Computer Science

College of Engineering

Works Published in 2005

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 41 - 60 of 115 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2005 conference paper

A semantic approach for designing e-business protocols

Lecture Notes in Computer Science, 3387, 111–123. http://www.scopus.com/inward/record.url?eid=2-s2.0-24144480932&partnerID=MN8TOARS

By: A. Mallya & M. Singh

Source: ORCID
Added: December 10, 2019

2005 conference paper

A semantic approach for designing commitment protocols

Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science), 3396, 33–49. http://www.scopus.com/inward/record.url?eid=2-s2.0-26844566333&partnerID=MN8TOARS

By: A. Mallya & M. Singh

Source: ORCID
Added: December 10, 2019

2005 book

Service-Oriented Computing

http://www.csc.ncsu.edu/faculty/mpsingh/books/SOC/

By: M. Singh & M. Huhns

Event: at Chichester, UK

Source: ORCID
Added: December 10, 2019

2005 conference paper

Agent-based trust model involving multiple qualities

Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems - AAMAS '05, 653–660.

By: E. Maximilien* & M. Singh

Event: the fourth international joint conference

Sources: ORCID, Crossref
Added: December 10, 2019

2005 conference paper

Effective bounding techniques for solving unate and binate covering problems

Proceedings of the 42nd annual Design Automation Conference, 385–390.

By: X. Li, M. Stallmann & F. Brglez

Event: ACM

Source: ORCID
Added: December 6, 2019

2005 conference paper

The Memogate affair: A case study on privacy in computer networks

Proceedings of the 2005 ASEE Annual Conference and Exposition. Presented at the 2005 ASEE Annual Conference and Exposition, Portland, OR.

By: E. Gehringer

Event: 2005 ASEE Annual Conference and Exposition at Portland, OR on June 12-15, 2005

Sources: NC State University Libraries, ORCID
Added: June 12, 2019

2005 conference paper

Reuse of homework and test questions: when, why, and how to maintain security?

34th Annual Frontiers in Education, 2004. FIE 2004. Presented at the 34th Annual Frontiers in Education, 2004. FIE 2004.

By: E. Gehringer

Event: 34th Annual Frontiers in Education, 2004. FIE 2004.

Sources: Crossref, ORCID
Added: March 29, 2019

2005 conference paper

A comparison of J2EE and .NET as platforms for teaching web services

34th Annual Frontiers in Education, 2004. FIE 2004. Presented at the 34th Annual Frontiers in Education, 2004. FIE 2004.

By: S. Kachru* & E. Gehringer

Event: 34th Annual Frontiers in Education, 2004. FIE 2004.

Sources: Crossref, ORCID
Added: March 29, 2019

2005 conference paper

Performance evaluation of an optical burst switching scheme for grid networks

2nd International Conference on Broadband Networks (Broadnets 2005), 515-.

By: X. Mountrouidou, H. Perros & M. Beshai

Source: NC State University Libraries
Added: August 6, 2018

2005 patent

Gallium nitride materials including thermally conductive regions

Washington, DC: U.S. Patent and Trademark Office.

By: R. Borges, K. Linthicum, T. Weeks & T. Gehrke

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Multivariate stream data reduction in sensor network applications

In Embedded and ubiquitous computing--EUC 2005 workshops: EUC 2005 workshops: UISW, NCUS, SecUbiq, USN and TAUES, Nagasaki, Japan, December 6-9, 2005: Proceedings (Vol. 3823, pp. 198–207). Berlin: Springer.

By: S. Seo, J. Kang & K. Ryu

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Network access control for mobile ad-hoc networks

Information and Communications Security, 3783, 350–362.

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Safe overprovisioning: Using power limits to increase aggregate throughput

In T. N. V. B. Falsafi (Ed.), Power-aware computer systems: 4th International Workshop, PACS 2004, Portland, OR, USA, December 5, 2004 (Lecture notes in computer science; 3471) (Vol. 3471, pp. 150–164).

Ed(s): T. B. Falsafi

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Fault-tolerant cluster-wise clock synchronization for wireless sensor networks

IEEE Transactions on Dependable and Secure Computing, 2(3), 177–189.

By: K. Sun, P. Ning & C. Wang*

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Integrating heterogeneous microarray data sources using correlation signatures

In B. Ludascher & L. Raschid (Eds.), Data integration in the life sciences: Second international workshop, DILS 2005, San Diego, CA, USA, July 20-22, 2005: Proceedings (Vol. 3615, pp. 105–120). Berlin; New York: Springer.

Ed(s): . B. Ludascher & L. Raschid

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Designing and using views to improve performance of aggregate queries (extended abstract)

In B. C. O. L. Zhou & X. Meng (Eds.), Database systems for advanced applications: 10th international conference, DASFAA 2005, Beijing, China, April 17-20, 2005: Proceedings (Lecture notes in computer science ; 3454) (Vol. 3453, pp. 548–554).

By: F. Afrati*, R. Chirkova, S. Gupta & C. Loftis

Ed(s): B. L. Zhou & X. Meng

Source: NC State University Libraries
Added: August 6, 2018

2005 book

Connection-oriented networks: SONET/SDH, ATM, MPLS, and optical networks

By: H. Perros

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

A multiscale approach to pixel-level image fusion

Integrated Computer-Aided Engineering, 12(2), 135–146.

By: A. Ben Hamza*, Y. He*, H. Krim & A. Willsky*

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

A detailed analysis and performance comparison of wavelength reservation schemes for optical burst switched networks

Photonic Network Communications, 9(3), 311–335.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Simulating perfect channels with probabilistic lossy channels

Information and Computation, 197(02-Jan), 22–40.

By: P. Abdulla*, C. Baier*, S. Iyer & B. Jonsson*

Source: NC State University Libraries
Added: August 6, 2018