Computer Science - 2016 Heckman, S., & King, J. (2016). Teaching Software Engineering Skills in CS1. 5: Incorporating Real-world Practices and Tools. Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 696–697. Johnson, B., Pandita, R., Smith, J., Ford, D., Elder, S., Murphy-Hill, E., … Sadowski, C. (2016). A Cross-Tool Study on Program Analysis Tool Notification Communication. Johnson, B., Pandita, R., Smith, J., Ford, D., Elder, S., Murphy-Hill, E., … Sadowski, C. (2016). A cross-tool communication study on program analysis tool notifications. Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 73–84. Al-Zubidy, A., Carver, J. C., Heckman, S., & Sherriff, M. (2016). A (Updated) Review of Empiricism at the SIGCSE Technical Symposium. Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 120–125. Li, X., d’Amorim, M., & Orso, A. (2016). Iterative User-Driven Fault Localization. Hardware and Software: Verification and Testing - 12th International Haifa Verification Conference, HVC 2016, Haifa, Israel, November 14-17, 2016, Proceedings, 82–98. https://doi.org/10.1007/978-3-319-49052-6_6 Bloem, R., & Arbel, E. (Eds.). (2016). Hardware and Software: Verification and Testing - 12th International Haifa Verification Conference, HVC 2016, Haifa, Israel, November 14-17, 2016, Proceedings. https://doi.org/10.1007/978-3-319-49052-6 Baruah, S., Easwaran, A., & Guo, Z. (2016). Mixed-criticality scheduling to minimize makespan. Proceedings of the 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Presented at the 36th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS) Leibniz International Proceedings in Informatics, Chennai, India. Guo, Z. (2016). Real-Time Scheduling of Mixed-Critical Workloads upon Platforms with Uncertainties (Ph.D. Thesis). University of North Carolina-Chapel Hill. Guo, Z. (2016). Mixed-Criticality Scheduling on Varying-Speed Platforms with Bounded Performance Drop Rate. Presented at the 2016 IEEE International Conference on Smart Computing (SMARTCOMP). https://doi.org/10.1109/smartcomp.2016.7501705 Baruah, S., Burns, A., & Guo, Z. (2016). Scheduling Mixed-Criticality Systems to Guarantee Some Service under All Non-erroneous Behaviors. Presented at the 2016 28th Euromicro Conference on Real-Time Systems (ECRTS). https://doi.org/10.1109/ecrts.2016.12 Santinelli, L., Guo, Z., & George, L. (2016). Fault-aware sensitivity analysis for probabilistic real-time systems. Presented at the 2016 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT). https://doi.org/10.1109/dft.2016.7684072 Cheng, W., Guo, Z., Zhang, X., & Wang, W. (2016). CGC. ACM Transactions on Knowledge Discovery from Data, 10(4), 1–27. https://doi.org/10.1145/2903147 Guo, Z., & Baruah, S. K. (2016). A Neurodynamic Approach for Real-Time Scheduling via Maximizing Piecewise Linear Utility. IEEE Transactions on Neural Networks and Learning Systems, 27(2), 238–248. https://doi.org/10.1109/tnnls.2015.2466612 Srinivasa Ragavan, S., Kuttal, S. K., Hill, C., Sarma, A., Piorkowski, D., & Burnett, M. (2016). Foraging Among an Overabundance of Similar Variants. Presented at the CHI'16: CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/2858036.2858469 Sarma, A., Chen, X., Kuttal, S., Dabbish, L., & Wang, Z. (2016). Hiring in the Global Stage: Profiles of Online Contributions. Presented at the 2016 IEEE 11th International Conference on Global Software Engineering (ICGSE). https://doi.org/10.1109/icgse.2016.35 Martos, C., Kim, S. Y., & Kuttal, S. K. (2016). Reuse of variants in online repositories: Foraging for the fittest. Presented at the 2016 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vlhcc.2016.7739674 Liu, J., Ding, H., Cai, Y., Yue, H., Fang, Y., & Chen, S. (2016). An energy-efficient strategy for secondary users in cooperative cognitive radio networks for green communications. IEEE Journal on Selected Areas in Communications, 34(12), 3195–3207. Liu, J., Zhang, C., Ding, H., Yue, H., & Fang, Y. (2016). Policy-based privacy-preserving scheme for primary users in database-driven cognitive radio networks. 2016 IEEE Global Communications Conference (GLOBECOM), 1–6. Santarra, T., & Jhala, A. (2016). Communicating intentions for coordination with unknown teammates. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 1423–1424. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85014233006&partnerID=MN8TOARS Santarra, T., & Jhala, A. (2016). Adapting plans through communication with unknown teammates. Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS, 1526–1527. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85014133684&partnerID=MN8TOARS Sarratt, T., & Jhala, A. (2016). Policy communication for coordination with unknown teammates. AAAI Workshop - Technical Report, WS-16-01 - WS-16-15, 567–573. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85021898504&partnerID=MN8TOARS Martens, C., Summerville, A., Mateas, M., Osborn, J., Harmon, S., Wardrip-Fruin, N., & Jhala, A. (2016). Proceduralist readings, procedurally. AAAI Workshop - Technical Report, WS-16-21 - WS-16-23, 53–59. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85021886472&partnerID=MN8TOARS Zhao, Y., Liao, C., & Shen, X. (2016). Towards Ontology-Based Program Analysis (Technical Report No. TR-2016-5). North Carolina State University. Eagle, M., Mostafavi, B., & Barnes, T. (2016). Data-driven Domain Models for Problem Solving. In R. Sottilare, A. Graesser, X. Hu, A. Olney, B. Nye, & A. Sinatra (Eds.), Design Recommendations for Intelligent Tutoring Systems: Domain Modeling (Vol. 4). Orlando, Florida: Army Research Laboratory. Rowe, E., Asbell-Clarke, J., Hicks, M. E. A., Barnes, T., Brown, R., & Edwards, T. (2016). Validating Game-based Measures of Implicit Science Learning. Educational Data Mining, 490–495. Mostafavi, B., & Barnes, T. (2016). Exploring the Impact of Data-driven Tutoring Methods on Students' Demonstrative Knowledge in Logic Problem Solving Educational Data Mining (EDM2016). Educational Data Mining, 460–465. Zhou, G., Lynch, C., Price, T., Barnes, T., & Chi, M. (2016). The Impact of Granularity on the Effectiveness of Students' Pedagogical Decision. Presented at the Annual Meeting of the Cognitive Science Society (CogSci). Liu, Z., Brown, R., Lynch, C., Barnes, T., Baker, R., Bergner, Y., & Mcnamara, D. (2016). MOOC Learning by Country and Culture; an Exploratory Analysis. Educational Data Mining, EDM2016, 127–134. Padia, K., & Healey, C. G. (2016). Sentiment-based document collection narratives. Presented at the Laboratory of Analytic Sciences (LAS) Research Symposium, Raleigh, NC. Vila-Parrish, A., Baldwin, T., Battestilli, L., Queen, H., Schmidt, J., & Carson, S. (2016). TH!NK: A Framework to Assess and Support Critical and Creative Thinking. 2016 ASEE Annual Conference & Exposition Proceedings. Presented at the 2016 ASEE Annual Conference & Exposition, New Orleans, Louisiana. https://doi.org/10.18260/p.26081 Devarajan, R., Benson, J. R., Caira, D. J., Sethi, S., Cox, J. A., Healey, C. G., … Padia, K. (2016, December). Visualizing results of electronic sentiment analysis. Google Patents. Padia, K. (2016). Visualizing Narratives. North Carolina State University. Devarajan, R., Benson, J. R., Caira, D. J., Sethi, S., Cox, J. A., Healey, C. G., … others. (2016, December). Visualizations for electronic narrative analytics. Google Patents. Hicks, D., Liu, Z., Eagle, M., & Barnes, T. (2016). Measuring Gameplay Affordances of User-Generated Content in and Educational Game. Presented at the International Conference on Educational Data Mining (EDM), Raleigh, North Carolina. Heckman, S., & King, J. (2016). Teaching Software Engineering Skills in CS1.5: Incorporating Real-world Practices and Tools (Abstract Only). Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 696–697. https://doi.org/10.1145/2839509.2850562 Carver, J. C., Burcham, M., Kocak, S. A., Bener, A., Felderer, M., Gander, M., … Williams, L. (2016). Establishing a Baseline for Measuring Advancement in the Science of Security: An Analysis of the 2015 IEEE Security & Privacy Proceedings. Proceedings of the Symposium and Bootcamp on the Science of Security, 38–51. https://doi.org/10.1145/2898375.2898380 Ning, L., & Shen, X. (2016). LCD: A Fast Contrastive Divergence Based Training Algorithm for Restricted Boltzmann Machine” (No. TR-2016-3). Raleigh, NC: North Carolina State University. Zhao, Y., Chen, G., Liao, C., & Shen, X. (2016). Towards Ontology-Based Program Analysis. In S. Krishnamurthi & B. S. Lerner (Eds.), 30th European Conference on Object-Oriented Programming (ECOOP 2016) (pp. 26:1–26:25). Dagstuhl, Germany: Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik. Chen, G., Shen, X., & Zhou, H. (2016). A Software Framework for Efficient Preemptive Scheduling on GPU (Technical Report No. TR-2016-1). North Carolina State University. Chopra, A. K., & Singh, M. P. (2016). Custard: Computing Norm States over Information Stores. Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems (AAMAS), 1096–1105. Singapore: IFAAMAS. Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., & Visconti, I. (2016). Improved OR-Composition of Sigma-Protocols. In Lecture Notes in Computer Science: Vol. 9563. Theory of Cryptography. TCC 2016 (pp. 112–141). https://doi.org/10.1007/978-3-662-49099-0_5 Chirkova, R. (2016). Combined-semantics equivalence of conjunctive queries: Decidability and tractability results. Journal of Computer and System Sciences, 82(3), 395–465. https://doi.org/10.1016/J.JCSS.2015.11.001 Cardona-Rivera, R., Price, T. W., Winer, D., & Young, R. M. (2016). Question Answering in the Context of Stories Generated by Computers. Advances in Cognitive Systems, 4, 227–245. Cavazza, M., & Michael, Y. R. (2016). Section editors for Interactive Narrative: A Systems Approach. In R. Nakatsu, P. Ciancarini, & M. Rauterberg (Eds.), Handbook of Digital Games and Entertainment Technologies. Singapore: Springer Verlag. Cavazza, M., & Young, R. M. (2016). Introduction to Interactive Storytelling. In R. Nakatsu, M. Rauterberg, & P. Ciancarini (Eds.), Handbook of Digital Games and Entertainment Technologies (pp. 1–16). https://doi.org/10.1007/978-981-4560-52-8_55-1 Kennedy, W. G., St. Amant, R., & Reitter, D. (2016). Behavior representation in modeling and simulation: introduction to CMOT special issue: BRiMS 2013. Computational and Mathematical Organization Theory, 22(1), 1–3. https://doi.org/10.1007/S10588-015-9194-9 Shen, X., Mueller, F., & Tuck, J. (Eds.). (2016). Languages and Compilers for Parallel Computing. In Lecture Notes in Computer Science. https://doi.org/10.1007/978-3-319-29778-1 Mashayekhi, M., Du, H., List, G. F., & Singh, M. P. (2016). Silk: A Simulation Study of Regulating Open Normative Multiagent Systems. Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI), 373–379. New York: IJCAI. Pratt, K., Riley, C., & Sheehy, D. R. (2016). Exploring Circle Packing Algorithms. SOCG: Symposium on Computational Geometry (Multimedia Session). Presented at the 32nd International Symposium on Computational Geometry, Boston, MA. https://doi.org/10.4230/LIPIcs.SoCG.2016.69 Cavanna, N. J., & Sheehy, D. R. (2016). Adaptive Metrics for Adaptive Samples. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Vancouver, British Columbia, Canada. Gardner, K., & Sheehy, D. R. (2016). kth Nearest Neighbor Sampling in the Plane. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Vancouver, British Columbia, Canada. Jahanseir, M., & Sheehy, D. R. (2016). Transforming Hierarchical Trees on Metric Spaces. CCCG: The Canadian Conference in Computational Geometry,2016. Presented at the Canadian Conference in Computational Geometry, Vancouver, British Columbia, Canada. Asselin, L., Gardner, K., & Sheehy, D. R. (2016). Interactive Geometric Algorithm Visualization in a Browser. SOCG: Symposium on Computational Geometry (Multimedia Session). Presented at the 32nd International Symposium on Computational Geometry (SoCG 2016), Boston, MA. Namatame, M., & Matsuda, N. (2016). Development of a Peer Review System for Art Education and its Evaluation. Transactions of Japan Society of Kansei Engineering, 15(4), 425–430. https://doi.org/10.5057/jjske.tjske-d-15-00091 Chen, G., & Shen, X. (2016). Coherence-Free Multiview. Proceedings of the 2016 International Conference on Supercomputing - ICS '16. Presented at the the 2016 International Conference. https://doi.org/10.1145/2925426.2926277 Riaz, M., Stallings, J., Singh, M. P., Slankas, J., & Williams, L. (2016). DIGS. Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement - ESEM '16. Presented at the the 10th ACM/IEEE International Symposium. https://doi.org/10.1145/2961111.2962599 Kalia, A. K., Zhang, Z., & Singh, M. P. (2016). Güven: estimating trust from communications. Journal of Trust Management, 3(1). https://doi.org/10.1186/s40493-015-0022-4 Min, W., Mott, B., Rowe, J., Liu, B., & Lester, J. (2016). Player goal recognition in open-world digital games with long short-term memory networks. IJCAI International Joint Conference on Artificial Intelligence, 2016-January, 2590–2596. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85006136250&partnerID=MN8TOARS Min, W., Vail, A. K., Frankosky, M. H., Wiggins, J. B., Boyer, K. E., Wiebe, E. N., … Lester, J. C. (2016). Predicting dialogue acts for intelligent virtual agents with multimodal student interaction data. Proceedings of the 9th International Conference on Educational Data Mining, EDM 2016, 454–459. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85072280923&partnerID=MN8TOARS Joint Scheduling and Beamforming Coordination in Cloud Radio Access Networks With QoS Guarantees. (2016). IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/tvt.2015.2464278 DCloud: Deadline-Aware Resource Allocation for Cloud Computing Jobs. (2016). IEEE Transactions on Parallel and Distributed Systems. https://doi.org/10.1109/tpds.2015.2489646 QoS Correlation-Aware Service Composition for Unified Network-Cloud Service Provisioning. (2016). 2016 IEEE Global Communications Conference (GLOBECOM). https://doi.org/10.1109/glocom.2016.7842186 Enhancing software-defined RAN with collaborative caching and scalable video coding. (2016). 2016 IEEE International Conference on Communications (ICC). https://doi.org/10.1109/icc.2016.7511029 Non-Preemptive Coflow Scheduling and Routing. (2016). 2016 IEEE Global Communications Conference (GLOBECOM). https://doi.org/10.1109/glocom.2016.7842029 Ciampi, M., Persiano, G., Scafuro, A., Siniscalchi, L., & Visconti, I. (2016). Online/Offline OR Composition of Sigma Protocols. In Advances in Cryptology – EUROCRYPT 2016 (pp. 63–92). https://doi.org/10.1007/978-3-662-49896-5_3 Bellare, M., Fuchsbauer, G., & Scafuro, A. (2016). NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. In Advances in Cryptology – ASIACRYPT 2016 (pp. 777–804). https://doi.org/10.1007/978-3-662-53890-6_26 Hemenway, B., Jafargholi, Z., Ostrovsky, R., Scafuro, A., & Wichs, D. (2016). Adaptively Secure Garbled Circuits from One-Way Functions. In Advances in Cryptology – CRYPTO 2016 (pp. 149–178). https://doi.org/10.1007/978-3-662-53015-3_6 Stolee, K. T., Elbaum, S., & Dwyer, M. B. (2016). Code search with input/output queries: Generalizing, ranking, and assessment. Journal of Systems and Software, 116, 35–48. https://doi.org/10.1016/J.JSS.2015.04.081 Lin, C., & Chi, M. (2016). Intervention-BKT: Incorporating Instructional Interventions into Bayesian Knowledge Tracing. In Intelligent Tutoring Systems (pp. 208–218). https://doi.org/10.1007/978-3-319-39583-8_20 Mealin, S., Howell, S., & Roberts, D. L. (2016). Towards Unsupervised Canine Posture Classification via Depth Shadow Detection and Infrared Reconstruction for Improved Image Segmentation Accuracy. In Biomimetic and Biohybrid Systems (pp. 155–166). https://doi.org/10.1007/978-3-319-42417-0_15 Chaudhary, M. S., Gonzalez, D. L., Bello, G. A., Angus, M. P., Desai, D., Harenberg, S., … Samatova, N. F. (2016). Causality-Guided Feature Selection. In Advanced Data Mining and Applications (pp. 391–405). https://doi.org/10.1007/978-3-319-49586-6_26 Bello, G. A., Harenberg, S., Agrawal, A., & Samatova, N. F. (2016). Community Detection in Dynamic Attributed Graphs. In Advanced Data Mining and Applications (pp. 329–344). https://doi.org/10.1007/978-3-319-49586-6_22 Harenberg, S., Seay, R. G., Bello, G. A., Chirkova, R. Y., Doraiswamy, P. M., & Samatova, N. F. (2016). Knowledge-Guided Maximal Clique Enumeration. In Advanced Data Mining and Applications (pp. 604–618). https://doi.org/10.1007/978-3-319-49586-6_43 Ramachandran, S., & Mueller, F. (2016). Distributed Job Allocation for Large-Scale Manycores. In Lecture Notes in Computer Science (pp. 404–425). https://doi.org/10.1007/978-3-319-41321-1_21 Yagna, K., Patil, O., & Mueller, F. (2016). Efficient and Predictable Group Communication for Manycore NoCs. In Lecture Notes in Computer Science (pp. 383–403). https://doi.org/10.1007/978-3-319-41321-1_20 Chandru, V., & Mueller, F. (2016). Reducing NoC and Memory Contention for Manycores. In Architecture of Computing Systems – ARCS 2016 (pp. 293–305). https://doi.org/10.1007/978-3-319-30695-7_22 Chen, Z., & Healey, C. G. (2016). Large Image Collection Visualization Using Perception-Based Similarity with Color Features. In Advances in Visual Computing (pp. 379–390). https://doi.org/10.1007/978-3-319-50835-1_35 Tebb, K. P., Erenrich, R. K., Jasik, C. B., Berna, M., Lester, J. C., & Ozer, E. M. (2016). Use of Theory in Computer-Based Interventions to Reduce Alcohol Use Among Adolescents and Young Adults. Journal of Adolescent Health, 58(2), S69–S70. https://doi.org/10.1016/J.JADOHEALTH.2015.10.151 Ozer, E. M., Jasik, C. B., Tebb, K. P., Erenrich, R. K., Berna, M., Rowe, J. P., … Lester, J. C. (2016). Development of a Self-Adaptive Personalized Behavior Change System for Adolescent Preventive Healthcare. Journal of Adolescent Health, 58(2), S70. https://doi.org/10.1016/J.JADOHEALTH.2015.10.152 Wang, P., Rowe, J., Mott, B., & Lester, J. (2016). Decomposing Drama Management in Educational Interactive Narrative: A Modular Reinforcement Learning Approach. In Interactive Storytelling (pp. 270–282). https://doi.org/10.1007/978-3-319-48279-8_24 Talebi, S., Katib, I., & Rouskas, G. N. (2016). Distance-adaptive routing and spectrum assignment in rings. IET Networks, 5(3), 64–70. https://doi.org/10.1049/IET-NET.2015.0085 Rouskas, G., Ho, P.-H., Tapolcai, J., & Cinkler, T. (2016). Special issue on advances in availability and survivability in optical networks. Optical Switching and Networking, 19, 41. https://doi.org/10.1016/J.OSN.2015.09.002 Kim, D., & Vouk, M. A. (2016). Assessing Run-time Overhead of Securing Kepler. Procedia Computer Science, 80, 2281–2286. https://doi.org/10.1016/J.PROCS.2016.05.412 Idrobo, J. C., Rusz, J., Spiegelberg, J., McGuire, M. A., Symons, C. T., Vatsavai, R. R., … Lupini, A. R. (2016). Mapping Magnetic Ordering With Aberrated Electron Probes in STEM. Microscopy and Microanalysis, 22(S3), 1676–1677. https://doi.org/10.1017/S1431927616009223 Ramachandra, B., Gadiraju, K. K., Vatsavai, R. R., Kaiser, D. P., & Karnowski, T. P. (2016). Detecting Extreme Events in Gridded Climate Data. Procedia Computer Science, 80, 2397–2401. https://doi.org/10.1016/J.PROCS.2016.05.537 Hong, S., & Vatsavai, R. R. (2016). Sliding Window-based Probabilistic Change Detection for Remote-sensed Images. Procedia Computer Science, 80, 2348–2352. https://doi.org/10.1016/J.PROCS.2016.05.438 Shelton, A., Smith, A., Wiebe, E., Behrle, C., Sirkin, R., & Lester, J. (2016). Drawing and Writing in Digital Science Notebooks: Sources of Formative Assessment Data. Journal of Science Education and Technology, 25(3), 474–488. https://doi.org/10.1007/s10956-016-9607-7 Matsuda, N., Barbalios, N., Zhao, Z., Ramamurthy, A., Stylianides, G. J., & Koedinger, K. R. (2016). Tell me how to teach, I’ll learn how to solve problems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9684, pp. 111–121). https://doi.org/10.1007/978-3-319-39583-8_11 Matsuda, N., Velsen, M., Barbalios, N., Lin, S., Vasa, H., Hosseini, R., … Bier, N. (2016). Cognitive tutors produce adaptive online course: Inaugural field trial. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9684, pp. 327–333). https://doi.org/10.1007/978-3-319-39583-8_37 Matsuda, N., Chandrasekaran, S., & Stamper, J. (2016). How quickly can wheel spinning be detected? Proceedings of the 9th International Conference on Educational Data Mining, EDM 2016, 607–608. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85067333848&partnerID=MN8TOARS Bridges, R. A., Collins, J., Ferragut, E. M., Laska, J., & Sullivan, B. D. (2016). A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization. Social Network Analysis and Mining, 6(1). https://doi.org/10.1007/S13278-016-0409-Y Duvall, S., Eagle, D. R., Narcisse, R. P., & Price, T. W. (2016). Clashroom: A Game to Enhance the Classroom Experience (Abstract Only). Proceedings of the 47th ACM Technical Symposium on Computing Science Education, 692. https://doi.org/10.1145/2839509.2850556 Buchet, M., Chazal, F., Oudot, S. Y., & Sheehy, D. R. (2016). Efficient and robust persistent homology for measures. Computational Geometry, 58, 70–96. https://doi.org/10.1016/j.comgeo.2016.07.001 Price, T. W., Cateté, V., Albert, J., Barnes, T., & Garcia, D. D. (2016). Lessons Learned from "BJC" CS Principles Professional Development. Proceedings of the 47th ACM Technical Symposium on Computing Science Education - SIGCSE '16, 467–472. https://doi.org/10.1145/2839509.2844625 Cateté, V., Snider, E., & Barnes, T. (2016). Developing a Rubric for a Creative CS Principles Lab. Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education - ITiCSE '16, 11-13-July-2016, 290–295. https://doi.org/10.1145/2899415.2899449 Payton, J., & Barnes, T. (2016). Learn about broadening participation. ACM SIGCSE Bulletin, 48(3), 5–5. https://doi.org/10.1145/2993223.2993226 Toward a Normative Approach for Forensicability. (2016). Symposium and Bootcamp on the Science of Security. https://doi.org/10.1145/2898375.2898386 Normative Requirements in Sociotechnical Systems. (2016). IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW). https://doi.org/10.1109/REW.2016.21 Deploying a Social Web Graph Over a Semantic Web Framework. (2016). Advances in Soft Computing. https://doi.org/10.1007/978-81-322-2734-2_8 Formal Understanding of Tradeoffs among Liveness and Safety Requirements. (2016). IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW). https://doi.org/10.1109/REW.2016.20 Chopra, A. K., & Singh, M. P. (2016). From Social Machines to Social Protocols. Proceedings of the 25th International Conference on World Wide Web - WWW '16. Presented at the the 25th International Conference. https://doi.org/10.1145/2872427.2883018 Argenta, C., & Doyle, J. (2016). Multi-agent plan recognition as planning (MAPRAP). ICAART 2016 - Proceedings of the 8th International Conference on Agents and Artificial Intelligence, 2, 141–148. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-84969262826&partnerID=MN8TOARS Stallmann, M. (2016). Edge offset in drawings of layered graphs with evenly-spaced nodes on each layer. North Carolina State University. Dept. of Computer Science. Stallmann, M. (2016). A gentle introduction to matroid algorithmics. North Carolina State University. Dept. of Computer Science. Ajmeri, N., Jiang, J., Chirkova, R. Y., Doyle, J., & Singh, M. P. (2016). Coco: Runtime Reasoning about Conflicting Commitments. Proceedings of the 25th International Joint Conference on Artificial Intelligence (IJCAI), 2016-January, 17–23. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85006107006&partnerID=MN8TOARS Jiang, J., Ajmeri, N., Chirkova, R. Y., Doyle, J., & Singh, M. P. (2016). Expressing and Reasoning about Conflicting Norms in Cybersecurity: Poster. Symposium and Bootcamp on the Science of Security, 63–64. https://doi.org/10.1145/2898375.2898395 Nardin, L. G., Balke-Visser, T., Ajmeri, N., Kalia, A. K., Sichman, J. S., & Singh, M. P. (2016). Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems. The Knowledge Engineering Review, 31(2), 142–166. https://doi.org/10.1017/S0269888916000023 Hao, Z., Kaltofen, E. L., & Zhi, L. (2016). Numerical Sparsity Determination and Early Termination. Proceedings of the ACM on International Symposium on Symbolic and Algebraic Computation - ISSAC '16. Presented at the the ACM. https://doi.org/10.1145/2930889.2930924 Behroozi, M., & Sami, A. (2016). A multiple-classifier framework for Parkinson's disease detection based on various vocal tests. International Journal of Telemedicine and Applications, 2016. https://doi.org/10.1155/2016/6837498 Gehringer, E. F., & Pramudianto, F. (2016). Research in student peer review: a cooperative web-services approach. Proceedings of the AAAS/NSF Symposium on Envisioning the Future of Undergraduate STEM Education. Presented at the AAAS/NSF Symposium on Envisioning the Future of Undergraduate STEM Education, Washington, DC. Hu, Z., Song, Y., & Gehringer, E. F. (2016). The role of initial input in reputation systems to generate accurate aggregated grades from peer assessment. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Song, Y., Hu, Z., & Gehringer, E. F. (2016). Who took peer review seriously: another perspective on student-generated quizzes. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Le, D. Y., Pramudianto, F., & Gehringer, E. F. (2016). Prediction of grades for reviewing with automated peer-review and reputation metrics. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Babik, D., Gehringer, E., Kidd, J., Pramudianto, F., & Tinapple, D. (2016). Probing the landscape: toward a systematic taxonomy of online peer assessment systems in education. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Pramudianto, F., Aljeshi, M., Song, Y., Gehringer, E. F., Alhussein, H., Babik, D., & Tinnaple, D. (2016). Peer review data warehouse: insights from different systems. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Song, Y., Hu, Z., Gehringer, E. F., Morris, J., Kidd, J., & Ringleb, S. (2016). Toward better training in peer assessment: Does calibration help? Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Yadav, R., & Gehringer, E. F. (2016). Automated metareviewing: a classifier approach to assess the quality of reviews. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Second Workshop on Computer-Supported Peer Review in Education, Educational Data Mining 2016, Raleigh, NC. Pramudianto, F., Chhabra, T., Gehringer, E. F., & Maynard, C. (2016). Assessing the quality of automatic summarization for peer review in education. Proceedings of the Second Workshop on Computer-Supported Peer Review in Education. Presented at the Educational Data Mining 2016: Second Workshop on Computer-Supported Peer Review in Education, Raleigh, NC. Price, T., Dong, Y., & Barnes, T. (2016). Generating Data-driven Hints for Open-ended Programming. Educational Data Mining, 191–198. Gehringer, E. F., Hu, Z., & Song, Y. (2016). Five years of extra credit in a studio-based course: An effort to incentivize socially useful behavior. 2016 IEEE Frontiers in Education Conference (FIE). Presented at the 2016 IEEE Frontiers in Education Conference (FIE). https://doi.org/10.1109/fie.2016.7757351 Song, Y., Hu, Z., Guo, Y., & Gehringer, E. F. (2016). An experiment with separate formative and summative rubrics in educational peer assessment. 2016 IEEE Frontiers in Education Conference (FIE). Presented at the 2016 IEEE Frontiers in Education Conference (FIE), Erie, PA. https://doi.org/10.1109/fie.2016.7757597 Theisen, C., & Williams, L. (2016). Stack traces reveal attack surfaces. Perspectives on Data Science for Software Engineering, 73–76. Menzies, T. (2016). Seven principles of inductive software engineering: What we do is different. Perspectives on Data Science for Software Engineering, 13–17. https://doi.org/10.1016/b978-0-12-804206-9.00003-9 Menzies, T., Williams, L., & Zimmermann, T. (2016). Perspectives on data science for software engineering. Perspectives on Data Science for Software Engineering, 3–6. https://doi.org/10.1016/b978-0-12-804206-9.00001-5 Menzies, T. (2016). Correlation is not causation (or, when not to scream "Eureka!"). Perspectives on Data Science for Software Engineering, 327–330. https://doi.org/10.1016/b978-0-12-804206-9.00059-3 Barik, T., & Murphy-Hill, E. (2016). A process for surviving survey design and sailing through survey deployment. Perspectives on Data Science for Software Engineering, 213–219. systematically developing prevention, detection, and response patterns for security requirements. (2016). 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 62–67. Kafali, O., Ajmeri, N., & Singh, M. P. (2016). Normative requirements in sociotechnical systems. 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 259–260. https://doi.org/10.1109/rew.2016.049 Kafali, O., Ajmeri, N., & Singh, M. P. (2016). Formal understanding of tradeoffs among liveness and safety requirements. 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), 17–18. https://doi.org/10.1109/rew.2016.017 Barik, T., Song, Y., Johnson, B., & Murphy-Hill, E. (2016). from quick fixes to slow fixes: reimagining static analysis resolutions to enable design space exploration. 32nd ieee international conference on software maintenance and evolution (icsme 2016), 212–222. Mealin, S., Dominguez, I. X., & Roberts, D. L. (2016). Semi-supervised Classification of Static Canine Postures Using the Microsoft Kinect. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON ANIMAL-COMPUTER INTERACTION, ACI 2016. https://doi.org/10.1145/2995257.3012024 Gionta, J., Enck, W., & Larsen, P. (2016). Preventing kernel code-reuse attacks through disclosure resistant code diversification. 2016 ieee conference on communications and network security (cns), 189–197. https://doi.org/10.1109/cns.2016.7860485 Pandita, R., Taneja, K., Tung, T., & Williams, L. (2016). ICON: Inferring temporal constraints from natural language API descriptions. 32nd ieee international conference on software maintenance and evolution (icsme 2016), 378–388. Barik, T., Song, Y., Johnson, B., & Murphy-Hill, E. (2016). From Quick Fixes to Slow Fixes: Reimagining Static Analysis Resolutions to Enable Design Space Exploration. 32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), pp. 212–222. https://doi.org/10.1109/icsme.2016.63 Talebi, S., Rouskas, G., & Katib, I. (2016). Offline distance-adaptive routing and spectrum assignment in mesh elastic optical networks. 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7842036 Xiong, Y., Li, Y. Y., Dong, X. C., Gao, Y. P., & Rouskas, G. (2016). Exploiting SDN principles for extremely fast restoration in elastic optical datacenter Networks. 2016 ieee global communications conference (globecom). https://doi.org/10.1109/glocom.2016.7841831 Menzies, T. (2016). "How not to Do it": Anti-patterns for Data Science in Software Engineering. 2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), pp. 887–887. https://doi.org/10.1145/2889160.2891047 Barik, T., DeLine, R., Drucker, S., & Fisher, D. (2016). The bones of the system: A case study of logging and telemetry at Microsoft. 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 92–101. Chen, Z. X., Vatsavai, R. R., Ramachandra, B., Zhang, Q., Singh, N., & Sukumar, S. (2016). Scalable nearest neighbor based hierarchical change detection framework for crop monitoring. 2016 IEEE International Conference on Big Data (Big Data), 1309–1314. https://doi.org/10.1109/bigdata.2016.7840735 Theisen, C. (2016). Reusing stack traces: Automated attack surface approximation. 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 859–862. Payton, J., Barnes, T., Buch, K., Rorrer, A., Zuo, H. F., & Naolu, B. (2016). Promoting computing faculty success through interinstitutional faculty learning communities. 2016 Research on Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT 2016). https://doi.org/10.1109/respect.2016.7836163 Smith, J. (2016). Identifying successful strategies for resolving static analysis notifications. 2016 IEEE/ACM 38th International Conference on Software Engineering Companion (ICSE-C), 662–664. Zhang, W. Z., Tang, H. J., Ranshous, S., Byna, S., Martin, D. F., Wu, K. S., … Samatova, N. F. (2016). Exploring memory hierarchy and network topology for runtime AMR data sharing across scientific applications. 2016 IEEE International Conference on Big Data (Big Data), 1359–1366. https://doi.org/10.1109/bigdata.2016.7840743 Acharya, M. P., Parnin, C., Kraft, N. A., Dagnino, A., & Qu, X. (2016). Code Drones. 2016 IEEE/ACM 38TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING COMPANION (ICSE-C), pp. 785–788. https://doi.org/10.1145/2889160.2889211 Huang, H. Q., Zheng, C., Zeng, J. Y., Zhou, W., Zhu, S. C., Liu, P., … Zhang, C. (2016). Android malware development on public malware scanning platforms: A large-scale data-driven study. 2016 IEEE International Conference on Big Data (Big Data), 1090–1099. Qian, T., Xu, H., Zhang, J. H., Chakrabortty, A., Mueller, F., & Xin, Y. F. (2016). A resilient software infrastructure for wide-area measurement systems. 2016 ieee power and energy society general meeting (pesgm). https://doi.org/10.1109/pesgm.2016.7741949 Majikes, J. J., Mealin, S., Rita, B., Walker, K., Yuschak, S., Sherman, B., … Roberts, D. L. (2016). Smart connected canines: IoT design considerations for the lab, home, and mission-critical environments (invited paper). 2016 ieee 37th sarnoff symposium, 118–123. https://doi.org/10.1109/sarnof.2016.7846739 Udechukwu, R., Bhat, S., Dutta, R., & Rouskas, G. (2016). Language of choice: On embedding choice-related semantics in a realizable protocol. 2016 ieee 37th sarnoff symposium, 31–36. https://doi.org/10.1109/sarnof.2016.7846760 Das, A., Mueller, F., Gu, X. H., & Iyengar, A. (2016). Performance analysis of a multi-tenant in-memory data grid. Proceedings of 2016 ieee 9th international conference on cloud computing (cloud), 956–959. https://doi.org/10.1109/cloud.2016.0144 Sun, P., & Stolee, K. T. (2016). Exploring crowd consistency in a mechanical turk survey. 2016 IEEE/ACM 3rd International Workshop on Crowdsourcing in Software Engineering (CSI-SE), 8–14. Chin, A. J., Goodrich, T. D., O'Brien, M. P., Reidl, F., Sullivan, B. D., & Poel, A. (2016). Asymptotic analysis of equivalences and core-structures in Kronecker-style graph models. 2016 ieee 16th international conference on data mining (icdm), 829–834. https://doi.org/10.1109/icdm.2016.0098 Carpenter, S. E., & Sichitiu, M. L. (2016). Analysis of packet loss in a large-scale DSRC field operational test. 5th IFIP International Conference On Performance Evaluation And Modeling In Wired And Wireless Networks Pemwn 16. https://doi.org/10.1109/pemwn.2016.7842909 Gehringer, E. F., Ma, K., & Duong, V. T. (2016). What Peer-Review Systems Can Learn from Online Rating Sites. STATE-OF-THE-ART AND FUTURE DIRECTIONS OF SMART LEARNING, pp. 341–350. https://doi.org/10.1007/978-981-287-868-7_42 Xie, T., & Enck, W. (2016). Tutorial: text analytics for security. Symposium and Bootcamp on the Science of Security, 124–125. Pan, X., Gownivaripalli, Y. J., & Mueller, F. (2016). TintMalloc: Reducing Memory Access Divergence via Controller-Aware Coloring. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2016), pp. 363–372. https://doi.org/10.1109/ipdps.2016.26 Bahmani, A., Sibley, A. B., Parsian, M., Owzar, K., & Mueller, F. (2016). SparkScore: Leveraging Apache Spark for Distributed Genomic Inference. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), pp. 435–442. https://doi.org/10.1109/ipdpsw.2016.6 Rahman, A. A. U., & Williams, L. (2016). Security Practices in DevOps. SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, pp. 109–111. https://doi.org/10.1145/2898375.2898383 Riley, E. D., & Kraus, H. T. (2016). Rain gardens: understanding their benefits and their beauty (c). Proceedings of the 2015 annual meeting of the international plant propagators' society, 1140, 409–412. https://doi.org/10.17660/actahortic.2016.1140.92 Wang, P. P., Nguyen, H., Gu, X. H., & Lu, S. (2016). RDE: Replay DEbugging for Diagnosing Production Site Failures. Proceedings of 2016 ieee 35th symposium on reliable distributed systems (srds), 327–336. https://doi.org/10.1109/srds.2016.050 Skau, E., Wohlberg, B., Krim, H., & Dai, L. Y. (2016). Pansharpening via coupled triple factorization dictionary learning. International conference on acoustics speech and signal processing, 1234–1237. https://doi.org/10.1109/icassp.2016.7471873 Dreher, P., Byun, C., Hill, C., Gadepally, V., Kuszmaul, B., & Kepner, J. (2016). PageRank pipeline benchmark: Proposal for a holistic system benchmark for big-data platforms. Ieee international symposium on parallel and distributed processing, 929–937. Yadav, R. K., & Gehringer, E. F. (2016). Metrics for Automated Review Classification: What Review Data Show. STATE-OF-THE-ART AND FUTURE DIRECTIONS OF SMART LEARNING, pp. 333–340. https://doi.org/10.1007/978-981-287-868-7_41 Chintakunta, H., Robinson, M., & Krim, H. (2016). Introduction to the special session on topological data Analysis, ICASSP 2016. International conference on acoustics speech and signal processing, 6410–6414. https://doi.org/10.1109/icassp.2016.7472911 Hsu, C. J., Panta, R. K., Ra, M. R., & Freeh, V. W. (2016). Inside-out: Reliable performance prediction for distributed storage systems in the cloud. Proceedings of 2016 ieee 35th symposium on reliable distributed systems (srds), 127–136. https://doi.org/10.1109/srds.2016.025 Chandru, V., & Mueller, F. (2016). Hybrid MPI/OpenMP programming on the Tilera manycore architecture. 2016 International Conference on High Performance Computing & Simulation (HPCS 2016), 326–333. https://doi.org/10.1109/hpcsim.2016.7568353 Fiala, D., Mueller, F., & Ferreira, K. B. (2016). FlipSphere: A Software-based DRAM Error Detection and Correction Library for HPC. 2016 IEEE/ACM 20TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL TIME APPLICATIONS (DS-RT), pp. 19–28. https://doi.org/10.1109/ds-rt.2016.27 Dreher, P., & Vouk, M. (2016). Embedding Cloud Computing inside Supercomputer Architectures. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, VOL 2 (CLOSER), pp. 296–301. https://doi.org/10.5220/0005912302960301 Shen, X. Y., Krim, H., & Gu, Y. T. (2016). Beyond union of subspaces: Subspace pursuit on grassmann manifold for data representation. International conference on acoustics speech and signal processing, 4079–4083. https://doi.org/10.1109/icassp.2016.7472444 Lagadapati, M., Mueller, F., & Engelmann, C. (2016). Benchmark Generation and Simulation at Extreme Scale. 2016 IEEE/ACM 20TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL TIME APPLICATIONS (DS-RT), pp. 9–18. https://doi.org/10.1109/ds-rt.2016.18 Zhou, Y. J., Singh, K., & Jiang, X. X. (2016). AppShell: Making data protection practical for lost or stolen Android devices. Noms 2016 - 2016 ieee/ifip network operations and management symposium, 502–508. https://doi.org/10.1109/noms.2016.7502850 Liang, W., Wang, H., & Krirn, H. (2016). A behavior-based evaluation of product quality. International conference on acoustics speech and signal processing, 1916–1920. https://doi.org/10.1109/icassp.2016.7472010 Andow, B., Nadkarni, A., Bassett, B., Enck, W., & Xie, T. (2016). A Study of Grayware on Google Play. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233. https://doi.org/10.1109/spw.2016.40 Gholkar, N., Mueller, F., & Rountree, B. (2016). A Power-aware Cost Model for HPC Procurement. 2016 IEEE 30TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), pp. 1110–1113. https://doi.org/10.1109/ipdpsw.2016.35 Reaves, B., Bowers, J., Gorski, S. A., III, Anise, O., Bobhate, R., Cho, R., … Traynor, P. (2016). droid: Assessment and Evaluation of Android Application Analysis Tools. ACM COMPUTING SURVEYS, 49(3). https://doi.org/10.1145/2996358 Morrison, P., Pandita, R., Murphy-Hill, E., & McLaughlin, A. (2016). Veteran developers' contributions and motivations: an open source perspective. 2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 171–179. https://doi.org/10.1109/vlhcc.2016.7739681 Hicks, D., Eagle, M., Rowe, E., Asbell-Clarke, J., Edwards, T., & Barnes, T. (2016). Using Game Analytics to Evaluate Puzzle Design and Level Progression in a Serious Game. LAK '16 CONFERENCE PROCEEDINGS: THE SIXTH INTERNATIONAL LEARNING ANALYTICS & KNOWLEDGE CONFERENCE, pp. 440–448. https://doi.org/10.1145/2883851.2883953 Mealin, S., Howell, S., & Roberts, D. L. (2016). Towards unsupervised canine posture classification via depth shadow detection and infrared reconstruction for improved image segmentation accuracy. Biomimetic and biohybrid systems, living machines 2016, 9793, 155–166. Brugarolas, R., Agcayazi, T., Yuschak, S., Roberts, D. L., Sherman, B. L., & Bozkurt, A. (2016). Towards a wearable system for continuous monitoring of sniffing and panting in dogs. International conference on wearable and implantable body sensor, 292–295. https://doi.org/10.1109/bsn.2016.7516276 Layman, L., Nikora, A. P., Meek, J., & Menzies, T. (2016). Topic Modeling of NASA Space System Problem Reports. 13TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2016), pp. 303–314. https://doi.org/10.1145/2901739.2901760 Liu, Y., Tseng, H. W., & Swanson, S. (2016). Spmario: scale up mapreduce with i/o-oriented scheduling for the gpu. Proceedings of the 34th ieee international conference on computer design (iccd), 384–387. https://doi.org/10.1109/iccd.2016.7753309 Hermans, F., Stolee, K. T., & Hoepelman, D. (2016). Smells in block-based programming languages. 2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 68–72. Smith, J. (2016). Resolving input validation vulnerabilities by retracing taint flow through source code. 2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 252–253. Ford, D. (2016). Recognizing gender differences in stack overflow usage: applying the bechdel test. 2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 264–265. Middleton, J., & Murphy-Hill, E. (2016). Perquimans: A Tool for Visualizing Patterns of Spreadsheet Function Combinations. 2016 IEEE WORKING CONFERENCE ON SOFTWARE VISUALIZATION, pp. 51–60. https://doi.org/10.1109/vissoft.2016.27 Krishnamurthy, R., & Rouskas, G. N. (2016). Performance Evaluation of Multi-Core, Multi-Threaded SIP Proxy Servers (SPS). 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). https://doi.org/10.1109/icc.2016.7511427 Yuan, G. C., Murukannaiah, P. K., & Singh, M. P. (2016). Percimo: A Personalized Community Model for Location Estimation in Social Media. PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM, 271–278. https://doi.org/10.1109/asonam.2016.7752245 Chen, G., Zhou, H., Shen, X., Gahm, J., Venkat, N., Booth, S., & Marshall, J. (2016, July). OpenCL-based erasure coding on heterogeneous architectures. 2016 IEEE 27th International Conference on Application-Specific Systems, Architectures and Processors (ASAP), Vol. 7, pp. 33–40. https://doi.org/10.1109/asap.2016.7760770 Bhat, S., & Rouskas, G. N. (2016). On Routing Algorithms for Open Marketplaces of Path Services. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). https://doi.org/10.1109/icc.2016.7511582 Gao, L. N., & Rouskas, G. (2016). Network-aware virtual request partitioning based on spectral clustering. 2016 25th international conference on computer communications and networks (icccn). https://doi.org/10.1109/icccn.2016.7568548 Kafali, O., Singh, M. P., & Williams, L. (2016). NANE: Identifying Misuse Cases Using Temporal Norm Enactments. 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), pp. 136–145. https://doi.org/10.1109/re.2016.34 Karpatne, A., Jiang, Z., Vatsavai, R. R., Shekhar, S., & Kumar, V. (2016). Monitoring Land-Cover Changes A machine-learning perspective. IEEE GEOSCIENCE AND REMOTE SENSING MAGAZINE, 4(2), 8–21. https://doi.org/10.1109/mgrs.2016.2528038 Parnin, C., & Begel, A. (2016). Invited session: hands-on sensors 101. 2016 IEEE/ACM 1st International Workshop on Emotion Awareness in Software Engineering (Semotion), 28–29. Ware, S. G., & Young, R. M. (2016). Intentionality and Conflict in The Best Laid Plans Interactive Narrative Virtual Environment. IEEE Transactions on Computational Intelligence and AI in Games, 8(4), 402–411. https://doi.org/10.1109/tciaig.2015.2489159 Smith, A., Aksit, O., Min, W., Wiebe, E., Mott, B. W., & Lester, J. C. (2016). Integrating real-time drawing and writing diagnostic models: An evidence-centered design framework for multimodal science assessment. Intelligent tutoring systems, its 2016, 0684, 165–175. Bhat, S., Udechukwu, R., Dutta, R., & Rouskas, G. (2016). Inception to application: A GENI based prototype of an Open Marketplace for Network Services. 2016 ieee conference on computer communications workshops (infocom wkshps). https://doi.org/10.1109/infcomw.2016.7562244 Hihn, J., Juster, L., Johnson, J., Menzies, T., & Michael, G. (2016). Improving and expanding NASA software cost estimation methods. 2016 ieee aerospace conference. https://doi.org/10.1109/aero.2016.7500655 Barik, T. (2016). How should static analysis tools explain anomalies to developers? FSE'16: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1118–1120. Liu, Y., Tseng, H. W., Gahagan, M., Li, J., Jin, Y. Q., & Swanson, S. (2016). Hippogriff: efficiently moving data in heterogeneous computing systems. Proceedings of the 34th ieee international conference on computer design (iccd), 376–379. https://doi.org/10.1109/iccd.2016.7753307 Spires, H. A., & Lester, J. C. (2016). Game-based learning: creating a multidisciplinary community of inquiry. ON THE HORIZON, 24(1), 88–93. https://doi.org/10.1108/oth-08-2015-0052 Dai, H. P., Shahzad, M., Liu, A. X., & Zhong, Y. K. (2016). Finding persistent items in data streams. Proceedings of the VLDB Endowment, 10(4), 289–300. https://doi.org/10.14778/3025111.3025112 Price, T. W., Brown, N. C. C., Lipovac, D., Barnes, T., & Kolling, M. (2016). Evaluation of a Frame-based Programming Editor. PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INTERNATIONAL COMPUTING EDUCATION RESEARCH (ICER'16), pp. 33–42. https://doi.org/10.1145/2960310.2960319 Barik, T., Pandita, R., Middleton, J., & Murphy-Hill, E. (2016). Designing for Dystopia Software Engineering Research for the Post-apocalypse. FSE'16: PROCEEDINGS OF THE 2016 24TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 924–927. https://doi.org/10.1145/2950290.2983986 Mostafavi, B., & Barnes, T. (2016). Data-driven Proficiency Profiling - Proof of Concept. LAK '16 CONFERENCE PROCEEDINGS: THE SIXTH INTERNATIONAL LEARNING ANALYTICS & KNOWLEDGE CONFERENCE, pp. 324–328. https://doi.org/10.1145/2883851.2883935 Lenhardt, W. C., Conway, M., Scott, E., Blanton, B., Krishnamurthy, A., Hadzikadic, M., … Wilson, A. (2016). Cross-institutional research cyberinfrastructure for data intensive science. 2016 ieee high performance extreme computing conference (hpec). https://doi.org/10.1109/hpec.2016.7761597 Azevedo, R., Martin, S. A., Taub, M., Mudrick, N. V., Millar, G. C., & Grafsgaard, J. F. (2016). Are Pedagogical Agents' External Regulation Effective in Fostering Learning with Intelligent Tutoring Systems? INTELLIGENT TUTORING SYSTEMS, ITS 2016, Vol. 9684, pp. 197–207. https://doi.org/10.1007/978-3-319-39583-8_19 Tang, W., Otero, I. R., Krim, H., & Dai, L. Y. (2016). Analysis dictionary learning for scene classification. 2016 IEEE Statistical Signal Processing Workshop (SSP). https://doi.org/10.1109/ssp.2016.7551849 Cvetkovic, B., Janko, V., Romero, A. E., Kafali, O., Stathis, K., & Lustrek, M. (2016). Activity recognition for diabetic patients using a smartphone. Journal of Medical Systems, 40(12). Murukannaiah, P. K., Ajmeri, N., & Singh, M. P. (2016). Acquiring Creative Requirements from the Crowd Understanding the Influences of Personality and Creative Potential in Crowd RE. 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), pp. 176–185. https://doi.org/10.1109/re.2016.68 Shu, R., Wang, P., Gorski, S. A., Andow, B., Nadkarni, A., Deshotels, L., … Gu, X. (2016). A Study of Security Isolation Techniques. ACM COMPUTING SURVEYS, 49(3). https://doi.org/10.1145/2988545 Hong, S., & Vatsavai, R. R. (2016). A Scalable Probabilistic Change Detection Algorithm for Very High Resolution (VHR) Satellite Imagery. 2016 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2016, pp. 275–282. https://doi.org/10.1109/bigdatacongress.2016.42 Batik, T., Murphy-Hill, E., & Zimmermann, T. (2016). A Perspective on blending programming environments and games: beyond points, badges, and leaderboards. 2016 ieee symposium on visual languages and human-centric computing (vl/hcc), 134–142. https://doi.org/10.1109/vlhcc.2016.7739676 He, X. F., Dai, H., Ning, P., & Dutta, R. (2016). A A multi-player Markov stopping game for delay-tolerant and opportunistic resource sharing networks. IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications. https://doi.org/10.1109/infocom.2016.7524350 Shashidharan, A., Berkel, D. B., Vatsavai, R. R., & Meentemeyer, R. K. (2016). pFUTURES: A Parallel Framework for Cellular Automaton Based Urban Growth Models. GEOGRAPHIC INFORMATION SCIENCE, (GISCIENCE 2016), Vol. 9927, pp. 163–177. https://doi.org/10.1007/978-3-319-45738-3_11 Taub, M., Mudrick, N. V., Azevedo, R., Millar, G. C., Rowe, J., & Lester, J. (2016). Using Multi-level Modeling with Eye-Tracking Data to Predict Metacognitive Monitoring and Self-regulated Learning with CRYSTAL ISLAND. INTELLIGENT TUTORING SYSTEMS, ITS 2016, Vol. 9684, pp. 240–246. https://doi.org/10.1007/978-3-319-39583-8_24 Krishna, R., Menzies, T., & Fu, W. (2016). Too Much Automation? The Bellwether Effect and Its Implications for Transfer Learning. 2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), pp. 122–131. https://doi.org/10.1145/2970276.2970339 Vail, A. K., Grafsgaard, J. F., Boyer, K. E., Wiebe, E. N., & Lester, J. C. (2016). Predicting Learning from Student Affective Response to Tutor Questions. INTELLIGENT TUTORING SYSTEMS, ITS 2016, Vol. 9684, pp. 154–164. https://doi.org/10.1007/978-3-319-39583-8_15 Ghanem, S., Skau, E., Krim, H., Clouse, H. S., & Sakla, W. (2016). Non-parametric bounds on the nearest neighbor classification accuracy based on the Henze-Penrose metric. 2016 ieee international conference on image processing (icip), 1364–1368. https://doi.org/10.1109/icip.2016.7532581 Lin, C., & Chi, M. (2016). Intervention-BKT: Incorporating instructional interventions into Bayesian knowledge tracing. Intelligent tutoring systems, its 2016, 0684, 208–218. Smith, A., Aksit, O., Min, W., Wiebe, E., Mott, B. W., & Lester, J. C. (2016). Integrating Real-Time Drawing and Writing Diagnostic Models: An Evidence-Centered Design Framework for Multimodal Science Assessment. INTELLIGENT TUTORING SYSTEMS, ITS 2016, Vol. 9684, pp. 165–175. https://doi.org/10.1007/978-3-319-39583-8_16 Liu, Z., Mostafavi, B., & Barnes, T. (2016). Combining Worked Examples and Problem Solving in a Data-Driven Logic Tutor. INTELLIGENT TUTORING SYSTEMS, ITS 2016, Vol. 9684, pp. 347–353. https://doi.org/10.1007/978-3-319-39583-8_40 Shen, S. T., Lin, C., Mostafavi, B., Barnes, T., & Chi, M. (2016). An analysis of feature selection and reward function for model-based reinforcement learning. Intelligent tutoring systems, its 2016, 0684, 504–505. Nair, V., Menzies, T., & Chen, J. (2016). An (Accidental) Exploration of Alternatives to Evolutionary Algorithms for SBSE. SEARCH BASED SOFTWARE ENGINEERING, SSBSE 2016, Vol. 9962, pp. 96–111. https://doi.org/10.1007/978-3-319-47106-8_7 Alonso-Mori, R., Asa, K., Bergmann, U., Brewster, A. S., Chatterjee, R., Cooper, J. K., … Yano, J. (2016). Towards characterization of photo-excited electron transfer and catalysis in natural and artificial systems using XFELs. FARADAY DISCUSSIONS, 194, 621–638. https://doi.org/10.1039/c6fd00084c Lauren, B., & Pigg, S. (2016). Toward entrepreneurial pedagogies: rethinking professional networking as knowledge making. 2016 ieee international professional communication conference (ipcc). https://doi.org/10.1109/ipcc.2016.7740535 Leon, L. S., Smith, R. C., Oates, W. S., & Miles, P. (2016). Sensitivity analysis for a quantum informed ferroelectric energy model. Proceedings of the asme conference on smart materials adaptive. https://doi.org/10.1115/smasis2016-9035 Hazard, C. J., & Singh, M. P. (2016). Privacy Risks in Intelligent User Interfaces. IEEE INTERNET COMPUTING, 20(6), 57–61. https://doi.org/10.1109/mic.2016.116 Wang, Q., Ren, K., Ning, P., & Hu, S. (2016). Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 65(10), 8331–8344. https://doi.org/10.1109/tvt.2015.2511071 Beck, M., Braun, B., Koppe, M., Savage, C. D., & Zafeirakopoulos, Z. (2016). GENERATING FUNCTIONS AND TRIANGULATIONS FOR LECTURE HALL CONES. SIAM JOURNAL ON DISCRETE MATHEMATICS, 30(3), 1470–1479. https://doi.org/10.1137/15m1036907 Shahzad, M., & Liu, A. X. (2016). Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild. IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3770–3784. https://doi.org/10.1109/tnet.2016.2559539 Shahzad, M., & Liu, A. X. (2016). Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping. IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3477–3492. https://doi.org/10.1109/tnet.2016.2533544 Song, Y., Pramudianto, F., & Gehringer, E. (2016). A markup language for building a data warehouse for educational peer-assessment research. 2016 IEEE Frontiers in Education Conference (FIE). Presented at the 2016 IEEE Frontiers in Education Conference (FIE), Erie, PA. https://doi.org/10.1109/fie.2016.7757600 Tang, H., Byna, S., Harenberg, S., Zou, X., Zhang, W., Wu, K., … Samatova, N. F. (2016). Usage Pattern-Driven Dynamic Data Layout Reorganization. 2016 16TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), pp. 356–365. https://doi.org/10.1109/ccgrid.2016.15 Rahman, A. A. U., & Williams, L. (2016). Software Security in DevOps: Synthesizing Practitioners' Perceptions and Practices. INTERNATIONAL WORKSHOP ON CONTINUOUS SOFTWARE EVOLUTION AND DELIVERY, CSED 2016, pp. 70–76. https://doi.org/10.1145/2896941.2896946 Gamble, J., Chintakunta, H., Wilkerson, A., & Krim, H. (2016). Node Dominance: Revealing Community and Core-Periphery Structure in Social Networks. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2(2), 186–199. https://doi.org/10.1109/tsipn.2016.2527923 Tanwir, S., Nayak, D., & Perros, H. (2016). Modeling 3D video traffic using a Markov Modulated Gamma Process. 2016 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/iccnc.2016.7440638 Dumas, J.-G., Kaltofen, E., Thome, E., & Villard, G. (2016). Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix. PROCEEDINGS OF THE 2016 ACM INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION (ISSAC 2016), pp. 199–206. https://doi.org/10.1145/2930889.2930908 Vatsavai, R., & Chandola, V. (2016, October). Guest editorial: big spatial data. GEOINFORMATICA, Vol. 20, pp. 797–799. https://doi.org/10.1007/s10707-016-0269-7 Lynch, C. F., Xue, L. T., & Chi, M. (2016). Evolving augmented graph grammars for argument analysis. Proceedings of the 2016 Genetic and Evolutionary Computation Conference (GECCO'16 Companion), 65–66. https://doi.org/10.1145/2908961.2908994 Bahmani, A., & Mueller, F. (2016). Efficient clustering for ultra-scale application tracing. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 98, 25–39. https://doi.org/10.1016/j.jpdc.2016.08.001 Yagna, K., Patil, O., & Mueller, F. (2016). Efficient and predictable group communication for manycore NoCs. High performance computing, 9697, 383–403. Ramachandran, S., & Mueller, F. (2016). Distributed job allocation for large-scale manycores. High performance computing, 9697, 404–425. Zhang, W., Tang, H., Harenberg, S., Byna, S., Zou, X., Devendran, D., … Samatova, N. F. (2016). AMRZone: A Runtime AMR Data Sharing Framework For Scientific Applications. 2016 16TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), pp. 116–125. https://doi.org/10.1109/ccgrid.2016.62 Guan, H., Tang, W., Krim, H., Keiser, J., Rindos, A., & Sazdanovic, R. (2016). A topological collapse for document summarization. Ieee international workshop on signal processing advances in wireless. https://doi.org/10.1109/spawc.2016.7536867 Wang, A. L., Shahzad, M., & Liu, A. X. (2016). A stochastic frame based approach to RFID tag searching. 2016 IFIP Networking Conference (IFIP Networking) and Workshops, 153–161. https://doi.org/10.1109/ifipnetworking.2016.7497201 Yang, T., Liu, A. X., Shahzad, M., Zhong, Y. K., Fu, Q. B., Li, Z., … Li, X. M. (2016). A shifting bloom filter framework for set queries. Proceedings of the VLDB Endowment, 9(5), 408–419. https://doi.org/10.14778/2876473.2876476 Adcock, A. B., Sullivan, B. D., & Mahoney, M. W. (2016). Tree decompositions and social graphs. INTERNET MATHEMATICS, 12(5), 315–361. https://doi.org/10.1080/15427951.2016.1182952 Kafali, O., Ajmeri, N., & Singh, M. P. (2016). Revani: Revising and Verifying Normative Specifications for Privacy. IEEE Intelligent Systems, 31(5), 8–15. https://doi.org/10.1109/mis.2016.89 Nadkarni, A., Andow, B., Enck, W., & Jha, S. (2016). Practical DIFC enforcement on android. Proceedings of the 25th USENIX Security Symposium, 1119–1136. Tang, H., Byna, S., Harenberg, S., Zhang, W., Zou, X., Martin, D. F., … Samatova, N. F. (2016). In situ Storage Layout Optimization for AMR Spatio-temporal Read Accesses. PROCEEDINGS 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING - ICPP 2016, pp. 406–415. https://doi.org/10.1109/icpp.2016.53 Yu, X., Joshi, P., Xu, J. W., Jin, G. L., Zhang, H., & Jiang, G. F. (2016). CloudSeer: Workflow monitoring of cloud infrastructures via interleaved logs. Operating Systems Review, 50(2), 489–502. Huang, H., Gong, T., Chen, T., Xiong, M., Pan, X., & Dai, T. (2016). An Improved mu TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs. JOURNAL OF SENSORS, 2016. https://doi.org/10.1155/2016/9021650 Dominguez, I. X., Cardona-Rivera, R. E., Vance, J. K., & Roberts, D. L. (2016). The Mimesis Effect: The Effect of Roles on Player Choice in Interactive Narrative Role-Playing Games. 34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, pp. 3438–3449. https://doi.org/10.1145/2858036.2858141 Bian, X., Krim, H., Bronstein, A., & Dai, L. (2016). Sparsity and Nullity: Paradigms for Analysis Dictionary Learning. SIAM JOURNAL ON IMAGING SCIENCES, 9(3), 1107–1126. https://doi.org/10.1137/15m1030376 Chen, L., Yu, T., & Chirkova, R. (2016). Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, Vol. 9895, pp. 187–203. https://doi.org/10.1007/978-3-319-45931-8_12 St Amant, R., & Roberts, D. L. (2016). Natural interaction for bot detection. IEEE Internet Computing, 20(4), 69–73. Mahdizadehaghdam, S., Wang, H., Krim, H., & Dai, L. (2016). Information Diffusion of Topic Propagation in Social Media. IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2(4), 569–581. https://doi.org/10.1109/tsipn.2016.2618324 Jiang, H. Q., Wang, Y. G., Lee, K., & Rhee, I. (2016). DRWA: A receiver-centric solution to bufferbloat in cellular networks. IEEE Transactions on Mobile Computing, 15(11), 2719–2734. https://doi.org/10.1109/tmc.2015.2510641 Invernizzi, L., Thomas, K., Kapravelos, A., Comanescu, O., Picod, J.-M., & Bursztein, E. (2016). Cloak of Visibility: Detecting When Machines Browse A Different Web. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 743–758. https://doi.org/10.1109/sp.2016.50 Li, P. Y., Tong, Z. F., Huo, L. N., Yang, F., & Su, W. (2016). Antibacterial and biological properties of biofunctionalized nanocomposites on titanium for implant application. Journal of Biomaterials Applications, 31(2), 205–214. Morris, M. R., Zolyomi, A., Yao, C., Bahram, S., Bigham, J. P., & Kane, S. K. (2016). "With most of it being pictures now, I rarely use it": Understanding Twitter's evolving accessibility to blind users. 34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, 5506–5516. Fang, S., Liu, Y., & Ning, P. (2016). Wireless Communications under Broadband Reactive Jamming Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 13(3), 394–408. https://doi.org/10.1109/tdsc.2015.2399304 Dean, D. J., Nguyen, H., Wang, P., Gu, X., Sailer, A., & Kochut, A. (2016). PerfCompass: Online Performance Anomaly Fault Localization and Inference in Infrastructure-as-a-Service Clouds. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 27(6), 1742–1755. https://doi.org/10.1109/tpds.2015.2444392 Pei, J., Liu, X. B., Fan, W. J., Pardalos, P. M., Migdalas, A., Goldengorin, B., & Yang, S. L. (2016). Minimizing the makespan for a serial-batching scheduling problem with arbitrary machine breakdown and dynamic job arrival. International Journal of Advanced Manufacturing Technology, 86(9-12), 3315–3331. Li, J., Tseng, H.-W., Lin, C., Papakonstantinou, Y., & Swanson, S. (2016). HippogriffDB: Balancing I/O and GPU Bandwidth in Big Data Analytics. PROCEEDINGS OF THE VLDB ENDOWMENT, 9(14), 1647–1658. https://doi.org/10.14778/3007328.3007331 Hu, Q. W., Merchante, C., Stepanova, A. N., Alonso, J. M., & Heber, S. (2016). Genome-wide search for translated upstream open reading frames in Arabidopsis thaliana. IEEE Transactions on Nanobioscience, 15(2), 150–159. Zhou, M., Wu, B., Shen, X., Gao, Y., & Yiu, G. (2016). Examining and Reducing the Influence of Sampling Errors on Feedback-Driven Optimizations. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 13(1). https://doi.org/10.1145/2851502 Brugarolas, R., Latif, T., Dieffenderfer, J., Walker, K., Yuschak, S., Sherman, B. L., … Bozkurt, A. (2016, May 15). Wearable Heart Rate Sensor Systems for Wireless Canine Health Monitoring. IEEE SENSORS JOURNAL, Vol. 16, pp. 3454–3464. https://doi.org/10.1109/jsen.2015.2485210 Tebb, K. P., Erenrich, R. K., Jasik, C. B., Berna, M. S., Lester, J. C., & Ozer, E. M. (2016). Use of theory in computer-based interventions to reduce alcohol use among adolescents and young adults: a systematic review. BMC PUBLIC HEALTH, 16. https://doi.org/10.1186/s12889-016-3183-x Fu, W., Menzies, T., & Shen, X. (2016). Tuning for software analytics: Is it really necessary? Information and Software Technology, 76, 135–146. https://doi.org/10.1016/j.infsof.2016.04.017 Barot, C., Buro, M., Cook, M., Eladhari, M., Johansson, M., Li, B., … Zook, A. (2016). The AIIDE 2015 Workshop Program. AI MAGAZINE, 37(2), 91–94. https://doi.org/10.1609/aimag.v37i2.2660 Modiano, E., Dutta, R., & Qian, Y. (2016, July). Special Issue on Survivable and Resilient Communication Networks and Services. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, Vol. 24, pp. 445–448. https://doi.org/10.1007/s10922-016-9378-8 Payton, J., Barnes, T., Buch, K., Rorrer, A., Zuo, H., Gosha, K., … Dennis, L. (2016). STARS Computing Corps: Enhancing Engagement of Underrepresented Students and Building Community in Computing. COMPUTING IN SCIENCE & ENGINEERING, 18(3), 44–57. https://doi.org/10.1109/mcse.2016.42 [Review of Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems]. (2016). [Review of]. Knowledge Engineering Review, 31(2), 142–166. Barnes, T., Payton, J., Thiruvathukal, G. K., Boyer, K. E., & Forbes, J. (2016). Best of RESPECT, Part 2. COMPUTING IN SCIENCE & ENGINEERING, Vol. 18, pp. 11–13. https://doi.org/10.1109/mcse.2016.51 Wurman, P. R., & Romano, J. M. (2016). Amazon Picking Challenge 2015. AI Magazine, 37(2), 97–98. Yoon, S., Lee, K., Yun, Y. C., & Rhee, I. (2016). ACMI: FM-Based Indoor Localization via Autonomous Fingerprinting. IEEE TRANSACTIONS ON MOBILE COMPUTING, 15(6), 1318–1332. https://doi.org/10.1109/tmc.2015.2465372 Baugh, J., & Liu, S. (2016). A general characterization of the Hardy Cross method as sequential and multiprocess algorithms. STRUCTURES, 6, 170–181. https://doi.org/10.1016/j.istruc.2016.03.004 Villarino, G. H., Hu, Q., Manrique, S., Flores-Vergara, M., Sehra, B., Robles, L., … Franks, R. G. (2016). Transcriptomic Signature of the SHATTERPROOF2 Expression Domain Reveals the Meristematic Nature of Arabidopsis Gynoecial Medial Domain. PLANT PHYSIOLOGY, 171(1), 42–61. https://doi.org/10.1104/pp.15.01845 Tanwir, S., & Perros, H. (2016). Modeling live adaptive streaming over HTTP. COMPUTER COMMUNICATIONS, 85, 74–88. https://doi.org/10.1016/j.comcom.2016.03.025 Pei, J., Liu, X. B., Fan, W. J., Migdalas, A., & Pardalos, P. M. (2016). Future research on multiobjective coordinated scheduling problems for discrete manufacturing enterprises in supply chain environments. Supply Chain Management and Logistics: Innovative Strategies and Practical Solutions, 19–39. He, X., Dai, H., & Ning, P. (2016). Faster Learning and Adaptation in Security Games by Exploiting Information Asymmetry. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 64(13), 3429–3443. https://doi.org/10.1109/tsp.2016.2548987 Johnson, W. L., & Lester, J. C. (2016). Face-to-Face Interaction with Pedagogical Agents, Twenty Years Later. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 26(1), 25–36. https://doi.org/10.1007/s40593-015-0065-9 Elliott, J., Hoemmen, M., & Mueller, F. (2016). Exploiting data representation for fault tolerance. Journal of Computational Science, 14, 51–60. https://doi.org/10.1016/J.JOCS.2015.12.002 Yu, X., Joshi, P., Xu, J., Jin, G., Zhang, H., & Jiang, G. (2016, April). CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs. ACM SIGPLAN NOTICES, Vol. 51, pp. 489–502. https://doi.org/10.1145/2954679.2872407 Savage, C. D. (2016). The mathematics of lecture hall partitions. JOURNAL OF COMBINATORIAL THEORY SERIES A, 144, 443–475. https://doi.org/10.1016/j.jcta.2016.06.006 Baugh, J., & Altuntas, A. (2016). Modeling a Discrete Wet-Dry Algorithm for Hurricane Storm Surge in Alloy (M. Butler, K.-D. Schewe, A. Mashkoor, & M. Biro, Eds.). ABSTRACT STATE MACHINES, ALLOY, B, TLA, VDM, AND Z (ABZ 2016), Vol. 9675, pp. 256–261. https://doi.org/10.1007/978-3-319-33600-8_18 Aji, A. M., Panwar, L. S., Ji, F., Murthy, K., Chabbi, M., Balaji, P., … Thakur, R. (2016). MPI-ACC: accelerator-aware MPI for scientific applications. IEEE Transactions on Parallel and Distributed Systems, 27(5), 1401–1414. Beam, A. L., Ghosh, S. K., & Doyle, J. (2016). Fast Hamiltonian Monte Carlo Using GPU Computing. JOURNAL OF COMPUTATIONAL AND GRAPHICAL STATISTICS, 25(2), 536–548. https://doi.org/10.1080/10618600.2015.1035724 Buffum, P. S., Frankosky, M., Boyer, K. E., Wiebe, E. N., Mott, B. W., & Lester, J. C. (2016). Collaboration and Gender Equity in Game-Based Learning for Middle School Computer Science. COMPUTING IN SCIENCE & ENGINEERING, 18(2), 18–28. https://doi.org/10.1109/mcse.2016.37 Barnes, T., Payton, J., Thiruvathukal, G. K., Boyer, K. E., & Forbes, J. (2016). Best of RESPECT, Part 1. Computing in Science & Engineering, 18(2), 6–8. Chin, D. B., Chi, M., & Schwartz, D. L. (2016). A comparison of two methods of active learning in physics: inventing a general solution versus compare and contrast. INSTRUCTIONAL SCIENCE, 44(2), 177–195. https://doi.org/10.1007/s11251-016-9374-0 Shapiro, H. G., Erickson, K. A., Peterson, M. N., Frew, K. N., Stevenson, K. T., & Langerhans, R. B. (2016). Which species to conserve: evaluating children's species-based conservation priorities. BIODIVERSITY AND CONSERVATION, 25(3), 539–553. https://doi.org/10.1007/s10531-016-1067-0 Loftin, R., Peng, B., MacGlashan, J., Littman, M. L., Taylor, M. E., Huang, J., & Roberts, D. L. (2016). Learning behaviors via human-delivered discrete feedback: modeling implicit feedback strategies to speed up learning. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 30(1), 30–59. https://doi.org/10.1007/s10458-015-9283-7 Barnes, T., & Thiruvathukal, G. K. (2016, March). The Need for Research in Broadening Participation. COMMUNICATIONS OF THE ACM, Vol. 59, pp. 33–34. https://doi.org/10.1145/2880177 Kaltofen, E. L., & Yang, Z. (2016). Sparse multivariate function recovery with a small number of evaluations. JOURNAL OF SYMBOLIC COMPUTATION, 75, 209–218. https://doi.org/10.1016/j.jsc.2015.11.015 Chen, W., Samatova, N. F., Stallmann, M. F., Hendrix, W., & Ying, W. (2016). On size-constrained minimum s-t cut problems and size-constrained dense subgraph problems. THEORETICAL COMPUTER SCIENCE, 609, 434–442. https://doi.org/10.1016/j.tcs.2015.10.031 Yayah, A. A., Coulibaly, Y., Ismail, A. S., & Rouskas, G. (2016). Hybrid offset-time and burst assembly algorithm (H-OTBA) for delay sensitive applications over optical burst switching networks. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 29(2), 251–261. https://doi.org/10.1002/dac.2821 Murukannaiah, P. K., Ajmeri, N., & Singh, M. P. (2016). Engineering Privacy in Social Applications. IEEE INTERNET COMPUTING, 20(2), 72–76. https://doi.org/10.1109/mic.2016.30 Lee, S., Sukumar, S. R., Hong, S., & Lim, S.-H. (2016). Enabling graph mining in RDF triplestores using SPARQL for holistic in-situ graph analysis. EXPERT SYSTEMS WITH APPLICATIONS, 48, 9–25. https://doi.org/10.1016/j.eswa.2015.11.010 Krim, H., Gentimis, T., & Chintakunta, H. (2016). DISCOVERING THE WHOLE BY THE COARSE A topological paradigm for data analysis. IEEE SIGNAL PROCESSING MAGAZINE, 33(2), 95–104. https://doi.org/10.1109/msp.2015.2510703 Kennedy, W. G., Amant, R. S., & Reitter, D. (2016). Behavior representation in modeling and simulation: introduction to CMOT special issue: BRiMS 2013. Computational and Mathematical Organization Theory, 22(1), 1–3. He, X., Dai, H., Shen, W., Ning, P., & Dutta, R. (2016). Toward Proper Guard Zones for Link Signature. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 15(3), 2104–2117. https://doi.org/10.1109/twc.2015.2498621 Jararweh, Y., Al-Ayyoub, M., Darabseh, A., Benkhelifa, E., Vouk, M., & Rindos, A. (2016). Software defined cloud: Survey, system and evaluation. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 58, 56–74. https://doi.org/10.1016/j.future.2015.10.015 Dyer, T., & Baugh, J. (2016). SMT: An interface for localized storm surge modeling. ADVANCES IN ENGINEERING SOFTWARE, 92, 27–39. https://doi.org/10.1016/j.advengsoft.2015.10.003 Kafali, O., & Yolum, P. (2016). PISAGOR: a proactive software agent for monitoring interactions. Knowledge and Information Systems, 47(1), 215–239. Krall, J., Menzies, T., & Davies, M. (2016). Learning Mitigations for Pilot Issues When Landing Aircraft (via Multiobjective Optimization and Multiagent Simulations). IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 46(2), 221–230. https://doi.org/10.1109/thms.2015.2509980 Pei, J., Liu, X. B., Pardalos, P. M., Fan, W. J., Wang, L., & Yang, S. L. (2016). Solving a supply chain scheduling problem with non-identical job sizes and release times by applying a novel effective heuristic algorithm. International Journal of Systems Science, 47(4), 765–776.