Computer Science

College of Engineering

Works Published in 2008

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2008 conference paper

Assessing students’ wiki contributions

Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA.

Event: 2008 ASEE Annual Conference and Exposition at Pittsburgh, PA on June 22-25, 2008

Sources: NC State University Libraries, ORCID
Added: June 12, 2019

2008 conference paper

Rose: A repository of education-friendly open-source projects

Proceedings of the 13th annual conference on Innovation and technology in computer science education - ITiCSE '08. Presented at the ITiCSE '08, Madrid, Spain.

By: A. Meneely, L. Williams & E. Gehringer

Event: ITiCSE '08 at Madrid, Spain on June 30 - July 2, 2008

Sources: Crossref, ORCID
Added: June 12, 2019

2008 article

Extraction of natural-language dates and comparison of dates in hypothesis and text to identify negative textual entailment

Orphanides, A. K. (2008, April 25). University of North Carolina at Chapel Hill. School of Information and Library Science.

Source: ORCID
Added: December 6, 2018

2008 conference paper

Massively parallel genomic sequence search on the Blue Gene/P architecture

International Conference for High Performance Computing, Networking, Storage and Analysis, 522–532.

By: H. Lin, P. Balaji, R. Poole, C. Sosa, X. Ma & W. Feng

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Shortest-path routing in randomized DHT-based Peer-to-Peer systems

Computer Networks (Amsterdam, Netherlands : 1999), 52(18), 3307–3317.

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Semantic parameterization

TOSEM, 18(2), 1–27.

By: T. Breaux, A. Antón & J. Doyle

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2008 journal article

Use of a nitinol gooseneck snare catheter for removal of adult Dirofilaria immitis in two cats

Journal of the American Veterinary Medical Association, 233(9), 1441–1445.

By: M. Small, C. Atkins, S. Gordon, A. Birkenheuer, M. Booth-Sayer, B. Keene, Y. Fujii, M. Miller

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Trustworthy web services provisioning for differentiated customer services

Telecommunication Systems, 39(3-4), 171–185.

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Geometric modeling of rigid and non-rigid 3D shapes using the global geodesic function

Pattern Recognition, 935–942.

By: D. Aouada, D. Dreisigmeyer & H. Krim

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

An algebraic condition for product form in stochastic automata networks without synchronizations

Performance Evaluation, 65(11-12), 854–868.

By: J. Fourneau, B. Plateau & W. Stewart

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

On hierarchical traffic grooming in WDM networks

IEEE/ACM Transactions on Networking, 16(5), 1226–1238.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2008 journal article

Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course

International Journal of Engineering Education, 24(4), 659–670.

Source: NC State University Libraries
Added: August 6, 2018

2008 conference paper

On the Levy-walk nature of human mobility

27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 1597–1605.

By: L. Rhee, M. Shin, S. Hong, K. Lee & S. Chong

Source: NC State University Libraries
Added: August 6, 2018

2008 conference paper

Countering persistent kernel rootkits through systematic hook discovery

Recent advances in intrusion detection, raid 2008, 5230, 21–38.

By: Z. Wang, X. Jiang, W. Cui & X. Wang

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Attack-resistant location estimation in wireless sensor networks

ACM Transactions on Information and System Security, 11(4).

By: D. Liu, P. Ning, A. Liu, C. Wang & W. Du

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in MPI programs

Journal of Parallel and Distributed Computing, 68(9), 1175–1185.

By: V. Freeh, N. Kappiah, D. Lowenthal & T. Bletsch

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Mitigating DoS attacks against broadcast authentication in wireless sensor networks

ACM Transactions on Sensor Networks, 4(1).

By: P. Ning, A. Liu & W. Du

Source: NC State University Libraries
Added: August 6, 2018

2008 review

The worst-case execution-time problem - Overview of methods and survey of tools

[Review of ]. ACM Transactions on Embedded Computing Systems, 7(3).

By: R. Wilhelm, J. Engblom, A. Ermedahl, N. Holsti, S. Thesing, D. Whalley, G. Bernat, C. Ferdinand ...

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

A differential HBT power cell and its model

Microwave and Optical Technology Letters, 50(9), 2262–2268.

By: D. Lee, Y. Chen, K. Lee & S. Hong

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Comparison of static and switching characteristics of 1200 V 4H-SiCBJT and 1200 V Si-IGBT

IEEE Transactions on Industry Applications, 44(3), 887–893.

By: Y. Gao, A. Huang, S. Krishnaswami, J. Richmond & A. Agarwal

Source: NC State University Libraries
Added: August 6, 2018