College of Engineering
Displaying works 81 - 100 of 130 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2008 article
Extraction of natural-language dates and comparison of dates in hypothesis and text to identify negative textual entailment
Orphanides, A. K. (2008, April 25). University of North Carolina at Chapel Hill. https://ils.unc.edu/MSpapers/3403.pdf
2008 conference paper
Massively parallel genomic sequence search on the Blue Gene/P architecture
International Conference for High Performance Computing, Networking, Storage and Analysis, 522–532.
2008 journal article
Shortest-path routing in randomized DHT-based Peer-to-Peer systems
COMPUTER NETWORKS, 52(18), 3307–3317.
2008 journal article
Semantic Parameterization: A Process for Modeling Domain Descriptions
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2).
2008 journal article
Use of a nitinol gooseneck snare catheter for removal of adult Dirofilaria immitis in two cats
JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 233(9), 1441–1445.
2008 journal article
Trustworthy Web services provisioning for differentiated customer services
TELECOMMUNICATION SYSTEMS, 39(3-4), 171–185.
2008 journal article
Geometric modeling of rigid and non-rigid 3D shapes using the global geodesic function
Pattern Recognition, 935–942.
2008 journal article
An algebraic condition for product form in stochastic automata networks without synchronizations
Performance Evaluation, 65(11-12), 854–868.
2008 journal article
On Hierarchical Traffic Grooming in WDM Networks
IEEE-ACM TRANSACTIONS ON NETWORKING, 16(5), 1226–1238.
Contriutors: B. Chen*, R. Dutta n & G. Rouskas n
2008 journal article
Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course
International Journal of Engineering Education, 24(4), 659–670.
2008 conference paper
On the Levy-walk nature of human mobility
27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 1597–1605.
2008 conference paper
Countering persistent kernel rootkits through systematic hook discovery
Recent advances in intrusion detection, raid 2008, 5230, 21–38.
2008 journal article
Attack-resistant location estimation in wireless sensor networks
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4).
2008 journal article
Just-in-time dynamic voltage scaling: Exploiting inter-node slack to save energy in MPI programs
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 68(9), 1175–1185.
2008 journal article
Mitigating DoS attacks against broadcast authentication in wireless sensor networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 4(1).
2008 review
The worst-case execution-time problem - Overview of methods and survey of tools
[Review of ]. ACM Transactions on Embedded Computing Systems, 7(3).
2008 journal article
A differential HBT power cell and its model
MICROWAVE AND OPTICAL TECHNOLOGY LETTERS, 50(9), 2262–2268.
2008 article
Comparison of static and switching characteristics of 1200 V 4H-SiCBJT and 1200 V Si-IGBT
IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, Vol. 44, pp. 887–893.
2008 journal article
Z-MAC: A hybrid MAC for wireless sensor networks
IEEE-ACM TRANSACTIONS ON NETWORKING, 16(3), 511–524.
2008 journal article
Realizing quality improvement through test driven development: results and experiences of four industrial teams
EMPIRICAL SOFTWARE ENGINEERING, 13(3), 289–302.