Computer Science

College of Engineering

Works Published in 2017

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 41 - 60 of 213 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2017 conference paper

Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers

IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

By: R. Yu

Source: ORCID
Added: March 29, 2020

2017 conference paper

Robust Incentive Tree Design for Mobile Crowdsensing

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

By: R. Yu

Source: ORCID
Added: March 29, 2020

2017 conference paper

An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications

2017 IEEE International Conference on Edge Computing (EDGE).

By: R. Yu

Source: ORCID
Added: March 29, 2020

2017 journal article

The Critical Network Flow Problem: Migratability and Survivability

IEEE/ACM Transactions on Networking.

By: R. Yu

Source: ORCID
Added: March 29, 2020

2017 chapter

Adaptively Indistinguishable Garbled Circuits

In Theory of Cryptography (pp. 40–71).

By: Z. Jafargholi*, A. Scafuro & D. Wichs*

Source: Crossref
Added: February 24, 2020

2017 chapter

Server-Aided Secure Computation with Off-line Parties

In Computer Security – ESORICS 2017 (pp. 103–123).

By: F. Baldimtsi*, D. Papadopoulos*, S. Papadopoulos*, A. Scafuro & N. Triandopoulos*

Source: Crossref
Added: February 24, 2020

2017 journal article

TMAP: Discovering relevant API methods through text mining of API documentation

Journal of Software: Evolution and Process, 29(12), e1845.

By: R. Pandita n, R. Jetley*, S. Sudarsan*, T. Menzies & L. Williams

Source: Crossref
Added: February 24, 2020

2017 chapter

A Comparisons of BKT, RNN and LSTM for Learning Gain Prediction

In Lecture Notes in Computer Science (pp. 536–539).

By: C. Lin n & M. Chi

Source: Crossref
Added: February 24, 2020

2017 chapter

Stimulus Control for Semi-autonomous Computer Canine-Training

In Biomimetic and Biohybrid Systems (pp. 279–290).

Source: Crossref
Added: February 24, 2020

2017 chapter

Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph

In Financial Cryptography and Data Security (pp. 248–263).

By: S. Ranshous n, C. Joslyn*, S. Kreyling*, K. Nowak*, N. Samatova, C. West*, S. Winters*

Source: Crossref
Added: February 24, 2020

2017 chapter

Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition

In Data and Applications Security and Privacy XXXI (pp. 142–163).

By: L. Chen n, T. Yu* & R. Chirkova

Source: Crossref
Added: February 24, 2020

2017 chapter

Lessons Learned: Visualizing Cyber Situation Awareness in a Network Security Domain

In Theory and Models for Cyber Situation Awareness (pp. 47–65).

By: C. Healey, L. Hao n & S. Hutchinson*

Source: Crossref
Added: February 24, 2020

2017 chapter

Balancing Learning and Engagement in Game-Based Learning Environments with Multi-objective Reinforcement Learning

In Lecture Notes in Computer Science (pp. 323–334).

By: R. Sawyer n, J. Rowe n & J. Lester

Source: Crossref
Added: February 24, 2020

2017 chapter

Affect Dynamics in Military Trainees Using vMedic: From Engaged Concentration to Boredom to Confusion

In Lecture Notes in Computer Science (pp. 238–249).

By: J. Ocumpaugh*, J. Andres*, R. Baker*, J. DeFalco*, L. Paquette*, J. Rowe n, B. Mott n, J. Lester ...

Source: Crossref
Added: February 24, 2020

2017 chapter

Computer-Aided Human Centric Cyber Situation Awareness

In Theory and Models for Cyber Situation Awareness (pp. 3–25).

By: M. Albanese*, N. Cooke*, G. Coty*, D. Hall*, C. Healey, S. Jajodia*, P. Liu*, M. McNeese* ...

Source: Crossref
Added: February 24, 2020

2017 chapter

Cost Analysis Comparing HPC Public Versus Private Cloud Computing

In Communications in Computer and Information Science (pp. 294–316).

By: P. Dreher, D. Nair*, E. Sills* & M. Vouk

Source: Crossref
Added: February 24, 2020

2017 journal article

Network service orchestration in heterogeneous 5G networks using an open marketplace

IET Networks, 6(6), 149–156.

By: S. Bhat n, R. Udechukwu n, R. Dutta & G. Rouskas

Sources: Crossref, ORCID
Added: February 20, 2020

2017 chapter

Is More Agency Better? The Impact of Student Agency on Game-Based Learning

In Lecture Notes in Computer Science: Vol. 10331 LNAI (pp. 335–346).

Sources: ORCID, Crossref
Added: February 19, 2020

2017 conference paper

Enhancing student models in game-based learning with facial expression recognition

UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization, 192–201.

By: R. Sawyer n, A. Smith, J. Rowe n, R. Azevedo n & J. Lester n

Source: ORCID
Added: February 19, 2020

2017 book

Regional cultural differences in how students customize their avatars in technology-enhanced learning

In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 598–601).

Source: ORCID
Added: February 11, 2020