Computer Science

College of Engineering

Works Published in 2005

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 61 - 80 of 115 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2005 journal article

SNAP: workbench management tool for evolutionary population genetic analysis

Bioinformatics, 21(3), 402–404.

By: E. Price & I. Carbone

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Probabilistic temporal logics via the modal mu-calculus

Theoretical Computer Science, 342(03-Feb), 316–350.

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Proactive mediation in plan-based narrative environments

In Intelligent Virtual Agents: 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005: Proceedings (Vol. 3661, pp. 292–304). New York: Springer.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

On the accuracy of semi-Lagrangian numerical simulation of internal gravity wave motion in the atmosphere

Journal of the Meteorological Society of Japan, 83(5), 851–869.

By: F. Semazzi n, J. Scroggs, G. Pouliot n, A. Mckee-Burrows n, M. Norman, V. Poojary n, Y. Tsai*

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Identifying value mappings for data integration: An unsupervised approach

In Web information systems engineering--WISE 2005: 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005: Proceedings (Lecture notes in computer science; 3806) (Vol. 3806, pp. 544–551). Berlin: Springer-Verlag.

By: J. Kang, D. Lee & P. Mitra

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Efficient security mechanisms for overlay multicast-based content distribution

In A. K. J. Ioannidis & M. Yung (Eds.), Applied cryptography and network security: Third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005: Proceedings (Lecture notes in computer science; 3531) (Vol. 3531, pp. 40–55). Berlin; New York: Springer.

By: S. Zhu, C. Yao, D. Liu, S. Setia & S. Jajodia

Ed(s): A. J. Ioannidis & M. Yung

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Designing views to efficiently answer real SQL queries

In J-D. Zucker & L. Saitta (Eds.), Abstraction, reformulation and approximation: 6th international symposium, SARA 2005, Airth Castle, Scotland, UK, July 26-29, 2005: proceedings (Lecture notes in computer science, Lecture notes in artificial intelligence; 3607) (Vol. 3607, pp. 332–346).

By: F. Afrati*, R. Chirkova, M. Gergatsoulis* & V. Pavlaki*

Ed(s): . J-D. Zucker & L. Saitta

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

An objective character believability evaluation procedure for multi-agent story generation systems

In Intelligent Virtual Agents: 5th International Working Conference, IVA 2005, Kos, Greece, September 12-14, 2005: Proceedings (Vol. 3661, pp. 278–291). New York: Springer.

By: M. Riedl & R. Young

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Selecting and using views to compute aggregate queries (extended abstract)

In T. Eiter & L. Libkin (Eds.), Database theory: ICDT 2005, 10th international conference, Edinburgh, UK, January 5-7, 2005: Proceedings (Lecture notes in computer science ; 3363) (Vol. 3363, pp. 383–397).

By: F. Afrati* & R. Chirkova

Ed(s): . T. Eiter & L. Libkin

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Research directions for service-oriented multiagent systems

IEEE Internet Computing, 9(6), 65–70.

By: M. Huhns*, M. Singh, M. Burstein*, K. Decker*, E. Durfee*, T. Finin*, L. Gasser*, H. Goradia* ...

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 chapter

On the application of k-center algorithms in heirarchical traffic grooming

In Proceedings of the Second International IEEE/Create-net workshop on traffic grooming (pp. 167–176). Los Alamitos, CA: IEEE Computer Society.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Identification of a discrete planar symmetric shape from a single noisy view

IEEE Transactions on Image Processing, 14(12), 2051–2059.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Feedback EDF scheduling of real-time tasks exploiting dynamic voltage scaling

Real-Time Systems, 31(03-Jan), 33–63.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Designing a visualization framework for multidimensional data

IEEE Computer Graphics and Applications, 25(6), 15-.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Checking inside the black box: Regression testing by comparing value spectra

IEEE Transactions on Software Engineering, 31(10), 869–883.

By: T. Xie n & D. Notkin*

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

An approach to unfolding asynchronous communication protocols

In I. J. H. J. Fitzgerald & A. Tarlecki (Eds.), FM 2005: Formal methods: International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005: proceedings (Lecture notes in computer science ; 3582) (Vol. 3582, pp. 334–349). Berlin; New York: Springer.

By: Y. Lei & S. Iyer

Ed(s): I. J. Fitzgerald & A. Tarlecki

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Traffic engineering approach to path selection in optical burst switching networks

Journal of Optical Networking, 4(11), 759–777.

By: J. Teng & G. Rouskas

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Path Switching in OBS Networks

In NETWORKING 2005. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems (Vol. 3462, pp. 406–418).

By: L. Yang n & G. Rouskas

Sources: NC State University Libraries, Crossref
Added: August 6, 2018

2005 journal article

Fast incorporation of optical flow into active polygons

IEEE Transactions on Image Processing, 14(6), 745–759.

By: G. Unal*, H. Krim & A. Yezzi*

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Emergent behavior in two complex cellular automata rule sets

Complexity, 10(5), 45–55.

By: C. Hazard, K. Kimport* & D. Johnson*

Source: NC State University Libraries
Added: August 6, 2018