Works Published in 2016

search works

Displaying works 261 - 280 of 313 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2016 journal article

Natural interaction for bot detection

IEEE Internet Computing, 20(4), 69–73.

By: R. St Amant & D. Roberts

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Information Diffusion of Topic Propagation in Social Media

IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2(4), 569–581.

author keywords: Computer networks; information diffusion; multi-layer network; topic propagation
TL;DR: The goal in this paper is to predict the specific states of the agents, as their observed resources evolve in time and get updated, using a notion of a supra-Laplacian matrix to address such a generalized diffusion of an interconnected network starting with the classical “graph Laplacians.” (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

DRWA: A receiver-centric solution to bufferbloat in cellular networks

IEEE Transactions on Mobile Computing, 15(11), 2719–2734.

By: H. Jiang, Y. Wang*, K. Lee* & I. Rhee n

TL;DR: Detailed measurement of the 3G/4G networks of the four major U.S. carriers and the largest carrier in Korea revealed the severity of bufferbloat in current cellular networks and discovered some ad-hoc tricks adopted by smart phone vendors, which mitigate the impact ofbufferbloat but result in performance degradation under various practical scenarios. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: NC State University Libraries
Added: August 6, 2018

2016 article

Cloak of Visibility: Detecting When Machines Browse A Different Web

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 743–758.

By: L. Invernizzi*, K. Thomas*, A. Kapravelos n, O. Comanescu*, J. Picod* & E. Bursztein*

TL;DR: This study provides the first broad perspective of cloaking as it affects Google Search and Google Ads and underscores the minimum capabilities necessary of security crawlers to bypass the state of the art in mobile, rDNS, and IP cloaking. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Antibacterial and biological properties of biofunctionalized nanocomposites on titanium for implant application

Journal of Biomaterials Applications, 31(2), 205–214.

By: P. Li, Z. Tong, L. Huo, F. Yang & W. Su

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

"With most of it being pictures now, I rarely use it": Understanding Twitter's evolving accessibility to blind users

34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, 5506–5516.

By: M. Morris, A. Zolyomi, C. Yao, S. Bahram, J. Bigham & S. Kane

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Wireless Communications under Broadband Reactive Jamming Attacks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 13(3), 394–408.

author keywords: Wireless communication; jamming attacks; reactive jammer; broadband
TL;DR: An anti-jamming communication system that allows communication in the presence of a broadband and high power reactive jammer that does not assume a reactivejammer with limited spectrum coverage and transmit power, and thus can be used in scenarios where traditional approaches fail. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

PerfCompass: Online Performance Anomaly Fault Localization and Inference in Infrastructure-as-a-Service Clouds

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 27(6), 1742–1755.

By: D. Dean n, H. Nguyen n, P. Wang n, X. Gu n, A. Sailer* & A. Kochut*

author keywords: Reliability, availability, and serviceability; debugging aids; distributed debugging; performance
TL;DR: PerfCompass is presented, an online performance anomaly fault debugging tool that can quantify whether a production-run performance anomaly has a global impact or local impact and provides useful diagnosis hints within several minutes and imposes negligible runtime overhead to the production system during normal execution time. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Minimizing the makespan for a serial-batching scheduling problem with arbitrary machine breakdown and dynamic job arrival

International Journal of Advanced Manufacturing Technology, 86(9-12), 3315–3331.

By: J. Pei, X. Liu, W. Fan, P. Pardalos, A. Migdalas, B. Goldengorin, S. Yang

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

HippogriffDB: Balancing I/O and GPU Bandwidth in Big Data Analytics

PROCEEDINGS OF THE VLDB ENDOWMENT, 9(14), 1647–1658.

By: J. Li*, H. Tseng*, C. Lin*, Y. Papakonstantinou* & S. Swanson*

TL;DR: HippogriffDB is proposed, an efficient, scalable GPU-accelerated OLAP system that adopts a query-over-block execution model that provides scalability using a stream-based approach and improves kernel efficiency with the operator fusion and double buffering mechanism. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Genome-wide search for translated upstream open reading frames in Arabidopsis thaliana

IEEE Transactions on Nanobioscience, 15(2), 150–159.

By: Q. Hu, C. Merchante, A. Stepanova, J. Alonso & S. Heber

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Examining and Reducing the Influence of Sampling Errors on Feedback-Driven Optimizations

ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 13(1).

By: M. Zhou, B. Wu*, X. Shen n, Y. Gao* & G. Yiu*

author keywords: Compiler; Profiling; Feedback-Driven Optimization (FDO); Performance; Input Sensitivity; Performance; influence of sampling errors; feedback-driven optimization
TL;DR: This article gives the first systematic study in how sampling rates affect the accuracy of collected profiles and how the accuracy correlates with the usefulness of the profile for modern FDO. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 article

Wearable Heart Rate Sensor Systems for Wireless Canine Health Monitoring

Brugarolas, R., Latif, T., Dieffenderfer, J., Walker, K., Yuschak, S., Sherman, B. L., … Bozkurt, A. (2016, May 15). IEEE SENSORS JOURNAL, Vol. 16, pp. 3454–3464.

author keywords: Computer applications; inertial measurement unit; animal machine interface; physiology
TL;DR: A non-invasive wearable sensor system combining electrocardiogram (ECG), photoplethysmogram (PPG), and inertial measurement units (IMU) to remotely and continuously monitor the vital signs of dogs is presented. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Use of theory in computer-based interventions to reduce alcohol use among adolescents and young adults: a systematic review

BMC PUBLIC HEALTH, 16.

author keywords: Adolescent; Young adult; Alcohol drinking; Alcohol prevention; Theoretical models; Computer systems; Computer-based interventions; Systematic review
MeSH headings : Adolescent; Adolescent Behavior; Adolescent Health Services; Alcohol Drinking / prevention & control; Child; Computer-Assisted Instruction; Humans; Models, Theoretical; Self Care; Young Adult
TL;DR: A literature review of computer-based interventions designed to address alcohol use among adolescents and young adults and examines the extent to which CBIs use theories of behavior change in their development and evaluations found greater emphasis on the selection and application of theory is needed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 journal article

Tuning for software analytics: Is it really necessary?

Information and Software Technology, 76, 135–146.

By: W. Fu n, T. Menzies n & X. Shen n

author keywords: Defect prediction; CART; Random forest; Differential evolution; Search-based software engineering
TL;DR: This paper finds that it is no longer enough to just run a data miner and present the result without conducting a tuning optimization study, and that standard methods in software analytics need to change. (via Semantic Scholar)
Sources: Web Of Science, ORCID, Crossref
Added: August 6, 2018

2016 journal article

The AIIDE 2015 Workshop Program

AI MAGAZINE, 37(2), 91–94.

By: C. Barot n, M. Buro*, M. Cook*, M. Eladhari*, M. Johansson*, B. Li*, A. Liapis*, J. McCoy* ...

TL;DR: The workshop program at the Eleventh Annual AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment was held November 14-15, 2015 at the University of California, Santa Cruz, USA and included 4 workshops: Artificial Intelligence in Adversarial Real-Time Games, Experimental AI in Games, Intelligent Narrative Technologies and Social Believability in games, and Player Modeling. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 article

Special Issue on Survivable and Resilient Communication Networks and Services

Modiano, E., Dutta, R., & Qian, Y. (2016, July). JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, Vol. 24, pp. 445–448.

TL;DR: The objective of this special issue is to cover the most recent research with cutting-edge insights, analysis, designs and/or evaluations in the field of the reliability and availability of communication networks and services. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2016 journal article

STARS Computing Corps: Enhancing Engagement of Underrepresented Students and Building Community in Computing

COMPUTING IN SCIENCE & ENGINEERING, 18(3), 44–57.

By: J. Payton*, T. Barnes n, K. Buch*, A. Rorrer*, H. Zuo*, K. Gosha*, K. Nagel*, N. Napier*, E. Randeree*, L. Dennis*

TL;DR: Findings establish empirical support for the Students & Technology in Academia, Research, and Service Computing Corps model of engagement, a flexible approach that can be applied across a variety of institutional types to positively impact underrepresented students in computing. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2016 review

Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems

[Review of]. Knowledge Engineering Review, 31(2), 142–166.

Nirav Ajmeri; Anup Kumar Kalia; Munindar Singh

Source: NC State University Libraries
Added: August 6, 2018

2016 article

Best of RESPECT, Part 2

COMPUTING IN SCIENCE & ENGINEERING, Vol. 18, pp. 11–13.

By: T. Barnes n, J. Payton*, G. Thiruvathukal, K. Boyer* & J. Forbes*

TL;DR: Five articles study participation in intersectional ways, through the perceptions and experiences of African- American middle school girls, the sense of belonging in computing for LGBTQ students, the impact of a STEM scholarship and community development program for low-income and first-generation college students, and how African-American women individually take leadership to enable their success in computing. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.