Works Published in 2008

search works

Displaying works 81 - 100 of 137 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2008 conference paper

Exact and inexact methods for selecting views and indexes for OLAP performance improvement

Proceedings of the 11th international conference on Extending database technology: Advances in database technology, 311–322.

By: Z. Talebi, R. Chirkova, Y. Fathi & M. Stallmann

Event: ACM

Source: ORCID
Added: December 6, 2019

2008 conference paper

Expressing a fraction of two determinants as a determinant

Proceedings of the twenty-first international symposium on Symbolic and algebraic computation - ISSAC '08. Presented at the the twenty-first international symposium.

By: E. Kaltofen n & P. Koiran*

Event: the twenty-first international symposium

TL;DR: The problem was motivated by resultant formulas derived from Chow forms and shows that divisions can be removed from formulas that compute polynomials in the input variables over a sufficiently large field within polynomial formula size growth. (via Semantic Scholar)
Source: Crossref
Added: August 18, 2019

2008 conference paper

Exact certification of global optimality of approximate factorizations via rationalizing sums-of-squares with floating point scalars

Proceedings of the twenty-first international symposium on Symbolic and algebraic computation - ISSAC '08. Presented at the the twenty-first international symposium.

Event: the twenty-first international symposium

TL;DR: This work generalizes the technique by Peyrl and Parillo to computing lower bound certificates for several well-known factorization problems in hybrid symbolic-numeric computation and certifies accurate rational lower bounds near the irrational global optima. (via Semantic Scholar)
Source: Crossref
Added: August 18, 2019

2008 conference paper

Understanding and relating to your international students

Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA.

By: E. Gehringer

Event: 2008 ASEE Annual Conference and Exposition at Pittsburgh, PA on June 22-25, 2008

Sources: NC State University Libraries, ORCID
Added: June 12, 2019

2008 conference paper

Damage control: What to do when things don’t work

Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA.

By: E. Gehringer

Event: 2008 ASEE Annual Conference and Exposition at Pittsburgh, PA on June 22-25, 2008

Sources: NC State University Libraries, ORCID
Added: June 12, 2019

2008 conference paper

Assessing students’ wiki contributions

Proceedings of the 2008 ASEE Annual Conference and Exposition. Presented at the 2008 ASEE Annual Conference and Exposition, Pittsburgh, PA.

By: E. Gehringer

Event: 2008 ASEE Annual Conference and Exposition at Pittsburgh, PA on June 22-25, 2008

Sources: NC State University Libraries, ORCID
Added: June 12, 2019

2008 conference paper

Rose: A repository of education-friendly open-source projects

Proceedings of the 13th annual conference on Innovation and technology in computer science education - ITiCSE '08. Presented at the ITiCSE '08, Madrid, Spain.

Event: ITiCSE '08 at Madrid, Spain on June 30 - July 2, 2008

TL;DR: The Repository for Open Software Education (ROSE) is created and three open-source projects intended for an undergraduate computer science or software engineering course are contributed, which are education-friendly in terms of a manageable size and scope. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: June 12, 2019

2008 article

Extraction of natural-language dates and comparison of dates in hypothesis and text to identify negative textual entailment

Orphanides, A. K. (2008, April 25). University of North Carolina at Chapel Hill. https://ils.unc.edu/MSpapers/3403.pdf

By: A. Orphanides

Source: ORCID
Added: December 6, 2018

2008 conference paper

Massively parallel genomic sequence search on the Blue Gene/P architecture

International Conference for High Performance Computing, Networking, Storage and Analysis, 522–532.

By: H. Lin, P. Balaji, R. Poole, C. Sosa, X. Ma & W. Feng

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Shortest-path routing in randomized DHT-based Peer-to-Peer systems

COMPUTER NETWORKS, 52(18), 3307–3317.

By: C. Wang n & K. Harfoush n

author keywords: Distributed hash tables; Randomized networks; Shortest-path routing
TL;DR: A novel routing protocol, RASTER, that approximates shortest overlay routes between nodes in randomized DHTs and provides a forwarding overhead of merely a small constant number of bitwise operations, a routing performance close to optimal, and a better resilience to churn. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Semantic Parameterization: A Process for Modeling Domain Descriptions

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 18(2).

By: T. Breaux n, A. Anton n & J. Doyle n

Contributors: T. Breaux n, A. Antón n & J. Doyle n

author keywords: Documentation; Standardization; Human Factors; Natural language; domain knowledge; formal specification; description logic
TL;DR: This article presents a systematic process called Semantic Parameterization for expressing natural language domain descriptions of goals as specifications in description logic, and allows engineers to automate inquiries using who, what, and where questions, completing the formalization of the ICM questions. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2008 journal article

Use of a nitinol gooseneck snare catheter for removal of adult Dirofilaria immitis in two cats

JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, 233(9), 1441–1445.

By: M. Small, C. Atkins*, S. Gordon, A. Birkenheuer*, M. Booth-Sayer, B. Keene*, Y. Fujii*, M. Miller*

MeSH headings : Animals; Cardiac Catheterization / instrumentation; Cardiac Catheterization / methods; Cardiac Catheterization / veterinary; Cat Diseases / parasitology; Cat Diseases / surgery; Cats; Chylothorax / etiology; Chylothorax / parasitology; Chylothorax / surgery; Chylothorax / veterinary; Dirofilaria immitis / isolation & purification; Dirofilariasis / complications; Dirofilariasis / surgery; Female; Heart Failure / surgery; Heart Failure / veterinary; Male; Treatment Outcome
TL;DR: Findings suggested that use of a nitinol gooseneck snare catheter may be a safe and effective technique for removing adult D immitis from the right atrium and ventricle in cats and that successful removal of adult heartworms in infected cats may resolve clinical signs of right-sided congestive heart failure and chylothorax. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Trustworthy Web services provisioning for differentiated customer services

TELECOMMUNICATION SYSTEMS, 39(3-4), 171–185.

By: K. Xiong* & H. Perros n

author keywords: Web services; Security; Trustworthiness; Percentile response time; Service availability
TL;DR: This paper considers a set of computer resources used by a service broker to host enterprise applications for two classes of differentiated customer services subject to a service level agreement, and studies three QoS metrics, namely, trustworthiness, a percentile response time, and availability. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Geometric modeling of rigid and non-rigid 3D shapes using the global geodesic function

Pattern Recognition, 935–942.

By: D. Aouada n, D. Dreisigmeyer* & H. Krim n

TL;DR: The experimental results show that the proposed modeling of objects to their topological graphs to ensure a full and compact description necessary for shape-based retrieval, recognition and analysis of 3D models appears to be robust to both noise and decimation. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

An algebraic condition for product form in stochastic automata networks without synchronizations

Performance Evaluation, 65(11-12), 854–868.

By: J. Fourneau*, B. Plateau* & W. Stewart n

TL;DR: A sufficient condition for the steady-state distribution to have product form is proved and this theorem generalizes former results on SANs as well as results on modulated Markovian queues, such as Boucherie's theory on competing Markov chain. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

On Hierarchical Traffic Grooming in WDM Networks

IEEE-ACM TRANSACTIONS ON NETWORKING, 16(5), 1226–1238.

By: B. Chen*, G. Rouskas n & R. Dutta n

Contributors: B. Chen*, R. Dutta n & G. Rouskas n

author keywords: Hierarchical traffic grooming; K-center; optical networks; wavelength division multiplexing (WDM)
TL;DR: Comparisons to lower bounds indicate that hierarchical grooming is efficient in its use of the network resources of interest, namely, electronic ports and wavelengths. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2008 journal article

Addressing diverse needs through a balance of agile and plan-driven software development methodologies in the core software engineering course

International Journal of Engineering Education, 24(4), 659–670.

Source: NC State University Libraries
Added: August 6, 2018

2008 conference paper

On the Levy-walk nature of human mobility

27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 1597–1605.

By: L. Rhee, M. Shin, S. Hong, K. Lee & S. Chong

Source: NC State University Libraries
Added: August 6, 2018

2008 conference paper

Countering persistent kernel rootkits through systematic hook discovery

Recent advances in intrusion detection, raid 2008, 5230, 21–38.

By: Z. Wang, X. Jiang, W. Cui & X. Wang

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

Attack-resistant location estimation in wireless sensor networks

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 11(4).

By: D. Liu*, P. Ning n, A. Liu n, C. Wang & W. Du*

author keywords: security; design; algorithms; sensor networks; security; localization
TL;DR: Two methods to tolerate malicious attacks against range-based location discovery in sensor networks are presented and the experimental results demonstrate the effectiveness of the proposed methods, and give the secure and resilient location estimation scheme most suitable for the current generation of sensor networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.