Computer Science - 2013 Chakradeo, S., Reaves, B., Traynor, P., & Enck, W. (2013). MAST: triage for market-scale mobile malware analysis. Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, 13–24. Pandita, R., Xiao, X., Yang, W., Enck, W., & Xie, T. (2013). WHYPER: towards automating risk assessment of mobile applications. Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14–16. Nadkarni, A., & Enck, W. (2013). Preventing accidental data disclosure in modern operating systems. Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 1029–1042. Rastogi, V., Chen, Y., & Enck, W. (2013). Automatic Security Analysis of Android Applications. In Android Security and Mobile Cloud Computing. Springer. Rastogi, V., Chen, Y., & Enck, W. (2013). AppsPlayground: automatic security analysis of smartphone applications. Proceedings of the third ACM conference on Data and application security and privacy, 209–220. Heckman, S., & Williams, L. (2013). A comparative evaluation of static analysis actionable alert identification techniques. Proceedings of the 9th International Conference on Predictive Models in Software Engineering, 1–10. Meyer, B., Baresi, L., & Mezini, M. (Eds.). (2013). Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18-26, 2013. Retrieved from http://dl.acm.org/citation.cfm?id=2491411 SPLat: lightweight dynamic analysis for reducing combinatorics in testing configurable systems. (2013). Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC/FSE'13, Saint Petersburg, Russian Federation, August 18-26, 2013, 257–267. https://doi.org/10.1145/2491411.2491459 Campos, J., Abreu, R., Fraser, G., & d’Amorim, M. (2013). Entropy-based test generation for improved fault localization. 2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013, 257–267. https://doi.org/10.1109/ASE.2013.6693085 Denney, E., Bultan, T., & Zeller, A. (Eds.). (2013). 2013 28th IEEE/ACM International Conference on Automated Software Engineering, ASE 2013, Silicon Valley, CA, USA, November 11-15, 2013. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6684409 French, A., Guo, Z., & Baruah, S. (2013). Scheduling mixed-criticality workloads upon unreliable processors. The 11th Workshop on Models and Algorithms for Planning and Scheduling Problems (MAPSP). Presented at the 11th Workshop on Models and Algorithms for Planning and Scheduling Problems (MAPSP), Pont a Mousson, France. Guo, Z., & Baruah, S. (2013). Mixed-criticality scheduling upon non-monitored varying-speed processors. Presented at the 2013 8th IEEE International Symposium on Industrial Embedded Systems (SIES). https://doi.org/10.1109/sies.2013.6601488 Cheng, W., Zhang, X., Guo, Z., Wu, Y., Sullivan, P. F., & Wang, W. (2013). Flexible and robust co-regularized multi-domain graph clustering. Presented at the KDD' 13: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. https://doi.org/10.1145/2487575.2487582 Baruah, S., & Guo, Z. (2013). Mixed-Criticality Scheduling upon Varying-Speed Processors. Presented at the 2013 IEEE 34th Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2013.15 Kuttal, S. K. (2013). Variation support for end users. Presented at the 2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vlhcc.2013.6645276 Kuttal, S. K., Sarma, A., & Rothermel, G. (2013). Debugging support for end user mashup programming. Presented at the CHI '13: CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/2470654.2466213 Kuttal, S. K., Sarma, A., & Rothermel, G. (2013). Predator behavior in the wild web world of bugs: An information foraging theory perspective. Presented at the 2013 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vlhcc.2013.6645244 Sullivan, B. D., Weerapurage, D., & Groer, C. (2013). Parallel algorithms for graph optimization using tree decompositions. Proceedings - IEEE 27th International Parallel and Distributed Processing Symposium Workshops and PhD Forum, IPDPSW 2013, 1838–1847. https://doi.org/10.1109/IPDPSW.2013.242 Sullivan, B. D. (2013). On a conjecture of Andrica and Tomescu. Journal of Integer Sequences, 16(3). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84880061040&partnerID=MN8TOARS Adcock, A. B., Sullivan, B. D., & Mahoney, M. W. (2013). Tree-Like Structure in Large Social and Information Networks. 2013 IEEE 13th International Conference on Data Mining, 1–10. https://doi.org/10.1109/icdm.2013.77 Karpouzis, K., Yannakakis, G., Paiva, A., Nielsen, J. H., Vasalou, A., & Jhala, A. (2013). User modelling and adaptive, natural interaction for conflict resolution. Proceedings - 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, ACII 2013, 719–721. https://doi.org/10.1109/ACII.2013.131 Morgens, S.-M., & Jhala, A. (2013). Synthetic photographs for learning aesthetic preferences. AAAI Workshop - Technical Report, WS-13-17, 83–85. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84898902152&partnerID=MN8TOARS Maraffi, C., Ishikawa, S., & Jhala, A. (2013). Inferring performer skill from aesthetic quality features in a dance game gesture corpus. AAAI Workshop - Technical Report, WS-13-19, 17–24. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84898846949&partnerID=MN8TOARS Riedl, M., Sukthankar, G., Jhala, A., Zhu, J., Ontanón, S., Buro, M., & Churchill, D. (2013). The eighth AAAI conference on artificial intelligence and interactive digital entertainment. AI Magazine, 34(1), 87–89. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84876194291&partnerID=MN8TOARS Gomes, P., & Jhala, A. (2013). AI authoring for virtual characters in conflict. Proceedings of the 9th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2013, 135–141. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84916941876&partnerID=MN8TOARS Leece, M., & Jhala, A. (2013). Reinforcement learning for spatial reasoning in strategy games. Proceedings of the 9th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2013, 156–162. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84916931832&partnerID=MN8TOARS Teaching strategies when students have access to solution manuals. (2013). Proceedings of the ASEE 2013 Annual Conference and Exposition. Kaltofen, E., & Lecerf, G. (2013). Factorization of multivariate polynomials. In G. L. Mullen & D. Panario (Eds.), Handbook of Finite Fields (pp. 382–392). Boca Raton, Florida: CRC Press, Taylor & Francis Group. Finkelstein, S., Barnes, T., Wartell, Z., & Suma, E. (2013). Evaluation of the Exertion and Motivation Factors of a Virtual Reality Exercise Game for Children with Autism. 2013 1st Workshop on Virtual and Augmented Assistive Technology (VAAT). Presented at the 2013 1st Workshop on Virtual and Augmented Assistive Technology (VAAT), Lake Buena Vista, Florida, USA. https://doi.org/10.1109/VAAT.2013.6786186 Eagle, M., Johnson, M., Barnes, T., & Boyce, A. (2013). Exploring Player Behavior with Visual Analytics. 8th ACM Foundations of Digital Games, 380–383. Shannon, A., Boyce, A., Gadwal, C., & Barnes, T. (2013). Effective Practices in Game Tutorial Systems. 8th ACM Foundations of Digital Games, 338–345. Eugene, W., Daily, S., Burns, R., & Barnes, T. (2013). Building Technology Fluency: Fostering Agents of Change. Presented at the 120th ASEE Conference (ASEE 2013), Atlanta, GA. https://doi.org/10.18260/1-2--19275 Mostafavi, B., & Barnes, T. (2013). Determining problem selection for a logic proof tutor. Educational Data Mining, 387–389. Eagle, M., & Barnes, T. (2013). Evaluation of automatically generated hint feedback. Educational Data Mining, 372–374. Johnson, M., Eagle, M., Barnes, T., & Stamper, J. (2013). An Algorithm for Reducing the Complexity of Interaction Networks. Educational Data Mining, 248–251. Johnson, M., Eagle, M., & Barnes, T. (2013). InVis: An Interactive Visualization Tool for Exploring Interaction Networks Educational Data Mining. Proceedings of the 6th International Conference on Educational Data Mining (EDM 2013), 82–89. Stamper, J., Eagle, M., Barnes, T., & Croy, M. (2013). Experimental Evaluation of Automatic Hint Generation for a Logic Tutor. International Journal of Artificial Intelligence in Education (IJAIED), 22(1-2), 3–17. Wang, L., Yang, R., Xu, Y., Niu, Q., Pardalos, P. M., & Fei, M. (2013). An improved adaptive binary Harmony Search algorithm. Information Sciences, 232, 58–87. https://doi.org/10.1016/j.ins.2012.12.043 Wang, L., Yang, R., Pardalos, P. M., Qian, L., & Fei, M. (2013). An adaptive fuzzy controller based on harmony search and its application to power plant control. International Journal of Electrical Power and Energy Systems, 53(1), 272–278. https://doi.org/10.1016/j.ijepes.2013.05.015 Rodrigo, M. M. T., Geli, R. I. A. M., Ong, A., Vitug, G. J. G., Bringula, R., Basa, R. S., … Matsuda, N. (2013). Exploring the Implications of Tutor Negativity Towards a Synthetic Agent in a Learning-by-Teaching Environment. Philippine Computing Journal, 8(1), 15–20. King, J., & Williams, L. (2013). Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems. Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, 4–4. Retrieved from http://dl.acm.org/citation.cfm?id=2696523.2696527 Menzies, T. (2013). Guest editorial for the Special Section on BEST PAPERS from the 2011 conference on Predictive Models in Software Engineering (PROMISE). Information and Software Technology, 55(8), 1477–1478. https://doi.org/10.1016/J.INFSOF.2013.03.006 Chopra, A. K., & Singh, M. P. (2013). Agent Communication. In G. Weiss (Ed.), Multiagent Systems (2nd ed., pp. 101–141). Cambridge, Massachusetts: MIT Press. Singh, M. P., Arrott, M., Balke, T., Chopra, A. K., Christiaanse, R., Cranefield, S., … Villata, S. (2013). The Uses of Norms. In G. Andrighetto, G. Governatori, P. Noriega, & L. W. N. Torre (Eds.), Normative Multi-Agent Systems (Vol. 4, pp. 191–229). https://doi.org/10.4230/DFU.Vol4.12111.191 Noriega, P., Chopra, A. K., Fornara, N., Cardoso, H. L., & Singh, M. P. (2013). Regulated MAS: Social Perspective. In G. Andrighetto, G. Governatori, P. Noriega, & L. W. N. Torre (Eds.), Normative Multi-Agent Systems (Vol. 4, pp. 93–133). https://doi.org/10.4230/DFU.Vol4.12111.93 Gerard, S. N., Telang, P. R., Kalia, A. K., & Singh, M. P. (2013). Positron: Composing Commitment Protocols. Proceedings of the 1st International Workshop on Engineering Multiagent Systems (EMAS). Presented at the International Workshop on Engineering Multiagent Systems, St. Paul, MN. Sklar, E. I., Parsons, S. D., & Singh, M. P. (2013). Towards an Argumentation-Based Model of Social Interaction. Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems (ArgMAS). Presented at the International Workshop on Argumentation in Multi-Agent Systems, St. Paul, MN. Kalia, A. K., Zhang, Z., & Singh, M. P. (2013). Trustworthy Decision Making via Commitments. Proceedings of the 15th AAMAS Workshop on Trust in Agent Societies (Trust), 24–35. Wu, B., Zhao, Z., Zhang, E. Z., Jiang, Y., & Shen, X. (2013). Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU. ACM SIGPLAN Notices, 48(8), 57. https://doi.org/10.1145/2517327.2442523 Cao, L., Zeng, Y., Symeonidis, A. L., Gorodetsky, V. I., Yu, P. S., & Singh, M. P. (Eds.). (2013). Agents and Data Mining Interaction. https://doi.org/10.1007/978-3-642-36288-0 Sheehy, D. R. (2013). Geometric Separators and the Parabolic Lift. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Waterloo, Ontario. Ghaisas, S., & Ajmeri, N. (2013). Knowledge-Assisted Ontology-Based Requirements Evolution. In W. Maalej & A. K. Thurimella (Eds.), Managing Requirements Knowledge (MaRK) (pp. 143–167). Retrieved from https://research-information.bris.ac.uk/en/publications/9d328913-4eb3-4403-bf6f-bbf20ed08017 Hang, C.-W., Ajmeri, N., Singh, M. P., & Parsons, S. (2013). Argumentation, Evidence, and Schemes: Abstract. Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems, 37. Retrieved from https://research-information.bris.ac.uk/en/publications/3b00f0ba-3768-4e45-94f5-93d1a4661f2b Guo, Z., & Shen, X. (2013). Fine-Grained Treatment to Synchronizations in GPU-to-CPU Translation. In Languages and Compilers for Parallel Computing (pp. 171–184). https://doi.org/10.1007/978-3-642-36036-7_12 Tian, K., Jiang, Y., Shen, X., & Mao, W. (2013). Optimal Co-Scheduling to Minimize Makespan on Chip Multiprocessors. In Job Scheduling Strategies for Parallel Processing (pp. 114–133). https://doi.org/10.1007/978-3-642-35867-8_7 Zhao, Z., Bebenita, M., Herman, D., Sun, J., & Shen, X. (2013). HPar. ACM Transactions on Architecture and Code Optimization, 10(4), 1–25. https://doi.org/10.1145/2541228.2555301 Wu, B., Zhou, M., Shen, X., Gao, Y., Silvera, R., & Yiu, G. (2013). Simple Profile Rectifications Go a Long Way. In ECOOP 2013 – Object-Oriented Programming (pp. 654–678). https://doi.org/10.1007/978-3-642-39038-8_27 Damgård, I., & Scafuro, A. (2013). Unconditionally Secure and Universally Composable Commitments from Physical Assumptions. In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119). https://doi.org/10.1007/978-3-642-42045-0_6 Ostrovsky, R., Scafuro, A., Visconti, I., & Wadia, A. (2013). Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions. In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718). https://doi.org/10.1007/978-3-642-38348-9_41 Ostrovsky, R., Rao, V., Scafuro, A., & Visconti, I. (2013). Revisiting Lower and Upper Bounds for Selective Decommitments. In Theory of Cryptography (pp. 559–578). https://doi.org/10.1007/978-3-642-36594-2_31 Martens, C., Bosser, A.-G., Ferreira, J. F., & Cavazza, M. (2013). Linear Logic Programming for Narrative Generation. In Logic Programming and Nonmonotonic Reasoning (pp. 427–432). https://doi.org/10.1007/978-3-642-40564-8_42 Stolee, K. T., Elbaum, S., & Sarma, A. (2013). Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! Pipes. Information and Software Technology, 55(7), 1289–1303. https://doi.org/10.1016/j.infsof.2012.10.004 Shahzad, F., Shahzad, M., & Farooq, M. (2013). In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS. Information Sciences, 231, 45–63. https://doi.org/10.1016/j.ins.2011.09.016 Harris, W. R., Jin, G., Lu, S., & Jha, S. (2013). Validating Library Usage Interactively. In Computer Aided Verification (pp. 796–812). https://doi.org/10.1007/978-3-642-39799-8_56 Kocaguneli, E., & Menzies, T. (2013). Software effort models should be assessed via leave-one-out validation. Journal of Systems and Software, 86(7), 1879–1890. https://doi.org/10.1016/J.JSS.2013.02.053 Partington, S., Murphy, E., Bowen, E., Lacombe, D., Piras, G., Carson, L., … Menzies, T. (2013). Choose to Change: The West Virginia Early Childhood Obesity Prevention Project. Journal of Nutrition Education and Behavior, 45(4), S92. https://doi.org/10.1016/J.JNEB.2013.04.271 Menzies, T., & Koru, G. (2013). Predictive models in software engineering. Empirical Software Engineering, 18(3), 433–434. https://doi.org/10.1007/S10664-013-9252-1 Atluri, G., Padmanabhan, K., Fang, G., Steinbach, M., Petrella, J. R., Lim, K., … Kumar, V. (2013). Complex biomarker discovery in neuroimaging data: Finding a needle in a haystack. NeuroImage: Clinical, 3, 123–131. https://doi.org/10.1016/J.NICL.2013.07.004 Jenkins, J., Arkatkar, I., Lakshminarasimhan, S., Boyuka, D. A., II, Schendel, E. R., Shah, N., … Samatova, N. F. (2013). ALACRITY: Analytics-Driven Lossless Data Compression for Rapid In-Situ Indexing, Storing, and Querying. In Transactions on Large-Scale Data- and Knowledge-Centered Systems X (pp. 95–114). https://doi.org/10.1007/978-3-642-41221-9_4 Kawale, J., Liess, S., Kumar, A., Steinbach, M., Snyder, P., Kumar, V., … Semazzi, F. (2013). A graph-based approach to find teleconnections in climate data. Statistical Analysis and Data Mining, 6(3), 158–179. https://doi.org/10.1002/SAM.11181 Watson, B., Berube, D., Hristov, N., Strohecker, C., Betz, S., Allen, L., … Kirstner, M. (2013). VIA - Visualizing Individual Actions to Develop a Sustainable Community Culture through Cycling. In Distributed, Ambient, and Pervasive Interactions (pp. 316–325). https://doi.org/10.1007/978-3-642-39351-8_35 Gomes, P., Paiva, A., Martinho, C., & Jhala, A. (2013). Metrics for Character Believability in Interactive Narrative. In Interactive Storytelling: Vol. 8230 LNCS (pp. 223–228). https://doi.org/10.1007/978-3-319-02756-2_27 Min, W., Rowe, J. P., Mott, B. W., & Lester, J. C. (2013). Personalizing embedded assessment sequences in narrative-centered learning environments: A collaborative filtering approach. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 369–378). https://doi.org/10.1007/978-3-642-39112-5-38 Sessoms, M., & Anyanwu, K. (2013). SkyPackage: From Finding Items to Finding a Skyline of Packages on the Semantic Web. In Semantic Technology (pp. 49–64). https://doi.org/10.1007/978-3-642-37996-3_4 Barnes, T., Boyce, A., Catete, V., Doran, K., Hicks, A. G., & Keller, L. (2013). Augmenting introductory computer science classes with GameMaker and mobile apps. Proceeding of the 44th ACM technical symposium on Computer science education, 767–767. https://doi.org/10.1145/2445196.2445532 Modeling and Algorithms for QoS-Aware Service Composition in Virtualization-Based Cloud Computing. (2013). IEICE Transactions on Communications. https://doi.org/10.1587/transcom.e96.b.10 Asgharzadeh Talebi, Z., Chirkova, R., & Fathi, Y. (2013). An integer programming approach for the view and index selection problem. Data & Knowledge Engineering, 83, 111–125. https://doi.org/10.1016/j.datak.2012.11.001 Chen, D., Chirkova, R., Sadri, F., & Salo, T. J. (2013). Query optimization in information integration. Acta Informatica, 50(4), 257–287. https://doi.org/10.1007/S00236-013-0179-1 Huang, R., Chirkova, R., & Fathi, Y. (2013). Two-Stage Stochastic View Selection for Data-Analysis Queries. In Advances in Intelligent Systems and Computing (pp. 115–123). https://doi.org/10.1007/978-3-642-32741-4_11 Bian, X., & Krim, H. (2013). Activity Video Analysis via Operator-Based Local Embedding. In Lecture Notes in Computer Science (pp. 845–852). https://doi.org/10.1007/978-3-642-40020-9_95 Yi, S., & Krim, H. (2013). A Subspace Learning of Dynamics on a Shape Manifold: A Generative Modeling Approach. In Lecture Notes in Computer Science (pp. 84–91). https://doi.org/10.1007/978-3-642-40020-9_8 González-Díaz, R., Jiménez, M.-J., & Krim, H. (2013). Towards Minimal Barcodes. In Graph-Based Representations in Pattern Recognition (pp. 184–193). https://doi.org/10.1007/978-3-642-38221-5_20 Bian, X., & Krim, H. (2013). Optimal Operator Space Pursuit: A Framework for Video Sequence Data Analysis. In Computer Vision – ACCV 2012 (pp. 760–769). https://doi.org/10.1007/978-3-642-37444-9_59 Sabourin, J. L., Shores, L. R., Mott, B. W., & Lester, J. C. (2013). Understanding and Predicting Student Self-Regulated Learning Strategies in Game-Based Learning Environments. International Journal of Artificial Intelligence in Education, 23(1-4), 94–114. https://doi.org/10.1007/S40593-013-0004-6 Min, W., Rowe, J. P., Mott, B. W., & Lester, J. C. (2013). Personalizing Embedded Assessment Sequences in Narrative-Centered Learning Environments: A Collaborative Filtering Approach. In Lecture Notes in Computer Science (pp. 369–378). https://doi.org/10.1007/978-3-642-39112-5_38 Sabourin, J., Mott, B., & Lester, J. (2013). Discovering Behavior Patterns of Self-Regulated Learners in an Inquiry-Based Learning Environment. In Lecture Notes in Computer Science (pp. 209–218). https://doi.org/10.1007/978-3-642-39112-5_22 Mitchell, C. M., Boyer, K. E., & Lester, J. C. (2013). A Markov Decision Process Model of Tutorial Intervention in Task-Oriented Dialogue. In Lecture Notes in Computer Science (pp. 828–831). https://doi.org/10.1007/978-3-642-39112-5_123 Grafsgaard, J. F., Wiggins, J. B., Boyer, K. E., Wiebe, E. N., & Lester, J. C. (2013). Embodied Affect in Tutorial Dialogue: Student Gesture and Posture. In Lecture Notes in Computer Science (pp. 1–10). https://doi.org/10.1007/978-3-642-39112-5_1 Sabourin, J., Mott, B., & Lester, J. (2013). Utilizing Dynamic Bayes Nets to Improve Early Prediction Models of Self-regulated Learning. In User Modeling, Adaptation, and Personalization (pp. 228–241). https://doi.org/10.1007/978-3-642-38844-6_19 Eugene, W., Barnes, T., & Wilson, J. (2013). Math Fluency through Game Design. In Design, User Experience, and Usability. Health, Learning, Playing, Cultural, and Cross-Cultural User Experience (pp. 189–198). https://doi.org/10.1007/978-3-642-39241-2_22 Goldin, I. M., Martin, T., Baker, R., Aleven, V., & Barnes, T. (2013). Formative Feedback in Interactive Learning Environments. In Lecture Notes in Computer Science (pp. 946–946). https://doi.org/10.1007/978-3-642-39112-5_158 Andrews, G. E., Savage, C. D., & Wilf, H. S. (2013). Hypergeometric Identities Associated with Statistics on Words. In Advances in Combinatorics (pp. 77–100). https://doi.org/10.1007/978-3-642-30979-3_4 Matsuda, N., Yarzebinski, E., Keiser, V., Raizada, R., Stylianides, G. J., & Koedinger, K. R. (2013). Studying the effect of a competitive game show in a learning by teaching environment. International Journal of Artificial Intelligence in Education, 23(1-4), 1–21. https://doi.org/10.1007/s40593-013-0009-1 MacLellan, C. J., Matsuda, N., & Koedinger, K. R. (2013). Toward a reflective SimStudent: Using experience to avoid generalization errors. CEUR Workshop Proceedings, 1009, 51–60. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84924980730&partnerID=MN8TOARS Rodrigo, M. M. T., Ong, A., Bringula, R., Basa, R. S., Dela Cruz, C., & Matsuda, N. (2013). Impact of prior knowledge and teaching strategies on learning by teaching. CEUR Workshop Proceedings, 1009, 71–80. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84924982067&partnerID=MN8TOARS Matsuda, N., Yarzebinski, E., Keiser, V., Raizada, R., Cohen, W. W., Stylianides, G. J., & Koedinger, K. R. (2013). Cognitive anatomy of tutor learning: Lessons learned with SimStudent. Journal of Educational Psychology, 105(4), 1152–1163. https://doi.org/10.1037/a0031955 Klymko, C., Sullivan, B. D., & Humble, T. S. (2013). Adiabatic quantum programming: minor embedding with hard faults. Quantum Information Processing, 13(3), 709–729. https://doi.org/10.1007/S11128-013-0683-9 Adcock, A. B., Sullivan, B. D., Hernandez, O. R., & Mahoney, M. W. (2013). Evaluating OpenMP Tasking at Scale for the Computation of Graph Hyperbolicity. In OpenMP in the Era of Low Power Devices and Accelerators: Vol. 8122 LNCS (pp. 71–83). https://doi.org/10.1007/978-3-642-40698-0_6 Sheehy, D. R. (2013). Linear-Size Approximations to the Vietoris–Rips Filtration. Discrete & Computational Geometry, 49(4), 778–796. https://doi.org/10.1007/s00454-013-9513-1 Oudot, S. Y., & Sheehy, D. R. (2013). Zigzag zoology. Proceedings of the 29th annual symposium on Symposuim on computational geometry - SoCG '13. Presented at the the 29th annual symposium. https://doi.org/10.1145/2462356.2462371 Miller, G. L., Sheehy, D. R., & Velingker, A. (2013). A fast algorithm for well-spaced points and approximate delaunay graphs. Proceedings of the 29th annual symposium on Symposuim on computational geometry - SoCG '13. Presented at the the 29th annual symposium. https://doi.org/10.1145/2462356.2462404 Miller, G. L., & Sheehy, D. R. (2013). A new approach to output-sensitive voronoi diagrams and delaunay triangulations. Proceedings of the 29th annual symposium on Symposuim on computational geometry - SoCG '13. Presented at the the 29th annual symposium. https://doi.org/10.1145/2462356.2462372 Zhou, M., Wu, B., Ding, Y., & Shen, X. (2013, February). Profmig: A framework for flexible migration of program profiles across software versions. Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO). https://doi.org/10.1109/cgo.2013.6494984 Wang, B., Wu, B., Li, D., Shen, X., Yu, W., Jiao, Y., & Vetter, J. (2013). Exploring Hybrid Memory for GPU Energy Efficiency through Software-Hardware Co-Design. Proceedings of the 22nd International Conference on Parallel Architectures and Compilation Techniques. Presented at the PACT, Edinburgh, Scotland. https://doi.org/10.1109/pact.2013.6618807 Hang, C.-W., Murukannaiah, P. K., & Singh, M. P. (2013). Platys: User-centric place recognition. AAAI Workshop - Technical Report, WS-13-05, 14–20. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84898908253&partnerID=MN8TOARS Kalia, A. K., Motahari-Nezhad, H. R., Bartolini, C., & Singh, M. P. (2013). Monitoring commitments in people-driven service engagements. Proceedings - IEEE 10th International Conference on Services Computing, SCC 2013, 160–167. https://doi.org/10.1109/SCC.2013.62 Hazard, C. J., & Singh, M. P. (2013). Macau: A basis for evaluating reputation systems. IJCAI International Joint Conference on Artificial Intelligence, 191–197. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84896061643&partnerID=MN8TOARS Yu, P. S., Singh, M. P., Cao, L., Zeng, Y., Symeonidis, A. L., & Gorodetsky, V. (2013). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84873816963&partnerID=MN8TOARS Telang, P. R., Meneguzzi, F., & Singh, M. P. (2013). Hierarchical planning about goals and commitments. 12th International Conference on Autonomous Agents and Multiagent Systems 2013, AAMAS 2013, 2, 877–884. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899450331&partnerID=MN8TOARS Gerard, S. N., & Singh, M. P. (2013). Evolving protocols and agents in multiagent systems. 12th International Conference on Autonomous Agents and Multiagent Systems 2013, AAMAS 2013, 2, 997–1004. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899458246&partnerID=MN8TOARS Kalia, A., Nezhad, H. R. M., Bartolini, C., & Singh, M. (2013). Identifying business tasks and commitments from email and chat conversations. HP Laboratories Technical Report, (4). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84874818269&partnerID=MN8TOARS Singh, M. P. (2013). Can't we all just get along? Agreement technologies and the science of security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 1–3). https://doi.org/10.1007/978-3-642-39860-5_1 Kang, D. S., Liu, H., Singh, M. P., & Sun, T. (2013). Adaptive process execution in a service cloud: Service selection and scheduling based on machine learning. Proceedings - IEEE 20th International Conference on Web Services, ICWS 2013, 324–331. https://doi.org/10.1109/ICWS.2013.51 Parsons, S., Sklar, E., Singh, M., Levitt, K., & Rowe, J. (2013). An argumentation-based approach to handling trust in distributed decision making. AAAI Spring Symposium - Technical Report, SS-13-07, 66–71. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883375594&partnerID=MN8TOARS Meneguzzi, F., Telang, P. R., & Singh, M. P. (2013). A first-order formalization of commitments and goals for planning. Proceedings of the 27th AAAI Conference on Artificial Intelligence, AAAI 2013, 697–703. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84893411920&partnerID=MN8TOARS Doyle, J. (2013). Mechanics and mental change. In Evolution of Semantic Systems (pp. 127–150). https://doi.org/10.1007/978-3-642-34997-3 Eberle, W., Karro, J., Lerner, N., & Stallmann, M. (2013). Integrating communication skills in data structures and algorithms courses. 2013 IEEE Frontiers in Education Conference (FIE), 1503–1509. Balik, S. P., Mealin, S. P., Stallmann, M. F., & Rodman, R. D. (2013). GSK: universally accessible graph sketching. Proceeding of the 44th ACM technical symposium on Computer science education, 221–226. Doyle, J. (2013). Mechanics and Mental Change. Evolution of Semantic Systems, pp. 127–150. https://doi.org/10.1007/978-3-642-34997-3_7 Ghaisas, S., & Ajmeri, N. (2013). Knowledge-Assisted Ontology-Based Requirements Evolution. Managing Requirements Knowledge, pp. 143–167. https://doi.org/10.1007/978-3-642-34419-0_7 Daneva, M., Veen, E., Amrit, C., Ghaisas, S., Sikkel, K., Kumar, R., … Wieringa, R. (2013). Agile requirements prioritization in large-scale outsourced system projects: An empirical study. Journal of Systems and Software, 86(5), 1333–1353. https://doi.org/10.1016/j.jss.2012.12.046 Kaltofen, E. L., & Yang, Z. (2013). Sparse multivariate function recovery from values with noise and outlier errors. Proceedings of the 38th international symposium on International symposium on symbolic and algebraic computation - ISSAC '13. Presented at the the 38th international symposium. https://doi.org/10.1145/2465506.2465524 Behroozi, M., & Boostani, R. (2013). Presenting a new cascade structure for multiclass problems. 2013 International Conference on Electronics, Computer and Computation, ICECCO 2013, 192–195. https://doi.org/10.1109/ICECCO.2013.6718261 Gehringer, E. F., & Peddycord III, B. W. (2013). Teaching strategies when students have access to solution manuals. Proceedings of the ASEE 2013 Annual Conference and Exposition. Presented at the ASEE 2013 Annual Conference and Exposition, Atlanta, GA. Ramachandran, L., Ravindran, B., & Gehringer, E. F. (2013). Determining review coverage by extracting topic sentences using a graph-based clustering approach. Proceedings of EDM 2013: Sixth International Conference on Educational Data Mining. Presented at the EDM 2013: Sixth International Conference on Educational Data Mining, Memphis, TN. Ramanchandran, L., & Gehringer, E. F. (2013). Graph-structures matching for review relevance identification. Proceedings of TextGraphs-8: 2013 Workshop. Presented at the TextGraphs-8: 2013 Workshop, Seattle, WA. Gehringer, E., & Peddycord III, B. (2013). Experience with Online and Open-Web Exams. Journal of Instructional Research, 2, 10–18. https://doi.org/10.9743/jir.2013.2.12 Gehringer, E. F., & Peddycord, B. W., III. (2013). The inverted-lecture model. Proceeding of the 44th ACM technical symposium on Computer science education - SIGCSE '13. Presented at the Proceeding of the 44th ACM technical symposium. https://doi.org/10.1145/2445196.2445343 Vouk, M. A., Averitt, S. F., Dreher, P., Kekas, D. H., Kurth, A., Hoit, M. A., … Wright, D. (2013). Constructing next generation academic cloud services. International Journal of Cloud Computing, 2(2/3), 104–122. https://doi.org/10.1504/ijcc.2013.055290 Pathak, P. H., & Dutta, R. (2013). Designing for network and service continuity in wireless mesh networks. https://doi.org/10.1007/978-1-4614-4627-9 St. Amant, R. (2013). Computing for ordinary mortals. New York, NY: Oxford University Press. Jiang, X., & Zhou, Y. (2013). Android malware. https://doi.org/10.1007/978-1-4614-7394-7 Schendel, E. R., Harenberg, S., Tang, H. J., Vishwanath, V., Papka, M. E., & Samatova, N. F. (2013). A generic high-performance method for deinterleaving scientific data. Euro-par 2013 parallel processing, 8097, 571–582. https://doi.org/10.1007/978-3-642-40047-6_58 Thakur, S., Tateosian, L., Mitasova, H., Hardin, E., & Overton, M. (2013). SUMMARY VISUALIZATIONS FOR COASTAL SPATIAL-TEMPORAL DYNAMICS. INTERNATIONAL JOURNAL FOR UNCERTAINTY QUANTIFICATION, 3(3), 241–253. https://doi.org/10.1615/int.j.uncertaintyquantification.2012003969 Lester, J. C., Ha, E. Y., Lee, S. Y., Mott, B. W., Rowe, J. P., & Sabourin, J. L. (2013). Serious Games Get Smart: Intelligent Game-Based Learning Environments. AI MAGAZINE, 34(4), 31–45. https://doi.org/10.1609/aimag.v34i4.2488 Johnson, B., Song, Y., Murphy-Hill, E., & Bowdidge, R. (2013). Why don't software developers use static analysis tools to find bugs? Proceedings of the 35th International Conference on software engineering (ICSE 2013), 672–681. https://doi.org/10.1109/icse.2013.6606613 Xie, T. (2013). The synergy of human and artificial intelligence in software engineering. International workshop on realizing artificial intelligence synergies in, 4–6. https://doi.org/10.1109/raise.2013.6615197 Murphy-Hill, E., Zimmermann, T., Bird, C., & Nagappan, N. (2013). The design of bug fixes. Proceedings of the 35th International Conference on software engineering (ICSE 2013), 332–341. https://doi.org/10.1109/icse.2013.6606579 Hussain, S. R., Odeh, A., Shivakumar, A., Chauhan, S., & Harfoush, K. (2013). Real-time traffic congestion management and deadlock avoidance for vehicular ad hoc networks. 2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 223–227. https://doi.org/10.1109/honet.2013.6729791 Chaudhry, M., Malibiradar, P., Mathur, V., Chugh, R., & Harfoush, K. (2013). Performance analysis of iSCSI with data center bridging suite of protocols. 2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 179–183. https://doi.org/10.1109/honet.2013.6729782 Johnson, B. (2013). Novice understanding of program analysis tool notifications. Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1432–1434. King, J. (2013). Measuring the Forensic-ability of Audit Logs for Nonrepudiation. Proceedings of the 2013 International Conference on Software Engineering, 1419–1422. Retrieved from http://dl.acm.org/citation.cfm?id=2486788.2487022 Slankas, J. (2013). Implementing database access control policy from unconstrained natural language text. Proceedings of the 35th International Conference on software engineering (ICSE 2013), 1357–1360. https://doi.org/10.1109/icse.2013.6606716 Xie, T., Tillmann, N., & Halleux, J. (2013). Educational software engineering: Where software engineering, education, and gaming meet. 2013 3rd International Workshop on Games and Software Engineering: Engineering Computer Games to Enable Positive, Progressive Change (GAS), 36–39. https://doi.org/10.1109/gas.2013.6632588 Grafsgaard, J. F., Wiggins, J. B., Boyer, K. E., Wiebe, E. N., & Lester, J. C. (2013). Automatically Recognizing Facial Indicators of Frustration: A Learning-Centric Analysis. 2013 HUMAINE ASSOCIATION CONFERENCE ON AFFECTIVE COMPUTING AND INTELLIGENT INTERACTION (ACII), pp. 159–165. https://doi.org/10.1109/acii.2013.33 Li, S. H., Zhou, H. C., Lin, H. X., Xiao, T., Lin, H. B., Lin, W., & Xie, T. (2013). A characteristic study on failures of production distributed data-parallel programs. Proceedings of the 35th International Conference on software engineering (ICSE 2013), 963–972. https://doi.org/10.1109/icse.2013.6606646 Ji, F., Lin, H. S., & Ma, X. S. (2013). RSVM: A region-based software virtual memory for GPU. International conference on parallel architectures and compilation, 269–278. Morrison, P., Holmgreen, C., Massey, A., & Williams, L. (2013). Proposing regulatory-driven automated test suites for electronic health record systems. 2013 5th international workshop on software engineering in health care (sehc), 46–49. https://doi.org/10.1109/sehc.2013.6602477 Brugarolas, R., Roberts, D., Sherman, B., & Bozkurt, A. (2013). Machine learning based posture estimation for a wireless canine machine interface. Ieee topical conference on biomedical wireless technologies networks and, 10–12. https://doi.org/10.1109/biowireless.2013.6613658 Nguyen, H., Shen, Z., Tan, Y., & Gu, X. (2013). FChain: Toward Black-box Online Fault Localization for Cloud Systems. 2013 IEEE 33RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 21–30. https://doi.org/10.1109/icdcs.2013.26 He, X. F., Dai, H. Y., & Ning, P. (2013). Dynamic adaptive anti-jamming via controlled mobility. 2013 IEEE Conference on Communications and Network Security (CNS), 1–9. https://doi.org/10.1109/cns.2013.6682686 Gonzalez, D. L., II, Pendse, S. V., Padmanabhan, K., Angus, M. P., Tetteh, I. K., Srinivas, S., … Samatova, N. F. (2013). Coupled Heterogeneous Association Rule Mining (CHARM): Application toward Inference of Modulatory Climate Relationships. 2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), pp. 1055–1060. https://doi.org/10.1109/icdm.2013.142 Dutta, R., Rouskas, G., & Baldiney, I. (2013). Converging choice and service in future commodity optical networks using traffic grooming. 2013 15th international conference on transparent optical networks (icton 2013). https://doi.org/10.1109/icton.2013.6602954 Slankas, J., & Williams, L. (2013). Automated extraction of non-functional requirements in available documentation. 2013 1st International Workshop on Natural Language Analysis in Software Engineering (NaturaLiSE), 9–16. https://doi.org/10.1109/naturalise.2013.6611715 Morrison, P., Holmgreen, C., Massey, A., & Williams, L. (2013). Proposing Regulatory-Driven Automated Test Suites. 2013 AGILE CONFERENCE (AGILE), pp. 11–21. https://doi.org/10.1109/agile.2013.8 Witschey, J., Murphy-Hill, E., & Xiao, S. D. (2013). Conducting interview studies: Challenges, lessons learned, and open questions. 2013 1st International Workshop on Conducting Empirical Studies in Industry (CESI), 51–54. https://doi.org/10.1109/cesi.2013.6618471 Yoon, S., Li, L. E., Liew, S. C., Choudhury, R. R., Rhee, I., & Tan, K. (2013). QuickSense: Fast and energy-efficient channel sensing for dynamic spectrum access networks. 2013 proceedings ieee infocom, 2247–2255. https://doi.org/10.1109/infcom.2013.6567028 Xiao, X. S., Li, S. H., Xie, T., & Tillmann, N. (2013). Characteristic studies of loop problems for structural test generation via symbolic execution. 2013 28th ieee/acm international conference on automated software engineering (ase), 246–256. Slankas, J., & Williams, L. (2013). Access Control Policy Extraction from Unconstrained Natural Language Text. 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), pp. 435–440. https://doi.org/10.1109/socialcom.2013.68 Subramani, S., Vouk, M., & Williams, L. (2013). Non-operational testing of software for security issues. 2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 21–22. https://doi.org/10.1109/issrew.2013.6688857 Heinrich, S. B. (2013). Efficient and robust model fitting with unknown noise scale. Image and Vision Computing, 31(10), 735–747. Ramachandran, L., & Gehringer, E. F. (2013). An Ordered Relatedness Metric for Relevance Identification. 2013 IEEE SEVENTH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC 2013), pp. 86–89. https://doi.org/10.1109/icsc.2013.23 Wilkerson, A. C., Moore, T. J., Swami, A., & Krim, H. (2013). Simplifying the homology of networks via strong collapses. International conference on acoustics speech and signal processing, 5258–5262. https://doi.org/10.1109/icassp.2013.6638666 Fu, H. Z., Kim, H., & Anyanwu, K. (2013). Scaling concurrency of personalized semantic search over large RDF data. 2013 IEEE International Conference on Big Data. https://doi.org/10.1109/bigdata.2013.6691622 Kim, H., & Anyanwu, K. (2013). Optimizing queries over semantically integrated datasets on mapreduce platforms. 2013 IEEE International Conference on Big Data. https://doi.org/10.1109/bigdata.2013.6691788 Kaltofen, E., & Yuhasz, G. (2013). On the Matrix Berlekamp-Massey Algorithm. ACM TRANSACTIONS ON ALGORITHMS, 9(4). https://doi.org/10.1145/2500122 Lee, K., Kim, Y., Chong, S., Rhee, I., Yi, Y., & Shroff, N. B. (2013). On the Critical Delays of Mobile Networks Under Levy Walks and Levy Flights. IEEE-ACM TRANSACTIONS ON NETWORKING, 21(5), 1621–1635. https://doi.org/10.1109/tnet.2012.2229717 Gehringer, E., & Peddycord, B. (2013). Grading by experience points: An example from computer ethics. 2013 IEEE Frontiers in Education Conference (FIE). Presented at the 2013 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/fie.2013.6685097 Biswas, T., Chakraborti, A., Ravindran, R., Zhang, X. W., & Wang, G. Q. (2013). Contextualized information-centric home network. Computer Communication Review, 43(4), 461–462. Wang, Y. G., Rozhnova, N., Narayanan, A., Oran, D., & Rhee, I. (2013). An improved hop-by-hop interest shaper for congestion control in named data networking. Computer Communication Review, 43(4). https://doi.org/10.1145/2491224.2491233 Barik, T., Everett, M., Cardona-Rivera, R. E., Roberts, D. L., & Gehringer, E. F. (2013). A community college blended learning classroom experience through Artificial Intelligence in Games. 2013 IEEE Frontiers in Education Conference (FIE). Presented at the 2013 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/fie.2013.6685093 Lobene, E. V., & Meade, A. W. (2013). The Effects of Career Calling and Perceived Overqualification on Work Outcomes for Primary and Secondary School Teachers. JOURNAL OF CAREER DEVELOPMENT, 40(6), 508–530. https://doi.org/10.1177/0894845313495512 Sarkar, A., & Chakravartty, J. K. (2013). Prediction of flow stress in cadmium using constitutive equation and artificial neural network approach. Journal of Materials Engineering and Performance, 22(10), 2982–2989. Gong, Z., Boyuka, D. A., II, Zou, X., Liu, Q., Podhorszki, N., Klasky, S., … Samatova, N. F. (2013). PARLO: PArallel Run-time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Patterns. PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), pp. 343–351. https://doi.org/10.1109/ccgrid.2013.58 Singh, M. P. (2013). Norms as a Basis for Governing Sociotechnical Systems. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 5(1). https://doi.org/10.1145/2542182.2542203 Park, Y., Reeves, D. S., & Stamp, M. (2013). Deriving common malware behavior through graph clustering. COMPUTERS & SECURITY, 39, 419–430. https://doi.org/10.1016/j.cose.2013.09.006 Singh, M., & Singh, M. P. (2013). Augmented Reality Interfaces. IEEE INTERNET COMPUTING, 17(6), 66–70. https://doi.org/10.1109/mic.2013.107 Shen, W., Ning, P., He, X., & Dai, H. (2013). Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188. https://doi.org/10.1109/sp.2013.22 Anyanwu, K. (2013). A vision for SPARQL multi-query optimization on MapReduce. 2013 ieee 29th international conference on data engineering workshops (icdew), 25–26. https://doi.org/10.1109/icdew.2013.6547420 Tanwir, S., & Perros, H. (2013). A Survey of VBR Video Traffic Models. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 15(4), 1778–1802. https://doi.org/10.1109/surv.2013.010413.00071 Singh, M. P. (2013). Vision for TOIT. ACM Transactions on Internet Technology, 12(4). https://doi.org/10.1145/2499926.2499929 Watson, B., Berube, D., Hristov, N., Strohecker, C., Betz, S., Allen, L., … Kirstner, M. (2013). VIA - visualizing individual actions to develop a sustainable community culture through cycling. Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, 8028, 316–325. Singh, M. P. (2013). TOIT administrative updates. ACM Transactions on Internet Technology, 12(4). https://doi.org/10.1145/2499926.2499930 Chen, Z., Hendrix, W., Guan, H., Tetteh, I. K., Choudhary, A., Semazzi, F., & Samatova, N. F. (2013). Discovery of extreme events-related communities in contrasting groups of physical system networks. DATA MINING AND KNOWLEDGE DISCOVERY, 27(2), 225–258. https://doi.org/10.1007/s10618-012-0289-3 Austin, A., Holmgreen, C., & Williams, L. (2013). A comparison of the efficiency and effectiveness of vulnerability discovery techniques. INFORMATION AND SOFTWARE TECHNOLOGY, 55(7), 1279–1288. https://doi.org/10.1016/j.infsof.2012.11.007 Emrani, S., & Krim, H. (2013). Wheeze detection and location using spectro-temporal analysis of lung sounds. 29TH SOUTHERN BIOMEDICAL ENGINEERING CONFERENCE (SBEC 2013), pp. 37–38. https://doi.org/10.1109/sbec.2013.27 Hussain, S. A., & McAllister, D. F. (2013). Stereo rendering of rain in real-time. STEREOSCOPIC DISPLAYS AND APPLICATIONS XXIV, Vol. 8648. https://doi.org/10.1117/12.2001308 Kunkel, K. E., Karl, T. R., Easterling, D. R., Redmond, K., Young, J., Yin, X., & Hennon, P. (2013). Probable maximum precipitation and climate change. GEOPHYSICAL RESEARCH LETTERS, 40(7). https://doi.org/10.1002/grl.50334 Formyduval, W. L., & Thuente, D. J. (2013). Priority inversion and queue management for 802.11 priority WLANs. 2013 IEEE Consumer Communications and Networking Conference (CCNC), 565–573. https://doi.org/10.1109/ccnc.2013.6488500 Cao, C., Rouskas, G. N., Wang, J., & Tang, X. (2013). Hybrid FRR/p-cycle design for link and node protection in MPLS networks. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 67(6), 470–478. https://doi.org/10.1016/j.aeue.2012.11.005 Domec, J.-C., Rivera, L. N., King, J. S., Peszlen, I., Hain, F., Smith, B., & Frampton, J. (2013). Hemlock woolly adelgid (Adelges tsugae) infestation affects water and carbon relations of eastern hemlock (Tsuga canadensis) and Carolina hemlock (Tsuga caroliniana). NEW PHYTOLOGIST, 199(2), 452–463. https://doi.org/10.1111/nph.12263 Mueller, F. (2013, July). Best papers, IPDPS 2011. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 73, pp. 939–939. https://doi.org/10.1016/j.jpdc.2013.05.001 Kaltofen, E., & Yuhasz, G. (2013). A fraction free Matrix Berlekamp/Massey algorithm. LINEAR ALGEBRA AND ITS APPLICATIONS, 439(9), 2515–2526. https://doi.org/10.1016/j.laa.2013.06.016 Tang, Y. L., Song, X. Y., Wang, H. J., & Zhu, Z. Y. (2013). Variable selection in high-dimensional quantile varying coefficient models. Journal of Multivariate Analysis, 122, 115–132. Ma, X. Z., & Harfoush, K. (2013). On the efficacy of WDM virtual topology design strategies. 2013 international conference on computing, networking and communications (icnc). https://doi.org/10.1109/iccnc.2013.6504115 Beck, M., Bliem, T., Braun, B., & Savage, C. D. (2013). Lattice point generating functions and symmetric cones. JOURNAL OF ALGEBRAIC COMBINATORICS, 38(3), 543–566. https://doi.org/10.1007/s10801-012-0414-9 Chopra, P., Kang, J., & Hong, S. M. (2013). Comparative meta-analysis between human and mouse cancer microarray data reveals critical pathways. International Journal of Data Mining and Bioinformatics, 8(3), 349–365. Parnin, C., Bird, C., & Murphy-Hill, E. (2013). Adoption and use of Java generics. EMPIRICAL SOFTWARE ENGINEERING, 18(6), 1047–1089. https://doi.org/10.1007/s10664-012-9236-6 Wang, H., & Rouskas, G. N. (2013). Traffic grooming in optical networks: Decomposition and partial linear programming (LP) relaxation. Journal of Optical Communications and Networking, 5(8), 825–835. https://doi.org/10.1364/jocn.5.000825 Chopra, A. K., Artikis, A., Bentahar, J., Colombetti, M., Dignum, F., Fornara, N., … Yolum, P. (2013). Research directions in agent communication. ACM Transactions on Intelligent Systems and Technology, 4(2), 1–23. https://doi.org/10.1145/2438653.2438655 Dong, Q., Liu, D. G., & Ning, P. (2013). Providing DoS resistance for signature-based broadcast authentication in sensor networks. ACM Transactions on Embedded Computing Systems, 12(3). https://doi.org/10.1145/2442116.2442123 Falcone, R., & Singh, M. P. (2013, March). Introduction to Special Section on Trust in Multiagent Systems. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, Vol. 4. https://doi.org/10.1145/2438653.2438658 Howard, B. E., Hu, Q., Babaoglu, A. C., Chandra, M., Borghi, M., Tan, X., … Heber, S. (2013). High-Throughput RNA Sequencing of Pseudomonas-Infected Arabidopsis Reveals Hidden Transcriptome Complexity and Novel Splice Variants. PLOS ONE, 8(10). https://doi.org/10.1371/journal.pone.0074183 He, X., Dai, H., & Ning, P. (2013). HMM-Based Malicious User Detection for Robust Collaborative Spectrum Sensing. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31(11), 2196–2208. https://doi.org/10.1109/jsac.2013.131119 Gerard, S. N., & Singh, M. P. (2013). Formalizing and Verifying Protocol Refinements. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 4(2). https://doi.org/10.1145/2438653.2438656 Murphy-Hill, E., Barik, T., & Black, A. P. (2013, April). Interactive ambient visualizations for soft advice. INFORMATION VISUALIZATION, Vol. 12, pp. 107–132. https://doi.org/10.1177/1473871612469020 Tian, W., & Samatova, N. F. (2013). Global Alignment of Pairwise Protein Interaction Networks for Maximal Common Conserved Patterns. INTERNATIONAL JOURNAL OF GENOMICS, 2013. https://doi.org/10.1155/2013/670623 Wang, X., Zhang, L., Xie, T., Mei, H., & Sun, J. (2013). Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 39(4), 516–536. https://doi.org/10.1109/tse.2012.40 Soares, G., Gheyi, R., Murphy-Hill, E., & Johnson, B. (2013). Comparing approaches to analyze refactoring activity on software repositories. JOURNAL OF SYSTEMS AND SOFTWARE, 86(4), 1006–1022. https://doi.org/10.1016/j.jss.2012.10.040 Tan, Y. M., Venkatesh, V., & Gu, X. H. (2013). resilient self-compressive monitoring for large-scale hosting infrastructures. IEEE Transactions on Parallel and Distributed Systems, 24(3), 576–586. https://doi.org/10.1109/tpds.2012.167 Arthur, J. G., Burton, S. D., & Ermentrout, G. B. (2013). Stimulus features, resetting curves, and the dependence on adaptation. JOURNAL OF COMPUTATIONAL NEUROSCIENCE, 34(3), 505–520. https://doi.org/10.1007/s10827-012-0433-5 Hang, C.-W., Zhang, Z., & Singh, M. P. (2013). Shin: Generalized Trust Propagation with Limited Evidence. COMPUTER, 46(3), 78–85. https://doi.org/10.1109/MC.2012.116 Wang, A., Iyer, M., Dutta, R., Rouskas, G. N., & Baldine, I. (2013). Network Virtualization: Technologies, Perspectives, and Frontiers. JOURNAL OF LIGHTWAVE TECHNOLOGY, 31(4), 523–537. https://doi.org/10.1109/jlt.2012.2213796 Wang, H., Sankarasubramanian, A., & Ranjithan, R. S. (2013). Integration of Climate and Weather Information for Improving 15-Day-Ahead Accumulated Precipitation Forecasts. JOURNAL OF HYDROMETEOROLOGY, 14(1), 186–202. https://doi.org/10.1175/jhm-d-11-0128.1 Lakshminarasimhan, S., Shah, N., Ethier, S., Ku, S.-H., Chang, C. S., Klasky, S., … Samatova, N. F. (2013). ISABELA for effective in situ compression of scientific data. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 25(4), 524–540. https://doi.org/10.1002/cpe.2887 Zhang, Y. P., & Mueller, F. (2013). HiDP: A hierarchical data parallel language. Proceedings of the 2013 ieee/acm international symposium on code generation and optimization (cgo), 171–181. Zhou, W., Zhou, Y., Grace, M., Jiang, X., & Zou, S. (2013). Fast, scalable detection of "piggybacked" mobile applications. ACM Conference on Data and Application Security and Privacy, 185–195. https://doi.org/10.1145/2435349.2435377 Wang, H., & Harrison, K. W. (2013). Bayesian update method for contaminant source characterization in water distribution systems. Journal of Water Resources Planning and Management, 139(1), 13–22. Zhang, Y., & Mueller, F. (2013). Autogeneration and Autotuning of 3D Stencil Codes on Homogeneous and Heterogeneous GPU Clusters. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 24(3), 417–427. https://doi.org/10.1109/tpds.2012.160 Anyanwu, K., Kim, H. S., & Ravindra, P. (2013). Algebraic Optimization for Processing Graph Pattern Queries in the Cloud. IEEE INTERNET COMPUTING, 17(2), 52–61. https://doi.org/10.1109/mic.2012.22 Pensyl, T. W., & Savage, C. D. (2013). Rational lecture hall polytopes and inflated Eulerian polynomials. RAMANUJAN JOURNAL, 31(1-2), 97–114. https://doi.org/10.1007/s11139-012-9393-7 Yuan, M., Chen, L., Yu, P. S., & Yu, T. (2013). Protecting Sensitive Labels in Social Network Data Anonymization. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633–647. https://doi.org/10.1109/tkde.2011.259 Lee, K., Lee, J., Yi, Y., Rhee, I., & Chong, S. (2013). Mobile Data Offloading: How Much Can WiFi Deliver? IEEE-ACM TRANSACTIONS ON NETWORKING, 21(2), 536–550. https://doi.org/10.1109/tnet.2012.2218122 Wang, T., Krim, H., & Viniotis, Y. (2013). A Generalized Markov Graph Model: Application to Social Network Analysis. IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 7(2), 318–332. https://doi.org/10.1109/jstsp.2013.2246767 Shin, Y., & Williams, L. (2013). Can traditional fault prediction models be used for vulnerability prediction? EMPIRICAL SOFTWARE ENGINEERING, 18(1), 25–59. https://doi.org/10.1007/s10664-011-9190-8