Computer Science

College of Engineering

Works Published in 2013

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 41 - 60 of 220 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2013 conference paper

Positron: Composing Commitment Protocols

Proceedings of the 1st International Workshop on Engineering Multiagent Systems (EMAS). Presented at the International Workshop on Engineering Multiagent Systems, St. Paul, MN.

By: S. Gerard, P. Telang, A. Kalia & M. Singh

Event: International Workshop on Engineering Multiagent Systems at St. Paul, MN on May 6-7, 2013

Source: NC State University Libraries
Added: January 17, 2021

2013 conference paper

Towards an Argumentation-Based Model of Social Interaction

Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems (ArgMAS). Presented at the International Workshop on Argumentation in Multi-Agent Systems, St. Paul, MN.

By: E. Sklar, S. Parsons & M. Singh

Event: International Workshop on Argumentation in Multi-Agent Systems at St. Paul, MN

Source: NC State University Libraries
Added: January 17, 2021

2013 conference paper

Trustworthy Decision Making via Commitments

Proceedings of the 15th AAMAS Workshop on Trust in Agent Societies (Trust), 24–35.

By: A. Kalia, Z. Zhang & M. Singh

Event: International Joint Conference on Autonomous Agents and Multiagent Systems at St. Paul, MN

Source: NC State University Libraries
Added: January 17, 2021

2013 journal article

Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU

ACM SIGPLAN Notices, 48(8), 57.

By: B. Wu*, Z. Zhao*, E. Zhang*, Y. Jiang* & X. Shen*

author keywords: Performance; Experimentation; GPGPU; Memory coalescing; Computational complexity; Thread-data remapping; Runtime optimizations; Data transformation
Sources: Crossref, ORCID
Added: December 7, 2020

2013 book

Agents and Data Mining Interaction

Ed(s): L. Cao, Y. Zeng, A. Symeonidis, V. Gorodetsky, P. Yu & M. Singh

Event: 8th International Workshop, ADMI 2012 at Valencia, Spain on June 4-5, 2012

Sources: Crossref, ORCID
Added: December 7, 2020

2013 conference paper

Geometric Separators and the Parabolic Lift

CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Waterloo, Ontario.

By: D. Sheehy

Event: Canadian Conference in Computational Geometry at Waterloo, Ontario on August 8-10, 2013

Source: NC State University Libraries
Added: November 15, 2020

2013 chapter

Knowledge-Assisted Ontology-Based Requirements Evolution

In W. Maalej & A. K. Thurimella (Eds.), Managing Requirements Knowledge (MaRK) (pp. 143–167). https://research-information.bris.ac.uk/en/publications/9d328913-4eb3-4403-bf6f-bbf20ed08017

By: S. Ghaisas & N. Ajmeri

Ed(s): W. Maalej & A. Thurimella

Event: at Germany

Source: ORCID
Added: October 31, 2020

2013 conference paper

Argumentation, Evidence, and Schemes: Abstract

Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems, 37. https://research-information.bris.ac.uk/en/publications/3b00f0ba-3768-4e45-94f5-93d1a4661f2b

By: C. Hang, N. Ajmeri, M. Singh & S. Parsons

Event: International Workshop on Argumentation in Multi-Agent Systems at St. Paul, MN on May 6-10, 2013

Sources: NC State University Libraries, ORCID
Added: October 31, 2020

2013 chapter

Fine-Grained Treatment to Synchronizations in GPU-to-CPU Translation

In Languages and Compilers for Parallel Computing (pp. 171–184).

By: Z. Guo* & X. Shen*

Sources: Crossref, ORCID
Added: September 10, 2020

2013 chapter

Optimal Co-Scheduling to Minimize Makespan on Chip Multiprocessors

In Job Scheduling Strategies for Parallel Processing (pp. 114–133).

By: K. Tian*, Y. Jiang*, X. Shen* & W. Mao*

Sources: Crossref, ORCID
Added: September 10, 2020

2013 journal article

HPar

ACM Transactions on Architecture and Code Optimization, 10(4), 1–25.

By: Z. Zhao*, M. Bebenita*, D. Herman*, J. Sun* & X. Shen*

Sources: Crossref, ORCID
Added: September 6, 2020

2013 chapter

Simple Profile Rectifications Go a Long Way

In ECOOP 2013 – Object-Oriented Programming (pp. 654–678).

By: B. Wu*, M. Zhou*, X. Shen*, Y. Gao*, R. Silvera* & G. Yiu*

Sources: Crossref, ORCID
Added: September 5, 2020

2013 chapter

Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119).

By: I. Damgård* & A. Scafuro*

Source: Crossref
Added: August 28, 2020

2013 chapter

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions

In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718).

Source: Crossref
Added: August 28, 2020

2013 chapter

Revisiting Lower and Upper Bounds for Selective Decommitments

In Theory of Cryptography (pp. 559–578).

Source: Crossref
Added: August 28, 2020

2013 chapter

Linear Logic Programming for Narrative Generation

In Logic Programming and Nonmonotonic Reasoning (pp. 427–432).

By: C. Martens*, A. Bosser, J. Ferreira & M. Cavazza

Source: Crossref
Added: August 28, 2020

2013 journal article

Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! Pipes

Information and Software Technology, 55(7), 1289–1303.

By: K. Stolee*, S. Elbaum* & A. Sarma*

author keywords: End-user programmers; Community analysis; Artifact repositories; Web mashups; Diversity analysis
Source: Crossref
Added: August 28, 2020

2013 journal article

In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS

Information Sciences, 231, 45–63.

author keywords: Intrusion detection system; Kernel task structure; Malware forensic; Operating system security; Malicious process detection
Source: Crossref
Added: August 28, 2020

2013 chapter

Validating Library Usage Interactively

In Computer Aided Verification (pp. 796–812).

By: W. Harris*, G. Jin*, S. Lu* & S. Jha*

Source: Crossref
Added: August 28, 2020

2013 journal article

Software effort models should be assessed via leave-one-out validation

Journal of Systems and Software, 86(7), 1879–1890.

By: E. Kocaguneli* & T. Menzies*

author keywords: Software cost estimation; Prediction system; Bias; Variance
Source: Crossref
Added: August 28, 2020