Computer Science - 2018 Yedida, R., Reddy, R., Vahi, R., J., R., Abhilash, & Kulkarni, D. (2018). Employee attrition prediction. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85095619264&partnerID=MN8TOARS Pala, O., & Schrum, P. (2018). Simulating infrastructure outages: An open-source geospatial approach. International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences - ISPRS Archives, 42(3W4), 389–396. https://doi.org/10.5194/isprs-archives-XLII-3-W4-389-2018 Deshotels, L., Deaconescu, R., Carabas, C., Manda, I., Enck, W., Chiroiu, M., … Sadeghi, A.-R. (2018). iOracle: Automated Evaluation of Access Control Policies in iOS. Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 117–131. Enck, W. H., Nadkarni, A. P., Sadeghi, A.-R., & Heuser, S. (2018, March). Programmable interface for extending security of application-based operating system. Gorski, P. L., Iacono, L. L., Wermke, D., Stransky, C., Möller, S., Acar, Y., & Fahl, S. (2018). Developers Deserve Security Warnings, Too: On the Effect of Integrated Security Advice on Cryptographic API Misuse. USENIX Symposium on Usable Privacy and Security (SOUPS) 2018, 265–281. Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., & Fahl, S. (2018). A Large Scale Investigation of Obfuscation Use in Google Play. Proceedings of the 34th Annual Computer Security Applications Conference (ACSAC '18), 222–235. Heckman, S., Zhang, J., Pérez-Quiñones, M. A., & Hawthorne, E. K. (2018). What is a SIGCSE symposium paper? ACM SIGCSE Bulletin, 50(3), 3–3. Heckman, S., Zhang, J., Peérez-Quiñones, M. A., & Hawthorne, E. K. (2018). SIGCSE 2019 paper length change. ACM SIGCSE Bulletin, 50(2), 4–4. Sheshadri, A., Gitinabard, N., Lynch, C. F., Barnes, T., & Heckman, S. (2018). Predicting student performance based on online study habits: a study of blended courses. the 11th International Conference on Educational Data Mining (EDM 2018), 87–96. Heckman, S., & King, J. (2018). Developing Software Engineering Skills using Real Tools for Automated Grading. Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 794–799. Carver, J. C., Heckman, S., & Sherriff, M. (2018). Designing Empirical Education Research Studies (DEERS): Creating an Answerable Research Question. Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 1051–1051. Sherriff, M., & Heckman, S. (2018). Capstones and large projects in computing education. ACM Transactions on Computing Education (TOCE), Vol. 18, pp. 1–4. ACM New York, NY, USA. Heckman, S., Stolee, K. T., & Parnin, C. (2018). 10+ years of teaching software engineering with itrust: the good, the bad, and the ugly. Proceedings of the 40th International Conference on Software Engineering: Software Engineering Education and Training, 1–4. Xiong, Y., Shi, J., Yang, Y., Lv, Y., & Rouskas, G. N. (2018). Lightpath Management in SDN-Based Elastic Optical Networks With Power Consumption Considerations. Journal of Lightwave Technology, 36(9), 1650–1660. https://doi.org/10.1109/JLT.2017.2785410 Silvestri, S., Goss, K., Guo, Z., & Bhuiyan, A. (2018). Algorithms CS2500 [Open Educational Resource]. Missouri University of Science and Technology Scholars' Mine Course Materials. Singh, J., Santinelli, L., Guo, Z., Brunel, J., Doose, D., & Infantes, G. (2018). Use of probabilities and formal methods to control system criticality levels. Real-Time Scheduling Open Problems Seminar (RTSOPS). Presented at the Real-Time Scheduling Open Problems Seminar (RTSOPS), Barcelona, Spain. Han, X., & Guo, Z. (2018). Resource Augmentation Bounds of EDF and Partitioned-EDF for Sporadic Tasks with Constrained Deadlines. Real-Time Scheduling Open Problems Seminar (RTSOPS). Presented at the Real-Time Scheduling Open Problems Seminar (RTSOPS), Barcelona, Spain. Sun, J., Guan, N., Jiang, X., Chang, S., Guo, Z., Deng, Q., & Yi, W. (2018). A Capacity Augmentation Bound for Real-Time Constrained-Deadline Parallel Tasks under GEDF. International Conference on Embedded Software (EMSOFT). Presented at the International Conference on Embedded Software (EMSOFT), Torino, Italy. Sruti, S., Bhuiyan, A. A., & Guo, Z. (2018). Work-in-Progress: Precise Scheduling of Mixed-Criticality Tasks by Varying Processor Speed. Presented at the 2018 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2018.00033 Zhang, Y., Wang, L., Jiang, W., & Guo, Z. (2018). Work-in-Progress: RWS - A Roulette Wheel Scheduler for Preventing Execution Pattern Leakage. Presented at the 2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS). https://doi.org/10.1109/rtas.2018.00016 Mao, Y., Green, V., Wang, J., Xiong, H., & Guo, Z. (2018). DRESS: Dynamic RESource-Reservation Scheme for Congested Data-Intensive Computing Platforms. Presented at the 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). https://doi.org/10.1109/cloud.2018.00095 Xiong, H., Cheng, W., Fu, Y., Hu, W., Bian, J., & Guo, Z. (2018). De-biasing Covariance-Regularized Discriminant Analysis. Presented at the Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. https://doi.org/10.24963/ijcai.2018/401 Santinelli, L., & Guo, Z. (2018). A Sensitivity Analysis for Mixed Criticality: Trading Criticality with Computational Resource. Presented at the 2018 IEEE 23rd International Conference on Emerging Technologies and Factory Automation (ETFA). https://doi.org/10.1109/etfa.2018.8502493 Guo, Z., Santinelli, L., & Yang, K. (2018). Mixed-Criticality Scheduling with Limited HI-Criticality Behaviors. https://doi.org/10.1007/978-3-319-99933-3_13 Han, X., Zhao, L., Guo, Z., & Liu, X. (2018). An Improved Speedup Factor for Sporadic Tasks with Constrained Deadlines Under Dynamic Priority Scheduling. Presented at the 2018 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2018.00058 Guo, Z., Yang, K., Vaidhun, S., Arefin, S., Das, S. K., & Xiong, H. (2018). Uniprocessor Mixed-Criticality Scheduling with Graceful Degradation by Completion Rate. Presented at the 2018 IEEE Real-Time Systems Symposium (RTSS). https://doi.org/10.1109/rtss.2018.00052 Bhuiyan, A., Guo, Z., Saifullah, A., Guan, N., & Xiong, H. (2018). Energy-Efficient Real-Time Scheduling of DAG Tasks. ACM Transactions on Embedded Computing Systems, 17(5), 1–25. https://doi.org/10.1145/3241049 Guo, Z., & Baruah, S. (2018). Mixed-Criticality Real-Time Systems. https://doi.org/10.1007/978-3-642-54477-4_6-2 Sun, J., Guan, N., Jiang, X., Chang, S., Guo, Z., Deng, Q., & Yi, W. (2018). A Capacity Augmentation Bound for Real-Time Constrained-Deadline Parallel Tasks Under GEDF. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(11), 2200–2211. https://doi.org/10.1109/TCAD.2018.2857362 Ghosh, A., & Kuttal, S. K. (2018). Semantic Clone Detection: Can Source Code Comments Help? Presented at the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vlhcc.2018.8506550 Zhou, C., Kuttal, S. K., & Ahmed, I. (2018). What Makes a Good Developer? An Empirical Study of Developers' Technical and Social Competencies. Presented at the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC). https://doi.org/10.1109/vlhcc.2018.8506577 Kuttal, S. K., Sarma, A., Rothermel, G., & Wang, Z. (2018). What happened to my application? Helping end users comprehend evolution through variation management. Information and Software Technology, 103, 55–74. https://doi.org/10.1016/j.infsof.2018.06.008 Hu, Y., Li, X., Liu, J., Ding, H., Gong, Y., & Fang, Y. (2018). Mitigating Traffic Analysis Attack in Smartphones with Edge Network Assistance. 2018 IEEE International Conference on Communications (ICC), 1–6. Liu, J., Zhang, C., & Fang, Y. (2018). Epic: A differential privacy framework to defend smart homes against internet traffic analysis. IEEE Internet of Things Journal, 5(2), 1206–1217. Jiang, S., Liu, J., Duan, M., Wang, L., & Fang, Y. (2018). Secure and privacy-preserving report de-duplication in the fog-based vehicular crowdsensing system. 2018 IEEE Global Communications Conference (GLOBECOM), 1–6. Lorenzo, B., Shafigh, A. S., Liu, J., González-Castaño, F. J., & Fang, Y. (2018). Data and spectrum trading policies in a trusted cognitive dynamic network architecture. IEEE/ACM Transactions on Networking, 26(3), 1502–1516. Jiang, S., Liu, J., Wang, L., & Fang, Y. (2018). A Secure Data Forwarding Scheme in Vehicular Named Data Networking. 2018 IEEE Global Communications Conference (GLOBECOM), 206–212. Han, D., Chen, W., Liu, J., & Fang, Y. (2018). A Probabilistic Scheduling Policy for Energy Efficient UAV Communications with Delay Constraints. 2018 IEEE Global Communications Conference (GLOBECOM), 1–6. Liu, J., Hu, Y., Yue, H., Gong, Y., & Fang, Y. (2018). A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease. 2018 IEEE Symposium on Privacy-Aware Computing (PAC), 107–116. Ding, H., Zhang, C., Li, X., Liu, J., Pan, M., Fang, Y., & Chen, S. (2018). Session-based cooperation in cognitive radio networks: A network-level approach. IEEE/ACM Transactions on Networking, 26(2), 685–698. Han, J., Li, Y., Liu, J., & Zhao, M. (2018). An efficient Lucas sequence-based batch auditing scheme for the Internet of medical things. IEEE Access, 7, 10077–10092. Yang, K., Liu, J., Zhang, C., & Fang, Y. (2018). Adversarial examples against the deep learning based network intrusion detection systems. MILCOM 2018-2018 IEEE Military Communications Conference (MILCOM), 559–564. Zhou, H., Niu, Y., Liu, J., Zhang, C., Wei, L., & Fang, Y. (2018). A privacy-preserving networked hospitality service with the bitcoin blockchain. international conference on wireless algorithms, systems, and applications, 696–708. Pang, Y., Ding, H., Liu, J., Fang, Y., & Chen, S. (2018). A UHF RFID-based system for children tracking. IEEE Internet of Things Journal, 5(6), 5055–5064. Kloster, K., Kuinke, P., O?Brien, M. P., Reidl, F., Villaamil, F. S., Sullivan, B. D., & Van Der Poel, A. (2018). A practical fpt algorithm for flow decomposition and transcript assembly. Proceedings of the Workshop on Algorithm Engineering and Experiments, 2018-January, 75–86. https://doi.org/10.1137/1.9781611975055.7 Demaine, E. D., Goodrich, T. D., Kloster, K., Lavallee, B., Liu, Q. C., Sullivan, B. D., … Poel, A. (2018). Structural rounding: Approximation algorithms for graphs near an algorithmically tractable class. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85094277709&partnerID=MN8TOARS Kloster, K., Sullivan, B. D., & Van Der Poel, A. (2018). Mining maximal induced bicliques using odd cycle transversals. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85093320378&partnerID=MN8TOARS Dumitrescu, E. F., Fisher, A. L., Goodrich, T. D., Humble, T. S., Sullivan, B. D., & Wrigh, A. L. (2018). Benchmarking treewidth as a practical component of tensor-network–based quantum simulation. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85095245427&partnerID=MN8TOARS Goodrich, T. D., Horton, E., & Sullivan, B. D. (2018). An updated experimental evaluation of graph bipartization methods. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85104339918&partnerID=MN8TOARS Horton, E., Kloster, K., & Sullivan, B. D. (2018). Subgraph centrality and walk-regularity. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85093754399&partnerID=MN8TOARS Kun, J., O’Brien, M. P., Pilipczuk, M., & Sullivan, B. D. (2018). Polynomial treedepth bounds in linear colorings. ArXiv. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85092833264&partnerID=MN8TOARS Wu, H.-Y., Si, M., & Jhala, A. (2018). Preface. CEUR Workshop Proceedings, 2321. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85062210194&partnerID=MN8TOARS Althagafi, A., Wu, H.-Y., & Jhala, A. (2018). MIDB: A web-based film annotation tool. CEUR Workshop Proceedings, 2321. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85062220146&partnerID=MN8TOARS Chen, Y.-C., Robertson, J., & Jhala, A. (2018). Abstractions for narrative comprehension tasks. CEUR Workshop Proceedings, 2321. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85062232028&partnerID=MN8TOARS Wu, H.-Y., & Jhala, A. (2018). A joint attention model for automated editing. CEUR Workshop Proceedings, 2321. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85062242549&partnerID=MN8TOARS Cohen, A., Shen, X., Torrellas, J., Tuck, J., & Zhou, Y. (2018). Inter-Disciplinary Research Challenges in Computer Systems for the 2020s. National Science Foundation. Yedida, R. (2018). An Introduction to Data Analysis. Presented at the PES University, Bangalore, India. Yedida, R. (2018). Machine Learning. Presented at the PES University, Bangalore, India. Yedida, R. (2018). How to design a Flappy Bird game. Presented at the PES University, Bangalore, India. Yang, R., Xu, M., Jones, P., & Samatova, N. (2018). Real time utility-based recommendation for revenue optimization via an adaptive online Top-K high utility itemsets mining model. ICNC-FSKD 2017 - 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery, 1859–1866. https://doi.org/10.1109/FSKD.2017.8393050 Xu, M., Yang, R., Ranshous, S., Li, S., & Samatova, N. F. (2018). Leveraging External Knowledge for Phrase-Based Topic Modeling. Proceedings - 2017 Conference on Technologies and Applications of Artificial Intelligence, TAAI 2017, 29–32. https://doi.org/10.1109/TAAI.2017.25 Leeman-Munk, S. P., Sethi, S., Healey, C. G., Nie, S., Padia, K., Devarajan, R., … others. (2018, August). Interactive visualizations of a convolutional neural network. Padia, K., Bandara, K. H., & Healey, C. G. (2018). Yarn: Generating Storyline Visualizations Using HTN Planning. Proceedings of Graphics Interface 2018, 17–24. Nie, S., Healey, C., Padia, K., Leeman-Munk, S., Benson, J., Caira, D., … Devarajan, R. (2018). Visualizing Deep Neural Networks for Text Analytics. 2018 IEEE Pacific Visualization Symposium (PacificVis), 180–189. Healey, C. G., Leeman-Munk, S. P., Nie, S., Padia, K., Devarajan, R., Caira, D. J., … others. (2018, April). Visualizing deep neural networks. Google Patents. Battestilli, L. (2018). Exam Wrappers and Grades with Context. Presented at the NCSU DELTA Summer Shorts in Instructional Technologies Workshops, Raleigh, NC. Jiang, J., Chirkova, R., Doyle, J., & Rosenthal, A. (2018). An Expressive, Flexible and Uniform Logical Formalism for Attribute-based Access Control. In L. Jia & C. Morisset (Eds.), Workshop on Foundations of Computer Security (FCS 2018). Retrieved from https://www.andrew.cmu.edu/user/liminjia/events/fcs2018/papers/s21.pdf Zhi, R., Price, T. W., Lytle, N., Dong, Y., & Barnes, T. (2018). Reducing the State Space of Programming Problems through Data-Driven Feature Detection. Education Data Mining Workshop. Perros, H., Papapanagiotou, I., & Pujolle, G. (2018). Cloud communications and networking. Annals of Telecommunications, 73(3-4), 165–167. https://doi.org/10.1007/S12243-018-0630-Y Paassen, B., Hammer, B., Price, T. W., Barnes, T., Gross, S., & Pinkwart, N. (2018). The Continuous Hint Factory - Providing Hints in Vast and Sparsely Populated Edit Distance Spaces. Journal of Educational Data Mining, 10(1), 1–35. https://doi.org/https://doi.org/10.5281/zenodo.3554697 Matsuda, N. (2018). The State-of-the-Art Pedagogical Agent Technology in the Field of Learning Science. Transactions of Japanese Society for Information and Systems in Education, 35(1), 13–20. Retrieved from https://doi.org/10.14926/jsise.35.13 Verhagen, H., Neumann, M., & Singh, M. P. (2018). Normative Multiagent Systems: Foundations and History. In A. Chopra, L. van der Torre, H. Verhagen, & S. Villata (Eds.), Handbook of Normative Multiagent Systems (pp. 3–25). London: College Publications. Christie, S. H., V, Chopra, A. K., & Singh, M. P. (2018). Compositional Correctness in Multiagent Interactions. Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS), 1159–1167. Retrieved from https://eprints.lancs.ac.uk/id/eprint/123578/ Cavanna, N. J., Kiselius, O., & Sheehy, D. R. (2018). Computing the Shift-Invariant Bottleneck Distance for Persistence Diagrams. CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Winnipeg, Canada. Duggirala, P. S., & Sheehy, D. R. (2018). When Can We Treat Trajectories as Points? CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Winnipeg, Canada. Tsan, J., Lynch, C. F., & Boyer, K. E. (2018). “Alright, what do we need?”: A study of young coders’ collaborative dialogue. International Journal of Child-Computer Interaction, 17, 61–71. https://doi.org/10.1016/J.IJCCI.2018.03.001 Wiggins, J. B., Kulkarni, M., Min, W., Boyer, K. E., Mott, B., Wiebe, E., & Lester, J. (2018). User affect and no-match dialogue scenarios: An analysis of facial expression. Proceedings of the 4th Workshop on Multimodal Analyses Enabling Artificial Agents in Human-Machine Interaction, MA3HMI 2018 - In conjunction with ICMI 2018, 6–14. https://doi.org/10.1145/3279972.3279979 Wang, P., Rowe, J., Min, W., Mott, B., & Lester, J. (2018). High-fidelity simulated players for interactive narrative planning. IJCAI International Joint Conference on Artificial Intelligence, 2018-July, 3884–3890. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85055720882&partnerID=MN8TOARS Wiggins, J. B., Kulkarni, M., Min, W., Mott, B., Boyer, K. E., Wiebe, E., & Lester, J. (2018). Affect-based early prediction of player mental demand and engagement for educational games. Proceedings of the 14th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2018, 243–249. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85070822616&partnerID=MN8TOARS Akram, B., Min, W., Wiebe, E., Mott, B., Boyer, K. E., & Lester, J. (2018). Improving stealth assessment in game-based learning with LSTM-based analytics. Proceedings of the 11th International Conference on Educational Data Mining, EDM 2018. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85080493724&partnerID=MN8TOARS Scalable Exploratory Search on Knowledge Graphs Using Apache Spark. (2018). 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE). https://doi.org/10.1109/wetice.2018.00036 The Fog of Things Paradigm: Road toward On-Demand Internet of Things. (2018, September). IEEE Communications Magazine. https://doi.org/10.1109/mcom.2018.1701140 HSDRAN: Hierarchical Software-Defined Radio Access Network for Distributed Optimization. (2018). IEEE Transactions on Vehicular Technology. https://doi.org/10.1109/tvt.2017.2691735 Transmitting and Sharing: A Truthful Double Auction for Cognitive Radio Networks. (2018). 2018 IEEE International Conference on Communications (ICC). https://doi.org/10.1109/icc.2018.8422505 Deploying Robust Security in Internet of Things. (2018). 2018 IEEE Conference on Communications and Network Security (CNS). https://doi.org/10.1109/cns.2018.8433219 CoinExpress: A Fast Payment Routing Mechanism in Blockchain-Based Payment Channel Networks. (2018). 2018 27th International Conference on Computer Communication and Networks (ICCCN). https://doi.org/10.1109/icccn.2018.8487351 Application Provisioning in Fog Computing-enabled Internet-of-Things: A Network Perspective. (2018). IEEE INFOCOM 2018 - IEEE Conference on Computer Communications. https://doi.org/10.1109/infocom.2018.8486269 Yang, T., Zhang, H., Wang, H., Shahzad, M., Liu, X., Xin, Q., & Li, X. (2018). FID-sketch: an accurate sketch to store frequencies in data streams. World Wide Web, 22(6), 2675–2696. https://doi.org/10.1007/S11280-018-0546-5 Bian, X., Panahi, A., & Krim, H. (2018). Bi-sparsity pursuit: A paradigm for robust subspace recovery. Signal Processing, 152, 148–159. https://doi.org/10.1016/J.SIGPRO.2018.05.024 Loderer, K., Pekrun, R., & Lester, J. C. (2018). Beyond cold technology: A systematic review and meta-analysis on emotions in technology-based learning environments. Learning and Instruction, 101162. https://doi.org/10.1016/J.LEARNINSTRUC.2018.08.002 Sawyer, R., Mudrick, N. V., Azevedo, R., & Lester, J. (2018). Impact of Learner-Centered Affective Dynamics on Metacognitive Judgements and Performance in Advanced Learning Technologies. In Lecture Notes in Computer Science (pp. 312–316). https://doi.org/10.1007/978-3-319-93846-2_58 Psaradellis, C., Muis, K. R., Smith, A., & Lajoie, S. P. (2018). Enhancing complex mathematics problem solving through learning by teaching with a teachable agent. IMSCI 2018 - 12th International Multi-Conference on Society, Cybernetics and Informatics, Proceedings, 2, 31–36. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85056509594&partnerID=MN8TOARS Inventado, P. S., Li, Y., Heffernan, N., Inventado, S. G. F., Scupelli, P., Tu, S., … McGuire, P. (2018). Using design patterns for math preservice teacher education. ACM International Conference Proceeding Series. https://doi.org/10.1145/3282308.3282340 Matsuda, N., Sekar, V. P. C., & Wall, N. (2018). Metacognitive scaffolding amplifies the effect of learning by teaching a teachable agent. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 311–323). https://doi.org/10.1007/978-3-319-93843-1_23 Goodrich, T. D., Sullivan, B. D., & Humble, T. S. (2018). Optimizing adiabatic quantum program compilation using a graph-theoretic framework. Quantum Information Processing, 17(5). https://doi.org/10.1007/S11128-018-1863-4 Kun, J., O’Brien, M. P., & Sullivan, B. D. (2018). Treedepth Bounds in Linear Colorings. In Graph-Theoretic Concepts in Computer Science: Vol. 11159 LNCS (pp. 331–343). https://doi.org/10.1007/978-3-030-00256-5_27 Zhang, F., Zhai, J., Shen, X., Mutlu, O., & Chen, W. (2018). Zwift. Proceedings of the 2018 International Conference on Supercomputing - ICS '18. Presented at the the 2018 International Conference. https://doi.org/10.1145/3205289.3205325 Pittman, R., Guan, H., Shen, X., Lim, S.-H., & Patton, R. M. (2018). Exploring Flexible Communications for Streamlining DNN Ensemble Training Pipelines. SC18: International Conference for High Performance Computing, Networking, Storage and Analysis. Presented at the SC18: International Conference for High Performance Computing, Networking, Storage and Analysis. https://doi.org/10.1109/sc.2018.00067 Zhu, Q., Wu, B., Shen, X., Shen, K., Shen, L., & Wang, Z. (2018). Resolving the GPU responsiveness dilemma through program transformations. Frontiers of Computer Science, 12(3), 545–559. https://doi.org/10.1007/s11704-016-6206-y Sirbu, M.-D., Dascalu, M., Crossley, S. A., McNamara, D. S., Barnes, T., Lynch, C. F., & Trausan-Matu, S. (2018). Exploring Online Course Sociograms Using Cohesion Network Analysis. In Lecture Notes in Computer Science (pp. 337–342). https://doi.org/10.1007/978-3-319-93846-2_63 Shen, S., Mostafavi, B., Lynch, C., Barnes, T., & Chi, M. (2018). Empirically Evaluating the Effectiveness of POMDP vs. MDP Towards the Pedagogical Strategies Induction. In Lecture Notes in Computer Science (pp. 327–331). https://doi.org/10.1007/978-3-319-93846-2_61 Crossley, S. A., Sirbu, M.-D., Dascalu, M., Barnes, T., Lynch, C. F., & McNamara, D. S. (2018). Modeling Math Success Using Cohesion Network Analysis. In Lecture Notes in Computer Science (pp. 63–67). https://doi.org/10.1007/978-3-319-93846-2_12 Cody, C., Mostafavi, B., & Barnes, T. (2018). Investigation of the Influence of Hint Type on Problem Solving Behavior in a Logic Proof Tutor. In Lecture Notes in Computer Science (pp. 58–62). https://doi.org/10.1007/978-3-319-93846-2_11 Chopra, A. K., & SIngh, M. P. (2018). Sociotechnical Systems and Ethics in the Large. Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society - AIES '18. Presented at the the 2018 AAAI/ACM Conference. https://doi.org/10.1145/3278721.3278740 Guo, H., Kafali, O., & Singh, M. (2018). Extraction of Natural Language Requirements from Breach Reports Using Event Inference. 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). Presented at the 2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE). https://doi.org/10.1109/aire.2018.00009 Zhang, Z., & Singh, M. (2018). Limbic: Author-Based Sentiment Aspect Modeling Regularized with Word Embeddings and Discourse Relations. Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. Presented at the Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing. https://doi.org/10.18653/v1/d18-1378 Sheehy, D. R. (2018). Fréchet-Stable Signatures Using Persistence Homology. In Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms (pp. 1100–1108). https://doi.org/10.1137/1.9781611975031.71 Cateté, V., Lytle, N., & Barnes, T. (2018). Creation and validation of low-stakes rubrics for K-12 computer science. Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education - ITiCSE 2018, 63–68. https://doi.org/10.1145/3197091.3197134 Peddycord-Liu, Z., Harred, R., Karamarkovich, S., Barnes, T., Lynch, C., & Rutherford, T. (2018). Learning Curve Analysis in a Large-Scale, Drill-and-Practice Serious Math Game: Where Is Learning Support Needed? In Lecture Notes in Computer Science (pp. 436–449). https://doi.org/10.1007/978-3-319-93843-1_32 Mendling, J., Dustdar, S., Gal, A., García-Bañuelos, L., Governatori, G., Hull, R., … Dumas, M. (2018). Blockchains for Business Process Management - Challenges and Opportunities. ACM Transactions on Management Information Systems, 9(1), 1–16. https://doi.org/10.1145/3183367 A Conceptual Framework for Engineering Chatbots. (2018). IEEE Internet Computing. https://doi.org/10.1109/MIC.2018.2877827 Chirkova, R., Doyle, J., & Reutter, J. L. (2018). The data readiness problem for relational databases. CEUR Workshop Proceedings, 2100. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-85048411064&partnerID=MN8TOARS Shashidharan, A., Vatsavai, R. R., & Meentemeyer, R. K. (2018). FUTURES-DPE: Towards Dynamic Provisioning and Execution of Geosimulations in HPC environments. 26TH ACM SIGSPATIAL INTERNATIONAL CONFERENCE ON ADVANCES IN GEOGRAPHIC INFORMATION SYSTEMS (ACM SIGSPATIAL GIS 2018), pp. 464–467. https://doi.org/10.1145/3274895.3274948 Geden, M., Smith, A., Campbell, J., Amos-Binks, A., Mott, B., Feng, J., & Lester, J. (2018). Towards Adaptive Support for Anticipatory Thinking. PROCEEDINGS OF THE TECHNOLOGY, MIND, AND SOCIETY CONFERENCE (TECHMINDSOCIETY'18). https://doi.org/10.1145/3183654.3183665 OConnor, T. J., Enck, W., Petullo, W. M., & Verma, A. (2018). PivotWall: SDN-Based Information Flow Control. PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18). Presented at the ACM. https://doi.org/10.1145/3185467.3185474 Guan, H., Ding, Y., Shen, X., & Krim, H. (2018). Reuse-Centric K-Means Configuration. 2018 IEEE 34TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), pp. 1224–1227. https://doi.org/10.1109/ICDE.2018.00116 Bushouse, M., & Reeves, D. (2018). Hyperagents: Migrating Host Agents to the Hypervisor. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), pp. 212–223. https://doi.org/10.1145/3176258.3176317 Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2018). Poster: Ethics, values, and personal agents. ACM International Conference Proceeding Series, 1–1. https://doi.org/10.1145/3190619.3191678 Sheshadri, K., Ajmeri, N., & Staddon, J. (2018). No (privacy) news is good news: An analysis of New York times and guardian privacy news from 2010-2016. Proceedings - 2017 15th Annual Conference on Privacy, Security and Trust, PST 2017, 159–168. https://doi.org/10.1109/PST.2017.00027 Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2018). Robust Norm Emergence by Revealing and Reasoning about Context: Socially Intelligent Agents for Enhancing Privacy. Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018-July, 28–34. https://doi.org/10.24963/ijcai.2018/4 Dhinakaran, V. T., Pulle, R., Ajmeri, N., & Murukannaiah, P. K. (2018). App Review Analysis Via Active Learning: Reducing Supervision Effort without Compromising Classification Accuracy. In G. Ruhe, W. Maalej, & D. Amyot (Eds.), 2018 IEEE 26th International Requirements Engineering Conference (RE) (pp. 170–181). https://doi.org/10.1109/re.2018.00026 Guo, H., Ajmeri, N., & Singh, M. P. (2018). Teaching Crowdsourcing: An Experience Report. IEEE Internet Computing, 22(6), 44–52. https://doi.org/10.1109/MIC.2018.2881515 Guo, H., Ajmeri, N., & Singh, M. (2018). Teaching Crowdsourcing: An Experience Report. IEEE Internet Computing, 1–1. https://doi.org/10.1109/mic.2018.112102348 Wolz, U., Battestilli, L., Maxwell, B., Rodger, S., & Trim, M. (2018). Best Practices in Academia to Remedy Gender Bias in Tech. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 672–673. https://doi.org/10.1145/3159450.3159618 Carver, J. C., Heckman, S., & Sherriff, M. (2018). Designing Empirical Education Research Studies (DEERS): Creating an Answerable Research Question. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 1051–1051. https://doi.org/10.1145/3159450.3162350 Battestilli, L., Awasthi, A., & Cao, Y. (2018). Two-Stage Programming Projects: Individual Work Followed by Peer Collaboration. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 479–484. https://doi.org/10.1145/3159450.3159486 Buffum, P. S., Boyer, K. E., Blackburn, D. C., Ying, K. M., Wiebe, E. N., Zheng, X., … Lester, J. C. (2018). Introducing the Computer Science Concept of Variables in Middle School Science Classrooms. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 906–911. https://doi.org/10.1145/3159450.3159545 Tsan, J., Rodriguez, F. J., Boyer, K. E., & Lynch, C. (2018). "I Think We Should...": Analyzing Elementary Students' Collaborative Processes for Giving and Taking Suggestions. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 622–627. https://doi.org/10.1145/3159450.3159507 Lin, C., Kalia, A. K., Xiao, J., Vukovic, M., & Anerousis, N. (2018). NL2API: A Framework for Bootstrapping Service Recommendation using Natural Language Queries. 2018 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (IEEE ICWS 2018), pp. 235–242. https://doi.org/10.1109/ICWS.2018.00037 Guo, Y., Song, Y., & Gehringer, E. F. (2018). Early Detection on Students' Failing Open-Source based Course Projects using Machine Learning Approaches. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 1088–1088. https://doi.org/10.1145/3159450.3162312 Heckman, S., & King, J. (2018). Developing Software Engineering Skills using Real Tools for Automated Grading. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 794–799. https://doi.org/10.1145/3159450.3159595 Price, T. W. (2018). iSnap: Automatic Hints and Feedback for Block-based Programming. SIGCSE'18: PROCEEDINGS OF THE 49TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, pp. 1113–1113. https://doi.org/10.1145/3159450.3162202 PoTrojan: powerful neural-level trojan designs in deep learning models. (2018, February 8). Shi, Y., Li, F., Liu, T., Beyette, F. R., & Song, W. (2018). Dynamic Time-frequency Feature Extraction for Brain Activity Recognition. 2018 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2018-July, 3104–3107. https://doi.org/10.1109/embc.2018.8512914 Jiang, J., Chirkova, R., Doyle, J., & Rosenthal, A. (2018). Poster: Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, pp. 217–219. https://doi.org/10.1145/3205977.3208950 Bushouse, M., & Reeves, D. (2018). Furnace: Self-service Tenant VMI for the Cloud. RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, Vol. 11050, pp. 647–669. https://doi.org/10.1007/978-3-030-00470-5_30 Luo, H., Chen, G., Liu, F., Li, P., Ding, C., & Shen, X. (2018). Footprint Modeling of Cache Associativity and Granularity. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON MEMORY SYSTEMS (MEMSYS 2018), pp. 232–242. https://doi.org/10.1145/3240302.3240419 Rothermel, G. (2018). Improving Regression Testing in Continuous Integration Development Environments (Keynote). PROCEEDINGS OF THE 9TH ACM SIGSOFT INTERNATIONAL WORKSHOP ON AUTOMATING TEST CASE DESIGN, SELECTION, AND EVALUATION (A-TEST '18), pp. 1–1. https://doi.org/10.1145/3278186.3281454 Uang, C.-M., & Bruneau, M. (2018). [Review of State-of-the-Art Review on Seismic Design of Steel Structures]. JOURNAL OF STRUCTURAL ENGINEERING, 144(4). https://doi.org/10.1061/(ASCE)ST.1943-541X.0001973 Pool, N., & Vatsavai, R. R. (2018). Deformable Part Models for Complex Object Detection in Remote Sensing Imagery. BIGSPATIAL 2018: PROCEEDINGS OF THE 7TH ACM SIGSPATIAL INTERNATIONAL WORKSHOP ON ANALYTICS FOR BIG GEOSPATIAL DATA (BIGSPATIAL-2018), pp. 57–62. https://doi.org/10.1145/3282834.3282843 Peitek, N., Siegmund, J., Parnin, C., Apel, S., Hofmeister, J. C., & Brechmann, A. (2018). Simultaneous Measurement of Program Comprehension with fMRI and Eye Tracking: A Case Study. PROCEEDINGS OF THE 12TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2018). https://doi.org/10.1145/3239235.3240495 Yang, R., He, J., Xu, M., Ni, H., Jones, P., & Samatova, N. (2018). An Intelligent and Hybrid Weighted Fuzzy Time Series Model Based on Empirical Mode Decomposition for Financial Markets Forecasting. ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS (ICDM 2018), Vol. 10933, pp. 104–118. https://doi.org/10.1007/978-3-319-95786-9_8 Gadiraju, K. K., Vatsavai, R. R., Kaza, N., Wibbels, E., & Krishna, A. (2018). Machine Learning Approaches for Slum Detection Using Very High Resolution Satellite Images. 2018 18TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), pp. 1397–1404. https://doi.org/10.1109/ICDMW.2018.00198 Xiao, Z., Rajasekar, C., Pramudianto, F., Gehringer, E., Chittoor, V., & Medhekar, A. (2018). Application of neural-network models to labeling educational peer reviews. Proceedings of CSEDM 2018: Educational Data Mining in Computer Science Education Workshop. Presented at the CSEDM 2018, Buffalo, NY. Biswas, S., Gehringer, E. F., Gupta, D., Sahane, S., & Sharma, S. (2018). A Data-Mining Approach to Detecting Plagiarism in Online Exams. Proceedings of EDM 2018: the 11th International Conference on Educational Data Mining, 504–507. Retrieved from http://educationaldatamining.org/files/conferences/EDM2018/EDM2018_Preface_TOC_Proceedings.pdf Exploring Data-driven Worked Examples for Block-based Programming. (2018, August 13). https://doi.org/10.1145/3230977.3231018 Zhi, R., Lytle, N., & Price, T. W. (2018). Exploring Instructional Support Design in an Educational Game for K-12 Computing Education. Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 747–752. https://doi.org/10.1145/3159450.3159519 Yang, S., & Shen, X. (2018). LEEM: Lean Elastic EM for Gaussian Mixture Model via Bounds-Based Filtering. 2018 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), pp. 677–686. https://doi.org/10.1109/ICDM.2018.00083 Babik, D., Gehringer, E. F., Pramudianto, F., Tinapple, D., & Song, Y. (2018). Domain model and meta-language for peer review and assessment. Proceedings of the Western Decision Science Institute Annual Meeting. Presented at the Western Decision Science Institute Annual Meeting, Kauai, HI. Retrieved from http://wdsinet.org/Annual_Meetings/2018_Proceedings/papers/cr150.pdf Gehringer, E., Pramudianto, F., Medhekar, A., Rajasekar, C., & Xiao, Z. (2018). Applications of Artificial Intelligence in Peer Assessment. Proceedings of the 2018 ASEE Annual Conference and Exposition. Presented at the 2018 ASEE Annual Conference and Exposition, Salt Lake City, UT. Retrieved from https://peer.asee.org/board-62-applications-of-artificial-intelligence-in-peer-assessment Yu, Z., & Menzies, T. (2018). Total Recall, Language Processing, and Software Engineering. PROCEEDINGS OF THE 4TH ACM SIGSOFT INTERNATIONAL WORKSHOP ON NLP FOR SOFTWARE ENGINEERING (NL4SE '18), pp. 10–13. https://doi.org/10.1145/3283812.3283818 Das, A., Acar, G., Borisov, N., & Pradeep, A. (2018). The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), pp. 1515–1532. https://doi.org/10.1145/3243734.3243860 Chen, Q., & Kapravelos, A. (2018). Mystique: Uncovering Information Leakage from Browser Extensions. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), pp. 1687–1700. https://doi.org/10.1145/3243734.3243823 Gholkar, N., Mueller, F., Rountree, B., & Marathe, A. (2018). PShiter: Feedback-based Dynamic Power Shiting within HPC Jobs for Performance. HPDC '18: PROCEEDINGS OF THE 27TH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE PARALLEL AND DISTRIBUTED COMPUTING, pp. 106–117. https://doi.org/10.1145/3208040.3208047 Das, A., Mueller, F., Siegel, C., & Vishnu, A. (2018). Desh: Deep Learning for System Health Prediction of Lead Times to Failure in HPC. HPDC '18: PROCEEDINGS OF THE 27TH INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE PARALLEL AND DISTRIBUTED COMPUTING, pp. 40–51. https://doi.org/10.1145/3208040.3208051 Rahman, A., Agrawal, A., Krishna, R., & Sobran, A. (2018). Characterizing the Influence of Continuous Integration. PROCEEDINGS OF THE 4TH ACM SIGSOFT INTERNATIONAL WORKSHOP ON SOFTWARE ANALYTICS (SWAN'18), pp. 8–14. https://doi.org/10.1145/3278142.3278149 Shen, S., Ausin, M. S., Mostafavi, B., & Chi, M. (2018). Improving Learning & Reducing Time: A Constrained Action-Based Reinforcement Learning Approach. PROCEEDINGS OF THE 26TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (UMAP'18), pp. 43–51. https://doi.org/10.1145/3209219.3209232 Emerson, A., Sawyer, R., Azevedo, R., & Lester, J. (2018). Gaze-Enhanced Student Modeling for Game-based Learning. PROCEEDINGS OF THE 26TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (UMAP'18), pp. 63–72. https://doi.org/10.1145/3209219.3209238 Tu, H., & Nair, V. (2018). Is One Hyperparameter Optimizer Enough? PROCEEDINGS OF THE 4TH ACM SIGSOFT INTERNATIONAL WORKSHOP ON SOFTWARE ANALYTICS (SWAN'18), pp. 19–25. https://doi.org/10.1145/3278142.3278145 Price, T. W., Zhi, R., Dong, Y., Lytle, N., & Barnes, T. (2018). The Impact of Data Quantity and Source on the Quality of Data-Driven Hints for Programming. In Lecture Notes in Computer Science (pp. 476–490). https://doi.org/10.1007/978-3-319-93843-1_35 Li, J., Chen, Y., Liu, H., Lu, S., Zhang, Y., Gunawi, H. S., … Li, D. (2018). PCatch: Automatically Detecting Performance Cascading Bugs in Cloud Systems. EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE. https://doi.org/10.1145/3190508.3190552 Barik, T., Ford, D., Murphy-Hill, E., & Parnin, C. (2018). How Should Compilers Explain Problems to Developers? ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 633–643. https://doi.org/10.1145/3236024.3236040 Chen, D., Fu, W., Krishna, R., & Menzies, T. (2018). Applications of Psychological Science for Actionable Analytics. ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 456–467. https://doi.org/10.1145/3236024.3236050 McNamara, A., Smith, J., & Murphy-Hill, E. (2018). Does ACM's Code of Ethics Change Ethical Decision Making in Software Development? ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 729–733. https://doi.org/10.1145/3236024.3264833 Wang, P., & Stolee, K. T. (2018). How Well Are Regular Expressions Tested in the Wild? ESEC/FSE'18: PROCEEDINGS OF THE 2018 26TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 668–678. https://doi.org/10.1145/3236024.3236072 Gehringer, E. (2018). Self-Assessment to Improve Learning and Evaluation. 2017 ASEE Annual Conference & Exposition Proceedings. Presented at the 2017 ASEE Annual Conference & Exposition. https://doi.org/10.18260/1-2--28816 Gehringer, E. (2018). Helping Students to Provide Effective Peer Feedback. 2017 ASEE Annual Conference & Exposition Proceedings. Presented at the 2017 ASEE Annual Conference & Exposition. https://doi.org/10.18260/1-2--28434 Xu, H., & Mueller, F. (2018). Work-In-Progress: Making Machine Learning Real-Time Predictable. 2018 39TH IEEE REAL-TIME SYSTEMS SYMPOSIUM (RTSS 2018), pp. 157–160. https://doi.org/10.1109/RTSS.2018.00029 Rahman, M. M., Barson, J., Paul, S., Kayani, J., Andres Lois, F., Fernandez Quezada, S., … Ray, B. (2018). Evaluating How Developers Use General-Purpose Web-Search for Code Retrieval. 2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), pp. 465–475. https://doi.org/10.1145/3196398.3196425 Nair, V., Agrawal, A., Chen, J., Fu, W., Mathew, G., Menzies, T., … Yu, Z. (2018). Data-Driven Search-based Software Engineering. 2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), pp. 341–352. https://doi.org/10.1145/3196398.3196442 Dai, T., He, J., Gu, X., Lu, S., & Wang, P. (2018). DScope: Detecting Real-World Data Corruption Hang Bugs in Cloud Server Systems. PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC '18), pp. 313–325. https://doi.org/10.1145/3267809.3267844 Middleton, J., Murphy-Hill, E., Green, D., Meade, A., Mayer, R., White, D., & McDonald, S. (2018). Which Contributions Predict Whether Developers Are Accepted Into GitHub Teams. 2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), pp. 403–413. https://doi.org/10.1145/3196398.3196429 Kukreti, S., & Mueller, F. (2018). CloneHadoop: Process Cloning to Reduce Hadoop's Long Tail. 2018 IEEE/ACM 5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING APPLICATIONS AND TECHNOLOGIES (BDCAT), pp. 11–20. https://doi.org/10.1109/BDCAT.2018.00011 Rahman, A. (2018). Comprehension Effort and Programming Activities: Related? Or Not Related? 2018 IEEE/ACM 15TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), pp. 66–69. https://doi.org/10.1145/3196398.3196470 Imtiaz, N., Middleton, J., Girouard, P., & Murphy-Hill, E. (2018). Sentiment and Politeness Analysis Tools on Developer Discussions Are Unreliable, but so Are People. 2018 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON EMOTION AWARENESS IN SOFTWARE ENGINEERING (SEMOTION), pp. 55–61. https://doi.org/10.1145/3194932.3194938 Goldwasser, S., Ostrovsky, R., Scafuro, A., & Sealfon, A. (2018). Population Stability: Regulating Size in the Presence of an Adversary. PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 397–406. https://doi.org/10.1145/3212734.3212747 Imamoglu, E., Kaltofen, E. L., & Yang, Z. (2018). Sparse Polynomial Interpolation With Arbitrary Orthogonal Polynomial Bases. ISSAC'18: PROCEEDINGS OF THE 2018 ACM INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, pp. 223–230. https://doi.org/10.1145/3208976.3208999 Te, I., Lokhandwala, M., Hu, Y.-C., & Tseng, H.-W. (2018). Pensieve: a Machine Learning Assisted SSD Layer for Extending the Lifetime. 2018 IEEE 36TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), pp. 35–42. https://doi.org/10.1109/ICCD.2018.00016 Shen, X. (2018). Rethinking Compilers in the Rise of Machine Learning and AI. CC'18: PROCEEDINGS OF THE 27TH INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION, pp. 1–1. https://doi.org/10.1145/3178372.3183634 Kloster, K., Král', D., & Sullivan, B. D. (2018). Walk entropy and walk-regularity. Linear Algebra and Its Applications, 546, 115–121. https://doi.org/10.1016/j.laa.2018.02.009 Brown, C. T., Moritz, D., O’Brien, M. P., Reidl, F., Reiter, T., & Sullivan, B. D. (2018, November 5). Exploring neighborhoods in large metagenome assembly graphs reveals hidden sequence diversity. BioRxiv, Vol. 11. https://doi.org/10.1101/462788 Yang, S., & Shen, X. (2018). FALCON: A Fast Drop-In Replacement of Citation KNN for Multiple Instance Learning. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, pp. 67–76. https://doi.org/10.1145/3269206.3271787 Wermke, D., Huaman, N., Acar, Y., Reaves, B., Traynor, P., & Fahl, S. (2018). A Large Scale Investigation of Obfuscation Use in Google Play. 34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), pp. 222–235. https://doi.org/10.1145/3274694.3274726 Xu, M., Yang, R., Jones, P., & Samatova, N. F. (2018). Mining Aspect-Specific Opinions from Online Reviews Using a Latent Embedding Structured Topic Model. COMPUTATIONAL LINGUISTICS AND INTELLIGENT TEXT PROCESSING, CICLING 2017, PT II, Vol. 10762, pp. 195–210. https://doi.org/10.1007/978-3-319-77116-8_15 Catete, V., Lytle, N., Dong, Y., Boulden, D., Akram, B., Houchins, J., … Boyer, K. (2018). Infusing Computational Thinking into Middle Grade Science Classrooms: Lessons Learned. WIPSCE'18: PROCEEDINGS OF THE 13TH WORKSHOP IN PRIMARY AND SECONDARY COMPUTING EDUCATION, pp. 109–114. https://doi.org/10.1145/3265757.3265778 Pan, X., & Mueller, F. (2018). Controller-Aware Memory Coloring for Multicore Real-Time Systems. 33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 584–592. https://doi.org/10.1145/3167132.3167196 Geden, M., Staicu, A.-M., & Feng, J. (2018). Reduced Target Facilitation and Increased Distractor Suppression During Mind Wandering. EXPERIMENTAL PSYCHOLOGY, 65(6), 345–352. https://doi.org/10.1027/1618-3169/a000417 Venkatnarayan, R. H., Page, G., & Shahzad, M. (2018). Multi-User Gesture Recognition Using WiFi. MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, pp. 401–413. https://doi.org/10.1145/3210240.3210335 Wilson, K., & Orphanides, A. (2018). It’s Made of People: Designing Systems for Humans. Serials Review, 44(3), 211–216. https://doi.org/10.1080/00987913.2018.1525244 Head, A., Sadowski, C., Murphy-Hill, E., & Knight, A. (2018). When Not to Comment Questions and Tradeoffs with API Documentation for C plus plus Projects. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 643–653. https://doi.org/10.1145/3180155.3180176 Murphy-Hill, E., Sadowski, C., Head, A., Daughtry, J., Macvean, A., Jaspan, C., & Winter, C. (2018). Discovering API Usability Problems at Scale. 2018 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON API USAGE AND EVOLUTION (WAPI), pp. 14–17. https://doi.org/10.1145/3194793.3194795 Morrison, P. J., Pandita, R., Xiao, X., Chillarege, R., & Williams, L. (2018). Are Vulnerabilities Discovered and Resolved like Other Defects? PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 498–498. https://doi.org/10.1145/3180155.3182553 Rahman, A., Partho, A., Morrison, P., & Williams, L. (2018). What Questions Do Programmers Ask About Configuration as Code? PROCEEDINGS 2018 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON RAPID CONTINUOUS SOFTWARE ENGINEERING (RCOSE), pp. 16–22. https://doi.org/10.1145/3194760.3194769 Hsu, C.-J., Nair, V., Menzies, T., & Freeh, V. (2018). Micky: A Cheaper Alternative for Selecting Cloud Instances. PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), pp. 409–416. https://doi.org/10.1109/CLOUD.2018.00058 Agrawal, A., & Menzies, T. (2018). Is "Better Data" Better Than "Better Data Miners"? On the Benefits of Tuning SMOTE for Defect Prediction. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 1050–1061. https://doi.org/10.1145/3180155.3180197 Chen, J., & Menzies, T. (2018). RIOT: a Stochastic-based Method for Workflow Scheduling in the Cloud. PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), pp. 318–325. https://doi.org/10.1109/CLOUD.2018.00047 Yu, X., & Jin, G. (2018). Dataflow Tunneling. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 586–597. https://doi.org/10.1145/3180155.3180171 Dai, H., Shahzad, M., Liu, A. X., Li, M., Zhong, Y., & Chen, G. (2018). Identifying and Estimating Persistent Items in Data Streams. IEEE-ACM TRANSACTIONS ON NETWORKING, 26(6), 2429–2442. https://doi.org/10.1109/TNET.2018.2865125 Dumitrescu, E. F., Fisher, A. L., Goodrich, T. D., Humble, T. S., Sullivan, B. D., & Wright, A. L. (2018). Benchmarking treewidth as a practical component of tensor network simulations. PLOS ONE, 13(12). https://doi.org/10.1371/journal.pone.0207827 Zhang, F., Zhai, J., Shen, X., Mutlu, O., & Chen, W. (2018). Efficient Document Analytics on Compressed Data: Method, Challenges, Algorithms, Insights. PROCEEDINGS OF THE VLDB ENDOWMENT, 11(11), 1522–1535. https://doi.org/10.14778/3236187.3236203 Wang, H., Skau, E., Krim, H., & Cervone, G. (2018). Fusing Heterogeneous Data: A Case for Remote Sensing and Social Media. IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, 56(12), 6956–6968. https://doi.org/10.1109/TGRS.2018.2846199 Yu, Z., Kraft, N. A., & Menzies, T. (2018). Finding better active learners for faster literature reviews. EMPIRICAL SOFTWARE ENGINEERING, 23(6), 3161–3186. https://doi.org/10.1007/s10664-017-9587-0 Horton, E., & Parnin, C. (2018). Gistable: Evaluating the Executability of Python Code Snippets on GitHub. PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), pp. 217–227. https://doi.org/10.1109/ICSME.2018.00031 Altuntas, A., & Baugh, J. (2018). Hybrid theorem proving as a lightweight method for verifying numerical software. PROCEEDINGS OF CORRECTNESS 2018: 2ND IEEE/ACM INTERNATIONAL WORKSHOP ON SOFTWARE CORRECTNESS FOR HPC APPLICATIONS, pp. 1–8. https://doi.org/10.1109/Correctness.2018.00005 Baugh, J., & Dyer, T. (2018). State-based formal methods in scientific computation. In M. Butler, A. Raschke, T. S. Hoang, & K. Reichl (Eds.), Abstract State Machines, Alloy, B, TLA, VDM, and Z (pp. 392–396). https://doi.org/10.1007/978-3-319-91271-4_29 Liu, X., Jiang, W., Yang, B., & Baugh, J. (2018). Numerical study on factors influencing typhoon-induced storm surge distribution in Zhanjiang Harbor. Estuarine, Coastal and Shelf Science, 215, 39–51. https://doi.org/10.1016/j.ecss.2018.09.019 Hill, A., Pasareanu, C. S., & Stolee, K. T. (2018). Poster: Automated Program Repair with Canonical Constraints. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, pp. 339–341. https://doi.org/10.1145/3183440.3194999 Behroozi, M., Lui, A., Moore, I., Ford, D., & Parnin, C. (2018). Dazed: Measuring the Cognitive Load of Solving Technical Interview Problems at the Whiteboard. 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: NEW IDEAS AND EMERGING TECHNOLOGIES RESULTS (ICSE-NIER), pp. 93–96. https://doi.org/10.1145/3183399.3183415 Akbar, S., Gehringer, E. F., & Hu, Z. (2018). Poster: Improving Formation of Student Teams: A Clustering Approach. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, pp. 147–148. https://doi.org/10.1145/3183440.3195057 Morrison, P., Oyetoyan, T. D., & Williams, L. (2018). Identifying Security Issues in Software Development: Are Keywords Enough? PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, pp. 426–427. https://doi.org/10.1145/3183440.3195040 Carpenter, S. E., & Sichitiu, M. L. (2018). BUR-GEN: A Bursty Packet Generator for Vehicular Communication Channels. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 67(11), 10232–10242. https://doi.org/10.1109/TVT.2018.2866946 Ning, L., Pittman, R., & Shen, X. (2018). LCD: A Fast Contrastive Divergence Based Algorithm for Restricted Boltzmann Machine. NEURAL NETWORKS, 108, 399–410. https://doi.org/10.1016/j.neunet.2018.08.018 Rahman, A. (2018). Characteristics of Defective Infrastructure as Code Scripts in DevOps. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, pp. 476–479. https://doi.org/10.1145/3183440.3183452 Rahman, A., Stallings, J., & Williams, L. (2018). Poster: Defect Prediction Metrics for Infrastructure as Code Scripts in DevOps. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, pp. 414–415. https://doi.org/10.1145/3183440.3195034 He, J., Dai, T., & Gu, X. (2018). TScope: Automatic Timeout Bug Identification for Server Systems. 15TH IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING (ICAC 2018), pp. 1–10. https://doi.org/10.1109/ICAC.2018.00010 Mudrick, N. V., Sawyer, R., Price, M. J., Lester, J., Roberts, C., & Azevedo, R. (2018). Identifying How Metacognitive Judgments Influence Student Performance During Learning with MetaTutorIVH. INTELLIGENT TUTORING SYSTEMS, ITS 2018, 10858, 140–149. https://doi.org/10.1007/978-3-319-91464-0_14 Mawhorter, P., Zegura, C., Gray, A., Jhala, A., Mateas, M., & Wardrip-Fruin, N. (2018). Choice Poetics by Example. ARTS, 7(3). https://doi.org/10.3390/arts7030047 Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J. C., Meneely, A., & Williams, L. (2018). [Review of Attack surface definitions: A systematic literature review]. INFORMATION AND SOFTWARE TECHNOLOGY, 104, 94–103. https://doi.org/10.1016/j.infsof.2018.07.008 Petke, J., & Menzies, T. (2018, December). Guest Editorial for the Special Section from the 9th International Symposium on Search Based Software Engineering. INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 104, pp. 194–194. https://doi.org/10.1016/j.infsof.2018.10.002 Damschen, M., Mueller, F., & Henkel, J. (2018, November). Co-Scheduling on Fused CPU-GPU Architectures With Shared Last Level Caches. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, Vol. 37, pp. 2337–2347. https://doi.org/10.1109/TCAD.2018.2857042 Azizsoltani, H., & Haldar, A. (2018). Reliability Analysis of Lead-Free Solders in Electronic Packaging Using a Novel Surrogate Model and Kriging Concept. JOURNAL OF ELECTRONIC PACKAGING, 140(4). https://doi.org/10.1115/1.4040924 Qian, T., & Mueller, F. (2018, November). A Failure Recovery Protocol for Software-Defined Real-Time Networks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, Vol. 37, pp. 2222–2232. https://doi.org/10.1109/TCAD.2018.2857299 Hu, Z., Song, Y., & Gehringer, E. F. (2018). Open-Source Software in Class: Students' Common Mistakes. 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-SEET), pp. 40–48. https://doi.org/10.1145/3183377.3183394 Heckman, S., Stolee, K. T., & Parnin, C. (2018). 10+Years of Teaching Software Engineering with iTrust: the Good, the Bad, and the Ugly. 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: SOFTWARE ENGINEERING EDUCATION AND TRAINING (ICSE-SEET), pp. 1–4. https://doi.org/10.1145/3183377.3183393 Williams, L. (2018). Continuously Integrating Security. 2018 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON SECURITY AWARENESS FROM DESIGN TO DEPLOYMENT (SEAD), pp. 1–2. https://doi.org/10.1145/3194707.3194717 Azizsoltani, H., Ramon Gaxiola-Camacho, J., & Haldar, A. (2018). Site-specific seismic design of damage tolerant structural systems using a novel concept. BULLETIN OF EARTHQUAKE ENGINEERING, 16(9), 3819–3843. https://doi.org/10.1007/s10518-018-0329-5 Shen, X., Lovas, R., & Liao, X. (2018, October). Editorial for the Special Issue on In-Memory Computing. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 120, pp. 322–322. https://doi.org/10.1016/j.jpdc.2018.05.009 Ramachandra, B., Nawathe, P., Monroe, J., Han, K., Ham, Y., & Vatsavai, R. R. (2018). Real-Time Energy Audit of Built Environments: Simultaneous Localization and Thermal Mapping. JOURNAL OF INFRASTRUCTURE SYSTEMS, 24(3). https://doi.org/10.1061/(ASCE)IS.1943-555X.0000431 Akbulut, A., Ertugrul, E., & Topcu, V. (2018). Fetal health status prediction based on maternal clinical history using machine learning techniques. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 163, 87–100. https://doi.org/10.1016/j.cmpb.2018.06.010 Azizsoltani, H., & Sadeghi, E. (2018). Adaptive sequential strategy for risk estimation of engineering systems using Gaussian process regression active learning. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 74, 146–165. https://doi.org/10.1016/j.engappai.2018.06.007 Morrison, P., Moye, D., Pandita, R., & Williams, L. (2018). Mapping the field of software life cycle security metrics. INFORMATION AND SOFTWARE TECHNOLOGY, 102, 146–159. https://doi.org/10.1016/j.infsof.2018.05.011 Zhao, Y., Li, J., Liao, C., & Shen, X. (2018). Bridging the Gap between Deep Learning and Sparse Matrix Format Selection. ACM SIGPLAN NOTICES, 53(1), 94–108. https://doi.org/10.1145/3178487.3178495 Ghanem, S., Krim, H., Clouse, H. S., & Sakla, W. (2018). Metric Driven Classification: A Non-Parametric Approach Based on the Henze-Penrose Test Statistic. IEEE TRANSACTIONS ON IMAGE PROCESSING, 27(12), 5947–5956. https://doi.org/10.1109/TIP.2018.2862352 Nam, J., Fu, W., Kim, S., Menzies, T., & Tan, L. (2018). Heterogeneous Defect Prediction. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 44(9), 874–896. https://doi.org/10.1109/TSE.2017.2720603 Xu, S., Xu, Y., Xue, W., Shen, X., Zheng, F., Huang, X., & Yang, G. (2018). Taming the "Monster": Overcoming Program Optimization Challenges on SW26010 Through Precise Performance Modeling. 2018 32ND IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 763–773. https://doi.org/10.1109/IPDPS.2018.00086 Lavrijsen, W., Iancu, C., & Pan, X. (2018). Improving Network Throughput with Global Communication Reordering. 2018 32ND IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 266–275. https://doi.org/10.1109/IPDPS.2018.00036 Zhao, Y., Zhou, W., Shen, X., & Yiu, G. (2018). Overhead-Conscious Format Selection for SpMV-Based Applications. 2018 32ND IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 950–959. https://doi.org/10.1109/IPDPS.2018.00104 Bahmani, A., & Mueller, F. (2018). Chameleon: Online Clustering of MPI Program Traces. 2018 32ND IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 1102–1112. https://doi.org/10.1109/IPDPS.2018.00119 Bhat, S., Rouskas, G. N., & Katib, I. (2018). On time dependent routing algorithms for open marketplaces of path services with support for in-advance path reservation. COMPUTER NETWORKS, 138, 201–212. https://doi.org/10.1016/j.comnet.2018.04.006 Magerko, B., Bahamon, J. C., Buro, M., Damiano, R., Mazeika, J., Ontanon, S., … Siu, K. (2018). The 13th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment. AI MAGAZINE, Vol. 39, pp. 75–78. https://doi.org/10.1609/aimag.v39i2.2798 Hanusa, C. R. H., & Savage, C. D. (2018). Lecture hall partitions and the affine hyperoctahedral group. Electronic Journal of Combinatorics, 25(1). Meneguzzi, F., Magnaguagno, M. C., Singh, M. P., Telang, P. R., & Yorke-Smith, N. (2018). GoCo: planning expressive commitment protocols. AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 32(4), 459–502. https://doi.org/10.1007/s10458-018-9385-0 Miyazawa, T., Harai, H., Udechukwu, R., & Dutta, R. (2018). Designing and experimentally demonstrating automatic OPS/OCS/OpenFlow network control driven by ChoiceNet provider. PHOTONIC NETWORK COMMUNICATIONS, 36(1), 43–55. https://doi.org/10.1007/s11107-018-0769-5 Rahman, A., & Williams, L. (2018). Characterizing Defective Configuration Scripts Used for Continuous Deployment. 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), pp. 34–45. https://doi.org/10.1109/icst.2018.00014 Agrawal, A., Fu, W., & Menzies, T. (2018). What is wrong with topic modeling? And how to fix it using search-based software engineering. INFORMATION AND SOFTWARE TECHNOLOGY, 98, 74–88. https://doi.org/10.1016/j.infsof.2018.02.005 Al-Amin, S., Ajmeri, N., Du, H., Berglund, E. Z., & Singh, M. P. (2018). Toward effective adoption of secure software development practices. SIMULATION MODELLING PRACTICE AND THEORY, 85, 33–46. https://doi.org/10.1016/j.simpat.2018.03.006 Sottilare, R. A., Baker, R. S., Graesser, A. C., & Lester, J. C. (2018, June). Special Issue on the Generalized Intelligent Framework for Tutoring (GIFT): Creating a Stable and Flexible Platform for Innovations in AIED Research. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, Vol. 28, pp. 139–151. https://doi.org/10.1007/s40593-017-0149-9 DeFalco, J. A., Rowe, J. P., Paquette, L., Georgoulas-Sherry, V., Brawner, K., Mott, B. W., … Lester, J. C. (2018). Detecting and Addressing Frustration in a Serious Game for Military Training. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 28(2), 152–193. https://doi.org/10.1007/s40593-017-0152-1 Gao, L., & Rouskas, G. N. (2018). A spectral clustering approach to network-aware virtual request partitioning. COMPUTER NETWORKS, 139, 70–80. https://doi.org/10.1016/j.comnet.2018.04.005 Gutin, G., Reidl, F., & Wahlstrom, M. (2018). k-distinct in- and out-branchings in digraphs. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 95, 86–97. https://doi.org/10.1016/j.jcss.2018.01.003 Nie, S., Healey, C. G., Padia, K., Leeman-Munk, S., Benson, J. R., Caira, D., … Devarajan, R. (2018). Visualizing Deep Neural Networks for Text Analytics. 2018 IEEE PACIFIC VISUALIZATION SYMPOSIUM (PACIFICVIS), pp. 180–189. https://doi.org/10.1109/pacificvis.2018.00031 Sohn, D., Shpanskaya, K., Lucas, J. E., Petrella, J. R., Saykin, A. J., Tanzi, R. E., … Doraiswamy, P. M. (2018). Sex Differences in Cognitive Decline in Subjects with High Likelihood of Mild Cognitive Impairment due to Alzheimer's disease. SCIENTIFIC REPORTS, 8. https://doi.org/10.1038/s41598-018-25377-w Panahi, A., Bian, X., Krim, L., & Dai, L. (2018). Robust Subspace Clustering by Bi-sparsity Pursuit: Guarantees and Sequential Algorithm. 2018 IEEE WINTER CONFERENCE ON APPLICATIONS OF COMPUTER VISION (WACV 2018), pp. 1302–1311. https://doi.org/10.1109/wacv.2018.00147 Martinez, M., & Savage, C. (2018). Patterns in inversion sequences II: Inversion sequences avoiding triples of relations. Journal of Integer Sequences, 21(2). Das, A., Iyengar, A., & Mueller, F. (2018). KeyValueServe(dagger): Design and performance analysis of a multi-tenant data grid as a cloud service. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 30(14). https://doi.org/10.1002/cpe.4424 Mushi, M., & Dutta, R. (2018). Human Factors in Network Reliability Engineering. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 26(3), 686–722. https://doi.org/10.1007/s10922-017-9440-1 Baugh, J., & Altuntas, A. (2018). Formal methods and finite element analysis of hurricane storm surge: A case study in software verification. SCIENCE OF COMPUTER PROGRAMMING, 158, 100–121. https://doi.org/10.1016/j.scico.2017.08.012 Nair, V., Menzies, T., Siegmund, N., & Apel, S. (2018). Faster discovery of faster system configurations with spectral learning. AUTOMATED SOFTWARE ENGINEERING, 25(2), 247–277. https://doi.org/10.1007/s10515-017-0225-2 Ajmeri, N., Guo, H., Murukannaiah, P. K., & Singh, M. P. (2018). Designing Ethical Personal Agents. IEEE INTERNET COMPUTING, 22(2), 16–22. https://doi.org/10.1109/mic.2018.022021658 Villanes, A., Griffiths, E., Rappa, M., & Healey, C. G. (2018). Dengue Fever Surveillance in India Using Text Mining in Public Media. AMERICAN JOURNAL OF TROPICAL MEDICINE AND HYGIENE, 98(1), 181–191. https://doi.org/10.4269/ajtmh.17-0253 Morrison, P. J., Pandita, R., Xiao, X., Chillarege, R., & Williams, L. (2018). Are vulnerabilities discovered and resolved like other defects? EMPIRICAL SOFTWARE ENGINEERING, 23(3), 1383–1421. https://doi.org/10.1007/s10664-017-9541-1 Meyer, C. D. (2018). Rank My Update, Please. AMERICAN MATHEMATICAL MONTHLY, 125(1), 61–64. https://doi.org/10.1080/00029890.2017.1389199 Bouterse, B., & Perros, H. (2018). Dynamic VM allocation in a SaaS environment. ANNALS OF TELECOMMUNICATIONS, 73(3-4), 205–218. https://doi.org/10.1007/s12243-017-0589-0 Chen, J., Nair, V., & Menzies, T. (2018). Beyond evolutionary algorithms for search-based software engineering. INFORMATION AND SOFTWARE TECHNOLOGY, 95, 281–294. https://doi.org/10.1016/j.infsof.2017.08.007 Taub, M., Azevedo, R., Bradbury, A. E., Millar, G. C., & Lester, J. (2018). Using sequence mining to reveal the efficiency in scientific reasoning during STEM learning with a game-based learning environment. LEARNING AND INSTRUCTION, 54, 93–103. https://doi.org/10.1016/j.learninstruc.2017.08.005 Menzies, T. (2018). The Unreasonable Effectiveness of Software Analytics. IEEE SOFTWARE, 35(2), 96–98. https://doi.org/10.1109/ms.2018.1661323 Parnin, C., & Fabry, J. (2018, February). Special edition of the Journal of Software: Evolution and Process for the 4th IEEE Working Conference on Software Visualization (VISSOFT 2016). JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, Vol. 30. https://doi.org/10.1002/smr.1940 Xiong, Y., Li, Y., Zhou, B., Wang, R., & Rouskas, G. N. (2018, January). SDN Enabled Restoration With Triggered Precomputation in Elastic Optical Inter- Datacenter Networks. JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, Vol. 10, pp. 24–34. https://doi.org/10.1364/jocn.10.000024 Reisman, S., Chou, W. B., Ferrante, F. E., Liu, S. Y., & Murugesan, S. (2018). Retrospectives and Reflections 20 Years of IT Professional. IT PROFESSIONAL, Vol. 20, pp. 19–26. https://doi.org/10.1109/mitp.2018.011291537 Bushouse, M., & Reeves, D. (2018). Goalkeeper: Comprehensive process enforcement from the hypervisor. COMPUTERS & SECURITY, 73, 459–473. https://doi.org/10.1016/j.cose.2017.11.020 Walden-Schreiner, C., Leung, Y.-F., & Tateosian, L. (2018). Digital footprints: Incorporating crowdsourced geographic information for protected area management. APPLIED GEOGRAPHY, 90, 44–54. https://doi.org/10.1016/j.apgeog.2017.11.004 Thomaz, L. A., Jardim, E., Silva, A. F., Silva, E. A. B., Netto, S. L., & Krim, H. (2018, March). Anomaly Detection in Moving-Camera Video Sequences Using Principal Subspace Analysis. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, Vol. 65, pp. 1003–1015. https://doi.org/10.1109/tcsi.2017.2758379 Perros, H. G. (2018). QoS architectures for the IP network. Encyclopedia of Information Science and Technology, 4th Edition, 6609–6617. Prikladnicki, R., & Menzies, T. (2018). VOICE OF EVIDENCE From Voice of Evidence to Redirections. IEEE SOFTWARE, Vol. 35, pp. 11–13. https://doi.org/10.1109/ms.2017.4541053 Yang, Y., Falessi, D., Menzies, T., & Hihn, J. (2018). Actionable Analytics for Software Engineering INTRODUCTION. IEEE SOFTWARE, Vol. 35, pp. 51–53. https://doi.org/10.1109/ms.2017.4541039