Computer Science - 2000 Ramesh, S., Rouskas, G. N., & Perros, H. G. (2000). Computing blocking probabilities in multiclass wavelength routing networks. ACM Transactions on Modeling and Computer Simulation, 10(2), 87–103. https://doi.org/10.1145/364996.365001 Ramesh, S., Rouskas, G. N., Perros, H. G., Pujolle, G., Perros, H., Fdida, S., … Stavrakakis, I. (2000). Computing blocking probabilities in multi-class wavelength routing networks. In Networking 2000 (Vol. 1815, pp. 176–188). Zhu, Y. H., Rouskas, G. N., & Perros, H. G. (2000). A path decomposition approach for computing blocking probabilities in wavelength-routing networks. Ieee-Acm Transactions on Networking, 8(6), 747–762. Gehringer, E. F. (2000). Welcome. Proceedings of the 2000 Workshop on Computer Architecture Education - WCAE '00. https://doi.org/10.1145/1275240.1275242 Chang, J. M., Srisa-an, W., Lo, C.-T. D., & Gehringer, E. F. (2000). Hardware support for dynamic memory management. Proceedings of the International Symposium on Computer Architecture:, Workshop on Solving the Memory Wall Problem. Presented at the International Symposium on Computer Architecture: Workshop on Solving the Memory Wall Problem, Vancouver, BC. Gehringer, E. F., & Louca, T. M. (2000). A Web-based object technology course database. Proceedings of the 15th ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications : October 15-19, 2000, Minneapolis, MN USA, 70–74. New York: Association for Computing Machinery. Gehringer, E. F. (2000). Web-based databases of course material: Improving the viability. FIE 2000 : 30th Annual Frontiers in Education Conference : Building on a century of progress in engineering education : conference proceedings : Hyatt Regency Crown Center Hotel, Kansas City, Missouri, October 18-21, 2000. Presented at the 30th Annual Frontiers in Education Conference, Kansas City, MO. Shen, X., & Xu, B. (2000). A CART-Based Hierarchical Stochastic Model for Prosodic Phrasing in Chinese. Proceedings of International Symposium on Chinese Spoken Language Processing 2000, 105–108. Beijing, China. Singh, M. P. (2000). From the Editor-in-Chief: In the Thick of Things. IEEE Internet Computing, 4(1), 4–5. https://doi.org/10.1109/MIC.2000.10005 Singh, M. P. (2000). From the Editor-in-Chief: Trusting Our Electronic Assistants. IEEE Internet Computing, 4(2), 4–5. https://doi.org/10.1109/MIC.2000.10006 Singh, M. P. (2000). Beyond Geography. IEEE Internet Computing, 4(5), 6–7. https://doi.org/10.1109/MIC.2000.10023 Kaltofen, E., Lee, W.-shin, & Lobo, A. A. (2000). Early termination in Ben-Or/Tiwari sparse interpolation and a hybrid of Zippel's algorithm. Proceedings of the 2000 international symposium on Symbolic and algebraic computation symbolic and algebraic computation - ISSAC '00. Presented at the the 2000 international symposium. https://doi.org/10.1145/345542.345629 Matsuda, N., & VanLehn, K. (2000). A reification of a strategy for geometry theorem proving. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1839, p. 660). Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84944321228&partnerID=MN8TOARS Gehringer, E. F. (2000). Strategies and mechanisms for electronic peer review. Proceedings of the 30th Annual Frontiers in Education Conference. Presented at the 30th Annual Frontiers in Education Conference: Building on A Century of Progress in Engineering Education, Kansas City, MO. https://doi.org/10.1109/fie.2000.897675 Trust and reputation management in a small-world network. (2000). Fourth International Conference on Multiagent Systems, Proceedings. https://doi.org/10.1109/ICMAS.2000.858519 The service Web. (2000). IEEE Internet Computing. Retrieved from https://publons.com/publon/21294518/ The intelligence within. (2000). IEEE Internet Computing. Retrieved from https://publons.com/publon/21294519/ Engineering interoperation. (2000). IEEE Internet Computing. https://doi.org/10.1109/MIC.2000.865082 Commitment-based enhancement of e-commerce protocols. (2000). IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS. https://doi.org/10.1109/ENABL.2000.883743 A social mechanism of reputation management in electronic communities. (2000). Lecture Notes in Computer Science. Retrieved from https://publons.com/publon/21294523/ Shrobe, H., & Doyle, J. (2000). Active Trust Management for Autonomous Adaptive Survivable Systems (ATM’s for AAss’s). Self-Adaptive Software, pp. 40–49. https://doi.org/10.1007/3-540-44584-6_4 Gehringer, E. F. (2000). Capability-based addressing. In A. Ralston, E. Reilly, & D. Hemmendinger (Eds.), Encyclopedia of Computer Science. International Thomson Computer Press. Gehringer, E. F., & Louca, T. M. (2000). Using the computer architecture course database. Proceedings of the 2000 workshop on Computer architecture education - WCAE '00. Presented at the the 2000 workshop. https://doi.org/10.1145/1275240.1275261 Craigmill, A. L., Riviere, J. E., & Webb, A. L. (2000). Food safety, FARAD, and Residue Avoidance in the 6th millenium. Journal of Veterinary Pharmacology and Therapeutics, 23(Suppl 1 CD). Martin-Jimenez, T., & Riviere, J. E. (2000). Mixed effect modelling applied to the interspecies scaling of gentamicin and oxytetracycline. Journal of Veterinary Pharmacology and Therapeutics, 23(Supp.1 CD), B26. Singh, M. P., & Singh, M. (2000, April). Deconstructing the "Any" key. COMMUNICATIONS OF THE ACM, Vol. 43, pp. 107–108. https://doi.org/10.1145/332051.332081 Reeves, D. S., & Salama, H. F. (2000). A distributed algorithm for delay-constrained unicast routing. IEEE-ACM TRANSACTIONS ON NETWORKING, 8(2), 239–250. https://doi.org/10.1109/90.842145 Dutta, R., & Rouskas, G. N. (2000). Design of logical topologies for wavelength routed networks. In K. M. Sivalingam & S. Subramaniam (Eds.), Optical WDM networks: Principles and practice (pp. 79–102). Boston: Kluwer Academic Publishers. Dutta, R., & Rouskas, G. N. (2000). A Survey of virtual topology design algorithms for wavelength routed networks. Optical Networks Magazine, 1(1), 73–89. Rhee, I. (2000). Methods and systems for forward error correction based loss recovery for interactive video transmission. Washington, DC: U.S. Patent and Trademark Office. Gehringer, E., & Louca, T. M. (2000). A Web-based computer architecture course database. Frontiers in Education Conference (30th: 2001: Kansas City, Mo.) FIE 2000: 30th Annual Frontiers in Education Conference: Building on a century of progress in engineering education: Vol. 1, S2B/12–16. https://doi.org/10.1109/fie.2000.896639 Rhee, I. (2000). Method and systems for dynamic hybrid packet loss recovery for video transmission over lossy packet-based network. Washington, DC: U.S. Patent and Trademark Office. Stewart, W. J. (2000). Numerical analysis methods. In C. L. G. Haring & M. Reiser (Eds.), Performance evaluation: Origins and directions (Vol. 1769, pp. 355–376). https://doi.org/10.1007/3-540-46506-5_15 Karacali, B., & Tai, K. C. (2000). Model checking based on simultaneous reachability analysis. In SPIN model checking and software verification: 7th International SPIN Workshop, Stanford, CA, USA, August 30-Sept. 1, 2000 (Vol. 1885, pp. 34–53). Berlin; New York: Springer. Meyer, C. D. (2000). Matrix analysis and applied linear algebra. Philadelphia: Society for Industrial and Applied Mathematics. Singh, M. P. (2000). Synthesizing coordination requirements for heterogeneous autonomous agents. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 3(2), 107–132. https://doi.org/10.1023/A:1010033827337 Lee, W., Nimbalkar, R. A., Yee, K. K., Patil, S. B., Desai, P. H., Tran, T. T., & Stolfo, S. J. (2000). A data mining and CIDF based approach for detecting novel and distributed intrusions. In Recent advances in intrusion detection: Third international workshop, RAID 2000, Toulouse, France, October 2-4, 2000: Proceedings (Vol. 1907, pp. 49–65). Berlin; New York: Springer. Bahler, D., & Stone, B. (2000). Symbolic, neural, and Bayesian machine learning models for predicting carcinogenicity of chemical compounds. JOURNAL OF CHEMICAL INFORMATION AND COMPUTER SCIENCES, Vol. 40, pp. 906–914. https://doi.org/10.1021/ci990116i Yu, B., & Singh, M. P. (2000). A social mechanism of reputation management in electronic communities. In M. Klusch & L. Kerschberg (Eds.), Cooperative information agents IV: The future of information agents in cyberspace: 4th International Workshop, CIA 2000, Boston, MA, USA, July 7-9, 2000: Proceedings (Vol. 1860, pp. 154–165). Berlin: Springer. Ortiz, Z., Rouskas, G. N., & Perros, H. G. (2000). Maximizing multicast throughput in WDM networks with tuning latencies using the virtual receiver concept. EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS, 11(1), 63–72. https://doi.org/10.1002/ett.4460110109 Gerstel, O., Li, B., McGuire, A., Rouskas, G., Sivalingam, K. M., Zhang, Z. S., & Ramaswami, R. (2000, October). Guest editorial - Protocols and architectures for next generation optical WDM networks. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol. 18, pp. 1805–1809. https://doi.org/10.1109/JSAC.2000.887903 Singh, M. P. (2000). A social semantics for agent communication languages. Lecture Notes in Computer Science, 1916, 31–45. https://doi.org/10.1007/10722777_3 Balasubramanian, T., Strachan, J. P., Boyle, P. D., & Lindsey, J. S. (2000). Rational synthesis of beta-substituted chlorin building blocks. JOURNAL OF ORGANIC CHEMISTRY, 65(23), 7919–7929. https://doi.org/10.1021/jo000913b Rhee, I., & Joshi, SR. (2000). Error recovery for interactive video transmission over the Internet. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 18(6), 1033–1049. https://doi.org/10.1109/49.848254 Lee, W. K., Stolfo, S. J., & Mok, K. W. (2000). Adaptive intrusion detection: A data mining approach. Artificial Intelligence (New York, N.Y. : 1970), 14(6), 533–567. Carver, D. K., Fetrow, J., Gerig, T., Correa, M. T., Krueger, K. K., & Barnes, H. J. (2000). Use of statistical modeling to assess risk for early poult mortality in commercial turkey flocks. Journal of Applied Poultry Research, 9(3), 303–318. https://doi.org/10.1093/japr/9.3.303 Roland, C., Bernholc, J., Brabec, C., Nardelli, M. B., & Maiti, A. (2000). Theoretical investigations of carbon nanotube growth. MOLECULAR SIMULATION, Vol. 25, pp. 1–12. https://doi.org/10.1080/08927020008044108 Rhee, I. (2000). System and method of error control for interactive low-bit rate video transmission. Washington, DC: U.S. Patent and Trademark Office. Fulp, E. W., & Reeves, D. S. (2000). QoS rewards and risks: A multi-market approach to resource allocation. In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 945–956). https://doi.org/10.1007/3-540-45551-5_79 Alexander, W. E., Reeves, D. S., & Gloster, C. S. (2000, September). Parallel image processing with the block data parallel architecture (Reprinted from Proceedings of the IEEE, vol 84, pg 947-968, 1996). IBM JOURNAL OF RESEARCH AND DEVELOPMENT, Vol. 44, pp. 681–702. https://doi.org/10.1147/rd.445.0681 Hagrman, P. J., Laduca, R. L., Koo, H. J., Rarig, R., Haushalter, R. C., Whangbo, M. H., & Zubieta, J. (2000). Ligand influences on the structures of molybdenum oxide networks. Inorganic Chemistry, 39(19), 4311–4317. https://doi.org/10.1021/ic0004961 Ramesh, S., Rouskas, G. N., & Perros, H. G. (2000). Computing blocking probabilities in multi-class wavelength routing networks. In Networking 2000: Broadband communications, high performance networking, and performance of communication networks / IFIP-TC6/European Commission International Conference, Paris, France, May 2000, proceedings (Vol. 1815, pp. 176–188). Berlin; New York: Springer. Smith, M. (2000). Acute traumatic compartment syndrome of the thigh in a collegiate soccer player. Athletic Therapy Today, 5(5), 42–43. https://doi.org/10.1123/att.5.5.42 Zhu, Y. H., Rouskas, G. N., & Perros, H. G. (2000). A comparison of allocation policies in wavelength routing networks. PHOTONIC NETWORK COMMUNICATIONS, 2(3), 267–295. https://doi.org/10.1023/A:1010056408572 Winstead, N. N. (2000). Inclusion and involvement of African-Americans at North Carolina State University, 1953-1993. Raleigh, NC: Nash Nicks Winfield. Ramesh, S., & Perros, H. G. (2000). A two-level queueing network model with blocking and non- blocking messages. In S. B. G. J. MacGregor Smith & C. T. Papadopoulos (Eds.), Performance evaluation and optimization of production lines (Annals of operations research ; v. 93) (Vol. 93, pp. 357–372). Bussum, The Netherlands: Baltzer Science. Sivaraman, V., & Rouskas, G. N. (2000). A reservation protocol for broadcast WDM networks and stability analysis. COMPUTER NETWORKS, 32(2), 211–227. https://doi.org/10.1016/s1389-1286(99)00137-1 Zhu, Y. H., Rouskas, G. N., & Perros, H. G. (2000, December). A path decomposition approach for computing blocking probabilities in wavelength-routing networks. IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 8, pp. 747–762. https://doi.org/10.1109/90.893871 Rhee, I., Martin, G. R., Muthukrishnan, S., & Packwood, R. A. (2000). Quadtree-structured variable-size block-matching motion estimation with minimal error. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 10(1), 42–50. https://doi.org/10.1109/76.825857 Cho, G. E., & Meyer, C. D. (2000). Markov chain sensitivity measured by mean first passage times. LINEAR ALGEBRA AND ITS APPLICATIONS, 316(1-3), 21–28. https://doi.org/10.1016/S0024-3795(99)00263-3 Baynes, R. E., Payne, M., Martin-Jimenez, T., Abdullah, A. R., Anderson, K. L., Webb, A. I., … Riviere, J. E. (2000). Extralabel use of ivermectin and moxidectin in food animals. JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 217(5), 668–671. https://doi.org/10.2460/javma.2000.217.668 Dayar, T., & Stewart, W. J. (2000, May 21). Comparison of partitioning techniques for two-level iterative solvers on large, sparse Markov chains. SIAM JOURNAL ON SCIENTIFIC COMPUTING, Vol. 21, pp. 1691–1705. https://doi.org/10.1137/S1064827598338159 Chu, M. T., Pauca, V. P., Plemmons, R. J., & Sun, X. B. (2000). A mathematical framework for the linear reconstructor problem in adaptive optics. LINEAR ALGEBRA AND ITS APPLICATIONS, 316(1-3), 113–135. https://doi.org/10.1016/S0024-3795(00)00019-7 Elsayed, K. M. F., & Perros, H. G. (2000). The superposition of discrete-time Markov renewal processes with an application to statistical multiplexing of bursty traffic sources. Applied Mathematics and Computation, 115(1), 43–62. https://doi.org/10.1016/s0096-3003(99)00134-4 Williams, L., Kessler, R. R., Cunningham, W., & Jeffries, R. (2000). Strengthening the case for pair programming. IEEE SOFTWARE, 17(4), 19-+. https://doi.org/10.1109/52.854064 Kamburowski, J., Michael, D. J., & Stallmann, M. F. M. (2000). Minimizing the complexity of an activity network. NETWORKS, 36(1), 47–52. https://doi.org/10.1002/1097-0037(200008)36:1<47::AID-NET5>3.0.CO;2-Q Yuill, J., Wu, F., Settle, J., Gong, F., Forno, R., Huang, M., & Asbery, J. (2000). Intrusion-detection for incident-response, using a military battlefield-intelligence process. Computer Networks (Amsterdam, Netherlands : 1999), 34(4), 671–697. Young, R. M. (2000). Creating interactive narrative structures: The potential for AI approaches. The Working Notes of the AAAI Spring Symposium on Artificial Intelligence and Interactive Entertainment, Stanford, CA, March 2000, (2000 Mar.). Whangbo, M. H., Koo, H. J., & Lee, K. S. (2000). Analysis of nearest-neighbor spin exchange interactions by molecular orbital calculations: anisotropic spin exchange interactions in MV3O7 (M = Cd, Ca, Sr) and alpha '-NaV2O5. Solid State Communications, 114(1), 27–32. https://doi.org/10.1016/s0038-1098(99)00571-2 Dwyer, R. A. (2000). Voronoi diagrams and convex hulls of random moving points. Discrete and Computational Geometry, 23(3), 343–365. Milojicic, D., Brewer, E., Douglis, F., Druschel, P., Herman, G., Reynolds, F., & Singh, M. (2000). Internet technology. IEEE Concurrency, 8(1), 70–81. Pollak, I., Willsky, A. S., & Krim, H. (2000). Image segmentation and edge enhancement with stabilized inverse diffusion equations. IEEE TRANSACTIONS ON IMAGE PROCESSING, 9(2), 256–266. https://doi.org/10.1109/83.821738 Zaghloul, M. R., Bourham, M. A., & Doster, J. M. (2000). A simple formulation and solution strategy of the Saha equation for ideal and nonideal plasmas. JOURNAL OF PHYSICS D-APPLIED PHYSICS, 33(8), 977–984. https://doi.org/10.1088/0022-3727/33/8/314 Baugh, J. W., & Kakivaya, G. R. (2000). Finite state verification of intelligent transportation systems. Journal of Computing in Civil Engineering, 14(1), 38–50. https://doi.org/10.1061/(ASCE)0887-3801(2000)14:1(38) Loughlin, D. H., Ranjithan, SR, Baugh, J. W., & Brill, E. D. (2000). Application of genetic algorithms for the design of ozone control strategies. JOURNAL OF THE AIR & WASTE MANAGEMENT ASSOCIATION, 50(6), 1050–1063. https://doi.org/10.1080/10473289.2000.10464133 Winstead, N. N. (2000). Tales of North Carolina State University: As told or remembered. Raleigh, N.C.: Nash N. Winstead. Ramesh, S., & Perros, H. G. (2000). A multilayer client-server queueing network model with synchronous and asynchronous messages. IEEE Transactions on Software Engineering, 26(11), 1086–1100. https://doi.org/10.1109/32.881719 St Amant, R., Lieberman, H., Potter, R., & Zettlemoyer, L. (2000). Visual generalization in programming by example. COMMUNICATIONS OF THE ACM, 43(3), 107–114. https://doi.org/10.1145/330534.330549 Ortiz, Z., Rouskas, G. N., & Perros, H. G. (2000). Scheduling combined unicast and multicast traffic in broadcast WDM networks. PHOTONIC NETWORK COMMUNICATIONS, 2(2), 135–153. https://doi.org/10.1023/A:1010084306132 Strachan, J. P., DF O'Shea, Balasubramanian, T., & Lindsey, J. S. (2000). Rational synthesis of meso-substituted chlorin building blocks. JOURNAL OF ORGANIC CHEMISTRY, 65(10), 3160–3172. https://doi.org/10.1021/jo991942t Kaltofen, E. (2000). [Review of Challenges of symbolic computation: My favorite open problems]. JOURNAL OF SYMBOLIC COMPUTATION, 29(6), 891–919. https://doi.org/10.1006/jsco.2000.0370 Healey, C. G. (2000). Building a perceptual visualization architecture. BEHAVIOUR & INFORMATION TECHNOLOGY, 19(5), 349–366. https://doi.org/10.1080/014492900750000054