Works Published in 2015

search works

Displaying works 201 - 220 of 299 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2015 conference paper

Real-time multiple DOA estimation of speech sources in wireless acoustic sensor networks

International conference on acoustics speech and signal processing, 2709–2713.

TL;DR: A distributed algorithm for multiple DOA estimation of speech sources in WASNs is presented, which exploits the sparsity ofspeech sources in the time-frequency domain to obtain DOA estimations locally in each node of the network. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

On the detection of abandoned objects with a moving camera using robust subspace recovery and sparse representation

International conference on acoustics speech and signal processing, 1295–1299.

TL;DR: This work considers the application of sparse-representation and robust-subspace-recovery techniques to detect abandoned objects in a target video acquired with a moving camera to demonstrate the technique effectiveness even in the presence of some significant camera shake along its trajectory. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Interactive preference-aware query optimization

2015 ieee 31st international conference on data engineering (icde), 1512–1515.

By: N. Ong*, S. Rojcewicz*, N. Farnan*, A. Lee*, P. Chrysanthis* & T. Yu n

TL;DR: This work demonstrates two approaches to implementing such a GUI that provide different ways of analyzing and interactively optimizing a PASQL query plan. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness

2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), pp. 279–290.

author keywords: RFID; Fairness; Identification
TL;DR: The first Fair RFID Identification Protocol (FRIP) is proposed that can achieve any required amount of fairness and is easy to deploy because it is compliant with the C1G2 standard, and thus, requires no modifications to tags or to the communication protocol between tags and readers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 article

FUSE: A Reproducible, Extendable, Internet-scale Corpus of Spreadsheets

12TH WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2015), pp. 486–489.

By: T. Barik n, K. Lubick n, J. Smith n, J. Slankas n & E. Murphy-Hill n

TL;DR: A corpus, called Fuse, containing 2,127,284 URLs that return spreadsheets (and their HTTP server responses), and 249,376 unique spreadsheets, contained within a public web archive of over 26.83 billion pages is described. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Discovering likely mappings between APIs using text mining

Ieee international working conference on source code analysis and, 231–240.

By: R. Pandita n, R. Jetley*, S. Sudarsan* & L. Williams n

TL;DR: This paper proposes TMAP: Text Mining based approach to discover likely API mappings using the similarity in the textual description of the source and target API documents to address the shortcoming of manually writingAPI mappings. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

CSI-based device-free gesture detection

2015 12th International Conference on High-Capacity Optical Networks and Enabling/Emerging Technologies (HONET), 122–126.

By: H. Xiong, F. Gong, L. Qu, C. Du & K. Harfoush

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

An unobtrusive interaction interface for multiple co-located mobile devices

Ieee international conference on wireless and mobile computing, 683–690.

By: S. Chung n & I. Rhee n

TL;DR: It is found that highly time-correlated Wi-Fi signal measures experience less variation in their received signal strength (RSS), which alleviates the impediment of the RSS-based solution. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

A Collaborative Approach to Predicting Service Price for QoS-Aware Service Selection

2015 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS), pp. 33–40.

By: P. Wang*, A. Kalia n, M. Singh n & H. Zhu

Contributors: P. Wang*, A. Kalia n & M. Singh n

TL;DR: This work proposes a collaborative approach to predicting a provider's minimum price for a desired QoS based on prior usage experience, and shows the approach can find the optimal service providers efficiently and effectively. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2015 conference paper

TRACE: A dynamic model of trust for people-driven service engagements combining trust with risk, commitments, and emotions

Service-oriented computing, (icsoc 2015), 9435, 353–361.

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Positron: Composing commitment-based protocols

Service-oriented computing, (icsoc 2015), 9435, 19–35.

By: S. Gerard, P. Telang, A. Kalia & M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

On the impact of scheduler settings on the performance of multi-threaded SIP servers

2015 ieee international conference on communications (icc), 6175–6180.

TL;DR: This is the first study that takes into account the scheduler parameters in improving the performance of the SPS, and indicates that network operators may increase server capacity without additional capital expenditures by applying insightful configuration changes to scheduler policy. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Impact of software obfuscation on susceptibility to return-oriented programming attacks

2015 36th ieee sarnoff symposium, 161–166.

By: H. Joshi n, A. Dhanasekaran n & R. Dutta n

TL;DR: The hypothesis that some of the most popular obfuscation techniques, including changing the control flow graph and substituting simpler instruction sequences with complex instructions, may make the obfuscated binary more vulnerable to Return-Oriented Programming (ROP) based attacks is investigated. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 article

Hyperbolicity, Degeneracy, and Expansion of Random Intersection Graphs

ALGORITHMS AND MODELS FOR THE WEB GRAPH, (WAW 2015), Vol. 9479, pp. 29–41.

By: M. Farrell*, T. Goodrich n, N. Lemons*, F. Reidl*, F. Villaamil* & B. Sullivan n

Contributors: M. Farrell*, T. Goodrich n, N. Lemons*, F. Reidl*, F. Villaamil* & B. Sullivan n

Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 article

Hybrid EDF Packet Scheduling for Real-Time Distributed Systems

PROCEEDINGS OF THE 2015 27TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2015), pp. 37–46.

By: T. Qian n, F. Mueller n & Y. Xin n

TL;DR: This work combines EDF scheduling with periodic message transmission tasks, and implements an EDF-based packet scheduler, which transmits packets considering event deadlines, in a real-time distributed storage system. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Design of a protocol to enable economic transactions for network services

2015 ieee international conference on communications (icc), 5354–5359.

TL;DR: The design of a protocol that associates access to network services with economic contracts is presented, and it is shown how this protocol can be realized in fundamentally different ways, using out-of- band signaling and in-band signaling, based on two different prototype implementations. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Combining practical and dialectical commitments for service engagements

Service-oriented computing, (icsoc 2015), 9435, 3–18.

By: P. Telang, A. Kalia, J. Madden & M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Bi-sparsity pursuit for robust subspace recovery

2015 ieee international conference on image processing (icip), 3535–3539.

TL;DR: A bi-sparse model is proposed as a framework to investigate and analyze this problem, and a novel algorithm to recover the union of subspaces in presence of sparse corruptions is provided. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A new modulation technique to reduce leakage current without compromising modulation index in PV systems

2015 ieee energy conversion congress and exposition (ecce), 460–465.

By: Z. Chen n, W. Yu n, X. Ni n & A. Huang n

UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

A A stochastic multi-channel spectrum access game with incomplete information

2015 ieee international conference on communications (icc), 4799–4804.

By: X. He n, H. Dai n, P. Ning n & R. Dutta n

TL;DR: A joint reinforcement learning and type identification algorithm is developed and results show that using the proposed algorithm, a wireless user can gradually achieve the same performance as that in the corresponding complete information game. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.