Computer Science - 2004 Xin, Y., & Rouskas, G. N. (2004). Light-tree routing under optical power budget constraints [Invited]. Journal of Optical Networking, 3(5), 282. https://doi.org/10.1364/jon.3.000282 Rouskas, G. N. (2004). Optical Network Engineering. In S. Dixit (Ed.), IP over WDM (pp. 299–327). https://doi.org/10.1002/0471478342.ch10 Davies, J., Schulte, W., & Barnett, M. (Eds.). (2004). Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, Proceedings. https://doi.org/10.1007/b102837 A Formal Monitoring-Based Framework for Software Development and Analysis. (2004). Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, Proceedings, 357–372. https://doi.org/10.1007/978-3-540-30482-1_31 Teng, J., Rouskas, G. N., & society. (2004). On wavelength assignment in optical burst switched networks. First International Conference on Broadband Networks, Proceedings, 24–33. Xin, Y. F., Rouskas, G. N., & IEEE. (2004). Multicast routing under optical layer constraints. In Ieee Infocom 2004: the Conference on Computer Communications, Vols 1-4, Proceedings (pp. 2731–2742). Xin, Y. F., Teng, J., Karmous-Edwards, G., Rouskas, G. N., Stevenson, D., & society. (2004). Fault management with fast restoration for optical burst switched networks. First International Conference on Broadband Networks, Proceedings, 34–42. Chen, B. S., Rouskas, G. N., Dutta, R., Mitrou, N., Kontovasilis, K., Iliadis, I., & Merakos, L. (2004). Traffic grooming in WDM ring networks with the min-max objective. In Networking 2004 (Vol. 3042, pp. 174–185). Xu, W., & Guo, Z. (2004). Three-failure match. Mathematics in Practice and Theory, 34(11), 14–19. Gordon, A., Van Lent, M., Van Velsen, M., Carpenter, P., & Jhala, A. (2004). Branching storylines in virtual reality environments for leadership development. Proceedings of the National Conference on Artificial Intelligence, 844–851. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-9444283150&partnerID=MN8TOARS Battestilli, L., & Perros, H. (2004). End-To-End Burst Loss Probabilities in an OBS Network with Simultaneous Link Possession. Proceedings of the Third International Workshop on Optical Burst Switching, WOBS3. Eberly, W., & Kaltofen, E. (2004). Early termination in Shoup's algorithm for the minimum polynomial of an algebraic. Young, R. M., Riedl, M., Branly, M., Jhala, A., Martin, R. J., & Saretto, C. J. (2004). An architecture for integrating plan-based behavior generation with interactive game environments. The Journal of Game Development, 1(1), 51–70. Shen, X., Boutell, M., Luo, J., & Brown, C. (2004). Multi-label Machine Learning and Its Application to Semantic Scene Classification. Proceedings of Storage and Retrieval Methods and Applications for Multimedia 2004, 5307, 188–199. https://doi.org/10.1117/12.523428 Shen, X., Ding, C., Dwarkdas, S., & Scott, M. L. (2004). Characterizing Phases in Service-Oriented Applications (Technical Report No. TR848). Computer Science Dept., University of Rochester. Chopra, A. K., Desai, N. V., Mallya, A. U., Wagle, L. V., & Singh, M. P. (2004). A Semantic Protocol-Based Approach for Developing Business Processes. Forum Proceedings of the 2nd International Conference on Service Oriented Computing (ICSOC), 99–107. New York: ACM. Chopra, A. K., Desai, N. V., Mallya, A. U., & Singh, M. P. (2004). Modeling Flexible Business Processes. Proceedings of the 1st AAMAS Workshop on Declarative Agent Languages and Technologies (DALT). New York. Menzies, T. (2004). Mining repositories to assist in project planning and resource allocation. "International Workshop on Mining Software Repositories (MSR 2004)" W17S Workshop - 26th International Conference on Software Engineering. Presented at the "International Workshop on Mining Software Repositories (MSR 2004)" W17S Workshop - 26th International Conference on Software Engineering. https://doi.org/10.1049/IC:20040480 Singh, M. P. (2004). Agent-Based Abstractions for Software Development. In F. Bergenti, M. P. Gleizes, & F. Zambonelli (Eds.), Methodologies and Software Engineering for Agent Systems (pp. 5–18). https://doi.org/10.1007/1-4020-8058-1_2 Singh, M. (Ed.). (2004). The Practical Handbook of Internet Computing. https://doi.org/10.1201/9780203507223 Singh, M. (2004). Introduction to Web Semantics. In M. Singh (Ed.), The Practical Handbook of Internet Computing. https://doi.org/10.1201/9780203507223.ch29 Singh, M., & Aparicio, M., IV. (2004). Concepts and Practice of Personalization. In M. Singh (Ed.), The Practical Handbook of Internet Computing. https://doi.org/10.1201/9780203507223.ch18 Zhong, Y., Shen, X., & Ding, C. (2004). A Hierarchical Model of Reference Affinity. In Languages and Compilers for Parallel Computing (pp. 48–63). https://doi.org/10.1007/978-3-540-24644-2_4 Kazar, B. M., Shekhar, S., Lilja, D. J., Vatsavai, R. R., & Pace, R. K. (2004). Comparing Exact and Approximate Spatial Auto-regression Model Solutions for Spatial Data Analysis. In Geographic Information Science (pp. 140–161). https://doi.org/10.1007/978-3-540-30231-5_10 Boutell, M. R., Luo, J., Shen, X., & Brown, C. M. (2004). Learning multi-label scene classification. Pattern Recognition, 37(9), 1757–1771. https://doi.org/10.1016/j.patcog.2004.03.009 Shen, X., & Ding, C. (2004). Adaptive data partition for sorting using probability distribution. International Conference on Parallel Processing, 2004. ICPP 2004. Presented at the International Conference on Parallel Processing, 2004. ICPP 2004. https://doi.org/10.1109/icpp.2004.1327928 Zhong, Y., Orlovich, M., Shen, X., & Ding, C. (2004). Array regrouping and structure splitting using whole-program reference affinity. Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation - PLDI '04, 255. https://doi.org/10.1145/996841.996872 Shen, X., Zhong, Y., & Ding, C. (2004). Locality phase prediction. Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPLOS-XI. Presented at the the 11th international conference. https://doi.org/10.1145/1024393.1024414 VanLehn, K., Bhembe, D., Chi, M., Lynch, C., Schulze, K., Shelby, R., … Wintersgill, M. (2004). Implicit Versus Explicit Learning of Strategies in a Non-procedural Cognitive Skill. In Intelligent Tutoring Systems (pp. 521–530). https://doi.org/10.1007/978-3-540-30139-4_49 Sharlin, E., Watson, B., Kitamura, Y., Kishino, F., & Itoh, Y. (2004). On tangible user interfaces, humans and spatiality. Personal and Ubiquitous Computing, 8(5). https://doi.org/10.1007/S00779-004-0296-5 Sharlin, E., Itoh, Y., Watson, B., Kitamura, Y., Sutphen, S., Liu, L., & Kishino, F. (2004). Spatial Tangible User Interfaces for Cognitive Assessment and Training. In Biologically Inspired Approaches to Advanced Information Technology (pp. 137–152). https://doi.org/10.1007/978-3-540-27835-1_11 Langville, A., & Meyer, C. (2004). Deeper Inside PageRank. Internet Mathematics, 1(3), 335–380. https://doi.org/10.1080/15427951.2004.10129091 Frasson, C., Porayska-Pomsta, K., Conati, C., Gouarderes, G., Johnson, L., Pain, H., … de Vicente, A. (2004). Workshop on Social and Emotional Intelligence in Learning Environments. In Intelligent Tutoring Systems (pp. 913–913). https://doi.org/10.1007/978-3-540-30139-4_125 Branting, K., Lester, J., & Mott, B. (2004). Dialogue Management for Conversational Case-Based Reasoning. In Lecture Notes in Computer Science (pp. 77–90). https://doi.org/10.1007/978-3-540-28631-8_7 Gao, S., Kaltofen, E., May, J., Yang, Z., & Zhi, L. (2004). Approximate factorization of multivariate polynomials via differential equations. Proceedings of the 2004 international symposium on Symbolic and algebraic computation - ISSAC '04. Presented at the the 2004 international symposium. https://doi.org/10.1145/1005285.1005311 Brglez, F., Li, X. Y., & Stallmann, M. F. (2004). On SAT instance classes and a method for reliable performance experiments with SAT solvers. Annals of Mathematics and Artificial Intelligence, 43(1-4), 1–34. https://doi.org/10.1007/s10472-004-9417-0 Petrie, C., Genesereth, M., Bjornsson, H., Chirkova, R., Ekstrom, M., Gomi, H., … Mohsin, W. (2004). Adding AI to Web Services. In Agent-Mediated Knowledge Management (pp. 322–338). https://doi.org/10.1007/978-3-540-24612-1_23 Matsuda, N., & Vanlehn, K. (2004). GRAMY: A geometry theorem prover capable of construction. Journal of Automated Reasoning, 32(1), 3–33. https://doi.org/10.1023/B:JARS.0000021960.39761.b7 Udupi, Y. B., Yolum, P., & Singh, M. P. (2004). Trustworthy service caching: Cooperative search in P2P information systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3030, pp. 32–44). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-7444260312&partnerID=MN8TOARS Maximilien, E. M., & Singh, M. P. (2004). Toward autonomic Web services trust and selection. ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing, 212–221. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-20444480301&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2004). Service graphs for building trust. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3290, pp. 509–525). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-33846960261&partnerID=MN8TOARS Yolum, P., & Singh, M. P. (2004). Self-organizing referral networks: A process view of trust and authority. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2977, 195–211. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144450099&partnerID=MN8TOARS Mallya, A. U., Yolum, P., & Singh, M. P. (2004). Resolving commitments among autonomous agents. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2922, 166–182. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-23144454066&partnerID=MN8TOARS Singh, M. P., Chopra, A. K., Desai, N. V., & Mallya, A. U. (2004). Protocols for processes: Programming in the large for open systems (extended abstract). Proceedings of the Conference on Object-Oriented Programming Systems, Languages, and Applications, OOPSLA, 120–123. https://doi.org/10.1145/1028664.1028712 Wan, F., & Singh, M. P. (2004). Mapping Dooley graphs and commitment causality to the π-calculus. Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, 1, 412–419. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544296343&partnerID=MN8TOARS Developing trust in large-scale peer-to-peer systems. (2004). IEEE 1ST SYMPOSIUM ON MULTI-AGENT SECURITY & SURVIVABILITY. https://doi.org/10.1109/MASSUR.2004.1368412 Chopra, A. K., & Singh, M. P. (2004). Commitments for flexible business processes. Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, 3, 1362–1363. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544335679&partnerID=MN8TOARS Desai, N., & Singh, M. P. (2004). Protocol-based business process modeling and enactment. Proceedings - IEEE International Conference on Web Services, 35–42. https://doi.org/10.1109/ICWS.2004.1314721 Chopra, A., & Singh, M. P. (2004). Nonmonotonic commitment machines. Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 2922, 183–200. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-22944442324&partnerID=MN8TOARS Yu, B., Singh, M. P., & Sycara, K. (2004). Developing trust in large-scale peer-to-peer systems. 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability, 1–10. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-17644415405&partnerID=MN8TOARS Bilgin, A. S., Chirkova, R. Y., Salo, T. J., & Singh, M. P. (2004). Deriving efficient SQL sequences via read-aheads. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3181, pp. 299–308). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-35048847119&partnerID=MN8TOARS Singh, M. P. (2004). Business Process Management: A Killer App for Agents? Proceedings of the 3rd International Joint Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 1, 26. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544340500&partnerID=MN8TOARS Udupi, Y. B., Yolum, P., & Singh, M. P. (2004). Agent-based peer-to-peer service networks: A study of effectiveness and structure evolution. Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, 3, 1336–1337. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544299541&partnerID=MN8TOARS Mallya, A. U., & Singh, M. P. (2004). A semantic approach for designing commitment protocols. Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, 3, 1364–1365. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544385537&partnerID=MN8TOARS Mallya, A. U., & Singh, M. P. (2004). A semantic approach for designing business protocols. Thirteenth International World Wide Web Conference Proceedings, WWW2004, 1040–1041. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-19944421093&partnerID=MN8TOARS Yu, B., Li, C., Singh, M. P., & Sycara, K. (2004). A dynamic pricing mechanism for P2P referral systems. Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS 2004, 3, 1426–1427. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-4544301282&partnerID=MN8TOARS Sreenath, R. M., & Singh, M. P. (2004). Agent-based service selection. Web Semantics, 1(3), 261–279. https://doi.org/10.1016/j.websem.2003.11.006 Mallya, A. U., & Singh, M. P. (2004). A Semantic Approach for Designing E-Business Protocols. Proceedings of the 2nd International Conference on Web Services (ICWS), 742–745. https://doi.org/10.1109/ICWS.2004.1314807 Bilgin, A. S., & Singh, M. P. (2004). A DAML-based repository for QoS-aware semantic Web service selection. Proceedings - IEEE International Conference on Web Services, 368–375. https://doi.org/10.1109/ICWS.2004.1314759 Junker, U., Delgrande, J., Doyle, J., Rossi, F., & Schaub, T. (2004). Computational intelligence: Preface. Computational Intelligence, 20(2), 109–110. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-2442596050&partnerID=MN8TOARS Brglez, F., Li, X. Y., Stallmann, M. F., & Militzer, B. (2004). Evolutionary and alternative algorithms: reliable cost predictions for finding optimal solutions to the LABS problem. Information Sciences. Ho, C.-W., Raha, S., Gehringer, E., & Williams, L. (2004). Sangam: A distributed pair-programming plugin for Eclipse. Proceedings of the 2004 OOPSLA workshop on eclipse technology eXchange - eclipse '04. Presented at the The 2004 OOPSLA Eclipse Technology Exchange, Vancouver, BC. https://doi.org/10.1145/1066129.1066144 Kachru, S., & Gehringer, E. F. (2004). On the relative advantages of teaching Web services in J2EE vs. .NET. Proceedings of the OOPSLA 2004 Educators' Symposium. Presented at the OOPSLA 2004 Educators' Symposium, Vancouver, BC. Vitri: A framework for environmental decision support on heterogeneous computer networks. (2004). Bridging the Gap: Meeting the World's Water and Environmental Resources Challenges - Proceedings of the World Water and Environmental Resources Congress 2001, 111. https://doi.org/10.1061/40569(2001)111 Kumar, S. V., Doby, T. A., Baugh, J. W., Brill, E. D., & Ranjithan, S. R. (2004). Method for least cost design of looped pipe networks for different levels of redundancy using genetic algorithms. Joint Conference on Water Resource Engineering and Water Resources Planning and Management 2000: Building Partnerships, 104. https://doi.org/10.1061/40517(2000)201 Doby, T. A., Kumar, S. V., Baugh, J. W., Brill, E. D., & Ranjithan, S. R. (2004). Genetic algorithm search for least cost design of looped pipe networks using age as a quality surrogate and different levels of redundancy. Bridging the Gap: Meeting the World's Water and Environmental Resources Challenges - Proceedings of the World Water and Environmental Resources Congress 2001, 111. https://doi.org/10.1061/40569(2001)387 Katira, N., Williams, L., Wiebe, E., Miller, C., Balik, S., & Gehringer, E. (2004). On understanding compatibility of student pair programmers. Proceedings of the 35th SIGCSE technical symposium on Computer science education - SIGCSE '04. Presented at the the 35th SIGCSE technical symposium. https://doi.org/10.1145/971300.971307 Baloch, S. H., Krim, H., & Genton, M. G. (2004). Shape representation with flexible skew-symmetric distributions. In Skew-elliptical distibutions and their applications: A journey beyond normality. https://doi.org/10.1201/9780203492000.ch17 Anantaraman, A., Seth, K., Rotenberg, E., & Mueller, F. (2004). Enforcing safety of real-time schedules on contemporary processors using a virtual simple architecture (VISA). 25TH IEEE INTERNATIONAL REAL-TIME SYSTEMS SYMPOSIUM, PROCEEDINGS, pp. 114–125. https://doi.org/10.1109/real.2004.19 Mahalati, R., & Dutta, R. (2004). Reconfiguration of traffic grooming optical networks. FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS, pp. 170–179. https://doi.org/10.1109/broadnets.2004.72 Yu, B., & Singh, M. P. (2004). Incentive mechanisms for peer-to-peer systems. Lecture Notes in Computer Science, 2872, 77–88. https://doi.org/10.1007/978-3-540-25840-7_9 Anton, A. I., & Earp, J. B. (2004). A requirements taxonomy for reducing Web site privacy vulnerabilities. REQUIREMENTS ENGINEERING, 9(3), 169–185. https://doi.org/10.1007/s00766-003-0183-z Leipzig, J., Pevzner, P., & Heber, S. (2004). The alternative splicing gallery (ASG): bridging the gap between genome and transcriptome. Nucleic Acids Research, 32(13), 3977–3983. https://doi.org/10.1039/nar/gkh731 Hope, P., McGraw, G., & Anton, A. I. (2004). Misuse and abuse cases: Getting past the positive. IEEE SECURITY & PRIVACY, Vol. 2, pp. 90–92. https://doi.org/10.1109/MSP.2004.17 Corteel, S., & Savage, C. D. (2004). Lecture hall theorems, q-series and truncated objects. JOURNAL OF COMBINATORIAL THEORY SERIES A, 108(2), 217–245. https://doi.org/10.1016/j.jcta.2004.05.006 Tai, S., Mikalsen, T., Wohlstadter, E., Desai, N., & Rouvellou, I. (2004). Transaction policies for service-oriented computing. DATA & KNOWLEDGE ENGINEERING, 51(1), 59–79. https://doi.org/10.1016/j.datak.2003.03.001 Yolum, P., & Singh, M. P. (2004). Service graphs for building trust. Lecture Notes in Computer Science, 3290, 509–525. https://doi.org/10.1007/978-3-540-30468-5_32 Singh, M. P., Chopra, A. K., Desai, N., & Mallya, A. U. (2004). Protocols for processes. ACM SIGPLAN Notices, 39(12), 73. https://doi.org/10.1145/1052883.1052893 Kim, C. S., Lee, C. H., Fiering, J. O., Ufer, S., Scarantino, C. W., & Nagle, H. T. (2004). Manipulation of microenvironment with a built-in electrochemical actuator in proximity of a dissolved oxygen microsensor. IEEE SENSORS JOURNAL, 4(5), 568–575. https://doi.org/10.1109/JSEN.2004.832857 Ning, P., Jajodia, S., & Wang, S. (2004). Intrusion detection in distributed systems: An abstraction-based approach. Boston: Kluwer Academic Publishers. Anton, A. I., Earp, J. B., He, Q. F., Stufflebeam, W., Bolchini, D., & Jensen, C. (2004). Financial privacy policies and the need for standardization. IEEE SECURITY & PRIVACY, 2(2), 36–45. https://doi.org/10.1109/MSECP.2004.1281243 Bilgin, A. S., Chirkova, R. Y., Salo, T. J., & Singh, M. P. (2004). Deriving efficient SQL sequences via read-aheads. Lecture Notes in Computer Science, 3181, 299–308. https://doi.org/10.1007/978-3-540-30076-2_30 Abdulla, P., Mahata, P., & Mayr, R. (2004). Decidability of zenoness, syntactic boundedness and token-liveness for dense-timed Petri nets. In K. Lodaya & M. Mahajan (Eds.), FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science: 24th international conference, Chennai, India, December 16-18, 2004: Proceedings (Lecture notes in computer science ; 3328) (Vol. 3328, pp. 58–70). Berlin; New York: Springer. Krim, J., Abdelmaksoud, M., Borovsky, B., & Winder, S. M. (2004). Scanning tunneling microscope-quartz crystal microbalance studies of "real world" and model lubricants. In Dynamics and friction of submicrometer confining systems (Vol. 882). https://doi.org/10.1021/bk-2004-0882.ch001 Yang, T. S., Duel-Hallen, A., & Hallen, H. (2004, April). Reliable adaptive modulation aided by observations of another fading channel. IEEE TRANSACTIONS ON COMMUNICATIONS, Vol. 52, pp. 605–611. https://doi.org/10.1109/TCOMM.2004.826369 Yolum, P., & Singh, M. P. (2004, September). Reasoning about commitments in the event calculus: An approach for specifying and executing protocols. ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, Vol. 42, pp. 227–253. https://doi.org/10.1023/B:AMAI.0000034528.55456.d9 Streicher, J. J., Culverhouse, W. C., Dulberg, M. S., & Fornaro, R. J. (2004). Modeling the anatomical distribution of sunlight. PHOTOCHEMISTRY AND PHOTOBIOLOGY, 79(1), 40–47. https://doi.org/10.1111/j.1751-1097.2004.tb09855.x Langville, A. N., & Stewart, W. J. (2004). Kronecker product approximate preconditioner for SANs. NUMERICAL LINEAR ALGEBRA WITH APPLICATIONS, Vol. 11, pp. 723–752. https://doi.org/10.1002/nla.344 Wu, F., & Soto, M. (2004). Extended anti-windup control schemes for LTI and LFT systems with actuator saturations. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 14(15), 1255–1281. https://doi.org/10.1002/rnc.943 May, E. E., Vouk, M. A., Bitzer, D. L., & Rosnick, D. I. (2004). Coding theory based models for protein translation initiation in prokaryotic organisms. BIOSYSTEMS, Vol. 76, pp. 249–260. https://doi.org/10.1016/j.biosystems.2004.05.017 Wang, P., Ning, P., & Reeves, D. S. (2004). Storage-efficient stateless group key revocation. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 25–38). https://doi.org/10.1007/978-3-540-30144-8_3 Langville, A. N., & Stewart, W. J. (2004, July 15). Special issue devoted to papers presented at the Conference on the Numerical Solution of Markov Chains 2003 - Preface. LINEAR ALGEBRA AND ITS APPLICATIONS, Vol. 386, pp. 1–2. https://doi.org/10.1016/j.laa.2004.02.016 Yolum, P., & Singh, M. P. (2004). Self-organizing referral networks: A process view of trust and authority. Lecture Notes in Computer Science, 2977, 195–211. https://doi.org/10.1007/978-3-540-24701-2_14 Craigmill, A. L., Miller, G. R., Gehring, R., Pierce, A. N., & Riviere, J. E. (2004). Meta-analysis of pharmacokinetic data of veterinary drugs using the Food Animal Residue Avoidance Databank: oxytetracycline and procaine penicillin G. JOURNAL OF VETERINARY PHARMACOLOGY AND THERAPEUTICS, 27(5), 343–353. https://doi.org/10.1111/j.1365-2885.2004.00606.x Meyer, C. (2004). Injective properties of complex matrices. American Mathematical Monthly, 111(8), 728. https://doi.org/10.2307/4145059 Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Improving robustness of PGP keyrings by conflict detection. In Topics in cryptology, CT-RSA 2004 (Vol. 2964, pp. 194–207). https://doi.org/10.1007/978-3-540-24660-2_16 Gao, S. H., Kaltofen, E., & Lauder, A. G. B. (2004). Deterministic distinct-degree factorization of polynomials over finite fields. JOURNAL OF SYMBOLIC COMPUTATION, 38(6), 1461–1470. https://doi.org/10.1016/j.jsc.2004.05.004 Jiang, Q. L., Reeves, D. S., & Ning, P. (2004). Certificate recommendations to improve the robustness of web of trust. In K. Zhang & Y. Zheng (Eds.), Information security: 7th international conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004: Proceedings (Vol. 3225, pp. 292–303). https://doi.org/10.1007/978-3-540-30144-8_25 Yu, T., Srivastava, D., Lakshmanan, L. V. S., & Jagadish, H. V. (2004). A compressed accessibility map for XML. ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363–402. https://doi.org/10.1145/1005566.1005570 Canfield, E. R., Savage, C. D., & Wilf, H. S. (2004). Regularly spaced subsums of integer partitions. ACTA ARITHMETICA, 115(3), 205–216. https://doi.org/10.4064/aa115-3-1 Fulp, E. W., & Reeves, D. S. (2004). Bandwidth provisioning and pricing for networks with multiple classes of service. COMPUTER NETWORKS, 46(1), 41–52. https://doi.org/10.1016/j.comnet.2004.03.018 May, E. E., Vouk, M. A., Bitzer, D. L., & Rosnick, D. I. (2004). An error-correcting code framework for genetic sequence analysis. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, Vol. 341, pp. 89–109. https://doi.org/10.1016/j.jfranklin.2003.12.009 Ben Hamza, A., Krim, H., & Zerubia, J. (2004). A nonlinear entropic variational model for image filtering. EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004(16), 2408–2422. https://doi.org/10.1155/S1110865704407197 Kim, C. S., Ufer, S., Seagle, C. M., Engle, C. L., Nagle, H. T., Johnson, T. A., & Cascio, W. E. (2004). Use of micromachined probes for the recording of cardiac electrograms in isolated heart tissues. BIOSENSORS & BIOELECTRONICS, 19(9), 1109–1116. https://doi.org/10.1016/j.bios.2003.10.011 Benoit, A., Fernandes, P., Plateau, B., & Stewart, W. J. (2004). On the benefits of using functional transitions and Kronecker algebra. PERFORMANCE EVALUATION, 58(4), 367–390. https://doi.org/10.1016/j.peva.2004.04.002 Bilgin, A. S. (2004). Incremental read-aheads. In Current trends in database technology: EDBT 2004 Workshops, PhD, DataX, PIM, P2P&DB, and Clustweb, Heraklion, Crete, Greece, March 14-18, 2004: revised selected papers (Vol. 3268, pp. 144–153). Berlin; New York: Springer. Kumar, N. J., Shivshankar, S., & Dean, A. G. (2004, July). Asynchronous software thread integration for efficient software implementations of embedded communication protocol controllers. ACM SIGPLAN NOTICES, Vol. 39, pp. 37–46. https://doi.org/10.1145/998300.997170 Lavian, T., Hoang, D. B., Travostino, F., Wang, P. Y. H., Subramanian, S., & Monga, I. (2004). An extensible, programmable, commercial-grade platform for Internet service architecture. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 34(1), 58–68. https://doi.org/10.1109/TSMCC.2003.818497 Udupi, Y. B., Yolum, P., & Singh, M. P. (2004). Trustworthy service caching: Cooperative search in P2P information systems. In B. H.-S. P. Giorgini & M. Winikoff (Eds.), Agent-oriented information systems: 5th international bi-conference workshop, AOIS 2003, Melbourne, Australia, July 14, 2003 and Chicago, IL, USA, October 13, 2003 ; Revised selected papers (Vol. 3030, pp. 32–44). https://doi.org/10.1007/978-3-540-25943-5_3 Chen, B., Rouskas, G. N., & Dutta, R. (2004). Traffic Grooming in WDM Ring Networks with the Min-Max Objective. In Lecture Notes in Computer Science (Vol. 3042, pp. 174–185). https://doi.org/10.1007/978-3-540-24693-0_15 Langville, A. N., & Stewart, W. J. (2004). Testing the nearest Kronecker product preconditioner on Markov chains and stochastic automata networks. INFORMS JOURNAL ON COMPUTING, 16(3), 300–315. https://doi.org/10.1287/ijoc.1030.0041 Puttasubbappa, V. S., & Perros, H. G. (2004). Access protocols to support different service classes in an optical burst switching ring. In Networking 2004: Networking technologies, services, and protocols: Performance of computer and communication networks, mobile and wireless commuication: Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004 ; Proceedings (Vol. 3042, pp. 878–889). https://doi.org/10.1007/978-3-540-24693-0_72 Gehring, R., Baynes, R. E., Wang, J., Craigmill, A. L., & Riviere, J. E. (2004). A web-based decision support system to estimate extended withdrawal intervals. COMPUTERS AND ELECTRONICS IN AGRICULTURE, 44(2), 145–151. https://doi.org/10.1016/j.compag.2004.05.002 Xin, Y. F., Baldine, I., Cassada, M., Stevenson, D., Jackson, L. E., & Perros, H. (2004). ORBIS: A reconfigurable hybrid optical metropolitan area network architecture. In Networking 2004: Networking technologies, services, and protocols: Performance of computer and communication networks, mobile and wireless commuication: Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004 ; Proceedings (Vol. 3042, pp. 1502–1507). https://doi.org/10.1007/978-3-540-24693-0_142 Oothongsap, P., Viniotis, Y., & Vouk, M. (2004). Experimental analysis of the SABUL congestion control algorithm. In Networking 2004: Networking technologies, services, and protocols: Performance of computer and communication networks, mobile and wireless commuication: Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004 ; Proceedings (Vol. 3042, pp. 1433–1439). https://doi.org/10.1007/978-3-540-24693-0_131 Washington, A. N., & Perros, H. (2004). Call blocking probabilities in a traffic-groomed tandem optical network. COMPUTER NETWORKS, 45(3), 281–294. https://doi.org/10.1016/j.comnet.2004.03.008 Griggs, J., Killian, C. E., & Savage, C. D. (2004). Venn diagrams and symmetric chain decompositions in the Boolean lattice. Electronic Journal of Combinatorics, 11(1). Kaltofen, E., & Villard, G. (2004, January 1). Computing the sign or the value of the determinant of an integer matrix, a complexity survey. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, Vol. 162, pp. 133–146. https://doi.org/10.1016/j.cam.2003.08.019 Wu, K. H., & Reeves, D. S. (2004). Capacity planning of DiffServ networks with best-effort and Expedited Forwarding traffic. TELECOMMUNICATION SYSTEMS, 25(3-4), 193–207. https://doi.org/10.1023/B:TELS.0000014781.92903.7f Bao, Y. F., & Krim, H. (2004). Smart nonlinear diffusion: A probabilistic approach. IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(1), 63–72. https://doi.org/10.1109/TPAMI.2004.1261079 Corteel, S., & Savage, C. D. (2004). Partitions and compositions defined by inequalities. RAMANUJAN JOURNAL, 8(3), 357–381. https://doi.org/10.1007/s11139-004-0144-2 Hitczenko, P. L., & Savage, C. D. (2004). On the multiplicity of parts in a random composition of a large integer. SIAM JOURNAL ON DISCRETE MATHEMATICS, 18(2), 418–435. https://doi.org/10.1137/s0895480199363155 Anton, A. I., He, Q. F., & Baumer, D. L. (2004). Inside JetBlue's privacy policy violations. IEEE Security & Privacy, 2(6), 18-. Patil, K., Seth, K., & Mueller, F. (2004, July). Compositional static instruction cache simulation. ACM SIGPLAN NOTICES, Vol. 39, pp. 136–145. https://doi.org/10.1145/998300.997183 Abdulla, P. A., Iyer, S. P., & Nylen, A. (2004). SAT-solving the coverability problem for Petri nets. FORMAL METHODS IN SYSTEM DESIGN, 24(1), 25–43. https://doi.org/10.1023/B:FORM.0000004786.30007.f8 Killian, C. E., & Savage, C. D. (2004). Antipodal gray codes. DISCRETE MATHEMATICS, 281(1-3), 221–236. https://doi.org/10.1016/j.disc.2003.07.012 Xin, Y. F., & Rouskas, G. N. (2004). A study of path protection in large-scale optical networks. PHOTONIC NETWORK COMMUNICATIONS, 7(3), 267–278. https://doi.org/10.1023/B:PNET.0000026891.50610.48 George, B., & Williams, L. (2004, April 15). A structured experiment of test-driven development. INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 46, pp. 337–342. https://doi.org/10.1016/j.infsof.2003.09.011 Maximilien, E. M., & Singh, M. P. (2004). A framework and ontology for dynamic Web services selection. IEEE INTERNET COMPUTING, 8(5), 84–93. https://doi.org/10.1109/MIC.2004.27 Li, X. Y., Stallmann, M. F., & Brglez, F. (2004). A Local Search SAT Solver Using an Effective Switching Strategy and an Efficient Unit Propagation. In Theory and Applications of Satisfiability Testing (Vol. 2919, pp. 53–68). https://doi.org/10.1007/978-3-540-24605-3_5 McGeachie, M., & Doyle, J. (2004, May). Utility functions for ceteris paribus preferences. COMPUTATIONAL INTELLIGENCE, Vol. 20, pp. 158–217. https://doi.org/10.1111/j.0824-7935.2004.00235.x Langville, A. N., & Stewart, W. J. (2004). The Kronecker product and stochastic automata networks. JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS, 167(2), 429–447. https://doi.org/10.1016/j.cam.2003.10.010 Desai, N., & Mueller, F. (2004). Scalable hierarchical locking for distributed systems. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 64(6), 708–724. https://doi.org/10.1016/j.jpdc.2003.10.001 Doyle, J. (2004, May). Prospects for preferences. COMPUTATIONAL INTELLIGENCE, Vol. 20, pp. 111–136. https://doi.org/10.1111/j.0824-7935.2004.00233.x