Works Published in 2014

search works

Displaying works 21 - 40 of 221 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2014 conference paper

2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014

http://dl.acm.org/citation.cfm?id=2632362

Marcelo D'Amorim

Ed(s): N. Rungta & O. Tkachuk

Source: ORCID
Added: June 21, 2023

2014 journal article

Implementing mixed-criticality systems upon a preemptive varying-speed processor

Leibniz Transactions on Embedded Systems (LITES), 1(2), 3:1–3:19.

By: Z. Guo* & S. Baruah*

TL;DR: In this work, an optimal algorithm for scheduling mixed criticality workloads upon a preemptive processor is derived and an implementation that is asymptotically optimal in terms of run-time efficiency is provided. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: April 21, 2023

2014 conference paper

Graph Regularized Dual Lasso for Robust eQTL Mapping

Proceedings of the 22nd Annual International Conference on Intelligent Systems for Molecular Biology (ISMB). Presented at the 22nd Annual International Conference on Intelligent Systems for Molecular Biology (ISMB), Boston, MA, USA.

By: W. Cheng, X. Zhang, Z. Guo, Y. Shi & W. Wang

Event: 22nd Annual International Conference on Intelligent Systems for Molecular Biology (ISMB) at Boston, MA, USA

Source: NC State University Libraries
Added: April 21, 2023

2014 article proceedings

Mixed-Criticality Scheduling upon Varying-Speed Multiprocessors

Presented at the 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC).

By: Z. Guo* & S. Baruah*

Event: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing (DASC)

TL;DR: In this paper, a linear program is constructed based on necessary and sufficient scheduling conditions, and according to its solution, jobs are executed in a processor-sharing based method, and an example is constructed to show the necessity of processor sharing. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: April 1, 2023

2014 article proceedings

Scheduling Mixed-Criticality Implicit-Deadline Sporadic Task Systems upon a Varying-Speed Processor

Presented at the 2014 IEEE Real-Time Systems Symposium (RTSS).

By: S. Baruah* & Z. Guo*

Event: 2014 IEEE Real-Time Systems Symposium (RTSS)

TL;DR: A mixed criticality (MC) workload consists of components of varying degrees of importance and suitable scheduling strategies are devised for scheduling such systems despite uncertainty and unpredictability in both the amount of execution needed by the tasks, and the effective speed of the processor. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: April 1, 2023

2014 journal article

Graph-regularized dual Lasso for robust eQTL mapping

Bioinformatics, 30(12), i139–i148.

MeSH headings : Algorithms; Chromosome Mapping; Cluster Analysis; Gene Expression; Gene Regulatory Networks; Genetic Markers; Linear Models; Polymorphism, Single Nucleotide; Protein Interaction Mapping; Quantitative Trait Loci; Saccharomyces cerevisiae / genetics; Saccharomyces cerevisiae / metabolism
TL;DR: Graph-regularized Dual Lasso (GDL) is proposed, a robust approach for eQTL mapping that integrates the correlation structures among genetic markers and traits simultaneously and takes into account the incompleteness of the networks and is robust to the noise. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: April 1, 2023

2014 journal article

On the benefits of providing versioning support for end users

ACM Transactions on Computer-Human Interaction, 21(2), 1–43.

By: S. Kuttal*, A. Sarma* & G. Rothermel*

TL;DR: This work has added versioning support to a popular wire-oriented mashup environment, Yahoo! Pipes, and provides an interface with which pipe programmers can browse histories of pipes and retrieve specific versions, providing evidence that versioning helps pipe programmers create and debug mashups. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: March 26, 2023

2014 chapter

The Importance of Narrative as an Affective Instructional Strategy

In R. Sottilare, A. Graesser, X. Hu, & B. Goldberg (Eds.), Design Recommendations for Intelligent Tutoring Systems (Vol. 2, pp. 57–70). Springer Verlag.

By: M. Riedl & R. Young

Ed(s): R. Sottilare, A. Graesser, X. Hu & B. Goldberg

Source: NC State University Libraries
Added: September 15, 2022

2014 journal article

An integrated programming and development environment for adiabatic quantum optimization

Computational Science and Discovery, 7(1).

By: T. Humble*, A. McCaskey*, R. Bennink*, J. Billings*, E. Dazevedo*, B. Sullivan*, C. Klymko*, H. Seddiqi*

Contributors: T. Humble*, A. McCaskey*, R. Bennink*, J. Billings*, E. Dazevedo*, B. Sullivan*, C. Klymko*, H. Seddiqi*

TL;DR: An integrated programming and development environment for AQO called Jade Adiabatic Development Environment (JADE) is presented that provides control over all the steps taken during program synthesis and its potential use for benchmarking AQO programs by the quantum computer science community is discussed. (via Semantic Scholar)
Source: ORCID
Added: August 6, 2022

2014 journal article

Adiabatic quantum programming: Minor embedding with hard faults

Quantum Information Processing, 13(3), 709–729.

By: C. Klymko*, B. Sullivan n & T. Humble*

Contributors: C. Klymko*, B. Sullivan n & T. Humble*

author keywords: Quantum computing; Adiabatic quantum optimization; Graph embedding; Fault-tolerant computing
TL;DR: Algorithms for embedding arbitrary instances of the adiabatic quantum optimization algorithm into a square lattice of specialized unit cells are presented and are shown to be more resilient to faulty fabrics than naive embedding approaches. (via Semantic Scholar)
Source: ORCID
Added: August 6, 2022

2014 conference paper

Locally Estimating Core Numbers

Proceedings - IEEE International Conference on Data Mining, ICDM, 2015-January(January), 460–469.

Contributors: M. Obrien n & B. Sullivan n

TL;DR: A new method for estimating the core number based only on the properties of the graph within a region of radius δ around the vertex is introduced, and an asymptotic error bound of the estimator on random graphs is proved. (via Semantic Scholar)
Source: ORCID
Added: August 6, 2022

2014 conference paper

Sequential Pattern mining in StarCraft:Brood War for short and long-term goals

AAAI Workshop - Technical Report, WS-14-15, 8–13. http://www.scopus.com/inward/record.url?eid=2-s2.0-84974846142&partnerID=MN8TOARS

By: M. Leece & A. Jhala

Contributors: M. Leece & A. Jhala

Source: ORCID
Added: July 14, 2022

2014 conference paper

Preface

Proceedings of the 10th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2014, xiii-xiv. http://www.scopus.com/inward/record.url?eid=2-s2.0-84916910001&partnerID=MN8TOARS

By: I. Horswill, A. Jhala, K. Dill, J. Orkin, N. Shaker, M. Si, N. Sturtevant, R. Young

Contributors: I. Horswill, A. Jhala, K. Dill, J. Orkin, N. Shaker, M. Si, N. Sturtevant, R. Young

Source: ORCID
Added: July 14, 2022

2014 conference paper

Multi-modal analysis of movies for rhythm extraction

AAAI Workshop - Technical Report, WS-14-06, 14–17. http://www.scopus.com/inward/record.url?eid=2-s2.0-84974856015&partnerID=MN8TOARS

By: D. Bates & A. Jhala

Contributors: D. Bates & A. Jhala

Source: ORCID
Added: July 14, 2022

2014 conference paper

Leveraging communication for player modeling and cooperative play

AAAI Workshop - Technical Report, WS-14-19, 14–17. http://www.scopus.com/inward/record.url?eid=2-s2.0-84974830954&partnerID=MN8TOARS

By: T. Sarratt & A. Jhala

Contributors: T. Sarratt & A. Jhala

Source: ORCID
Added: July 14, 2022

2014 conference paper

EduCam: Cinematic vocabulary for educational videos

AAAI Workshop - Technical Report, WS-14-06, 57–60. http://www.scopus.com/inward/record.url?eid=2-s2.0-84974817717&partnerID=MN8TOARS

By: S. Morgens & A. Jhala

Contributors: S. Morgens & A. Jhala

Source: ORCID
Added: July 14, 2022

2014 conference paper

Automating camera control in games using gaze

AAAI Workshop - Technical Report, WS-14-06, 7–13. http://www.scopus.com/inward/record.url?eid=2-s2.0-84974817401&partnerID=MN8TOARS

By: C. Alston & A. Jhala

Contributors: C. Alston & A. Jhala

Source: ORCID
Added: July 14, 2022

2014 conference paper

Converging to a player model in Monte-Carlo Tree Search

IEEE Conference on Computatonal Intelligence and Games, CIG.

By: T. Sarratt*, D. Pynadath* & A. Jhala*

Contributors: T. Sarratt*, D. Pynadath* & A. Jhala*

TL;DR: A method of updating belief distributions through leveraging information sampled during the MCTS to convergence of belief distributions is described and it is shown that for a sufficient quantity of iterations, this approach converges to the correct model faster than the same model under value iteration. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: July 14, 2022

2014 conference paper

Gamification of private digital data archive management

ACM International Conference Proceeding Series, 33–37.

By: C. Maltzahn*, A. Jhala*, M. Mateas* & J. Whitehead*

Contributors: C. Maltzahn*, A. Jhala*, M. Mateas* & J. Whitehead*

Source: ORCID
Added: July 14, 2022

2014 conference paper

Opponent state modeling in RTS games with limited information using Markov random fields

IEEE Conference on Computatonal Intelligence and Games, CIG.

By: M. Leece* & A. Jhala*

Contributors: M. Leece* & A. Jhala*

TL;DR: This work presents a graphical model for opponent modeling in StarCraft: Brood War that uses observed quantities to infer distributions for unseen features and presents a new metric for measuring aggregate performance of a model within this domain. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: July 14, 2022

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.