Computer Science - 2009 Barnes, T., Dahlberg, T., Buch, K., & Bean, K. (2009). The STARS Leadership Corps: An innovative computer science learning community. Learning Communities Journal, 1(2), 5–18. Gay, G., Menzies, T., Jalali, O., Mundy, G., Gilkerson, B., Feather, M., & Kiper, J. (2009). Finding robust solutions in requirements models. Automated Software Engineering, 17(1), 87–116. https://doi.org/10.1007/s10515-009-0059-7 Gegick, M., Rotella, P., & Williams, L. (2009). Toward Non-security Failures as a Predictor of Security Faults and Failures. In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009. (pp. 135–149). https://doi.org/10.1007/978-3-642-00199-4_12 Gehringer, E. F. (2009). Improving scores on course evaluations: experienced faculty tell what works. Proceedings of the 2009 ASEE Annual Conference and Exposition, 2009–1742. Washington, DC: American Society for Engineering Education. Gehringer, E. F. (2009). Personal vs. professional e-mail: the Palin case. 2009 ASEE Annual Conference and Exposition, 2009–1719. Washington, DC: American Society for Engineering Education. Gehringer, E. F., Droujkova, M., Gummadi, A., & Nallapeta, M. (2009). Game mechanics and social networking for co-production of course materials. 2009 39th IEEE Frontiers in Education Conference, W2C–1-W1C–2. https://doi.org/10.1109/FIE.2009.5350564 Hang, C.-W., & Singh, M. P. (2009). Selecting Trustworthy Services: Learning a Bayesian Network. Workshop on Trust in Agent Societies, Seventh International Conference on Autonomous Agents & Multi-Agent Systems. Presented at the Seventh International Conference on Autonomous Agents & Multi-Agent Systems, Budapest, Hungary. Jiang, Y., & Shen, X. (2009). Speculation with Little Wasting: Saving Cost in Software Speculation Through Transparent Learning (No. WM-CS-2009-08). Williamsburg, VA: Computer Science Department, The College of William and Mary. Liu, Y., Zhang, E. Z., & Shen, X. (2009). A cross-input adaptive framework for GPU program optimizations. 2009 IEEE International Symposium on Parallel & Distributed Processing. Presented at the Distributed Processing (IPDPS). https://doi.org/10.1109/ipdps.2009.5160988 Mao, F., Zhang, E. Z., & Shen, X. (2009). Influence of program inputs on the selection of garbage collectors. Proceedings of the 2009 ACM SIGPLAN/SIGOPS international conference on Virtual execution environments - VEE '09. Presented at the the 2009 ACM SIGPLAN/SIGOPS international conference. https://doi.org/10.1145/1508293.1508307 PADIA, K., VIKAS, G. A., IYER, H. S., DARSHAN, V. R., PRASAD, N. P. G. A. N. E. S. H., & SRINIVAS, A. (2009). A Localization Algorithm for a GPS-Free System with Static Parameter Tuning. Computer And Network Technology-Proceedings Of The International Conference On Iccnt 2009, 37–41. Shen, X., & Jiang, Y. (2009). Co-Run Locality Prediction for Proactive Shared-Cache Management (Technical Report No. WM-CS-2009-03). Computer Science Department, The College of William and Mary. Shen, X., Jiang, Y., Zhang, E. Z., Tan, K., Mao, F., & Gethers, M. (2009). Program Seminal Behaviors: Automating Input Characterization for Large-Scope Proactive Behavior Prediction (Technical Report No. WM-CS-2009-07). Computer Science Department, The College of William and Mary. Tian, K., Jiang, Y., & Shen, X. (2009). A study on optimally co-scheduling jobs of different lengths on chip multiprocessors. Proceedings of the 6th ACM conference on Computing frontiers - CF '09. Presented at the the 6th ACM conference. https://doi.org/10.1145/1531743.1531752 Vatsavai, R. R. (2009). Incremental Clustering Algorithm for Earth Science Data Mining. In G. Allen, J. Nabrzyski, E. Seidel, G. D. van Albada, J. Dongarra, & P. M. A. Sloot (Eds.), Computational Science – ICCS 2009 (pp. 375–384). https://doi.org/10.1007/978-3-642-01973-9_42 Vikas, G. A., Padia, K., Iyer, H. S., Darshan, V. R., Prasad, N. P. G., Srinivas, A., … Olariu, S. (2009). A Dynamic GPS-Free Localization Technique using Progressive Interpolation. International Conference on Computer Networks and Mobile Computing. Williams, L., Gegick, M., & Meneely, A. (2009). Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer. In F. Massacci, S. T. Redwine, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2009 (pp. 122–134). https://doi.org/10.1007/978-3-642-00199-4_11 Xiong, K., Perros, H., & Blake, S. (2009). Bandwidth provisioning in ADSL access networks. International Journal of Network Management, 19(5), 427–444. https://doi.org/10.1002/nem.718 Zhang, E. Z., Jiang, Y., & Shen, X. (2009). A Systematic Measurement of the Influence of Non-Uniform Cache Sharing on the Performance of Modern Multithreaded Programs (Technical Report No. WM-CS-2009-04). Computer Science Department, The College of William and Mary. Zhang, E. Z., Jiang, Y., Guo, Z., & Shen, X. (2009). Streamlining GPU Applications On the Fly – Thread Divergence Elimination through Runtime Thread-Data Remapping (No. WM-CS-2009-08). Williamsburg, VA: Computer Science Department, The College of William and Mary.