Computer Science - 2010 Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., & Sheth, A. N. (2010). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. Proceedings of the 9th USENIX conference on Operating systems design and implementation, 1–6. https://doi.org/10.1145/2619091 McDaniel, P., & Enck, W. (2010). Not so great expectations: Why application markets haven't failed security. IEEE Security & Privacy, 8(5), 76–78. Patterson, E., & Gaweda, A. (2010). Toward Using Dynamics of Facial Expressions and Gestures for Person Identification. IASTED International Conference on Computational Intelligence. Presented at the IASTED International Conference on Computational Intelligence. Heckman, S. (2010). Software testing (CS1 & CS2). NC State University, August, 6. Takaki, M., Cavalcanti, D., Gheyi, R., Iyoda, J., d’Amorim, M., & Prudêncio, R. B. C. (2010). Randomized constraint solvers: a comparative study. ISSE, 6(3), 243–253. https://doi.org/10.1007/s11334-010-0124-1 Assertion Checking in J-Sim Simulation Models of Network Protocols. (2010). Simulation, 86(11), 651–673. https://doi.org/10.1177/0037549709349326 Wang, J., & Guo, Z. (2010). Parametric Sensitivity and Scalability of k-Winners-Take-All Networks with a Single State Variable and Infinity-Gain Activation Functions. In L. Zhang, B. L. Lu, & J. Kwok (Eds.), Advances in Neural Networks - ISNN 2010. https://doi.org/10.1007/978-3-642-13278-0_11 Guo, Z., & Wang, J. (2010). A neurodynamic optimization approach to constrained sparsity maximization based on alternative objective functions. Presented at the 2010 International Joint Conference on Neural Networks (IJCNN). https://doi.org/10.1109/ijcnn.2010.5596553 Chen, S., Smith, A. M., Jhala, A., Wardrip-Fruin, N., & Mateas, M. (2010). RoleModel: Towards a formal model of dramatic roles for story generation. Proceedings of the Intelligent Narrative Technologies III Workshop, INT3 '10. https://doi.org/10.1145/1822309.1822326 Weber, B. G., Mawhorter, P., Mateas, M., & Jhala, A. (2010). Reactive planning idioms for multi-scale game AI. Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, CIG2010, 115–122. https://doi.org/10.1109/ITW.2010.5593363 Michael Youngblood, G., Bulitko, V., Dill, K., Jhala, A., Schwab, B., & Riedl, M. O. (2010). Preface. Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84883114702&partnerID=MN8TOARS Yannakakis, G., Togelius, J., Khaled, R., Jhala, A., Karpouzis, K., Paiva, A., & Vasalou, A. (2010). Siren: Towards adaptive serious games for teaching conflict resolution. 4th European Conference on Games Based Learning 2010, ECGBL 2010, 412–417. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-80053103561&partnerID=MN8TOARS Weber, B. G., Mateas, M., & Jhala, A. (2010). Applying goal-driven autonomy to starcraft. Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010, 101–106. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84867392807&partnerID=MN8TOARS Battestilli, L., & Perros, H. (2010). Performance Evaluation of an OBS Network as a TandemNetwork of IPP/M/W/W Nodes. Proceedings of the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM). Presented at the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM), Wellington, New Zealand. Kaltofen, E. L. (2010). The Role of Symbolic, Numeric and Algebraic Computation in Cyber-Enabled Discovery and Innovation (CDI). In Future Directions of Symbolic Computation Research And Their Applications to the Domain Sciences. University of Rhode Island. Barnes, T., & Stamper, J. (2010). Automatic hint generation for logic proof tutoring using historical data. Journal of Educational Technology & Society, 13(1), 3–12. Smith, B., Williams, L., & Austin, A. (2010). Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks. In F. Massacci, D. Wallach, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2010 (pp. 192–200). https://doi.org/10.1007/978-3-642-11747-3_15 Gehringer, E. F. (2010). Online vs. on-paper exams. Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY. Gehringer, E. F. (2010). Daily course evaluation with Google forms. Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY. Gehringer, E. F. (2010). Teaching interactively with Google docs. Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY. Gehringer, E. F., Gummadi, A., Kadanjoth, R., & Andrés, Y. M. (2010). Motivating effective peer review with extra credit and leaderboards. Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY. Gehringer, E. F., Navalakha, K., & Kadanjoth, R. (2010). Experience with a student-written wiki textbook supplement. KU Village Online. Presented at the Kaplan University Village Online. Smith, B., Austin, A., Brown, M., King, J. T., Lankford, J., Meneely, A., & Williams, L. (2010). Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected. Proceedings of the Second Annual Workshop on Security and Privacy in Medical and Home-care Systems, 1–12. https://doi.org/10.1145/1866914.1866916 Albert, C., Paloski, A., Shen, X., Walter, E. J., & Zhang, S. (2010). Experiences in Porting the Hubbard Model in Computational Materials Science to GPU (Technical Report No. WM-CS-2010-04). Computer Science Department, The College of William and Mary. Kowalski, A., & Shen, X. (2010). Implementing the Dslash Operator in OpenCL (Technical Report No. WM-CS-2010-03). Computer Science Department, The College of William and Mary. Boyce, A., & Barnes, T. (2010). BeadLoom Game: using game elements to increase motivation and learning. Proceedings of the Fifth International Conference on the Foundations of Digital Games (FDG '10), 25–31. https://doi.org/10.1145/1822348.1822352 Powell, E. M., Finkelstein, S., Hicks, A., Phifer, T., Charugulla, S., Thornton, C., … Dahlberg, T. (2010). SNAG: social networking games to facilitate interaction. Extended abstracts on Human factors in computing systems - (CHI EA '10), 4249–4254. https://doi.org/10.1145/1753846.1754134 Finkelstein, S. L., Powell, E., Hicks, A., Doran, K., Charugulla, S. R., & Barnes, T. (2010). SNAG: using social networking games to increase student retention in computer science. Proceedings of the fifteenth annual conference on Innovation and technology in computer science education - ITiCSE '10, 142–146. https://doi.org/10.1145/1822090.1822131 Nelson, A., Menzies, T., & Gay, G. (2010). Sharing experiments using open-source software. Software: Practice and Experience, 41(3), 283–305. https://doi.org/10.1002/spe.1004 Gerard, S. N., & Singh, M. P. (2010). Protocol Refinement: Formalization and Verification. Proceedings of the AAMAS Workshop on Agent Communication (AC), 19–36. Toronto. Brazier, F., Dignum, F., Dignum, V., Huhns, M. N., Lessner, T., Padget, J., … Singh, M. P. (2010). Governance of Services: A Natural Function for Agents. Proceedings of the 8th AAMAS Workshop on Service-Oriented Computing: Agents, Semantics, and Engineering (SOCASE), 8–22. Toronto. Telang, P. R., & Singh, M. P. (2010). Abstracting Business Modeling Patterns from Rosetta-Net. Proceedings of the 8th AAMAS Workshop on Service-Oriented Computing: Agents, Semantics, and Engineering (SOCASE), 83–96. Toronto. Hazard, C. J., & Singh, M. P. (2010). An Architectural Approach to Combining Trust and Reputation. In W. van der Hoek, G. A. Kaminka, Y. Lesperance, M. Luck, & S. Sen (Eds.), Proceedings of the 9th Autonomous Agents and Multiagent Systems, the 13th International Workshop on Trust in Agent Societies (pp. 83–93). Toronto: AAMAS. Hang, C.-W., & Singh, M. P. (2010). Trust-based Recommendation Based on Graph Similarity. In W. van der Hoek, G. A. Kaminka, Y. Lesperance, M. Luck, & S. Sen (Eds.), Proceedings of the 9th Autonomous Agents and Multi-Agent Systems, 13th International Workshop on Trust in Agent Societies (pp. 71–81). Toronto: AAMAS. Li, Q., Panetto, H., Berio, G., & Anyanwu, K. (2010). EI2N’10 & SeDeS’10 - PC Co-chairs Message. In R. Meersman, T. Dillon, & P. Herrero (Eds.), On the Move to Meaningful Internet Systems: OTM 2010 Workshops (pp. 563–564). https://doi.org/10.1007/978-3-642-16961-8_79 Li, Q., Panetto, H., Berio, G., & Anyanwu, K. (2010). EI2N’10 & SeDeS’10 - PC Co-chairs Message. In R. Meersman, T. Dillon, & P. Herrero (Eds.), On the Move to Meaningful Internet Systems: OTM 2010 Workshops (pp. 180–181). https://doi.org/10.1007/978-3-642-16961-8_35 Cholewa, J., Mantey, S., Heber, S., & Hollweg, W. (2010). Developmental surface and phonological dysgraphia in German 3rd graders. Reading and Writing, 23(1), 97–127. https://doi.org/10.1007/S11145-008-9153-7 Chang, K.-Y., Georgianna, D. R., Heber, S., Payne, G. A., & Muddiman, D. C. (2010). Detection of Alternative Splice Variants at the Proteome Level in Aspergillus flavus. Journal of Proteome Research, 9(3), 1209–1217. https://doi.org/10.1021/pr900602d Jaikumar, P., & Dutta, R. (2010). Differential capacity p-Cycles: A p-Cycle variant with increased capacity efficiency. Optical Switching and Networking, 7(4), 185–195. https://doi.org/10.1016/j.osn.2010.05.002 Mao, F., & Shen, X. (2010). LU Decomposition on Cell Broadband Engine: An Empirical Study to Exploit Heterogeneous Chip Multiprocessors. In Lecture Notes in Computer Science (pp. 61–75). https://doi.org/10.1007/978-3-642-15672-4_7 Jiang, Y., Tian, K., & Shen, X. (2010). Combining Locality Analysis with Online Proactive Job Co-scheduling in Chip Multiprocessors. In High Performance Embedded Architectures and Compilers (pp. 201–215). https://doi.org/10.1007/978-3-642-11515-8_16 Zhang, E. Z., Jiang, Y., & Shen, X. (2010). Does cache sharing on modern CMP matter to the performance of contemporary multithreaded programs? Proceedings of the 15th ACM SIGPLAN symposium on Principles and practice of parallel programming - PPoPP '10. Presented at the the 15th ACM SIGPLAN symposium. https://doi.org/10.1145/1693453.1693482 Jiang, Y., Zhang, E. Z., Tian, K., & Shen, X. (2010). Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors? In Lecture Notes in Computer Science (pp. 264–282). https://doi.org/10.1007/978-3-642-11970-5_15 Jiang, Y., Zhang, E. Z., Tian, K., Mao, F., Gethers, M., Shen, X., & Gao, Y. (2010). Exploiting statistical correlations for proactive prediction of program behaviors. Proceedings of the 8th annual IEEE/ ACM international symposium on Code generation and optimization - CGO '10. Presented at the the 8th annual IEEE/ ACM international symposium. https://doi.org/10.1145/1772954.1772989 Zhang, E. Z., Jiang, Y., Guo, Z., & Shen, X. (2010). Streamlining GPU applications on the fly. Proceedings of the 24th ACM International Conference on Supercomputing - ICS '10. Presented at the the 24th ACM International Conference. https://doi.org/10.1145/1810085.1810104 Tian, K., Jiang, Y., Zhang, E. Z., & Shen, X. (2010). An input-centric paradigm for program dynamic optimizations. Proceedings of the ACM international conference on Object oriented programming systems languages and applications - OOPSLA '10. Presented at the the ACM international conference. https://doi.org/10.1145/1869459.1869471 Jhala, A., & Young, R. M. (2010). Cinematic Visual Discourse: Representation, Generation, and Evaluation. IEEE Transactions on Computational Intelligence and AI in Games, 2(2), 69–81. https://doi.org/10.1109/tciaig.2010.2046486 Armknecht, F., Sadeghi, A.-R., Scafuro, A., Visconti, I., & Wachsmann, C. (2010). Impossibility Results for RFID Privacy Notions. In Transactions on Computational Science XI (pp. 39–63). https://doi.org/10.1007/978-3-642-17697-5_3 Kapravelos, A., Polakis, I., Athanasopoulos, E., Ioannidis, S., & Markatos, E. P. (2010). D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks. In Computer Security – ESORICS 2010 (pp. 663–678). https://doi.org/10.1007/978-3-642-15497-3_40 Tosun, A., Bener, A., Turhan, B., & Menzies, T. (2010). Practical considerations in deploying statistical methods for defect prediction: A case study within the Turkish telecommunications industry. Information and Software Technology, 52(11), 1242–1257. https://doi.org/10.1016/j.infsof.2010.06.006 El-Rawas, O., & Menzies, T. (2010). A second look at Faster, Better, Cheaper. Innovations in Systems and Software Engineering, 6(4), 319–335. https://doi.org/10.1007/S11334-010-0137-9 Gay, G., Menzies, T., Davies, M., & Gundy-Burlet, K. (2010). Automatically finding the control variables for complex system behavior. Automated Software Engineering, 17(4), 439–468. https://doi.org/10.1007/s10515-010-0072-x Menzies, T., Jalali, O., Hihn, J., Baker, D., & Lum, K. (2010). Stable rankings for different effort models. Automated Software Engineering, 17(4), 409–437. https://doi.org/10.1007/s10515-010-0070-z Menzies, T., Milton, Z., Turhan, B., Cukic, B., Jiang, Y., & Bener, A. (2010). Defect prediction from static code features: current results, limitations, new approaches. Automated Software Engineering, 17(4), 375–407. https://doi.org/10.1007/s10515-010-0069-5 Turhan, B., Bener, A., & Menzies, T. (2010). Regularities in Learning Defect Predictors. In Product-Focused Software Process Improvement (pp. 116–130). https://doi.org/10.1007/978-3-642-13792-1_11 Chi, M., VanLehn, K., Litman, D., & Jordan, P. (2010). Inducing Effective Pedagogical Strategies Using Learning Context Features. In User Modeling, Adaptation, and Personalization (pp. 147–158). https://doi.org/10.1007/978-3-642-13470-8_15 Chi, M., VanLehn, K., & Litman, D. (2010). Do Micro-Level Tutorial Decisions Matter: Applying Reinforcement Learning to Induce Pedagogical Tutorial Tactics. In Intelligent Tutoring Systems (pp. 224–234). https://doi.org/10.1007/978-3-642-13388-6_27 Yannakakis, G. N., Martínez, H. P., & Jhala, A. (2010). Towards affective camera control in games. User Modeling and User-Adapted Interaction, 20(4), 313–340. https://doi.org/10.1007/s11257-010-9078-0 Rowe, J. P., Shores, L. R., Mott, B. W., & Lester, J. C. (2010). Integrating Learning and Engagement in Narrative-Centered Learning Environments. In Intelligent Tutoring Systems (pp. 166–177). https://doi.org/10.1007/978-3-642-13437-1_17 Lee, S. Y., Mott, B. W., & Lester, J. C. (2010). Optimizing Story-Based Learning: An Investigation of Student Narrative Profiles. In Intelligent Tutoring Systems (pp. 155–165). https://doi.org/10.1007/978-3-642-13437-1_16 Robison, J., McQuiggan, S., & Lester, J. (2010). Developing Empirically Based Student Personality Profiles for Affective Feedback Models. In Intelligent Tutoring Systems (pp. 285–295). https://doi.org/10.1007/978-3-642-13388-6_33 Rowe, B., Wood, D., & Reeves, D. (2010). How the Public Views Strategies Designed to Reduce the Threat of Botnets. In Trust and Trustworthy Computing (pp. 337–351). https://doi.org/10.1007/978-3-642-13869-0_25 Traynor, P., Butler, K., Enck, W., McDaniel, P., & Borders, K. (2010). malnets: large-scale malicious networks via compromised wireless access points. Security and Communication Networks, 3(2-3), 102–113. https://doi.org/10.1002/sec.149 Fu, H., Gao, S., & Anyanwu, K. (2010). Disambiguating Keyword Queries on RDF Databases Using "Deep" Segmentation. 2010 IEEE Fourth International Conference on Semantic Computing, 236–243. https://doi.org/10.1109/ICSC.2010.90 An agglomerative query model for discovery in linked data. (2010). Procceedings of the 13th International Workshop on the Web and Databases - WebDB '10. https://doi.org/10.1145/1859127.1859131 Stamper, J., Barnes, T., & Croy, M. (2010). Enhancing the Automatic Generation of Hints with Expert Seeding. In Intelligent Tutoring Systems (pp. 31–40). https://doi.org/10.1007/978-3-642-13437-1_4 Mostafavi, B., & Barnes, T. (2010). Towards the Creation of a Data-Driven Programming Tutor. In Intelligent Tutoring Systems (pp. 239–241). https://doi.org/10.1007/978-3-642-13437-1_31 Johnson, M., & Barnes, T. (2010). Visualizing Educational Data from Logic Tutors. In Intelligent Tutoring Systems (pp. 233–235). https://doi.org/10.1007/978-3-642-13437-1_29 Eagle, M., & Barnes, T. (2010). Intelligent Tutoring Systems, Educational Data Mining, and the Design and Evaluation of Video Games. In Intelligent Tutoring Systems (pp. 215–217). https://doi.org/10.1007/978-3-642-13437-1_23 Mouallem, P., Crawl, D., Altintas, I., Vouk, M., & Yildiz, U. (2010). A Fault-Tolerance Architecture for Kepler-Based Distributed Scientific Workflows. In Lecture Notes in Computer Science (pp. 452–460). https://doi.org/10.1007/978-3-642-13818-8_31 Boyer, K. E., Phillips, R., Ingram, A., Ha, E. Y., Wallis, M., Vouk, M., & Lester, J. (2010). Characterizing the Effectiveness of Tutorial Dialogue with Hidden Markov Models. In Intelligent Tutoring Systems (pp. 55–64). https://doi.org/10.1007/978-3-642-13388-6_10 Matsuda, N., Cohen, W. W., Koedinger, K. R., Stylianides, G., Keiser, V., & Raizada, R. (2010). Tuning cognitive tutors into a platform for learning-by-teaching with SimStudent technology. CEUR Workshop Proceedings, 587, 20–25. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84888214372&partnerID=MN8TOARS Li, N., Matsuda, N., Cohen, W. W., & Koedinger, K. R. (2010). Towards a computational model of why some students learn faster than others. AAAI Fall Symposium - Technical Report, FS-10-01, 40–46. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-79960149222&partnerID=MN8TOARS Matsuda, N., Keiser, V., Raizada, R., Tu, A., Stylianides, G., Cohen, W. W., & Koedinger, K. R. (2010). Learning by teaching SimStudent: Technical accomplishments and an initial use with students. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 317–326). https://doi.org/10.1007/978-3-642-13388-6_36 Matsuda, N., Keiser, V., Raizada, R., Stylianides, G., Cohen, W. W., & Koedinger, K. (2010). Learning by teaching SimStudent. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (p. 449). https://doi.org/10.1007/978-3-642-13437-1_106 Seymour, P., & Sullivan, B. D. (2010). Counting paths in digraphs. European Journal of Combinatorics, 31(3), 961–975. https://doi.org/10.1016/j.ejc.2009.05.008 Finkelstein, S., Nickel, A., Barnes, T., & Suma, E. A. (2010). Astrojumper: motivating children with autism to exercise using a VR game. Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems - CHI EA '10. Presented at the the 28th of the international conference extended abstracts. https://doi.org/10.1145/1753846.1754124 Chaffin, A., & Barnes, T. (2010). Lessons from a course on serious games research and prototyping. Proceedings of the Fifth International Conference on the Foundations of Digital Games - FDG '10. Presented at the the Fifth International Conference. https://doi.org/10.1145/1822348.1822353 Dahlberg, T., Barnes, T., Buch, K., & Bean, K. (2010). Applying service learning to computer science: attracting and engaging under-represented students. Computer Science Education, 20(3), 169–180. https://doi.org/10.1080/08993408.2010.492164 Barnes, T. (2010). Novel Derivation and Application of Skill Matrices. In Handbook of Educational Data Mining (pp. 159–172). https://doi.org/10.1201/b10274-14 Barnes, T., Stamper, J., & Croy, M. (2010). Using Markov Decision Processes for Automatic Hint. In Handbook of Educational Data Mining (pp. 467–480). https://doi.org/10.1201/b10274-36 Miller, G. L., & Sheehy, D. R. (2010). Approximate centerpoints with proofs. Computational Geometry, 43(8), 647–654. https://doi.org/10.1016/j.comgeo.2010.04.006 Hudson, B., Miller, G. L., Oudot, S. Y., & Sheehy, D. R. (2010). Topological inference via meshing. Proceedings of the 2010 annual symposium on Computational geometry - SoCG '10. Presented at the the 2010 annual symposium. https://doi.org/10.1145/1810959.1811006 Programming Multiagent Systems without Programming Agents. (2010). Lecture Notes in Computer Science. https://doi.org/10.1145/1754288.1754302 Multidisciplinary Views of Business Contracts. (2010). Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-642-17358-5_76 Chopra, A. K., Mylopoulos, J., Dalpiaz, F., Giorgini, P., & Singh, M. P. (2010). Requirements as goals and commitments too. In Intentional Perspectives on Information Systems Engineering (pp. 137–153). https://doi.org/10.1007/978-3-642-12544-7_8 Singh, M. P., & Chopra, A. K. (2010). Programming multiagent systems without programming agents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 1–14). https://doi.org/10.1007/978-3-642-14843-9_1 Brazier, F. M., Dignum, F., Dignum, V., Huhns, M. H., Lessner, T., Padget, J., … Singh, M. P. (2010). Governance of services: A natural function for agents. Belgian/Netherlands Artificial Intelligence Conference. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84873828353&partnerID=MN8TOARS Hang, C.-W., & Singh, M. P. (2010). From quality to utility: Adaptive service selection framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 456–470). https://doi.org/10.1007/978-3-642-17358-5_31 Chopra, A. K., & Singh, M. P. (2010). Elements of a Business-Level Architecture for Multiagent Systems. In Lecture Notes in Computer Science: Vol. 5919 LNAI (pp. 15–30). https://doi.org/10.1007/978-3-642-14843-9_2 Udupi, Y. B., & Singh, M. P. (2010). Information sharing among autonomous agents in referral networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 13–26). https://doi.org/10.1007/978-3-642-11368-0_2 ElMessiry, A. M., Gao, X., & Singh, M. P. (2010). Incorporating expectations as a basis for business service selection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 486–500). https://doi.org/10.1007/978-3-642-17358-5_33 Singh, M. P., & Chopra, A. K. (2010). Correctness properties for multiagent systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 192–207). https://doi.org/10.1007/978-3-642-11355-0_12 Telang, P. R., & Singh, M. P. (2010). Abstracting and Applying Business Modeling Patterns from RosettaNet. In Service-Oriented Computing: Vol. 6470 LNCS (pp. 426–440). https://doi.org/10.1007/978-3-642-17358-5_29 Stallmann, M. F., & Gupta, S. (2010). Bottleneck crossing minimization in layered graphs (No. TR-2010-13). Dept of Computer Science, North Carolina State University. Stallmann, M. F., & Brglez, F. (2010). High-contrast algorithm behavior: Observation, conjecture, and experimental design. North Carolina State University. Dept. of Computer Science. Kumar, M., Ajmeri, N., & Ghaisas, S. (2010). Towards knowledge assisted agile requirements evolution. In R. Holmes, M. P. Robillard, R. J. Walker, & T. Zimmermann (Eds.), Proceedings - International Conference on Software Engineering (pp. 16–20). https://doi.org/10.1145/1808920.1808924 Ajmeri, N., Sejpal, R., & Ghaisas, S. (2010). A semantic and collaborative platform for agile requirements evolution. 2010 3rd International Workshop on Managing Requirements Knowledge, MaRK'10, 32–40. https://doi.org/10.1109/MARK.2010.5623810 Hutton, S., Kaltofen, E. L., & Zhi, L. (2010). Computing the radius of positive semidefiniteness of a multivariate real polynomial via a dual of Seidenberg's method. Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation - ISSAC '10. Presented at the the 2010 International Symposium. https://doi.org/10.1145/1837934.1837979 Kaltofen, E. L. (2010). Fifteen years after DSC and WLSS2 what parallel computations I do today. Proceedings of the 4th International Workshop on Parallel and Symbolic Computation - PASCO '10. Presented at the the 4th International Workshop. https://doi.org/10.1145/1837210.1837213 Ramachandran, L., & Gehringer, E. F. (2010). Automated metareviewing. Proceedings of Intelligent Tutoring Systems 2010: Workshop on Computer-Supported Peer Review in Education. Presented at the Intelligent Tutoring Systems 2010: Workshop on Computer-Supported Peer Review in Education, Pittsburgh, PA. Gehringer, E. F., Kadanjoth, R., & Kidd, J. (2010). Software support for peer-reviewing wiki textbooks and other large projects. Proceedings of Intelligent Tutoring Systems 2010: Workshop on Computer-Supported Peer Review in Education. Presented at the Intelligent Tutoring Systems 2010: Workshop on Computer-Supported Peer Review in Education, Pittsburgh, PA. Gehringer, E. F. (2010). Expertiza. In Monitoring and Assessment in Online Collaborative Environments (pp. 75–96). https://doi.org/10.4018/978-1-60566-786-7.ch005 Gehringer, E. F., Kadanjoth, R., & Kidd, J. (2010). Software support for writing wiki textbooks. 2010 IEEE Frontiers in Education Conference (FIE). Presented at the 2010 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/fie.2010.5673120 Thomas, J. M., & Young, R. M. (2010). Annie: Automated Generation of Adaptive Learner Guidance for Fun Serious Games. IEEE Transactions on Learning Technologies, 3(4), 329–343. https://doi.org/10.1109/tlt.2010.32 Singh, M. P., & Chopra, A. K. (2010). Programming multiagent systems without programming agents. Programming multi-agent systems, 5919, 1–14. Miao, S., & Krim, H. (2010). 3D FACE RECOGNITION BASED ON EVOLUTION OF ISO-GEODESIC DISTANCE CURVES. 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, pp. 1134–1137. https://doi.org/10.1109/icassp.2010.5495363 Pathak, P. H., & Dutta, R. (2010). Using centrality-based power control for hot-spot mitigation in wireless networks. 2010 ieee global telecommunications conference globecom 2010. https://doi.org/10.1109/glocom.2010.5683097 Liu, Y., Ning, P., Dai, H. Y., & Liu, A. (2010). Randomized differential DSSS: Jamming-resistant wireless broadcast communication. 2010 proceedings ieee infocom. https://doi.org/10.1109/infcom.2010.5462156 Wang, L., Jang, C., Zhang, Y., Wang, K., Zhang, Q., Streets, D., … Phillips, S. (2010). Assessment of air quality benefits from national air pollution control policies in China. Part I: Background, emission scenarios and evaluation of meteorological predictions. ATMOSPHERIC ENVIRONMENT, 44(28), 3442–3448. https://doi.org/10.1016/j.atmosenv.2010.05.051 Singh, M. P., & Desai, N. (2010). Multidisciplinary views of business contracts. Service-oriented computing, 6470, 730–730. ElMessiry, A. M., Gao, X. B., & Singh, M. P. (2010). Incorporating expectations as a basis for business service selection. Service-oriented computing, 6470, 486–500. Hang, C. W., & Singh, M. P. (2010). From quality to utility: Adaptive service selection framework. Service-oriented computing, 6470, 456–470. Chen, Z., Wilson, K. A., Jin, Y., & Samatova, N. F. (2010). Detecting and Tracking Community Dynamics in Evolutionary Networks. The 10th IEEE International Conference on Data Mining Workshops, 318–327. https://doi.org/10.1109/icdmw.2010.32 Pittard, J. J., & Tharp, A. L. (2010). Simplified self-adapting skip lists. Intelligent data engineering and automated learning - ideal 2010, 6283, 126–136. https://doi.org/10.1007/978-3-642-15381-5_16 Wang, Y. G. (2010). SIP overload control: A backpressure-based approach. Computer Communication Review, 40(4), 399–400. Yun, C., & Perros, H. (2010). QoS Control for NGN: A Survey of Techniques. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 18(4), 447–461. https://doi.org/10.1007/s10922-010-9157-x Lee, K., Rhee, I., Lee, J., Yi, Y., & Chong, S. (2010). Mobile data offloading: How much can WiFi deliver? Computer Communication Review, 40(4), 425–426. Kaltofen, E., & Lavin, M. (2010). Efficiently Certifying Non-Integer Powers. COMPUTATIONAL COMPLEXITY, 19(3), 355–366. https://doi.org/10.1007/s00037-010-0297-x Yoon, S. R. (2010). Contrabass: Concurrent transmissions without coordination. Computer Communication Review, 40(4), 403–404. Poliannikov, O. V., Zhizhina, E., & Krim, H. (2010). Global optimization by adapted diffusion. IEEE Transactions on Signal Processing, 58(12), 6119–6125. https://doi.org/10.1109/tsp.2010.2071867 Marathe, J., Thakkar, V., & Mueller, F. (2010). Feedback-directed page placement for ccNUMA via hardware-generated memory traces. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 70(12), 1204–1219. https://doi.org/10.1016/j.jpdc.2010.08.015 Chen, B., Rouskas, G. N., & Dutta, R. (2010). Clustering Methods for Hierarchical Traffic Grooming in Large-Scale Mesh WDM Networks. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2(8), 502–514. https://doi.org/10.1364/jocn.2.000502 Wang, Z., & Jiang, X. X. (2010). hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. 2010 IEEE symposium on security and privacy, 380–395. Ramaprasad, H., & Mueller, F. (2010). Tightening the Bounds on Feasible Preemptions. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2). https://doi.org/10.1145/1880050.1880063 Mohan, S., Mueller, F., Root, M., Hawkins, W., Healy, C., Whalley, D., & Vivancos, E. (2010). Parametric Timing Analysis and Its Application to Dynamic Voltage Scaling. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2). https://doi.org/10.1145/1880050.1880061 Liu, Y., Ning, P., & Dai, H. (2010). Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. 2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301. https://doi.org/10.1109/sp.2010.24 Tan, Y., Gu, X., & Wang, H. (2010). Adaptive System Anomaly Prediction for Large-Scale Hosting Infrastructures. PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 173–182. https://doi.org/10.1145/1835698.1835741 Karmous-Edwards, G., Polito, S. G., Jukan, A., & Rouskas, G. (2010). A new framework for GLIF Interdomain Resource Reservation Architecture (GIRRA). ANNALS OF TELECOMMUNICATIONS, 65(11-12), 723–737. https://doi.org/10.1007/s12243-010-0186-y Mouallem, P., Crawl, D., Altintas, I., Vouk, M., & Yildiz, U. (2010). A fault-tolerance architecture for kepler-based distributed scientific workflows. Scientific and statistical database management, 6187, 452–460. Cox, D. N., & Tharp, A. L. (2010). Toward a Visualization of DNA Sequences. ADVANCES IN COMPUTATIONAL BIOLOGY, Vol. 680, pp. 419–435. https://doi.org/10.1007/978-1-4419-5913-3_48 Ding, M., & Gard, K. G. (2010). Tanh cascode cell amplifier - an arbitrary transfer characteristics amplifier. Electronics Letters, 46(22), 1495–1496. Tateosian, L. G., Mitasova, H., Harmon, B. A., Fogleman, B., Weaver, K., & Harmon, R. S. (2010). TanGeoMS: Tangible Geospatial Modeling System. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, Vol. 16, pp. 1605–1612. https://doi.org/10.1109/tvcg.2010.202 Mukherjee, B., Subramaniam, S., Sivalingam, K., Dutta, R., Datta, D., & Mohan, S. (2010, December). Special Issue: Selected Papers from the Third International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2009). OPTICAL SWITCHING AND NETWORKING, Vol. 7, pp. 139–140. https://doi.org/10.1016/j.osn.2010.08.001 Li, N., Xie, T., Jin, M., & Liu, C. (2010). Perturbation-based user-input-validation testing of web applications. JOURNAL OF SYSTEMS AND SOFTWARE, 83(11), 2263–2274. https://doi.org/10.1016/j.jss.2010.07.007 Bezerianos, A., Dragicevic, P., Fekete, J.-D., Bae, J., & Watson, B. (2010). GeneaQuilts: A System for Exploring Large Genealogies. IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, Vol. 16, pp. 1073–1081. https://doi.org/10.1109/tvcg.2010.159 Wang, Y., & Singh, M. P. (2010). Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems. ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 5(4). https://doi.org/10.1145/1867713.1867715 Jaikumar, P., & Dutta, R. (2010). Differential capacity p-Cycles: A p-Cycle variant with increased capacity efficiency. Optical Switching and Networking, 7(4), 185–195. Bahram, S., Jiang, X. X., Wang, Z., Grace, M., Li, J. K., Srinivasan, D., … Xu, D. Y. (2010). DKSM: Subverting virtual machine introspection for fun and profit. 2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91. Riley, R., Jiang, X., & Xu, D. (2010). An Architectural Approach to Preventing Code Injection Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365. https://doi.org/10.1109/tdsc.2010.1 Beck, M., Gessel, I. M., Lee, S., & Savage, C. D. (2010). Symmetrically constrained compositions. RAMANUJAN JOURNAL, 23(1-3), 355–369. https://doi.org/10.1007/s11139-010-9232-7 Lim, J. B., Jang, B., Yoon, S., Sichitiu, M. L., & Dean, A. G. (2010). RaPTEX: Rapid Prototyping Tool for Embedded Communication Systems. ACM TRANSACTIONS ON SENSOR NETWORKS, 7(1). https://doi.org/10.1145/1806895.1806902 McAllister, D. F., Zhou, Y., & Sullivan, S. (2010). Methods for computing color anaglyphs. STEREOSCOPIC DISPLAYS AND APPLICATIONS XXI, Vol. 7524. https://doi.org/10.1117/12.837163 Pandita, R., Xie, T., Tillmann, N., & Halleux, J. (2010). Guided test generation for coverage criteria. 2010 ieee international conference on software maintenance. https://doi.org/10.1109/icsm.2010.5609565 Williams, L. (2010, August). Guest editorial: Special issue on software reliability engineering. EMPIRICAL SOFTWARE ENGINEERING, Vol. 15, pp. 321–322. https://doi.org/10.1007/s10664-010-9129-5 Yang, Z., Lichtenwalner, D., Morris, A., Krim, J., & Kingon, A. I. (2010). Contact degradation in hot/cold operation of direct contact micro-switches. JOURNAL OF MICROMECHANICS AND MICROENGINEERING, 20(10). https://doi.org/10.1088/0960-1317/20/10/105028 Murphy-Hill, E., & Black, A. P. (2010). An interactive ambient visualization for code smells. Softvis 2010: Proceedings of the 2010 International Symposium on Software Visualization, 5–14. https://doi.org/10.1145/1879211.1879216 Gehringer, E., & Cross, W. T. (2010). A suite of Google services for daily course evaluation. 2010 IEEE frontiers in education conference (FIE). https://doi.org/10.1109/fie.2010.5673187 Lee, D., & Krim, H. (2010). 3D surface reconstruction using structured circular light patterns. Advanced concepts for intelligent vision systems, pt i, 6474, 279–289. https://doi.org/10.1007/978-3-642-17688-3_27 Chen, Y., Jayasekera, T., Calzolari, A., Kim, K. W., & Nardelli, M. B. (2010). Thermoelectric properties of graphene nanoribbons, junctions and superlattices. JOURNAL OF PHYSICS-CONDENSED MATTER, 22(37). https://doi.org/10.1088/0953-8984/22/37/372202 Smith, B., Williams, L., & Austin, A. (2010). Idea: Using system level testing for revealing SQL injection-related error message information leaks. Engineering secure software and systems, proceedings, 5965, 192–200. Deodhar, S., & Motsinger-Reif, A. (2010). Grammatical evolution decision trees for detecting gene-gene interactions. Evolutionary computation, machine learning and data mining in bioinformatics, proceedings, 6023, 98–109. Lv, Q., & Rouskas, G. N. (2010). An economic model for pricing tiered network services. ANNALS OF TELECOMMUNICATIONS, 65(3-4), 147–161. https://doi.org/10.1007/s12243-009-0149-3 Howard, B. E., & Heber, S. (2010). Towards reliable isoform quantification using RNA-SEQ data. BMC BIOINFORMATICS, Vol. 11. https://doi.org/10.1186/1471-2105-11-s3-s6 Kim, M., & Chae, K. (2010). DMP: Detouring using multiple paths against jamming attack for ubiquitous networking system. Sensors (Basel, Switzerland), 10(4), 3626–3640. Williams, L. (2010). Agile software development methodologies and practices. Advances in Computers, Vol 80, 80, 1–44. Riedl, M. O., & Young, R. M. (2010). Narrative Planning: Balancing Plot and Character. Journal of Artificial Intelligence Research, 39, 217–268. https://doi.org/10.1613/jair.2989 Thummalapenta, S., Halleux, J., Tillmann, N., & Wadsworth, S. (2010). Dygen: Automatic generation of high-coverage tests via mining gigabytes of dynamic traces. Test and proofs, proceedings, 6143, 77–93. Hendrix, W., Schmidt, M. C., Breimyer, P., & Samatova, N. F. (2010). Theoretical underpinnings for maximal clique enumeration on perturbed graphs. THEORETICAL COMPUTER SCIENCE, 411(26-28), 2520–2536. https://doi.org/10.1016/j.tcs.2010.03.011 Williams, L., Meneely, A., & Shipley, G. (2010). Protection Poker: The New Software Security "Game". IEEE SECURITY & PRIVACY, 8(3), 14–20. https://doi.org/10.1109/msp.2010.58 Zhang, R., Wang, X., Yang, X., & Jiang, X. (2010). On the billing vulnerabilities of SIP-based VoIP systems. COMPUTER NETWORKS, 54(11), 1837–1847. https://doi.org/10.1016/j.comnet.2010.02.007 Chen, P.-F., Krim, H., & Mendoza, O. L. (2010). Multiphase Joint Segmentation-Registration and Object Tracking for Layered Images. IEEE TRANSACTIONS ON IMAGE PROCESSING, 19(7), 1706–1719. https://doi.org/10.1109/tip.2010.2045164 Udupi, Y. B., & Singh, M. P. (2010). Information sharing among autonomous agents in referral networks. Agents and peer-to-peer computing, 5319, 13–26. Chen, W. B., Yin, D. P., & Chen, Z. Z. (2010). Inapproximability results for equations over infinite groups. Theoretical Computer Science, 411(26-28), 2513–2519. Fawaz, W., Ouaiss, I., Chen, K., & Perros, H. (2010). Deadline-based connection setup in wavelength-routed WDM networks. COMPUTER NETWORKS, 54(11), 1792–1804. https://doi.org/10.1016/j.comnet.2010.02.008 Shi, R., Sun, Y.-H., Li, Q., Heber, S., Sederoff, R., & Chiang, V. L. (2010). [Review of Towards a Systems Approach for Lignin Biosynthesis in Populus trichocarpa: Transcript Abundance and Specificity of the Monolignol Biosynthetic Genes]. PLANT AND CELL PHYSIOLOGY, 51(1), 144–163. https://doi.org/10.1093/pcp/pcp175 Aouada, D., & Krim, H. (2010). Squigraphs for Fine and Compact Modeling of 3-D Shapes. IEEE TRANSACTIONS ON IMAGE PROCESSING, 19(2), 306–321. https://doi.org/10.1109/TIP.2009.2034693 Le, L., & Rhee, I. (2010). Implementation and experimental evaluation of multi-channel MAC protocols for 802.11 networks. AD HOC NETWORKS, 8(6), 626–639. https://doi.org/10.1016/j.adhoc.2009.12.004 Chapman, J. A., Kirkness, E. F., Simakov, O., Hampson, S. E., Mitros, T., Weinmaier, T., … Walenz, B. (2010). The dynamic genome of Hydra. Nature, 464(7288), 592–596. Hao, D., Xie, T., Zhang, L., Wang, X., Sun, J., & Mei, H. (2010). Test input reduction for result inspection to facilitate fault localization. AUTOMATED SOFTWARE ENGINEERING, 17(1), 5–31. https://doi.org/10.1007/s10515-009-0056-x Kim, H. C., Lee, D., Chon, K., Jang, B., Kwon, T., & Choi, Y. (2010). Performance impact of large file transfer on web proxy caching: A case study in a high bandwidth campus network environment. Journal of Communications and Networks, 12(1), 52–66. Baloch, S., & Krim, H. (2010). Object Recognition Through Topo-Geometric Shape Models Using Error-Tolerant Subgraph Isomorphisms. IEEE TRANSACTIONS ON IMAGE PROCESSING, 19(5), 1191–1200. https://doi.org/10.1109/tip.2009.2039372 Feng, S., Kogan, I., & Krim, H. (2010). Classification of Curves in 2D and 3D via Affine Integral Signatures. ACTA APPLICANDAE MATHEMATICAE, 109(3), 903–937. https://doi.org/10.1007/s10440-008-9353-9 Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). Anonymizing bipartite graph data using safe groupings. VLDB JOURNAL, Vol. 19, pp. 115–139. https://doi.org/10.1007/s00778-009-0167-9 Young, R. M. (2010). The play's the thing. IEEE Internet Computing, 14(1), 16–18. Jiang, X., Wang, X., & Xu, D. (2010). Stealthy Malware Detection and Monitoring through VMM-Based "Out-of-the-Box" Semantic View Reconstruction. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 13(2). https://doi.org/10.1145/1698750.1698752 Cerf, V. G., & Singh, M. P. (2010). Internet Predictions. IEEE INTERNET COMPUTING, Vol. 14, pp. 10–11. https://doi.org/10.1109/mic.2010.11 Kocher, S. D., Ayroles, J. F., Stone, E. A., & Grozinger, C. M. (2010). Individual variation in pheromone response correlates with reproductive traits and brain gene expression in worker honey bees. PLoS One, 5(2). Anton, A. I., Earp, J. B., & Young, J. D. (2010). How internet users' privacy concerns have evolved since 2002. IEEE Security & Privacy Magazine, 8(1), 21–27. https://doi.org/10.1109/msp.2010.38 Krish, K., Heinrich, S., Snyder, W. E., Cakir, H., & Khorram, S. (2010). Global registration of overlapping images using accumulative image features. PATTERN RECOGNITION LETTERS, 31(2), 112–118. https://doi.org/10.1016/j.patrec.2009.09.016 Massey, A. K., Otto, P. N., Hayward, L. J., & Anton, A. I. (2010). Evaluating existing security and privacy requirements for legal compliance. REQUIREMENTS ENGINEERING, 15(1), 119–137. https://doi.org/10.1007/s00766-009-0089-5 Yavuz, A. A., Alagoz, F., & Anarim, E. (2010). A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turkish Journal of Electrical Engineering and Computer Sciences, 18(1), 1–21. Pan, C., Park, B. H., McDonald, W. H., Carey, P. A., Banfield, J. F., VerBerkmoes, N. C., … Samatova, N. F. (2010). A high-throughput de novo sequencing approach for shotgun proteomics using high-resolution tandem mass spectrometry. BMC Bioinformatics, 11. Gantt, B., Meskhidze, N., Zhang, Y., & Xu, J. (2010). The effect of marine isoprene emissions on secondary organic aerosol and ozone formation in the coastal United States. Atmospheric Environment, 44(1), 115–121. https://doi.org/10.1016/j.atmosenv.2009.08.027 Vanegas, C. A., Aliaga, D. G., Wonka, P., Mueller, P., Waddell, P., & Watson, B. (2010). Modelling the Appearance and Behaviour of Urban Spaces. COMPUTER GRAPHICS FORUM, 29(1), 25–42. https://doi.org/10.1111/j.1467-8659.2009.01535.x Thummalapenta, S., Cerulo, L., Aversano, L., & Di Penta, M. (2010). An empirical study on the maintenance of source code clones. Empirical Software Engineering, 15(1), 1–34. Boella, G., Pigozzi, G., Singh, M. P., & Verhagen, H. (2010, February). Normative Multiagent Systems: Guest Editors' Introduction. LOGIC JOURNAL OF THE IGPL, Vol. 18, pp. 1–3. https://doi.org/10.1093/jigpal/jzp079