Computer Science

College of Engineering

Works Published in 2005

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 81 - 100 of 115 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2005 chapter

Benefits of multiple battery levels for the lifetime of large wireless sensor networks

In Networking 2005: Networking technologies, services, and protocols: Performance of computer and communication networks: Mobile and wireless communication systems: 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005: Proceedings (Lecture notes in computer science; 3462) (Vol. 3462, pp. 1440–1444).

By: M. Sichitiu & R. Dutta

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 chapter

An approximate queueing model for limited-range wavelength conversion in an OBS switch

In Networking 2005: Networking technologies, services, and protocols: Performance of computer and communication networks: Mobile and wireless communication systems: 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005: Proceedings (Lecture notes in computer science; 3462) (Vol. 3462, pp. 697–708).

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

A semantic approach for designing commitment protocols

Lecture Notes in Computer Science, 3396, 33–49.

By: A. Mallya & M. Singh

Ed(s): M. Eijk & F. Dignum

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

Examining Internet privacy policies within the context of user privacy values

IEEE Transactions on Engineering Management, 52(2), 227–237.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Engineering self-organizing referral networks for trustworthy service selection

IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans., 35(3), 396–407.

By: P. Yolum & M. Singh

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

A survey of eigenvector methods for Web information retrieval

SIAM Review, 47(1), 135–161.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Integration of authentication and mobility management in third generation and WLAN data networks

Wireless Communications & Mobile Computing, 5(6), 665–678.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Information-theoretic active polygons for unsupervised texture segmentation

International Journal of Computer Vision, 62(3), 199–220.

By: G. Unal, A. Yezzi* & H. Krim

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Feedback EDF scheduling exploiting hardware-assisted asynchronous dynamic voltage scaling

ACM SIGPLAN Notices, 40(7), 203–212.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

A semantic approach for designing e-business protocols

IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 3387, 111–123.

By: A. Mallya & M. Singh

Ed(s): . J. Cardoso & A. Sheth

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

RACE: Remote Analysis Computation for gene Expression data

Nucleic Acids Research, 33, W638–643.

By: M. Psarros*, S. Heber, M. Sick, G. Thoppae, K. Harshman & B. Sick

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

Multivariate meta-analysis of pharmacokinetic studies of ampicillin trihydrate in cattle

American Journal of Veterinary Research, 66(1), 108–112.

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Monte Carlo approximation in incomplete information, sequential auction games

Decision Support Systems, 39(2), 153–168.

Source: NC State University Libraries
Added: August 6, 2018

2005 chapter

Experimental Analysis of the Q-Matrix Method in Knowledge Discovery

In Lecture Notes in Computer Science (Vol. 3488, pp. 603–611).

Sources: NC State University Libraries, Crossref
Added: August 6, 2018

2005 journal article

Analyzing multiparty agreements with commitments

Lecture Notes in Computer Science, 3508, 85–96.

By: F. Wan & M. Singh

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

Service-oriented computing: Key concepts and principles

IEEE Internet Computing, 9(1), 75–81.

By: M. Huhns & M. Singh

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 journal article

Weak bisimilarity and regularity of context-free processes is EXPITIME-hard

Theoretical Computer Science, 330(3), 553–575.

By: R. Mayr

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

On the complexity of computing determinants

Computational Complexity, 13, 91–130.

By: E. Kaltofen & G. Villard*

Source: NC State University Libraries
Added: August 6, 2018

2005 journal article

Genetic algorithm-based decision support for optimizing seismic response of piping systems

Journal of Structural Engineering, 131(3), 389–398.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2005 patent

2D/3D chemical sensors and methods of fabricating and operating the same

Washington, DC: U.S. Patent and Trademark Office.

By: S. Ufer

Source: NC State University Libraries
Added: August 6, 2018