Works Published in 2018

search works

Displaying works 181 - 200 of 275 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2018 article

Exploring neighborhoods in large metagenome assembly graphs reveals hidden sequence diversity

Brown, C. T., Moritz, D., O’Brien, M. P., Reidl, F., Reiter, T., & Sullivan, B. D. (2018, November 5). BioRxiv, Vol. 11.

By: C. Brown, D. Moritz*, M. O’Brien*, F. Reidl*, T. Reiter & B. Sullivan*

Contributors: C. Brown, D. Moritz*, M. O’Brien*, F. Reidl*, T. Reiter & B. Sullivan*

TL;DR: An information retrieval system for large metagenomic data sets that exploits the sparsity of DNA assembly graphs to efficiently extract subgraphs surround-ing an inferred genome is introduced. (via Semantic Scholar)
Source: ORCID
Added: February 8, 2019

2018 article

FALCON: A Fast Drop-In Replacement of Citation KNN for Multiple Instance Learning

CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, pp. 67–76.

By: S. Yang n & X. Shen n

author keywords: Citation KNN; Triangle Inequality; Multiple-instance Learning
TL;DR: FALCON accelerates Citation KNN by removing unnecessary distance calculations through two novel optimizations, multi-level triangle inequality-based distance filtering and heap optimization, making it a promising drop-in replacement of Citation Knn for multiple instance learning. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: February 4, 2019

2018 article

A Large Scale Investigation of Obfuscation Use in Google Play

34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), pp. 222–235.

author keywords: Obfuscation; Android; User Study
TL;DR: This first comprehensive analysis of the use of and challenges to software obfuscation in Android applications finds that only 24.92% of apps are obfuscated by the developer, with broad implications both for improving the security of Android apps and for all tools that aim to help developers write more secure software. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: January 28, 2019

2018 article

Mining Aspect-Specific Opinions from Online Reviews Using a Latent Embedding Structured Topic Model

COMPUTATIONAL LINGUISTICS AND INTELLIGENT TEXT PROCESSING, CICLING 2017, PT II, Vol. 10762, pp. 195–210.

By: M. Xu n, R. Yang n, P. Jones n & N. Samatova n

Contributors: M. Xu n, R. Yang n, P. Jones n & N. Samatova n

TL;DR: This paper proposes a Latent embedding structured Opinion mining Topic model, called the LOT, which can simultaneously discover relevant aspect-level specific opinions from small or large numbers of reviews and to assign accurate sentiment to words. (via Semantic Scholar)
UN Sustainable Development Goal Categories
1. No Poverty (OpenAlex)
Sources: Web Of Science, ORCID
Added: January 28, 2019

2018 article

Infusing Computational Thinking into Middle Grade Science Classrooms: Lessons Learned

WIPSCE'18: PROCEEDINGS OF THE 13TH WORKSHOP IN PRIMARY AND SECONDARY COMPUTING EDUCATION, pp. 109–114.

By: V. Catete n, N. Lytle n, Y. Dong n, D. Boulden n, B. Akram n, J. Houchins n, T. Barnes n, E. Wiebe n ...

Contributors: V. Cateté n, N. Lytle n, Y. Dong n, D. Boulden n, B. Akram n, J. Houchins n, T. Barnes n, E. Wiebe n ...

author keywords: Professional Development; STEM plus C; Computational Thinking
TL;DR: Initial lessons learned while conducting design-based implementation research on integrating computational thinking into middle school science classes are presented and case studies suggest that several factors including teacher engagement, teacher attitudes, student prior experience with CS/CT, and curriculum design can all impact student engagement in integrated science-CT lessons. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: January 28, 2019

2018 article

Controller-Aware Memory Coloring for Multicore Real-Time Systems

33RD ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 584–592.

By: X. Pan n & F. Mueller n

author keywords: memory access; NUMA; real-time predictability
TL;DR: This work contributes a controller/node-aware memory coloring (CAMC) allocator inside the Linux kernel for the entire address space to reduce access conflicts and latencies by isolating tasks from one another. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: January 28, 2019

2018 journal article

Reduced Target Facilitation and Increased Distractor Suppression During Mind Wandering

EXPERIMENTAL PSYCHOLOGY, 65(6), 345–352.

By: M. Geden n, A. Staicu n & J. Feng n

author keywords: mind wandering; target facilitation; distractor suppression; perceptual decoupling
MeSH headings : Adolescent; Adult; Attention / physiology; Female; Humans; Male; Perception / physiology; Young Adult
TL;DR: Findings suggest that rather than perceptual decoupling globally suppressing all stimuli, it is more selective, falling in line with evidence on strong top-down modulation. (via Semantic Scholar)
Source: Web Of Science
Added: January 28, 2019

2018 article

Multi-User Gesture Recognition Using WiFi

MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, pp. 401–413.

author keywords: Gesture recognition; WiFi; Multi-user
TL;DR: The key idea behind WiMU is that when it detects that some users have performed some gestures simultaneously, it first automatically determines the number of simultaneously performed gestures (Na) and then, using the training samples collected from a single user, generates virtual samples for various plausible combinations of Na gestures. (via Semantic Scholar)
Source: Web Of Science
Added: January 28, 2019

2018 journal article

It’s Made of People: Designing Systems for Humans

Serials Review, 44(3), 211–216.

By: K. Wilson & A. Orphanides n

author keywords: design ethics; human-centered design; models; systems analysis
TL;DR: Some of the challenges of interacting with the world in terms of systems, the human costs of failing to recognize the limitations of systems are discussed, and a framework for thinking about systems is provided to help ensure that the authors' systems respect the humanity of their human participants. (via Semantic Scholar)
Source: ORCID
Added: January 25, 2019

2018 article

When Not to Comment Questions and Tradeoffs with API Documentation for C plus plus Projects

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 643–653.

By: A. Head*, C. Sadowski*, E. Murphy-Hill n & A. Knight*

TL;DR: A set of questions maintainers and tool developers should consider when improving API-level documentation is identified, which may provide only limited value for developers, while requiring effort maintainers don't want to invest. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 article

Discovering API Usability Problems at Scale

2018 IEEE/ACM 2ND INTERNATIONAL WORKSHOP ON API USAGE AND EVOLUTION (WAPI), pp. 14–17.

By: E. Murphy-Hill n, C. Sadowski*, A. Head*, J. Daughtry*, A. Macvean*, C. Jaspan*, C. Winter*

TL;DR: This paper describes an analysis technique designed to find API usability problems by comparing successive file-level changes made by individual software developers, and applies this tool to the file histories of real developers doing real tasks at Google. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 article

Are Vulnerabilities Discovered and Resolved like Other Defects?

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 498–498.

Source: Web Of Science
Added: January 21, 2019

2018 article

What Questions Do Programmers Ask About Configuration as Code?

PROCEEDINGS 2018 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON RAPID CONTINUOUS SOFTWARE ENGINEERING (RCOSE), pp. 16–22.

By: A. Rahman n, A. Partho, P. Morrison n & L. Williams n

author keywords: challenge; configuration as code; continuous deployment; devops; infrastructure as code; programming; puppet; question; stack over-flow
TL;DR: This paper extracts 2,758 Puppet-related questions asked by programmers from January 2010 to December 2016, posted on Stack Overflow, and applies qualitative analysis to identify the questions programmers ask about Puppet. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 article

Micky: A Cheaper Alternative for Selecting Cloud Instances

PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), pp. 409–416.

By: C. Hsu n, V. Nair n, T. Menzies n & V. Freeh n

TL;DR: A collective-optimizer is created, MICKY, that reformulates the task of finding the near-optimal cloud configuration as a multi-armed bandit problem and can achieve on average 8.6 times reduction in measurement cost as compared to the state-of-the-art method while finding near-Optimal solutions. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: January 21, 2019

2018 article

Is "Better Data" Better Than "Better Data Miners"? On the Benefits of Tuning SMOTE for Defect Prediction

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 1050–1061.

By: A. Agrawal n & T. Menzies n

author keywords: Search based SE; defect prediction; classification; data analytics for software engineering; SMOTE; imbalanced data; preprocessing
TL;DR: For software analytic tasks like defect prediction, data pre-processing can be more important than classifier choice, ranking studies are incomplete without such pre- Processing, and SMOTUNED is a promising candidate for pre- processing. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: January 21, 2019

2018 article

RIOT: a Stochastic-based Method for Workflow Scheduling in the Cloud

PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), pp. 318–325.

By: J. Chen n & T. Menzies n

author keywords: cloud computing; workflow scheduling; multiobjective optimization
TL;DR: RIOT (Randomized Instance Order Types), a stochastic based method for workflow scheduling that groups the tasks in the workflow into virtual machines via a probability model and then uses an effective surrogate based method to assess large amount of potential schedulings. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: January 21, 2019

2018 article

Dataflow Tunneling

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 586–597.

By: X. Yu n & G. Jin n

author keywords: web applications; request-based applications; web frameworks; inter-request analysis; tracing
TL;DR: This paper designs an approach called dataflow tunneling to capture inter-request data dependencies from concrete application executions and produce data-dependency specifications, and envision that this approach can provide key information to enable future inter- request analysis techniques. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2018 journal article

Identifying and Estimating Persistent Items in Data Streams

IEEE-ACM TRANSACTIONS ON NETWORKING, 26(6), 2429–2442.

author keywords: Persistent item; identification; estimation; Bloom filter; Raptor code
TL;DR: This paper proposes a novel scheme, PIE, that can not only accurately identify each persistent item with a probability greater than any desired false negative rate (FNR), but can also accurately estimate the number of occurrences of each persistence item. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: January 14, 2019

2018 journal article

Benchmarking treewidth as a practical component of tensor network simulations

PLOS ONE, 13(12).

Ed(s): E. Torre

MeSH headings : Algorithms; Benchmarking; Computer Graphics; Computer Simulation; Quantum Theory; Software
TL;DR: This work exhibits multiple regimes where treewidth-based algorithms outperform domain-specific algorithms, while demonstrating that the optimal choice of algorithm has a complex dependence on the network density, expected contraction complexity, and user run time requirements. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: January 7, 2019

2018 journal article

Efficient Document Analytics on Compressed Data: Method, Challenges, Algorithms, Insights

PROCEEDINGS OF THE VLDB ENDOWMENT, 11(11), 1522–1535.

TL;DR: This work proposes the concept of compression-based direct processing to enable direct document analytics on compressed data, and presents how the concept can be materialized on Sequitur, a compression algorithm that produces hierarchical grammar-like representations. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: December 31, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.