College of Engineering
Displaying works 41 - 60 of 215 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2013 conference paper
Geometric Separators and the Parabolic Lift
CCCG: The Canadian Conference in Computational Geometry. Presented at the Canadian Conference in Computational Geometry, Waterloo, Ontario.
Event: Canadian Conference in Computational Geometry at Waterloo, Ontario on August 8-10, 2013
2013 chapter
Knowledge-Assisted Ontology-Based Requirements Evolution
In W. Maalej & A. K. Thurimella (Eds.), Managing Requirements Knowledge (MaRK) (pp. 143–167). https://research-information.bris.ac.uk/en/publications/9d328913-4eb3-4403-bf6f-bbf20ed08017
Ed(s): W. Maalej & A. Thurimella
Event: at Germany
2013 conference paper
Argumentation, Evidence, and Schemes: Abstract
Proceedings of the 10th International Workshop on Argumentation in Multi-Agent Systems, 37. https://research-information.bris.ac.uk/en/publications/3b00f0ba-3768-4e45-94f5-93d1a4661f2b
Event: International Workshop on Argumentation in Multi-Agent Systems at St. Paul, MN on May 6-10, 2013
2013 chapter
Fine-Grained Treatment to Synchronizations in GPU-to-CPU Translation
In Languages and Compilers for Parallel Computing (pp. 171–184).
2013 chapter
Optimal Co-Scheduling to Minimize Makespan on Chip Multiprocessors
In Job Scheduling Strategies for Parallel Processing (pp. 114–133).
2013 journal article
HPar
ACM Transactions on Architecture and Code Optimization, 10(4), 1–25.
2013 chapter
Simple Profile Rectifications Go a Long Way
In ECOOP 2013 – Object-Oriented Programming (pp. 654–678).
2013 chapter
Unconditionally Secure and Universally Composable Commitments from Physical Assumptions
In Advances in Cryptology - ASIACRYPT 2013 (pp. 100–119).
2013 chapter
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
In Advances in Cryptology – EUROCRYPT 2013 (pp. 702–718).
2013 chapter
Revisiting Lower and Upper Bounds for Selective Decommitments
In Theory of Cryptography (pp. 559–578).
2013 chapter
Linear Logic Programming for Narrative Generation
In Logic Programming and Nonmonotonic Reasoning (pp. 427–432).
2013 journal article
Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! Pipes
Information and Software Technology, 55(7), 1289–1303.
2013 journal article
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
Information Sciences, 231, 45–63.
2013 chapter
Validating Library Usage Interactively
In Computer Aided Verification (pp. 796–812).
2013 journal article
Software effort models should be assessed via leave-one-out validation
Journal of Systems and Software, 86(7), 1879–1890.
2013 journal article
Choose to Change: The West Virginia Early Childhood Obesity Prevention Project
Journal of Nutrition Education and Behavior, 45(4), S92.
2013 journal article
Predictive models in software engineering
Empirical Software Engineering, 18(3), 433–434.
2013 journal article
Complex biomarker discovery in neuroimaging data: Finding a needle in a haystack
NeuroImage: Clinical, 3, 123–131.
2013 chapter
ALACRITY: Analytics-Driven Lossless Data Compression for Rapid In-Situ Indexing, Storing, and Querying
In Transactions on Large-Scale Data- and Knowledge-Centered Systems X (pp. 95–114).
2013 journal article
A graph-based approach to find teleconnections in climate data
Statistical Analysis and Data Mining, 6(3), 158–179.