Works Published in 2015

search works

Displaying works 221 - 240 of 299 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2015 article

On the Threshold of Intractability

ALGORITHMS - ESA 2015, Vol. 9294, pp. 411–423.

By: P. Drange*, M. Dregi*, D. Lokshtanov* & B. Sullivan n

Contributors: P. Drange*, M. Dregi*, D. Lokshtanov* & B. Sullivan n

TL;DR: This article shows that both graph modification problems are Open image in new window -hard, resolving a conjecture by Natanzon, Shamir, and Sharan (2001), and gives a subexponential time parameterized algorithm solving this problem. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 book

Geometric methods in signal and image analysis

By: H. Krim n & A. Hamza

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

An efficient algorithm for pairwise local alignment of protein interaction networks

JOURNAL OF BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, 13(2).

author keywords: Network alignment; conserved functional modules; graph optimization; graph theory
MeSH headings : Algorithms; Animals; Computational Biology; Conserved Sequence; Gene Ontology / statistics & numerical data; Humans; Protein Interaction Mapping / statistics & numerical data; Protein Interaction Maps; Sequence Alignment / statistics & numerical data
TL;DR: The problem of identifying conserved patterns of protein interaction networks as a graph optimization problem is formulated, and a fast heuristic algorithm for this problem is developed that discovers conserved modules with a larger number of proteins in an order of magnitude less time. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Pluggable reputation systems for peer review: A web-service approach

Frontiers in education conference (fie), 2015, 1636–1640.

By: Y. Song n, Z. Hu n & E. Gehringer n

TL;DR: A Peer-Review Markup Language is defined, which is a generic schema for data sharing among different peer-review systems, and two reputation algorithms are compared, each of which has two versions, and efforts to make them “pluggable,” so they can easily be adopted by different Peer- review systems are reported on. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 journal article

Crowdsourcing cloud-based software development foreword

Crowdsourcing: Cloud-Based Software Development, V-.

By: M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2015 article

Cross-Project Data for Software Engineering

Menzies, T. (2015, December). COMPUTER, Vol. 48, pp. 6–6.

By: T. Menzies n

TL;DR: This installment of Computer's series highlighting the work published in IEEE Computer Society journals comes from IEEE Transactions on Software Engineering. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

On-the-Fly Principled Speculation for FSM Parallelization

Zhao, Z., & Shen, X. (2015, April). ACM SIGPLAN NOTICES, Vol. 50, pp. 619–630.

By: Z. Zhao* & X. Shen n

author keywords: Languages; Performance; Finite State Machine; FSM; DFA; Speculative Parallelization; Multicore; Online Profiling
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Multi-Level Anomaly Detection on Time-Varying Graph Data

PROCEEDINGS OF THE 2015 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2015), pp. 579–583.

By: R. Bridges*, J. Collins*, E. Ferragut*, J. Laska* & B. Sullivan n

Contributors: R. Bridges*, J. Collins*, E. Ferragut*, J. Laska* & B. Sullivan n

TL;DR: This work introduces a generalization of the BTER model of Seshadhri et al. by adding flexibility to community structure, and uses this model to perform multi-scale graph anomaly detection, accurately detecting anomalies at the node, subgraph, and graph levels. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 conference paper

Improving learning and adaptation in security games by exploiting information asymmetry

2015 ieee conference on computer communications (infocom).

By: X. He n, H. Dai n & P. Ning n

TL;DR: Two new MARL algorithms, termed minimax-PDS and WoLF-P DS, are proposed, which enable the LS to learn and adapt faster in dynamic environments by exploiting its private local information. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

How Do Users Discover New Tools in Software Development and Beyond?

COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES, 24(5), 389–422.

author keywords: Discovery; Learning; Programmers; Programming tools
TL;DR: It is found that social learning of software tools, while sometimes effective, is infrequent; software users appear to discover tools from peers only once every few months. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 review

Anomaly detection in dynamic networks: a survey

[Review of ]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 7(3), 223–247.

By: S. Ranshous n, S. Shen n, D. Koutra*, S. Harenberg n, C. Faloutsos* & N. Samatova n

author keywords: anomaly detection; dynamic networks; outlier detection; graph mining; dynamic network anomaly detection; network anomaly detection
TL;DR: This work focuses on anomaly detection in static graphs, which do not change and are capable of representing only a single snapshot of data, but as real‐world networks are constantly changing, there has been a shift in focus to dynamic graphs,Which evolve over time. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Two Modes Are Better Than One: A Multimodal Assessment Framework Integrating Student Writing and Drawing

ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2015, Vol. 9112, pp. 205–215.

By: S. Leeman-Munk n, A. Smith n, B. Mott n, E. Wiebe n & J. Lester n

Contributors: S. Leeman-Munk n, A. Smith n, B. Mott n, E. Wiebe n & J. Lester n

author keywords: Formative assessment; Multimodal assessment; Student writing analysis; Student sketch analysis
TL;DR: This paper introduces a novel multimodal assessment framework that integrates two techniques for automatically analyzing student artifacts: a deep learning-based model for assessing student writing, and a topology-based models for assessingStudent drawing. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 conference paper

The Mars and Venus effect: The influence of user gender on the effectiveness of adaptive task support

User modeling, adaptation and personalization, 9146, 265–276.

Source: NC State University Libraries
Added: August 6, 2018

2015 journal article

QoS-aware ant-based route, wavelength and timeslot assignment algorithm for optical burst switchednetworks

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 26(11), 1265–1277.

TL;DR: An ant‐based route, wavelength and timeslot allocation algorithm is proposed to address high burst loss in OBS and improve the overall network performance and results show that the proposed algorithm outperforms SP in terms of burst loss ratio and delay. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

No time to demodulate - fast physical layer verification of friendly jamming

2015 ieee military communications conference (milcom 2015), 653–658.

By: W. Shen n, Y. Liu*, X. He n, H. Dai n & P. Ning n

TL;DR: Fast friendly jamming is proposed, which eliminates the need for demodulation and enables the friendly jammer to verify the received signals directly on the physical layer and achieve the accurate distinction between allies' and enemies' transmissions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Mind the Gap: Improving Gender Equity in Game-Based Learning Environments with Learning Companions

ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2015, Vol. 9112, pp. 64–73.

By: P. Buffum n, K. Boyer n, E. Wiebe n, B. Mott n & J. Lester n

author keywords: Learning companions; Game-based learning; Gender
TL;DR: A prototype learning companion designed specifically to reduce frustration through the telling of autobiographical stories is developed, suggesting that introducing learning companions can directly contribute to making the benefits of game-based learning equitable for all learners. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 article

GUEST EDITORS' INTRODUCTION REFACTORING

IEEE SOFTWARE, Vol. 32, pp. 27–29.

By: E. Murphy-Hill n, D. Roberts*, P. Sommerlad* & W. Opdyke*

TL;DR: The articles selected for this issue range from historical, exploring refactoring research's origins, to practical, exploring software developers' experiences withRefactoring, to theoretical, exploring new refactored techniques that haven't yet appeared in the wild. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 journal article

GALE: Geometric Active Learning for Search-Based Software Engineering

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 41(10), 1001–1018.

By: J. Krall, T. Menzies n & M. Davies

author keywords: Multi-objective optimization; search based software engineering; active learning
TL;DR: GALE is a near-linear time MOEA that builds a piecewise approximation to the surface of best solutions along the Pareto frontier that finds comparable solutions to standard methods using far fewer evaluations. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Exploring Missing Behaviors with Region-Level Interaction Network Coverage

ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2015, Vol. 9112, pp. 831–835.

By: M. Eagle n & T. Barnes n

TL;DR: The possibility of using frequency estimation to uncover locations in the network with differing amounts of student-saturation can be used to locate specific problem approaches and strategies that would be most improved by additional student-data, as well as provide a measure of confidence when comparing across networks or between groups. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 article

Exact Detection of Information Leakage in Database Access Control

BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY, Vol. 9263, pp. 403–415.

author keywords: Privacy and security in cloud intelligence; Data exchange
TL;DR: Managing fine-grained access control in software is rather challenging and if access is not configured carefully, information leakage may happen: Users may infer sensitive information through the data explicitly accessible to them in centralized systems or in the cloud. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.