, A., & Zhou, L. (2020). Anonymous Lottery In The Proof-of-Stake Setting. 2020 IEEE 33RD COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2020), pp. 318–333. https://doi.org/10.1109/CSF49147.2020.00030 Heckman, S., Schmidt, J. Y., & King, J. (2020). Integrating Testing Throughout the CS Curriculum. 2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW), pp. 441–444. https://doi.org/10.1109/ICSTW50294.2020.00079 Robust resource provisioning in time-varying edge networks. (2020). Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing (MobiHoc). https://doi.org/10.1145/3397166.3409146 Fisk, S., Stolee, K. T., & Battestilli, L. (2020). A Lightweight Intervention to Decrease Gender Bias in Student Evaluations of Teaching. 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT). Presented at the 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT). https://doi.org/10.1109/respect49803.2020.9272454 Shao, S., Qiu, Z., Yu, X., Yang, W., Jin, G., Xie, T., & Wu, X. (2020). Database-Access Performance Antipatterns in Database-Backed Web Applications. 2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2020), pp. 58–69. https://doi.org/10.1109/ICSME46990.2020.00016 Yang, Xi, Kim, Y.-J., Taub, M., Azevedo, R., & Chi, M. (2020). PRIME: Block-Wise Missingness Handling for Multi-modalities in Intelligent Tutoring Systems. MULTIMEDIA MODELING (MMM 2020), PT II, Vol. 11962, pp. 63–75. https://doi.org/10.1007/978-3-030-37734-2_6 Khan, U. M., Venkatnarayan, R. H., & Shahzad, M. (2020). RFMap: Generating Indoor Maps using RF Signals. 2020 19TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN 2020), pp. 133–144. https://doi.org/10.1109/IPSN48710.2020.00-40 Conchuir, B. O., Gardner, K., Jordan, K. E., Bray, D. J., Anderson, R. L., Johnston, M. A., … Peters, T. J. (2020). Efficient Algorithm for the Topological Characterization of Worm-like and Branched Micelle Structures from Simulations. JOURNAL OF CHEMICAL THEORY AND COMPUTATION, 16(7), 4588–4598. https://doi.org/10.1021/acs.jctc.0c00311 Cateté, V., Isvik, A., & Barnes, T. (2020). Infusing Computing: A Scaffolding and Teacher Accessibility Analysis of Computing Lessons Designed by Novices. ACM International Conference Proceeding Series. https://doi.org/10.1145/3428029.3428056 Isvik, A., Catete, V., & Barnes, T. (2020). FLAMES: A Socially Relevant Computing Summer Internship for High School Students. 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings. https://doi.org/10.1109/RESPECT49803.2020.9272515 Grover, S., Cateté, V., Barnes, T., Hill, M., Ledeczi, A., & Broll, B. (2020). FIRST Principles to Design for Online, Synchronous High School CS Teacher Training and Curriculum Co-Design. ACM International Conference Proceeding Series. https://doi.org/10.1145/3428029.3428059 Boulden, D., Edwards, C., Catete, V., Lytle, N., Barnes, T., Wiebe, E. N., & Frye, D. (2020). Creating a School-wide CS/CT-focused STEM Ecosystem to Address Access Barriers. 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings. https://doi.org/10.1109/RESPECT49803.2020.9272485 Catete, V., Bell, D., Isvik, A., Lytle, N., Dong, Y., & Barnes, T. (2020). Bridge to Computing: An outreach program for at-risk young men. 2020 Research on Equity and Sustained Participation in Engineering, Computing, and Technology, RESPECT 2020 - Proceedings. https://doi.org/10.1109/RESPECT49803.2020.9272475 Cateté, V., Alvarez, L., Isvik, A., Milliken, A., Hill, M., & Barnes, T. (2020). Aligning Theory and Practice in Teacher Professional Development for Computer Science. ACM International Conference Proceeding Series. https://doi.org/10.1145/3428029.3428560 Lytle, N., Catete, V., & Dong, Y. (2020). Data-driven approaches for exploring the effects of teacher instruction on student programming behaviors. CEUR Workshop Proceedings, 2734. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85096177425&partnerID=MN8TOARS Cateté, V., Lytle, N., Boulden, D., Hinckle, M., Wiebe, E., & Barnes, T. (2020). A block-based modeling curriculum for teaching middle grade science students about Covid-19. ACM International Conference Proceeding Series. https://doi.org/10.1145/3421590.3421624 Patil, O., Mueller, F., Ionkov, L., Lee, J., & Lang, M. (2020). Symbiotic HW Cache and SW DTLB Prefetching for DRAM/NVM Hybrid Memory. 2020 28th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 1–8. https://doi.org/10.1109/MASCOTS50786.2020.9285963 Holder, T. R. N., Gruen, M. E., Roberts, D. L., Somers, T., & Bozkurt, A. (2020). [Review of A Systematic Literature Review of Animal-Assisted Interventions in Oncology (Part II): Theoretical Mechanisms and Frameworks]. INTEGRATIVE CANCER THERAPIES, 19. https://doi.org/10.1177/1534735420943269 Le, L. V., Kim, Y. D., & Aspnes, D. E. (2020). Quantitative assessment of linear noise-reduction filters for spectroscopy. OPTICS EXPRESS, 28(26), 38917–38933. https://doi.org/10.1364/OE.411768 Kun, J., O'Brien, M. P., Pilipczuk, M., & Sullivan, B. D. (2020). Polynomial Treedepth Bounds in Linear Colorings. ALGORITHMICA. https://doi.org/10.1007/s00453-020-00760-0 Zhang, F., Zhai, J., Shen, X., Wang, D., Chen, Z., Mutlu, O., … Du, X. (2020). TADOC: Text analytics directly on compression. VLDB JOURNAL. https://doi.org/10.1007/s00778-020-00636-3 Oudjit, A., & Stallmann, M. (2020). Efficient algorithms for finding2-mediansof a tree. NETWORKS, Vol. 9. https://doi.org/10.1002/net.21978 Kaptsov, E., Meleshko, S., & Samatova, N. F. (2020). The one-dimensional Green-Naghdi equations with a time dependent bottom topography and their conservation laws. PHYSICS OF FLUIDS, 32(12). https://doi.org/10.1063/5.0031238 Gao, L., & Rouskas, G. N. (2020). Congestion Minimization for Service Chain Routing Problems With Path Length Considerations. IEEE-ACM TRANSACTIONS ON NETWORKING, 28(6), 2643–2656. https://doi.org/10.1109/TNET.2020.3017792 Zhang, F., Zhai, J., Shen, X., Mutlu, O., & Du, X. (2020). Enabling Efficient Random Access to Hierarchically-Compressed Data. 2020 IEEE 36th International Conference on Data Engineering (ICDE), 1069–1080. https://doi.org/10.1109/ICDE48307.2020.00097 Li, X., Zhang, L., & Shen, X. (2020). DIAC An Inter-app Conflicts Detector for Open IoT Systems. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 19(6). https://doi.org/10.1145/3391895 Nayak, D., & Perros, H. (2020). Automated real-time anomaly detection of temperature sensors through machine-learning. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 34(3), 137–152. https://doi.org/10.1504/IJSNET.2020.111233 Travis, J., Kaszycki, A., Geden, M., & Bunde, J. (2020). Some Stress Is Good Stress: The Challenge-Hindrance Framework, Academic Self-Efficacy, and Academic Outcomes. JOURNAL OF EDUCATIONAL PSYCHOLOGY, 112(8), 1632–1643. https://doi.org/10.1037/edu0000478 Vivek Nanda, V. M., Tateosian, L., & Baran, P. (2020). GIS-Based Estimation of Seasonal Solar Energy Potential for Parking Lots and Roads. IEEE Greentech Conference Proceedings. Presented at the 2020 IEEE Green Technologies Conference, Okalahoma City, OK. Yoshizumi, A., Coffer, M., Collins, E., Gaines, M., Gao, X., Jones, K., … Tateosian, L. (2020). A Review of Geospatial Content in IEEE Visualization Publications. Proceedings IEEE Visualization 2020. Presented at the 2020 IEEE Visualization Conference, Salt Lake City, Utah. Saha, S., Nagaraj, N., Mathur, A., Yedida, R., & Sneha, H. R. (2020). [Review of Evolution of novel activation functions in neural network training for astronomy data: habitability classification of exoplanets]. EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 229(16), 2629–2738. https://doi.org/10.1140/epjst/e2020-000098-9 Kilari, V. T., Yu, R., Misra, S., & Xue, G. (2020). Robust Revocable Anonymous Authentication for Vehicle to Grid Communications. IEEE Transactions on Intelligent Transportation Systems (T-ITS), 21(11), 4845–4857. https://doi.org/10.1109/tits.2019.2948803 V, S. H. C., Smirnova, D., Chopra, A. K., & Singh, M. P. (2020). Protocols Over Things: A Decentralized Programming Model for the Internet of Things. Computer, 53(12), 60–68. https://doi.org/10.1109/MC.2020.3023887 Dutta, R., & Harai, H. (2020). Traffic Grooming. In Springer Handbook of Optical Networks (pp. 513–534). https://doi.org/10.1007/978-3-030-16250-4_14 Marojevic, V., Guvenc, I., Dutta, R., Sichitiu, M. L., & Floyd, B. A. (2020). Advanced Wireless for Unmanned Aerial Systems: 5G Standardization, Research Challenges, and AERPAW Architecture. IEEE Vehicular Technology Magazine, 15(2), 22–30. https://doi.org/10.1109/MVT.2020.2979494 Siegmund, J., Peitek, N., Brechmann, A., Parnin, C., & Apel, S. (2020, June). Studying Programming in the Neuroage: Just a Crazy Idea? COMMUNICATIONS OF THE ACM, Vol. 63, pp. 30–34. https://doi.org/10.1145/3347093 Wang, J., Yang, Y., Menzies, T., & Wang, Q. (2020). iSENSE2.0: Improving Completion-aware Crowdtesting Management with Duplicate Tagger and Sanity Checker. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 29(4). https://doi.org/10.1145/3394602 Maniktala, M., Cody, C., Barnes, T., & Chi, M. (2020). Avoiding Help Avoidance: Using Interface Design Changes to Promote Unsolicited Hint Usage in an Intelligent Tutor. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 30(4), 637–667. https://doi.org/10.1007/s40593-020-00213-3 Murukannaiah, P. K., Ajmeri, N., Jonker, C. M., & Singh, M. P. (2020). New Foundations of Ethical Multiagent Systems. Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 1706–1710. Retrieved from https://research-information.bris.ac.uk/en/publications/766baf8c-9f8a-4311-89f4-9b436a30d64c Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2020). Elessar: Ethics in Norm-Aware Agents. Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 16–24. Retrieved from https://research-information.bris.ac.uk/en/publications/fb85ded1-f0d2-4ef2-93bb-4a15fccafc6a Vandenberg, J., Tsan, J., Boulden, D., Zakaria, Z., Lynch, C., Boyer, K. E., & Wiebe, E. (2020). Elementary Students' Understanding of CS Terms. ACM TRANSACTIONS ON COMPUTING EDUCATION, 20(3). https://doi.org/10.1145/3386364 Ajmeri, N., Murukannaiah, P. K., & Singh, M. P. (2020). Ethics in Self-* Sociotechnical Systems (Tutorial Abstract). 2020 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2020), pp. 249–249. https://doi.org/10.1109/ACSOS-C51401.2020.00070 Ghanem, S., Panahi, A., Krim, H., & Kerekes, R. A. (2020). Robust Group Subspace Recovery: A New Approach for Multi-Modality Data Fusion. IEEE SENSORS JOURNAL, 20(20), 12307–12316. https://doi.org/10.1109/JSEN.2020.2999461 Huang, H., Huang, Q., Xiao, F., Wang, W., Li, Q., & Dai, T. (2020). An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains. SECURITY AND COMMUNICATION NETWORKS, 2020. https://doi.org/10.1155/2020/8897282 Tang, F., Li, Y., Shen, G., & Rouskas, G. N. (2020). Minimizing Inter-Core Crosstalk Jointly in Spatial, Frequency, and Time Domains for Scheduled Lightpath Demands in Multi-Core Fiber-based Elastic Optical Network. JOURNAL OF LIGHTWAVE TECHNOLOGY, 38(20), 5595–5607. https://doi.org/10.1109/JLT.2020.3004138 Akbulut, F. P., Perros, H. G., & Shahzad, M. (2020). Bimodal affect recognition based on autoregressive hidden Markov models from physiological signals. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 195. https://doi.org/10.1016/j.cmpb.2020.105571 Unproductive Help-seeking in Programming: What it is and How to Address it. (2020). Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science Education. https://doi.org/10.1145/3341525.3387394 Huang, Y., Panahi, A., Krim, H., & Dai, L. (2020). Community Detection and Improved Detectability in Multiplex Networks. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 7(3), 1697–1709. https://doi.org/10.1109/TNSE.2019.2949036 Cavanna, N. J., & Sheehy, D. R. (2020). Adaptive Metrics for Adaptive Samples. ALGORITHMS, 13(8). https://doi.org/10.3390/a13080200 Meleshko, S., & Samatova, N. F. (2020). Group classification of the two-dimensional shallow water equations with the beta-plane approximation of coriolis parameter in Lagrangian coordinates. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 90. https://doi.org/10.1016/j.cnsns.2020.105337 Wang, T., Yu, X., Qiu, Z., Jin, G., & Mueller, F. (2020). BarrierFinder: recognizing ad hoc barriers. EMPIRICAL SOFTWARE ENGINEERING, 25(6), 4676–4706. https://doi.org/10.1007/s10664-020-09862-3 Barnes, T., Payton, J., Washington, N., Stukes, F., Peterfreund, A., & Dunton, S. (2020). Featured Research on Equity and Sustained Participation in Engineering, Computing, and Technology. COMPUTING IN SCIENCE & ENGINEERING, Vol. 22, pp. 4–6. https://doi.org/10.1109/MCSE.2020.3010595 Holder, T. R. N., Gruen, M. E., Roberts, D. L., Somers, T., & Bozkurt, A. (2020). [Review of A Systematic Literature Review of Animal-Assisted Interventions in Oncology (Part I): Methods and Results]. INTEGRATIVE CANCER THERAPIES, 19. https://doi.org/10.1177/1534735420943278 Saleh, A., Chen, Y., Hmelo-Silver, C. E., Glazewski, K. D., Mott, B. W., & Lester, J. C. (2020). Coordinating scaffolds for collaborative inquiry in a game-based learning environment. JOURNAL OF RESEARCH IN SCIENCE TEACHING, 57(9), 1490–1518. https://doi.org/10.1002/tea.21656 Shabrina, P., Akintunde, R. O., Maniktala, M., Barnes, T., Lynch, C., & Rutherford, T. (2020). Peeking through the Classroom Window : A Detailed Data-Driven Analysis on the Usage of a Curriculum Integrated Math Game in Authentic Classrooms. LAK20: THE TENTH INTERNATIONAL CONFERENCE ON LEARNING ANALYTICS & KNOWLEDGE, pp. 625–634. https://doi.org/10.1145/3375462.3375525 Ausin, M. S., Maniktala, M., Barnes, T., & Chi, M. (2020). Exploring the Impact of Simple Explanations and Agency on Batch Deep Reinforcement Learning Induced Pedagogical Policies. In Lecture Notes in Computer Science (pp. 472–485). https://doi.org/10.1007/978-3-030-52237-7_38 Battestilli, L., & Korkes, S. (2020). Writing Effective Autograded Exercises Using Bloom's Taxonomy. 2020 ASEE Virtual Annual Conference Content Access Proceedings. https://doi.org/10.18260/1-2--35711 Predictive Student Modeling in Block-Based Programming Environments with Bayesian Hierarchical Models. (2020). Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization. https://doi.org/10.1145/3340631.3394853 Rahman, A., Farhana, E., & Williams, L. (2020). The 'as code' activities: development anti-patterns for infrastructure as code. EMPIRICAL SOFTWARE ENGINEERING, 25(5), 3430–3467. https://doi.org/10.1007/s10664-020-09841-8 Haldar, A., Gaxiola-Camacho, J. R., Azizsoltani, H., Villegas-Mercado, F. J., & Vazirizade, S. M. (2020). Novel Geomechanics Concepts for Earthquake Excitations Applied in Time Domain. INTERNATIONAL JOURNAL OF GEOMECHANICS, 20(9). https://doi.org/10.1061/(ASCE)GM.1943-5622.0001799 Murukannaiah, P. K., & Singh, M. P. (2020). From Machine Ethics to Internet Ethics: Broadening the Horizon. IEEE INTERNET COMPUTING, 24(3), 51–57. https://doi.org/10.1109/MIC.2020.2989935 Brown, C. T., Moritz, D., Michael P. O'Brien, Reidl, F., Reiter, T., & Sullivan, B. D. (2020). Exploring neighborhoods in large metagenome assembly graphs using spacegraphcats reveals hidden sequence diversity. GENOME BIOLOGY, 21(1). https://doi.org/10.1186/s13059-020-02066-4 Ozer, E. M., Rowe, J., Tebb, K. P., Berna, M., Penilla, C., Giovanelli, A., … Lester, J. C. (2020). Fostering Engagement in Health Behavior Change: Iterative Development of an Interactive Narrative Environment to Enhance Adolescent Preventive Health Services. JOURNAL OF ADOLESCENT HEALTH, 67(2), S34–S44. https://doi.org/10.1016/j.jadohealth.2020.04.022 Ozer, E. M., & Lester, J. C. (2020, August). Innovative Digital Technologies to Improve Adolescent and Young Adult Health. JOURNAL OF ADOLESCENT HEALTH, Vol. 67, pp. S3–S3. https://doi.org/10.1016/j.jadohealth.2020.05.015 Krishna, R., & Menzies, T. (2020). Learning actionable analytics from multiple software projects. EMPIRICAL SOFTWARE ENGINEERING, 25(5), 3468–3500. https://doi.org/10.1007/s10664-020-09843-6 Foster, M., Brugarolas, R., Walker, K., Mealin, S., Cleghern, Z., Yuschak, S., … Bozkurt, A. (2020). Preliminary Evaluation of a Wearable Sensor System for Heart Rate Assessment in Guide Dog Puppies. IEEE SENSORS JOURNAL, 20(16), 9449–9459. https://doi.org/10.1109/JSEN.2020.2986159 Rowe, J. P., & Lester, J. C. (2020). [Review of Artificial Intelligence for Personalized Preventive Adolescent Healthcare]. JOURNAL OF ADOLESCENT HEALTH, 67(2), 552–558. https://doi.org/10.1016/j.jadohealth.2020.02.021 Isvik, A., Catete, V., Alvarez, L., Lytle, N., & Barnes, T. (2020, August). Exploring Differences Between Student and Teacher Created Snap! Projects. 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vl/hcc50065.2020.9127249 Milliken, A., Catete, V., Isvik, A., & Barnes, T. (2020, August). Poster: Designing GradeSnap for Block-Based Code. 2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vl/hcc50065.2020.9127284 Price, T. W., Williams, J. J., Solyst, J., & Marwan, S. (2020). Engaging Students with Instructor Solutions in Online Programming Homework. ACM CHI Conference on Human Factors in Computing Systems. Presented at the Honolulu, HI, USA. Honolulu, HI, USA. Wang, W., Zhi, R., Milliken, A., Lytle, N., & Price, T. W. (2020). Crescendo : Engaging Students to Self-Paced Programming Practices. Proceedings of the ACM Technical Symposium on Computer Science Education. Marwan, S., Gao, G., Fisk, S., Price, T. W., & Barnes, T. (2020). Adaptive Immediate Feedback Can Improve Novice Programming Engagement and Intention to Persist in Computer Science. Proceedings of the International Computing Education Research Conference, 1–10. Wang, W., Rao, Y., Zhi, R., Marwan, S., Gao, G., & Price, T. W. (2020). Step Tutor: Supporting Students through Step-by-Step Example-Based Feedback. Proceedings of the International Conference on Innovation and Technology in Computer Science Education. Emerson, A., Cloude, E. B., Azevedo, R., & Lester, J. (2020). Multimodal learning analytics for game-based learning. BRITISH JOURNAL OF EDUCATIONAL TECHNOLOGY, 51(5), 1505–1526. https://doi.org/10.1111/bjet.12992 Shahzad, M., Shafiq, M. Z., & Liu, A. X. (2020). Large Scale Characterization of Software Vulnerability Life Cycles. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 17(4), 730–744. https://doi.org/10.1109/TDSC.2019.2893950 Carleton, A. D., Harper, E., Lyu, M. R., Eldh, S., Xie, T., & Menzies, T. (2020). Expert Perspectives on AI. IEEE SOFTWARE, Vol. 37, pp. 87–94. https://doi.org/10.1109/MS.2020.2987673 Carleton, A. D., Harper, E., Menzies, T., Xie, T., Eldh, S., & Lyu, M. R. (2020). The AI Effect: Working at the Intersection of AI and SE. IEEE SOFTWARE, Vol. 37, pp. 26–35. https://doi.org/10.1109/MS.2020.2987666 Ghandehari, L. S., Lei, Y., Kacker, R., Kuhn, R., Xie, T., & Kung, D. (2020). A Combinatorial Testing-Based Approach to Fault Localization. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 46(6), 616–645. https://doi.org/10.1109/TSE.2018.2865935 Xu, Y., Solihin, Y., & Shen, X. (2020). MERR: Improving Security of Persistent Memory Objects via Efficient Memory Exposure Reduction and Randomization. TWENTY-FIFTH INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS (ASPLOS XXV), pp. 987–1000. https://doi.org/10.1145/3373376.3378492 Price, T. W., Marwan, S., Winters, M., & Williams, J. J. (2020). An Evaluation of Data-Driven Programming Hints in a Classroom Setting. In Lecture Notes in Computer Science (pp. 246–251). https://doi.org/10.1007/978-3-030-52240-7_45 Fayez, M., Katib, I., Rouskas, G. N., Gharib, T. F., Khaleed, H., & Faheem, H. M. (2020). Recursive algorithm for selecting optimum routing tables to solve offline routing and spectrum assignment problem. AIN SHAMS ENGINEERING JOURNAL, 11(2), 273–280. https://doi.org/10.1016/j.asej.2019.10.008 Min, W., Frankosky, M. H., Mott, B. W., Rowe, J. P., Smith, A., Wiebe, E., … Lester, J. C. (2020). DeepStealth: Game-Based Learning Stealth Assessment With Deep Neural Networks. IEEE Transactions on Learning Technologies, 13(2), 312–325. https://doi.org/10.1109/TLT.2019.2922356 Liu, L., Shen, Y., Yan, Y., Yang, T., Shahzad, M., Cui, B., & Xie, G. (2020). SF-Sketch: A Two-Stage Sketch for Data Streams. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 31(10), 2263–2276. https://doi.org/10.1109/TPDS.2020.2987609 Akram, B., Min, W., Wiebe, E., Navied, A., Mott, B., Boyer, K. E., & Lester, J. (2020). A conceptual assessment framework for k-12 computer science rubric design. Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE, 1328. https://doi.org/10.1145/3328778.3372643 Peitek, N., Siegmund, J., Apel, S., Kastner, C., Parnin, C., Bethmann, A., … Brechmann, A. (2020). A Look into Programmers' Heads. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 46(4), 442–462. https://doi.org/10.1109/TSE.2018.2863303 Kafali, Ö., Ajmeri, N., & Singh, M. P. (2020). Desen: Specification of Sociotechnical Systems via Patterns of Regulation and Control. ACM Transactions on Software Engineering and Methodology, 29(1), 7:1–7:50. https://doi.org/10.1145/3365664 Agrawal, A., Menzies, T., Minku, L. L., Wagner, M., & Yu, Z. (2020). Better software analytics via "DUO": Data mining algorithms using/used-by optimizers. EMPIRICAL SOFTWARE ENGINEERING, 25(3), 2099–2136. https://doi.org/10.1007/s10664-020-09808-9 Akintunde, R. O., Shabrina, P., Catete, V., Barnes, T., Lynch, C., & Rutherford, T. (2020). Data-informed curriculum sequences for a curriculum-integrated game. Proceedings of the Tenth International Conference on Learning Analytics & Knowledge, 635–644. https://doi.org/10.1145/3375462.3375530 Lytle, N., Milliken, A., Cateté, V., & Barnes, T. (2020). Investigating Different Assignment Designs to Promote Collaboration in Block-Based Environments. Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 832–838. https://doi.org/10.1145/3328778.3366943 Jocius, R., Joshi, D., Dong, Y., Robinson, R., Cateté, V., Barnes, T., … Lytle, N. (2020). Code, Connect, Create: The 3C Professional Development Model to Support Computational Thinking Infusion. Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 971–977. https://doi.org/10.1145/3328778.3366797 Designing Block-Based Programming Language Features to Support Upper Elementary Students in Creating Interactive Science Narratives. (2020). Proceedings of the 51st ACM Technical Symposium on Computer Science Education. https://doi.org/10.1145/3328778.3372653 Cluster-Based Analysis of Novice Coding Misconceptions in Block-Based Programming. (2020). Proceedings of the 51st ACM Technical Symposium on Computer Science Education. https://doi.org/10.1145/3328778.3366924 Price, R. E., Longtin, M., Conley-Payton, S., Osborne, J. A., Johanningsmeier, S. D., Bitzer, D., & Breidt, F. (2020). Modeling buffer capacity and pH in acid and acidified foods. JOURNAL OF FOOD SCIENCE, 85(4), 918–925. https://doi.org/10.1111/1750-3841.15091 Battestilli, L., Domı́nguez Ignacio X., & Thyagarajan, M. (2020). Toward Finding Online Activity Patterns in a Flipped Programming Course. Proceedings of the 51st ACM Technical Symposium on Computer Science Education, 1345. https://doi.org/10.1145/3328778.3372626 Matsuda, N., Weng, W., & Wall, N. (2020). The Effect of Metacognitive Scaffolding for Learning by Teaching a Teachable Agent. International Journal of Artificial Intelligence in Education, 30(1), 1–37. https://doi.org/10.1007/s40593-019-00190-2 Taub, M., Sawyer, R., Lester, J., & Azevedo, R. (2020). The Impact of Contextualized Emotions on Self-Regulated Learning and Scientific Reasoning during Learning with a Game-Based Learning Environment. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 30(1), 97–120. https://doi.org/10.1007/s40593-019-00191-1 Tateosian, L., Glatz, M., & Shukunobe, M. (2020). Story-telling maps generated from semantic representations of events. BEHAVIOUR & INFORMATION TECHNOLOGY, 39(4), 391–413. https://doi.org/10.1080/0144929X.2019.1569162 Zhang, Y., Lin, C., & Chi, M. (2020). Going deeper: Automatic short-answer grading by combining student and question models. USER MODELING AND USER-ADAPTED INTERACTION, 30(1), 51–80. https://doi.org/10.1007/s11257-019-09251-6 Theisen, C., & Williams, L. (2020). Better together: Comparing vulnerability prediction models. INFORMATION AND SOFTWARE TECHNOLOGY, 119. https://doi.org/10.1016/j.infsof.2019.106204 Wimberley, C. E., & Heber, S. (2020, February 1). PeakPass: Automating ChIP-Seq Blacklist Creation. JOURNAL OF COMPUTATIONAL BIOLOGY, Vol. 27, pp. 259–268. https://doi.org/10.1089/cmb.2019.0295 Taub, M., Sawyer, R., Smith, A., Rowe, J., Azevedo, R., & Lester, J. (2020). The agency effect: The impact of student agency on learning, emotions, and problem-solving behaviors in a game-based learning environment. Computers and Education, 147. https://doi.org/10.1016/j.compedu.2019.103781 Singh, M. P., & Chopra, A. K. (2020). Blockchain-Based Financial Technologies and Cryptocurrencies for Low-Income People: Technical Potential Versus Practical Reality. COMPUTER, 53(1), 53–62. https://doi.org/10.1109/MC.2019.2951977 Zhou, W., Zhao, Y., Shen, X., & Chen, W. (2020). Enabling Runtime SpMV Format Selection through an Overhead Conscious Method. IEEE Transactions on Parallel and Distributed Systems, 31(1), 80–93. https://doi.org/10.1109/TPDS.2019.2932931 Menzies, T. (2020). The Five Laws of SE for AI. IEEE SOFTWARE, Vol. 37, pp. 81–85. https://doi.org/10.1109/MS.2019.2954841 Singh, M. P., & Chopra, A. K. (2020). Computational Governance and Violable Contracts for Blockchain Applications. Computer, 53(1), 53–62. https://doi.org/10.1109/MC.2019.2947372 Jin, H., Shen, X., Lovas, R., & Liao, X. (2020, February 10). Special Issue: Graph Computing. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, Vol. 32. https://doi.org/10.1002/cpe.5452 Banach, R., & Baugh, J. (2020). A simple Hybrid Event-B model of an active control system for earthquake protection. In A. Adamatzky & V. Kendon (Eds.), From Astrophysics to Unconventional Computation (Vol. 35, pp. 157–194). https://doi.org/10.1007/978-3-030-15792-0_7