Works Published in 2016

search works

Displaying works 241 - 260 of 313 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2016 conference paper

Modeling 3D video traffic using a Markov Modulated Gamma Process

2016 International Conference on Computing, Networking and Communications (ICNC).

TL;DR: A new model for multiview video that is based on a Markov process is proposed and evaluated and results show that the model has less complexity and better accuracy. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 article

Linear Time Interactive Certificates for the Minimal Polynomial and the Determinant of a Sparse Matrix

PROCEEDINGS OF THE 2016 ACM INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION (ISSAC 2016), pp. 199–206.

TL;DR: An algorithm is given that computes a certificate for the minimal polynomial of sparse or structured matrices over an abstract field, of sufficiently large cardinality, whose Monte Carlo verification complexity requires a single matrix-vector multiplication and a linear number of extra field operations. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 article

Guest editorial: big spatial data

Vatsavai, R., & Chandola, V. (2016, October). GEOINFORMATICA, Vol. 20, pp. 797–799.

TL;DR: The purpose of this special issue is to showcase some of the recent developments and novel applications of the big spatial data field, which has attracted eleven papers covering broad range of spatial big data technologies and applications. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 conference paper

Evolving augmented graph grammars for argument analysis

Proceedings of the 2016 Genetic and Evolutionary Computation Conference (GECCO'16 Companion), 65–66.

By: C. Lynch n, L. Xue n & M. Chi n

TL;DR: The work on the automatic induction of graph grammars for argument diagrams via EC outperforms the existing grammar induction algorithms gSpan and Subdue on the dataset and shows that it is possible to augment the standard EC process to harvest a set of diverse rules which can be filtered via a post-hoc Chi-Squared analysis. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Efficient clustering for ultra-scale application tracing

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 98, 25–39.

author keywords: Clustering algorithms; Programming techniques; Concurrent programming; Performance measurement
TL;DR: This work contributes a fast, scalable, signature-based clustering algorithm that clusters processes exhibiting similar execution behavior that combines low overhead at the clustering level with l o g ( P ) time complexity, and it splits the merge process to make tracing suitable for extreme-scale computing. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Efficient and predictable group communication for manycore NoCs

High performance computing, 9697, 383–403.

By: K. Yagna, O. Patil & F. Mueller

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Distributed job allocation for large-scale manycores

High performance computing, 9697, 404–425.

By: S. Ramachandran & F. Mueller

Source: NC State University Libraries
Added: August 6, 2018

2016 article

AMRZone: A Runtime AMR Data Sharing Framework For Scientific Applications

2016 16TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), pp. 116–125.

By: W. Zhang n, H. Tang n, S. Harenberg n, S. Byna*, X. Zou n, D. Devendran*, D. Martin*, K. Wu* ...

TL;DR: AMRZone's performance and scalability are even comparable with existing state-of-the-art work when tested over uniform mesh data with up to 16384 cores, in the best case, the framework achieves a 46% performance improvement. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

A topological collapse for document summarization

Ieee international workshop on signal processing advances in wireless.

By: H. Guan*, W. Tang*, H. Krim*, J. Keiser, A. Rindos* & R. Sazdanovic n

TL;DR: DoCollapse is proposed, a topological collapse-based unsupervised keyphrase extraction method that relies on networking document by semantic relatedness of candidate keyphrases to facilitate final keyphrase selection. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A stochastic frame based approach to RFID tag searching

2016 IFIP Networking Conference (IFIP Networking) and Workshops, 153–161.

By: A. Wang*, M. Shahzad n & A. Liu*

TL;DR: This paper proposes a protocol called RTSP, which satisfies the four requirements of C1G2 compliance, arbitrary accuracy, privacy preserving, and multiple-reader capability and is easy to deploy because it is implemented on readers as a software module and does not require any implementation on tags. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

A shifting bloom filter framework for set queries

Proceedings of the VLDB Endowment, 9(5), 408–419.

TL;DR: This paper proposes a Shifting Bloom Filter framework for representing and querying sets, and demonstrates the effectiveness of ShBF using three types of popular set queries: membership, association, and multiplicity queries. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Tree decompositions and social graphs

INTERNET MATHEMATICS, 12(5), 315–361.

By: A. Adcock*, B. Sullivan n & M. Mahoney*

Contributors: A. Adcock*, B. Sullivan n & M. Mahoney*

TL;DR: It is shown that TD methods can identify structures that correlate strongly with the core-periphery structure of realistic networks, even when using simple greedy heuristics; and it is proved that the only two impediments to low-distortion hyperbolic embedding are high tree-width and long geodesic cycles. (via Semantic Scholar)
UN Sustainable Development Goal Categories
10. Reduced Inequalities (OpenAlex)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2016 journal article

Revani: Revising and Verifying Normative Specifications for Privacy

IEEE Intelligent Systems, 31(5), 8–15.

By: O. Kafali, N. Ajmeri n & M. Singh n

Contributors: N. Ajmeri n, O. Kafali & M. Singh n

TL;DR: The authors' approach, Revani, understands privacy from the standpoint of sociotechnical systems (STSs), with particular attention on the social elements of STSs, via a combination of technical mechanisms and social norms founded on accountability. (via Semantic Scholar)
Sources: NC State University Libraries, ORCID, NC State University Libraries
Added: August 6, 2018

2016 conference paper

Practical DIFC enforcement on android

Proceedings of the 25th USENIX Security Symposium, 1119–1136.

By: A. Nadkarni, B. Andow, W. Enck & S. Jha

Source: NC State University Libraries
Added: August 6, 2018

2016 article

In situ Storage Layout Optimization for AMR Spatio-temporal Read Accesses

PROCEEDINGS 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING - ICPP 2016, pp. 406–415.

By: H. Tang n, S. Byna*, S. Harenberg n, W. Zhang n, X. Zou n, D. Martin*, B. Dong*, D. Devendran* ...

TL;DR: This work develops an in situ data layout optimization framework that automatically selects from a set of candidate layouts based on a performance model, and reorganizes the data before writing to storage to enable efficient AMR read accesses. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

CloudSeer: Workflow monitoring of cloud infrastructures via interleaved logs

Operating Systems Review, 50(2), 489–502.

By: X. Yu, P. Joshi, J. Xu, G. Jin, H. Zhang & G. Jiang

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

An Improved mu TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

JOURNAL OF SENSORS, 2016.

TL;DR: A self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network and improve the traditional μTESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 article

The Mimesis Effect: The Effect of Roles on Player Choice in Interactive Narrative Role-Playing Games

34TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, CHI 2016, pp. 3438–3449.

By: I. Dominguez n, R. Cardona-Rivera n, J. Vance* & D. Roberts n

author keywords: Mimesis Effect; Roles; Player Choice; Interactive Narrative; Role-Playing; RPGs; Games; Role-Playing Games; Player Actions; Computer Games; Narrative Role
TL;DR: This study investigates the heretofore unexplored relationship between a player's sense of her narrative role in an interactive narrative role-playing game and the options she selects when faced with choice structures during gameplay and discovered the Mimesis Effect. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Sparsity and Nullity: Paradigms for Analysis Dictionary Learning

SIAM JOURNAL ON IMAGING SCIENCES, 9(3), 1107–1126.

By: X. Bian, H. Krim*, A. Bronstein & L. Dai

author keywords: dictionary learning; sparse coding; sparse null space problem; union of subspaces
TL;DR: It is shown that the SNS problem plays a central role, and may be utilized to solve dictionary learning problems, and an efficient algorithm of sparse null space basis pursuit (SNS-BP) is proposed and extended to a solution of ADL. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 article

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data

INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, Vol. 9895, pp. 187–203.

TL;DR: This paper adopts the classical honest-but-curious attack model, and design a suite of efficient protocols for skyline queries over horizontally partitioned data, and analyzes in detail the efficiency of each of the proposed protocols as well as their privacy guarantees. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.