Computer Science - 2011 Enck, W. (2011). Android’s Security Framework--Understanding the Security of Mobile Phone Platforms. In Encyclopedia of Cryptography and Security (pp. 34–37). Springer US. Enck, W. H. (2011). Analysis Techniques for Mobile Operating System Security. The Pennsylvania State University. Barrera, D., Enck, W., & Oorschot, P. C. (2011). Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems. Technical report, School of Computer Science, Carleton University, http …. Enck, W. (2011). ARP Spoofing. In Encyclopedia of Cryptography and Security (pp. 48–49). Springer US. Enck, W., Octeau, D., McDaniel, P., & Chaudhuri, S. (2011). A Study of Android Application Security. USENIX Security Symposium. Gaweda, A., & Patterson, E. (2011). Individual identification based on facial dynamics during expressions using active-appearance-based Hidden Markov Models. Presented at the Gesture Recognition (FG 2011). https://doi.org/10.1109/fg.2011.5771351 Heckman, S., & Williams, L. (2011). A systematic literature review of actionable alert identification techniques for automated static code analysis. Information and Software Technology, 53(4), 363–387. Rimsa, A., d’Amorim, M., & Pereira, F. M. Q. (2011). Tainted Flow Analysis on e-SSA-Form Programs. Compiler Construction - 20th International Conference, CC 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings, 124–143. https://doi.org/10.1007/978-3-642-19861-8_8 Bobaru, M. G., Havelund, K., Holzmann, G. J., & Joshi, R. (Eds.). (2011). NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011. Proceedings. https://doi.org/10.1007/978-3-642-20398-5 Fault-localization using dynamic slicing and change impact analysis. (2011). 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, KS, USA, November 6-10, 2011, 520–523. https://doi.org/10.1109/ASE.2011.6100114 Knoop, J. (Ed.). (2011). Compiler Construction - 20th International Conference, CC 2011, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2011, Saarbrücken, Germany, March 26-April 3, 2011. Proceedings. https://doi.org/10.1007/978-3-642-19861-8 Alexander, P., Pasareanu, C. S., & Hosking, J. G. (Eds.). (2011). 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), Lawrence, KS, USA, November 6-10, 2011. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6093623 Souza, M., Borges, M., d’Amorim, M., & Pasareanu, C. S. (2011). CORAL: Solving Complex Constraints for Symbolic PathFinder. NASA Formal Methods - Third International Symposium, NFM 2011, Pasadena, CA, USA, April 18-20, 2011. Proceedings, 359–374. https://doi.org/10.1007/978-3-642-20398-5_26 Dwekat, Z. A., Rouskas, G. N., & IEEE. (2011). Worst-Case Fair Bin Sort Queuing (WBSQ): An O(1) Worst-Case Fair Scheduler. 2011 Ieee International Conference on Communications (Icc). Lv, Q., Rouskas, G. N., & IEEE. (2011). On Optimal Tiered Structures for Network Service Bundles. 2011 Ieee Global Telecommunications Conference (Globecom 2011). Cao, C., Rouskas, G. N., & IEEE. (2011). Hybrid FRR/p-Cycle MPLS Link Protection Design. 2011 Ieee Global Telecommunications Conference (Globecom 2011). Wang, H., Rouskas, G. N., & IEEE. (2011). Flow Isolation in Optical Networks. 2011 18th Ieee Workshop on Local and Metropolitan Area Networks (Lanman). Wang, M. S., Wang, A., Bathula, B. G., Lai, C. P., Baldine, I., Chen, C., … America, O. S. (2011). Demonstration of QoS-Aware Video Streaming over a Metro-Scale Optical Network Using a Cross-Layer Architectural Design. 2011 Optical Fiber Communication Conference and Exposition (Ofc/Nfoec) and the National Fiber Optic Engineers Conference. Guo, Z., Liu, Q., & Wang, J. (2011). A One-Layer Recurrent Neural Network for Pseudoconvex Optimization Subject to Linear Equality Constraints. IEEE Transactions on Neural Networks, 22(12), 1892–1900. https://doi.org/10.1109/tnn.2011.2169682 Guo, Z., & Wang, J. (2011). Information retrieval from large data sets via multiple-winners-take-all. Presented at the 2011 IEEE International Symposium on Circuits and Systems (ISCAS). https://doi.org/10.1109/iscas.2011.5938154 Kuttal, S. K., Sarma, A., Swearngin, A., & Rothermel, G. (2011). Versioning for Mashups – An Exploratory Study. https://doi.org/10.1007/978-3-642-21530-8_4 Kuttal, S. K., Sarma, A., & Rothermel, G. (2011). History repeats itself more easily when you log it: Versioning for mashups. Presented at the 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC 2011). https://doi.org/10.1109/vlhcc.2011.6070381 Weber, B. G., Mateas, M., & Jhala, A. (2011). Building human-level AI for real-time strategy games. AAAI Fall Symposium - Technical Report, FS-11-01, 329–336. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84856478459&partnerID=MN8TOARS Weber, B. G., Mateas, M., & Jhala, A. (2011). A particle model for state estimation in real-time strategy games. Proceedings of the 7th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2011, 103–108. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84871961742&partnerID=MN8TOARS Weber, B. G., John, M., Mateas, M., & Jhala, A. (2011). Modeling player retention in Madden NFL 11. Proceedings of the National Conference on Artificial Intelligence, 2, 1701–1706. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-80055032087&partnerID=MN8TOARS Grenet, B., Kaltofen, E. L., Koiran, P., & Portier, N. (2011). Symmetric determinantal representation of weakly skew circuits. In C. Dürr & T. Schwentick (Eds.), Proceedings of the Symposium on Theoretical Aspects of Computer Science (STACS 2011) (pp. 543–554). Germany. Mostafavi, B., Barnes, T., & Croy, M. (2011). Automatic Generation of Proof Problems in Deductive Logic. Proceedings of the 4th International Conference on Educational Data Mining (EDM 2011), 289–294. Eindhoven, Netherlands. Johnson, M., Eagle, M., Joseph, L., & Barnes, T. (2011). The EDM Vis Tool. Electronic Data Mining, 349–350. Stamper, J., Barnes, T., & Croy, M. (2011). Enhancing the Automatic Generation of Hints with Expert Seeding. International Journal of Artificial Intelligence in Education, 21(1-2), 153–167. Yiltas, D., & Perros, H. (2011). Quality of service-based multi-domain routing under multiple quality of service metrics. IET Communications, 5(3), 327–336. https://doi.org/10.1049/iet-com.2010.0144 Battestilli, L., Nelms, T., Hunter, S. W., & Shippy, G. (2011). High-performing scale-out solution for deep packet processing via adaptive load-balancing. 2011 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN). Presented at the Metropolitan Area Networks (LANMAN). https://doi.org/10.1109/lanman.2011.6076946 Navuluri, K., Padia, K., Gupta, A., & Nadeem, T. (2011). Poster: What's on your mind?: a mind-based driving alert system. Proceedings of the 9th international conference on Mobile systems, applications, and services, 415–416. Gehringer, E. F., Navalakha, K., & Kadanjoth, R. (2011). A student-written wiki textbook supplement for a parallel-architecture course. Proceedings of the HPCA-17: Workshop on Computer Architecture Education. Presented at the Workshop on Computer Architecture Education, associated with HPCA-17, High-Performance Computer Architecture, San Antonio, TX. Finkelstein, S. L., Nickel, A., Lipps, Z., Barnes, T., Wartell, Z., & Suma, E. A. (2011). Astrojumper: Motivating Exercise with an Immersive Virtual Reality Exergame. Presence: Teleoperators and Virtual Environments, 20(1), 78–92. https://doi.org/10.1162/pres_a_00036 Bener, A., & Menzies, T. (2011). Guest editorial: learning to organize testing. Automated Software Engineering, 19(2), 137–140. https://doi.org/10.1007/S10515-011-0095-Y Kocaguneli, E., Menzies, T., & Keung, J. W. (2011). Kernel methods for software effort estimation. Empirical Software Engineering, 18(1), 1–24. https://doi.org/10.1007/S10664-011-9189-1 Marengo, E., Baldoni, M., Chopra, A. K., Baroglio, C., Patti, V., & Singh, M. P. (2011). Commitments with Regulations: Reasoning about Safety and Control in R EGULA. Proceedings of the 10th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 467–474. Taipei: IFAAMAS. Adalı, S., Wallace, W. A., Qi, Y., Vijayakumar, P., & Singh, M. P. (2011). A Unified Framework for Trust in Composite Networks. Proceedings of the 13th Autonomous Agents & Multi-Agent Systems Workshop on Trust in Agent Societies, 1–12. Taipei. Lester, J. C. (2011). Affect, Learning, and Delight. In S. D'Mello, A. Graesser, B. Schuller, & J. C. Martin (Eds.), Affective Computing and Intelligent Interaction. ACII 2011 (pp. 2–2). https://doi.org/10.1007/978-3-642-24600-5_2 Vatsavai, R. R., & Bhaduri, B. (2011). A hybrid classification scheme for mining multisource geospatial data. GeoInformatica, 15(1), 29–47. https://doi.org/10.1007/S10707-010-0113-4 Parnin, C., & Rugaber, S. (2011). Resumption strategies for interrupted programming tasks. Software Quality Journal, 19(1), 5–34. https://doi.org/10.1007/S11219-010-9104-9 Jiang, Y., Zhang, E. Z., Shen, X., Gao, Y., & Archambault, R. (2011). Array Regrouping on CMP with Non-uniform Cache Sharing. In Languages and Compilers for Parallel Computing (pp. 92–105). https://doi.org/10.1007/978-3-642-19595-2_7 Hoffman, F. M., Larson, J. W., Mills, R. T., Brooks, B.-G. J., Ganguly, A. R., Hargrove, W. W., … Vatsavai, R. R. (2011). Data Mining in Earth System Science (DMESS 2011). Procedia Computer Science, 4, 1450–1455. https://doi.org/10.1016/j.procs.2011.04.157 Vatsavai, R. R., Symons, C. T., Chandola, V., & Jun, G. (2011). GX-Means: A model-based divide and merge algorithm for geospatial image clustering. Procedia Computer Science, 4, 186–195. https://doi.org/10.1016/j.procs.2011.04.020 Chandola, V., & Vatsavai, R. R. (2011). A scalable gaussian process analysis algorithm for biomass monitoring. Statistical Analysis and Data Mining, 4(4), 430–445. https://doi.org/10.1002/sam.10129 Jiang, Y., Tian, K., Shen, X., Zhang, J., Chen, J., & Tripathi, R. (2011). The Complexity of Optimal Job Co-Scheduling on Chip Multiprocessors and Heuristics-Based Solutions. IEEE Transactions on Parallel and Distributed Systems, 22(7), 1192–1205. https://doi.org/10.1109/TPDS.2010.193 Zhang, E. Z., Jiang, Y., Guo, Z., Tian, K., & Shen, X. (2011). On-the-fly elimination of dynamic irregularities for GPU computing. Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '11. Presented at the the sixteenth international conference. https://doi.org/10.1145/1950365.1950408 Tian, K., Zhang, E., & Shen, X. (2011). A step towards transparent integration of input-consciousness into dynamic program optimizations. Proceedings of the 2011 ACM international conference on Object oriented programming systems languages and applications - OOPSLA '11. Presented at the the 2011 ACM international conference. https://doi.org/10.1145/2048066.2048103 Guo, Z., Zhang, E. Z., & Shen, X. (2011). Correctly Treating Synchronizations in Compiling Fine-Grained SPMD-Threaded Programs for CPU. 2011 International Conference on Parallel Architectures and Compilation Techniques. Presented at the 2011 International Conference on Parallel Architectures and Compilation Techniques (PACT). https://doi.org/10.1109/pact.2011.62 Wu, B., Zhang, E. Z., & Shen, X. (2011). Enhancing Data Locality for Dynamic Simulations through Asynchronous Data Transformations and Adaptive Control. 2011 International Conference on Parallel Architectures and Compilation Techniques. Presented at the 2011 International Conference on Parallel Architectures and Compilation Techniques (PACT). https://doi.org/10.1109/pact.2011.56 Jhala, A., & Young, R. M. (2011). Intelligent Machinima Generation for Visual Storytelling. In Artificial Intelligence for Computer Games (pp. 151–170). https://doi.org/10.1007/978-1-4419-8188-2_7 Kapravelos, A., Cova, M., Kruegel, C., & Vigna, G. (2011). Escape from Monkey Island: Evading High-Interaction Honeyclients. In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 124–143). https://doi.org/10.1007/978-3-642-22424-9_8 Nandeshwar, A., Menzies, T., & Nelson, A. (2011). Learning patterns of university student retention. Expert Systems with Applications, 38(12), 14984–14996. https://doi.org/10.1016/j.eswa.2011.05.048 Chi, M., VanLehn, K., Litman, D., & Jordan, P. (2011). Empirically evaluating the application of reinforcement learning to the induction of effective and adaptive pedagogical strategies. User Modeling and User-Adapted Interaction, 21(1-2), 137–180. https://doi.org/10.1007/S11257-010-9093-1 Roberts, D. L., & Roberts, F. (2011). A Method for Transferring Probabilistic User Models between Environments. In Interactive Storytelling (pp. 43–54). https://doi.org/10.1007/978-3-642-25289-1_6 Belnap, C. P., Pan, C., Denef, V. J., Samatova, N. F., Hettich, R. L., & Banfield, J. F. (2011). Quantitative proteomic analyses of the response of acidophilic microbial communities to different pH conditions. The ISME Journal, 5(7), 1152–1161. https://doi.org/10.1038/ismej.2010.200 Lakshminarasimhan, S., Shah, N., Ethier, S., Klasky, S., Latham, R., Ross, R., & Samatova, N. F. (2011). Compressing the Incompressible with ISABELA: In-situ Reduction of Spatio-temporal Data. In Euro-Par 2011 Parallel Processing (pp. 366–379). https://doi.org/10.1007/978-3-642-23400-2_34 Jenkins, J., Arkatkar, I., Owens, J. D., Choudhary, A., & Samatova, N. F. (2011). Lessons Learned from Exploring the Backtracking Paradigm on the GPU. In Euro-Par 2011 Parallel Processing (pp. 425–437). https://doi.org/10.1007/978-3-642-23397-5_42 Tran, M., Etheridge, M., Bletsch, T., Jiang, X., Freeh, V., & Ning, P. (2011). On the Expressiveness of Return-into-libc Attacks. In Lecture Notes in Computer Science (pp. 121–141). https://doi.org/10.1007/978-3-642-23644-0_7 Zhou, Y., Zhang, X., Jiang, X., & Freeh, V. W. (2011). Taming Information-Stealing Smartphone Applications (on Android). In Trust and Trustworthy Computing (pp. 93–107). https://doi.org/10.1007/978-3-642-21599-5_7 Maraffi, C. T., & Jhala, A. (2011). Performatology: A Procedural Acting Approach for Interactive Drama in Cinematic Games. In Interactive Storytelling: Vol. 7069 LNCS (pp. 322–325). https://doi.org/10.1007/978-3-642-25289-1_39 Lee, S. Y., Mott, B. W., & Lester, J. C. (2011). Director Agent Intervention Strategies for Interactive Narrative Environments. In Interactive Storytelling (pp. 140–151). https://doi.org/10.1007/978-3-642-25289-1_15 Sabourin, J., Mott, B., & Lester, J. C. (2011). Modeling Learner Affect with Theoretically Grounded Dynamic Bayesian Networks. In Affective Computing and Intelligent Interaction (pp. 286–295). https://doi.org/10.1007/978-3-642-24600-5_32 Grafsgaard, J. F., Boyer, K. E., & Lester, J. C. (2011). Predicting Facial Indicators of Confusion with Hidden Markov Models. In Affective Computing and Intelligent Interaction (pp. 97–106). https://doi.org/10.1007/978-3-642-24600-5_13 Sabourin, J., Mott, B., & Lester, J. C. (2011). Generalizing Models of Student Affect in Game-Based Learning Environments. In Affective Computing and Intelligent Interaction (pp. 588–597). https://doi.org/10.1007/978-3-642-24571-8_73 Sabourin, J., Rowe, J. P., Mott, B. W., & Lester, J. C. (2011). When Off-Task is On-Task: The Affective Role of Off-Task Behavior in Narrative-Centered Learning Environments. In Lecture Notes in Computer Science (pp. 534–536). https://doi.org/10.1007/978-3-642-21869-9_93 Shores, L. R., Rowe, J. P., & Lester, J. C. (2011). Early Prediction of Cognitive Tool Use in Narrative-Centered Learning Environments. In Lecture Notes in Computer Science (pp. 320–327). https://doi.org/10.1007/978-3-642-21869-9_42 Lee, S. Y., Mott, B. W., & Lester, J. C. (2011). Modeling Narrative-Centered Tutorial Decision Making in Guided Discovery Learning. In Lecture Notes in Computer Science (pp. 163–170). https://doi.org/10.1007/978-3-642-21869-9_23 Grafsgaard, J. F., Boyer, K. E., Phillips, R., & Lester, J. C. (2011). Modeling Confusion: Facial Expression, Task, and Discourse in Task-Oriented Tutorial Dialogue. In Lecture Notes in Computer Science (pp. 98–105). https://doi.org/10.1007/978-3-642-21869-9_15 So, J. K., & Reeves, D. S. (2011). Defending against Sybil Nodes in BitTorrent. In NETWORKING 2011 (pp. 25–39). https://doi.org/10.1007/978-3-642-20798-3_3 Bristianou, M., Panou, C., Chatzidakis, I., Tsiligrou, V., Theodosopoulos, I., Rouskas, G., … Lanaras, L. (2011). CAUSES OF FOURTH AGED PATIENTS HOSPITALIZATION IN AN INTERNAL MEDICINE HOSPITAL CLINIC. European Journal of Internal Medicine, 22, S108–S109. https://doi.org/10.1016/S0953-6205(11)60442-1 Bianco, A., Jukan, A., & Rouskas, G. (2011). Elsevier OSN is Sad to Announce the Loss of Fabio Neri, co-Editor-in-Chief of the Journal, Distinguished Professor and Researcher. Optical Switching and Networking, 8(4), 286–287. https://doi.org/10.1016/j.osn.2011.09.001 Savage, C. D., & Sills, A. V. (2011). On an identity of Gessel and Stanton and the new little Göllnitz identities. Advances in Applied Mathematics, 46(1-4), 563–575. https://doi.org/10.1016/j.aam.2009.12.009 Enck, W. (2011). Defending Users against Smartphone Apps: Techniques and Future Directions. In Information Systems Security (pp. 49–70). https://doi.org/10.1007/978-3-642-25560-1_3 Morris, T., Srivastava, A., Reaves, B., Gao, W., Pavurapu, K., & Reddi, R. (2011). A control system testbed to validate critical infrastructure protection concepts. International Journal of Critical Infrastructure Protection, 4(2), 88–103. https://doi.org/10.1016/j.ijcip.2011.06.005 Kim, H. S., Ravindra, P., & Anyanwu, K. (2011). From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra. Proc. VLDB Endow., 4(12), 1426–1429. Retrieved from http://www.vldb.org/pvldb/vol4/p1426-kim.pdf Chen, L., Gao, S., & Anyanwu, K. (2011). Efficiently Evaluating Skyline Queries on RDF Databases. In The Semanic Web: Research and Applications (pp. 123–138). https://doi.org/10.1007/978-3-642-21064-8_9 Fu, H., & Anyanwu, K. (2011). Effectively Interpreting Keyword Queries on RDF Databases with a Rear View. In The Semantic Web – ISWC 2011 (pp. 193–208). https://doi.org/10.1007/978-3-642-25073-6_13 Ravindra, P., Kim, H. S., & Anyanwu, K. (2011). An Intermediate Algebra for Optimizing RDF Graph Pattern Matching on MapReduce. In The Semanic Web: Research and Applications (pp. 46–61). https://doi.org/10.1007/978-3-642-21064-8_4 CoSi. (2011). Proceedings of the 20th international conference companion on World wide web - WWW '11. https://doi.org/10.1145/1963192.1963291 Matsuda, N., Keiser, V., Raizada, R., Stylianides, G., Cohen, W. W., & Koedinger, K. R. (2011). Learning by teaching simstudent - Interactive event. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (p. 623). https://doi.org/10.1007/978-3-642-21869-9_124 Matsuda, N., Yarzebinski, E., Keiser, V., Raizada, R., Stylianides, G. J., Cohen, W. W., & Koedinger, K. R. (2011). Learning by teaching simstudent - An initial classroom baseline study comparing with cognitive tutor. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 213–221). https://doi.org/10.1007/978-3-642-21869-9_29 Li, N., Matsuda, N., Cohen, W. W., & Koedinger, K. R. (2011). A machine learning approach for automatic student model discovery. EDM 2011 - Proceedings of the 4th International Conference on Educational Data Mining, 31–40. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84863408562&partnerID=MN8TOARS Groër, C., Sullivan, B. D., & Poole, S. (2011). A mathematical analysis of the R-MAT random graph generator. Networks, 58(3), 159–170. https://doi.org/10.1002/net.20417 McCrickard, D. S., Townsend, D. M., Winchester, W. W., & Barnes, T. (2011). Leveraging Card-Based Collaborative Activities as Culturally Situated Design Tools. In Communications in Computer and Information Science (pp. 232–236). https://doi.org/10.1007/978-3-642-22098-2_47 Stamper, J. C., Eagle, M., Barnes, T., & Croy, M. (2011). Experimental Evaluation of Automatic Hint Generation for a Logic Tutor. In Lecture Notes in Computer Science (pp. 345–352). https://doi.org/10.1007/978-3-642-21869-9_45 Payton, J., Powell, E., Nickel, A., Doran, K., & Barnes, T. (2011). GameChanger. Proceeding of the 1st international workshop on Games and software engineering - GAS '11. Presented at the Proceeding of the 1st international workshop. https://doi.org/10.1145/1984674.1984688 Boyce, A. K., Campbell, A., Pickford, S., Culler, D., & Barnes, T. (2011). Experimental evaluation of BeadLoom game. Proceedings of the 16th annual joint conference on Innovation and technology in computer science education - ITiCSE '11. Presented at the the 16th annual joint conference. https://doi.org/10.1145/1999747.1999816 Boyce, A., Doran, K., Campbell, A., Pickford, S., Culler, D., & Barnes, T. (2011). BeadLoom Game. Proceedings of the 6th International Conference on Foundations of Digital Games - FDG '11. Presented at the the 6th International Conference. https://doi.org/10.1145/2159365.2159384 Powell, E., Stukes, F., Barnes, T., & Lipford, H. R. (2011). Snag'em: Creating Community Connections through Games. 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing. Presented at the 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). https://doi.org/10.1109/passat/socialcom.2011.229 Boyce, A., Doran, K., Campbell, A., Pickford, S., Culler, D., & Barnes, T. (2011). Social user generated content's effect on creativity in educational games. Proceedings of the 8th ACM conference on Creativity and cognition - C&C '11. Presented at the the 8th ACM conference. https://doi.org/10.1145/2069618.2069675 Dahlberg, T., Barnes, T., Buch, K., & Rorrer, A. (2011). The STARS Alliance. ACM Transactions on Computing Education, 11(3), 1–25. https://doi.org/10.1145/2037276.2037282 Babu, S. V., Suma, E., Hodges, L. F., & Barnes, T. (2011). Learning Cultural Conversational Protocols with Immersive Interactive Virtual Humans. International Journal of Virtual Reality, 10(4), 25–35. https://doi.org/10.20870/ijvr.2011.10.4.2826 Miller, G. L., Phillips, T., & Sheehy, D. R. (2011). Beating the spread. Proceedings of the 27th annual ACM symposium on Computational geometry - SoCG '11. Presented at the the 27th annual ACM symposium. https://doi.org/10.1145/1998196.1998252 Singh, M. P. (2011). Trust as Dependence: A Logical Approach. AAMAS '11: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems, 2, 863–870. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899408581&partnerID=MN8TOARS Chopra, A. K., & Singh, M. P. (2011). Specifying and Applying Commitment-Based Business Patterns. AAMAS '11: Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems, 1, 475–482. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899421820&partnerID=MN8TOARS Singh, M. P. (2011). Information-driven interaction-oriented programming: BSPL, the blindingly simple protocol language. 10th International Conference on Autonomous Agents and Multiagent Systems 2011, AAMAS 2011, 1, 457–464. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899440400&partnerID=MN8TOARS Sollenberger, D. J., & Singh, M. P. (2011). Kokomo: An empirically evaluated methodology for affective applications. Proceedings of the 10th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 1, 293–300. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899438815&partnerID=MN8TOARS El Fallah-Seghrouchni, A., Gomez-Sanz, J. J., & Singh, M. P. (2011). Formal methods in agent-oriented software engineering. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 213–228). https://doi.org/10.1007/978-3-642-19208-1_15 Marengo, E., Baldoni, M., Baroglio, C., Chopra, A. K., Patti, V., & Singh, M. P. (2011). Commitments with regulations: Reasoning about safety and control in REGULA. 10th International Conference on Autonomous Agents and Multiagent Systems 2011, AAMAS 2011, 1, 433–440. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84899444781&partnerID=MN8TOARS Sollenberger, D. J., & Singh, M. P. (2011). Methodology for engineering affective social applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 97–109). https://doi.org/10.1007/978-3-642-19208-1_7 Singh, M. P. (2011). LoST: Local State Transfer: An architectural style for the distributed enactment of business protocols. Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011, 57–64. https://doi.org/10.1109/ICWS.2011.48 Chopra, A. K., Oren, N., Modgil, S., Desai, N., Miles, S., Luck, M., & Singh, M. P. (2011). Analyzing contract robustness through a model of commitments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 17–36). https://doi.org/10.1007/978-3-642-22636-6_2 Chopra, A. K., & Singh, M. P. (2011). Colaba: Collaborative design of cross-organizational processes. 2011 Workshop on Requirements Engineering for Systems, Services and Systems-of-Systems, RESS 2011 - Workshop Co-located with the 19th IEEE International Requirements Engineering Conference, 36–43. https://doi.org/10.1109/RESS.2011.6043928 Ajmeri, N., Vidhani, K., Bhat, M., & Ghaisas, S. (2011). An Ontology-based method and tool for cross-domain requirements visualization. In W. Maalej & A. K. Thurimella (Eds.), 2011 4th International Workshop on Managing Requirements Knowledge, MaRK'11 - Part of the 19th IEEE International Requirements Engineering Conference, RE'11 (pp. 22–23). https://doi.org/10.1109/MARK.2011.6046558 Rose, P., Bhat, M., Vidhani, K., Ajmeri, N., Gole, A., & Ghaisas, S. (2011). Intelligent informatics platform for nano-agriculture. Proceedings of the IEEE Conference on Nanotechnology, 916–919. https://doi.org/10.1109/NANO.2011.6144536 Kaltofen, E. L., Nehring, M., & Saunders, B. D. (2011). Quadratic-time certificates in linear algebra. Proceedings of the 36th international symposium on Symbolic and algebraic computation - ISSAC '11. Presented at the the 36th international symposium. https://doi.org/10.1145/1993886.1993915 Kaltofen, E. L., & Nehring, M. (2011). Supersparse black box rational function interpolation. Proceedings of the 36th international symposium on Symbolic and algebraic computation - ISSAC '11. Presented at the the 36th international symposium. https://doi.org/10.1145/1993886.1993916 Kaltofen, E. L., Lee, W.-shin, & Yang, Z. (2011). Fast estimates of Hankel matrix condition numbers and numeric sparse interpolation. Proceedings of the 2011 International Workshop on Symbolic-Numeric Computation - SNC '11. Presented at the the 2011 International Workshop. https://doi.org/10.1145/2331684.2331704 Grenet, B., Kaltofen, E., Koiran, P., & Portier, N. (2011). Symmetric determinantal representation of formulas and weakly skew circuits. https://doi.org/10.1090/conm/556/11008 Kaltofen, E. L. (2011). The “Seven Dwarfs” of Symbolic Computation. In Texts & Monographs in Symbolic Computation (pp. 95–104). https://doi.org/10.1007/978-3-7091-0794-2_5 Siewiorek, D. P., & Gehringer, E. F. (2011). Cm*: The first non-uniform memory access architecture. In D. Padua (Ed.), Encyclopedia of Parallel Computing. Springer. Gehringer, E. F. (2011). Experience with software support for managing student-authored wiki textbooks. Proceedings of the 2011 ASEE Annual Conference and Exposition. Presented at the 2011 ASEE Annual Conference and Exposition, Vancouver, BC. Ramachandran, L., & Gehringer, E. F. (2011). Automated Assessment of Review Quality Using Latent Semantic Analysis. 2011 IEEE 11th International Conference on Advanced Learning Technologies. Presented at the 2011 11th IEEE International Conference on Advanced Learning Technologies (ICALT). https://doi.org/10.1109/icalt.2011.46 Ramachandran, L., & Gehringer, E. F. (2011). Determining Degree of Relevance of Reviews Using a Graph-Based Text Representation. 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence. Presented at the 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence (ICTAI). https://doi.org/10.1109/ictai.2011.72 Orphanides, A. K. (2011). Lessons in public touchscreen development. Code4lib Journal, 15. Retrieved from https://journal.code4lib.org/articles/5832 Murphy-Hill, E., Ayazifar, M., & Black, A. P. (2011). Restructuring software with gestures. 2011 ieee symposium on visual languages and human-centric computing (vl/hcc 2011), 165–172. https://doi.org/10.1109/vlhcc.2011.6070394 Prasad, S., & Thuente, D. J. (2011). Jamming attacks in 802.11g-a cognitive radio based approach. 2011 - Milcom 2011 Military Communications Conference, 1219–1224. https://doi.org/10.1109/milcom.2011.6127467 Gehringer, E. (2011). From the manager's perspective: Classroom contributions to open-source projects. 2011 frontiers in education conference (fie). https://doi.org/10.1109/fie.2011.6143028 Schmidt, M. C., Rocha, A. M., Padmanabhan, K., Chen, Z., Scott, K., Mihelcic, J. R., & Samatova, N. F. (2011). Efficient alpha, beta-motif finder for identification of phenotype-related functional modules. BMC BIOINFORMATICS, 12. https://doi.org/10.1186/1471-2105-12-440 Gehringer, E., & Narang, M. B. (2011). Accountability and the use of classroom response devices. 2011 frontiers in education conference (fie). https://doi.org/10.1109/fie.2011.6142866 Heckman, S., Horton, T. B., & Sherriff, M. (2011). Teaching second-level Java and software engineering with Android. 2011 24th IEEE-CS Conference on Software Engineering Education and Training (CSEET), 540–542. https://doi.org/10.1109/cseet.2011.5876144 Miao, S., & Krim, H. (2011). Robustness and expression independence in 3D face recognition. 2011 ieee workshop on signal processing systems (sips), 289–292. https://doi.org/10.1109/sips.2011.6088991 Kc, K., & Gu, X. (2011). ELT: Efficient Log-based Troubleshooting System for Cloud Computing Infrastructures. 2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), pp. 11–20. https://doi.org/10.1109/srds.2011.11 Lee, K., Kim, Y., Chong, S., Rhee, I., & Yi, Y. (2011). Delay-capacity tradeoffs for mobile networks with levy walks and levy flights. 2011 proceedings ieee infocom, 3128–3136. https://doi.org/10.1109/infcom.2011.5935159 Yoon, S., Rhee, I., Jung, B. C., Daneshrad, B., & Kim, J. H. (2011). Contrabass: Concurrent transmissions without coordination for ad hoc networks. 2011 proceedings ieee infocom, 1134–1142. https://doi.org/10.1109/infcom.2011.5934890 Carter, M., Vouk, M., Gannod, G. C., Burge, J. E., Anderson, P. V., & Hoffman, M. E. (2011). Communication genres: Integrating communication into the software engineering curriculum. 2011 24th IEEE-CS Conference on Software Engineering Education and Training (CSEET), 21–30. https://doi.org/10.1109/cseet.2011.5876091 Massey, A. K., Smith, B., Otto, P. N., & Anton, A. I. (2011). Assessing the accuracy of legal implementation readiness decisions. 2011 19th ieee international requirements engineering conference (re), 207–216. https://doi.org/10.1109/re.2011.6051661 Maxwell, J. C., Anton, A. I., & Swire, P. (2011). A legal cross-references taxonomy for identifying conflicting software requirements. 2011 19th ieee international requirements engineering conference (re), 197–206. https://doi.org/10.1109/re.2011.6051647 Yi, S., Krim, H., & Norris, L. K. (2011). A invertible dimension reduction of curves on a manifold. 2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops). https://doi.org/10.1109/iccvw.2011.6130412 Thummalapenta, S., Xie, T., Tillmann, N., Halleux, J., & Su, Z. (2011, October). Synthesizing Method Sequences for High-Coverage Testing. ACM SIGPLAN NOTICES, Vol. 46, pp. 189–206. https://doi.org/10.1145/2076021.2048083 Biswas, T., & Dutta, R. (2011). Spatially diffuse pathsets for robust routing in ad hoc networks. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6133499 Lv, Q., & Rouskas, G. N. (2011). On optimal tiered structures for network service bundles. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6133598 Che, Z., Hendrix, W., & Samatova, N. (2011). Community-based anomaly detection in evolutionary networks. The Journal of Intelligent Information Systems: Integrating Artificial Intelligence and Database Technologies. https://doi.org/10.1007/s10844-011-0183-2 Babaoglu, A. C., & Dutta, R. (2011). Benefits of multi wavelength approach to converter placement to support broadcast with available wavelengths. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6134393 Saovapakhiran, B., Michailidis, G., & Devetsikiotis, M. (2011). Aggregated-DAG Scheduling for Job Flow Maximization in Heterogeneous Cloud Computing. 2011 ieee global telecommunications conference (globecom 2011). https://doi.org/10.1109/glocom.2011.6133611 Lim, M. Y., Freeh, V. W., & Lowenthal, D. K. (2011). Adaptive, transparent CPU scaling algorithms leveraging inter-node MPI communication regions. PARALLEL COMPUTING, 37(10-11), 667–683. https://doi.org/10.1016/j.parco.2011.07.001 Smith, B. (2011). Systematizing security test case planning using functional requirements phrases. 2011 33rd International Conference on Software Engineering (ICSE), 1136–1137. Meneely, A., & Williams, L. (2011). Socio-technical developer networks: Should we trust our measurements? 2011 33rd International Conference on Software Engineering (ICSE), 281–290. https://doi.org/10.1145/1985793.1985832 Xiao, X. S. (2011). Problem identification for structural test generation: First step towards cooperative developer testing. 2011 33rd International Conference on Software Engineering (ICSE), 1179–1181. Sarkar, A., Mueller, F., & Ramaprasad, H. (2011). Predictable Task Migration for Locked Caches in Multi-Core Systems. ACM SIGPLAN NOTICES, 46(5), 131–140. https://doi.org/10.1145/2016603.1967696 Xiao, X. S., Xie, T., Tillmann, N., & Halleux, J. (2011). Precise identification of problems for structural test generation. 2011 33rd International Conference on Software Engineering (ICSE), 611–620. https://doi.org/10.1145/1985793.1985876 Ge, X., Taneja, K., Xie, T., & Tillmann, N. (2011). DyTa: Dynamic symbolic execution guided with static verification results. 2011 33rd International Conference on Software Engineering (ICSE), 992–994. https://doi.org/10.1145/1985793.1985971 Xiao, X. S., Xie, T., Tillmann, N., & Halleux, J. (2011). Covana: Precise identification of problems in Pex. 2011 33rd International Conference on Software Engineering (ICSE), 1004–1006. https://doi.org/10.1145/1985793.1985976 Anjum, B., Perros, H., Mountrouidou, X., & Kontovasilis, K. (2011). Bandwidth allocation under end-to-end percentile delay bounds. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 21(6), 536–547. https://doi.org/10.1002/nem.783 Lee, D. Y. (2011). A case study on refactoring in Haskell programs. 2011 33rd International Conference on Software Engineering (ICSE), 1164–1166. Clouse, H. S., Krim, H., Sakla, W., & Mendoza-Schrock, O. (2011). Vehicle Tracking Through the Exploitation of Remote Sensing and LWIR Polarization Science. POLARIZATION SCIENCE AND REMOTE SENSING V, Vol. 8160. https://doi.org/10.1117/12.901556 Heinrich, S. B., Snyder, W. E., & Frahm, J.-M. (2011). Maximum likelihood autocalibration. IMAGE AND VISION COMPUTING, 29(10), 653–665. https://doi.org/10.1016/j.imavis.2011.07.003 Liu, A. X., Chen, F., Hwang, J. H., & Xie, T. (2011). Designing Fast and Scalable XACML Policy Evaluation Engines. IEEE TRANSACTIONS ON COMPUTERS, 60(12), 1802–1817. https://doi.org/10.1109/tc.2010.274 Hendrix, W., Rocha, A. M., Padmanabhan, K., Choudhary, A., Scott, K., Mihelcic, J. R., & Samatova, N. F. (2011). DENSE: efficient and prior knowledge-driven discovery of phenotype-associated protein functional modules. BMC SYSTEMS BIOLOGY, 5. https://doi.org/10.1186/1752-0509-5-172 Sheng, X., & Thuente, D. (2011). Contextual Decision Making in General Game Playing. 2011 23RD IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2011), pp. 679–684. https://doi.org/10.1109/ictai.2011.108 Afrati, F., & Chirkova, R. (2011). Selecting and using views to compute aggregate queries. Journal of Computer and System Sciences, 77(6), 1079–1107. https://doi.org/10.1016/j.jcss.2010.10.003 Wu, X., & Mueller, F. (2011, August). ScalaExtrap: Trace-Based Communication Extrapolation for SPMD Programs. ACM SIGPLAN NOTICES, Vol. 46, pp. 113–122. https://doi.org/10.1145/2038037.1941569 Pathak, P. H., & Dutta, R. (2011). A Survey of Network Design Problems and Joint Design Approaches in Wireless Mesh Networks. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 13(3), 396–428. https://doi.org/10.1109/surv.2011.060710.00062 Thummalapenta, S., Marri, M. R., Xie, T., Tillmann, N., & Halleux, J. (2011). Retrofitting unit tests for parameterized unit testing. Fundamental Approaches to Software Engineering, 6603, 294–309. Yetginer, E., Liu, Z., & Rouskas, G. N. (2011). Fast Exact ILP Decompositions for Ring RWA. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 3(7), 577–586. https://doi.org/10.1364/jocn.3.000577 Hu, V. C., Kuhn, D. R., Xie, T., & Hwang, J. (2011). MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 21(1), 103–127. https://doi.org/10.1142/s021819401100513x Hazard, C. J., & Singh, M. P. (2011). Intertemporal Discount Factors as a Measure of Trustworthiness in Electronic Commerce. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 23(5), 699–712. https://doi.org/10.1109/tkde.2010.141 Liu, Y., Ning, P., & Reiter, M. K. (2011, May). False Data Injection Attacks against State Estimation in Electric Power Grids. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 14. https://doi.org/10.1145/1952982.1952995 Heber, S., Mayr, R., & Stoye, J. (2011). Common Intervals of Multiple Permutations. ALGORITHMICA, 60(2), 175–206. https://doi.org/10.1007/s00453-009-9332-1 Anjum, B., & Perros, H. (2011). Adding Percentiles of Erlangian Distributions. IEEE COMMUNICATIONS LETTERS, 15(3), 346–348. https://doi.org/10.1109/lcomm.2011.011011.102143 Heckman, S., & Williams, L. (2011). [Review of A systematic literature review of actionable alert identification techniques for automated static code analysis]. INFORMATION AND SOFTWARE TECHNOLOGY, 53(4), 363–387. https://doi.org/10.1016/j.infsof.2010.12.007 Touch, J., Baldine, I., Dutta, R., Finn, G. G., Ford, B., Jordan, S., … Rouskas, G. (2011). A Dynamic Recursive Unified Internet Design (DRUID). COMPUTER NETWORKS, 55(4), 919–935. https://doi.org/10.1016/j.comnet.2010.12.016 Smith, B., & Phillips, B. A. (2011). Truckers drive their own assessment for obstructive sleep apnea: A collaborative approach to online self-assessment for obstructive sleep apnea. Journal of Clinical Sleep Medicine, 7(3), 238–242. Ha, S., & Rhee, I. (2011). Taming the elephants: New TCP slow start. COMPUTER NETWORKS, 55(9), 2092–2110. https://doi.org/10.1016/j.comnet.2011.01.014 Vishwanath, A., Sivaraman, V., & Rouskas, G. N. (2011). Anomalous Loss Performance for Mixed Real-Time and TCP Traffic in Routers With Very Small Buffers. IEEE-ACM TRANSACTIONS ON NETWORKING, 19(4), 933–946. https://doi.org/10.1109/tnet.2010.2091721 Subramanian, S. V., & Dutta, R. (2011, September). A study of performance and scalability metrics of a SIP proxy server - a practical approach. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, Vol. 77, pp. 884–897. https://doi.org/10.1016/j.jcss.2010.08.006 Clouse, H. S., Krim, H., & Mendoza-Schrock, O. (2011). A Scaled, Performance Driven Evaluation of the Layered Sensing Framework Utilizing Polarimetric Infrared Imagery. EVOLUTIONARY AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS V, Vol. 8059. https://doi.org/10.1117/12.886510 Hsiao, J. P.-L., & Healey, C. G. (2011, June). Visualizing combinatorial auctions. VISUAL COMPUTER, Vol. 27, pp. 633–643. https://doi.org/10.1007/s00371-011-0576-9 McGeachie, M., & Doyle, J. (2011). The local geometry of multiattribute tradeoff preferences. ARTIFICIAL INTELLIGENCE, 175(7-8), 1122–1152. https://doi.org/10.1016/j.artint.2010.11.014 Law, J. M., Hoch, C., Glaum, R., Heinmaa, I., Stern, R., Kang, J., … Kremer, R. K. (2011). Spin-Peierls transition in the S=1/2 compound TiPO4 featuring large intrachain coupling. PHYSICAL REVIEW B, 83(18). https://doi.org/10.1103/physrevb.83.180414 Dutta, R., Schupke, D., & Somemura, Y. (2011, July). Special Issue: Green Communications and Networking. OPTICAL SWITCHING AND NETWORKING, Vol. 8, pp. 129–130. https://doi.org/10.1016/j.osn.2011.05.001 Geleji, G., & Perros, H. G. (2011). QoS routing across multiple autonomous systems using the path computation element architecture. ANNALS OF TELECOMMUNICATIONS, 66(5-6), 293–306. https://doi.org/10.1007/s12243-010-0206-y Rhee, I., Shin, M., Hong, S., Lee, K., Kim, S. J., & Chong, S. (2011). On the Levy-Walk Nature of Human Mobility. IEEE-ACM TRANSACTIONS ON NETWORKING, 19(3), 630–643. https://doi.org/10.1109/tnet.2011.2120618 Sollenberger, D. J., & Singh, M. P. (2011). Methodology for engineering affective social applications. Agent-oriented software engineering x, 6038, 97–109. Zhong, H., Zhang, L., Xie, T., & Mei, H. (2011). Inferring specifications for resources from natural language API documentation. AUTOMATED SOFTWARE ENGINEERING, 18(3-4), 227–261. https://doi.org/10.1007/s10515-011-0082-3 Wiegmann, B. M., Trautwein, M. D., Winkler, I. S., Barr, N. B., Kim, J. W., Lambkin, C., … Blagoderov, V. (2011). Episodic radiations in the fly tree of life. Proceedings of the National Academy of Sciences of the United States of America, 108(14), 5690–5695. Thummalapenta, S., & Xie, T. (2011). Alattin: mining alternative patterns for defect detection. AUTOMATED SOFTWARE ENGINEERING, 18(3-4), 293–323. https://doi.org/10.1007/s10515-011-0086-z Singh, M. P. (2011). Self-Renewing Applications. IEEE INTERNET COMPUTING, Vol. 15, pp. 3–5. https://doi.org/10.1109/mic.2011.95 Sarkar, A., Mueller, F., & Ramaprasad, H. (2011). Predictable task migration for locked caches in multi-core systems. LCTES 11: Proceedings of the ACM Sigplan/Sigbed 2011 Conference on Languages, Complilers, Tools and Theory for Embedded Systems, 131–140. https://doi.org/10.1145/1967677.1967696 Bhat, B., & Mueller, F. (2011). Making DRAM refresh predictable. REAL-TIME SYSTEMS, 47(5), 430–453. https://doi.org/10.1007/s11241-011-9129-6 Dwekat, Z., & Rouskas, G. N. (2011). A practical fair queuing scheduler: Simplification through quantization. COMPUTER NETWORKS, 55(10), 2392–2406. https://doi.org/10.1016/j.comnet.2011.04.004 Castillo, C., Rouskas, G. N., & Harfoush, K. (2011). Online algorithms for advance resource reservations. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(7), 963–973. https://doi.org/10.1016/j.jpdc.2011.01.003 Wang, X., & Reeves, D. S. (2011). Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434–449. https://doi.org/10.1109/tdsc.2010.35 Chen, W., Schmidt, M. C., & Samatova, N. F. (2011). On the parameterized complexity of the Multi-MCT and Multi-MCST problems. JOURNAL OF COMBINATORIAL OPTIMIZATION, 21(2), 151–158. https://doi.org/10.1007/s10878-009-9220-2 Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). Digital privacy: theory, policies and technologies. REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2. https://doi.org/10.1007/s00766-011-0117-0 Young, J. D. (2011). Commitment analysis to operationalize software requirements from privacy policies. Requirements Engineering, 16(1), 33–46. https://doi.org/10.1007/s00766-010-0108-6 Wang, Y., Hang, C.-W., & Singh, M. P. (2011). A Probabilistic Approach for Maintaining Trust Based on Evidence. JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 40, 221–267. https://doi.org/10.1613/jair.3108 Hang, C.-W., & Singh, M. P. (2011). Trustworthy Service Selection and Composition. ACM Transactions on Autonomous and Adaptive Systems, 6(1), 1–17. https://doi.org/10.1145/1921641.1921646 Li, J., Ma, X., Yoginath, S., Kora, G., & Samatova, N. F. (2011). Transparent runtime parallelization of the R scripting language. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(2), 157–168. https://doi.org/10.1016/j.jpdc.2010.08.013 Kim, M., & Ning, P. (2011). SeCA: A framework for Secure Channel Assignment in wireless mesh networks. COMPUTER COMMUNICATIONS, 34(4), 567–576. https://doi.org/10.1016/j.comcom.2010.05.008 Zhang, Y., Mueller, F., Cui, X., & Potok, T. (2011). Data-intensive document clustering on graphics processing unit (GPU) clusters. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(2), 211–224. https://doi.org/10.1016/j.jpdc.2010.08.002 Lin, H., Ma, X., Feng, W., & Samatova, N. F. (2011). Coordinating Computation and I/O in Massively Parallel Sequence Search. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 22(4), 529–543. https://doi.org/10.1109/tpds.2010.101 Zhou, T., Roy, R., Ning, C. P., & Chakrabarty, K. (2011). P(2)DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 29(3), 582–594. https://doi.org/10.1109/jsac.2011.110308