Computer Science

College of Engineering

Works Published in 2009

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 conference paper

Secure open source collaboration: An empirical study of linus' law

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

By: Y. Liu, P. Ning & M. Reiter

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Business modeling via commitments

Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125.

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments

Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114.

By: J. Thomas & R. Young

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Remote attestation to dynamic system properties: Towards providing complete system integrity evidence

2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN 2009), 115–124.

By: C. Kil, E. Sezer, A. Azab, P. Ning & X. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Fitness-guided path exploration in dynamic symbolic execution

2009 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN 2009), 359–368.

By: T. Xie, N. Tillmann, J. Halleux & W. Schulte

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Should software testers use mutation analysis to augment a test set?

Journal of Systems and Software, 82(11), 1819–1832.

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Incommensurate spin correlation driven by frustration in BiCu2PO6

Physical Review. B, Condensed Matter and Materials Physics, 80(18).

By: O. Mentre, E. Janod, P. Rabu, M. Hennion, F. Leclercq-Hugeux, J. Kang, C. Lee, M. Whangbo, S. Petit

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Improving data availability for better access performance: a study on caching scientific data on distributed desktop workstations

Journal of Grid Computing, 7(4), 419–438.

By: X. Ma, S. Vazhkudai & Z. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

A tunable holistic resiliency approach for high-performance computing systems

ACM SIGPLAN Notices, 44(4), 305–306.

By: S. Scott, C. Engelmann, G. Vallee, T. Naughton, A. Tikotekar, G. Ostrouchov, C. Leangsuksun, N. Naksinehaboon ...

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Special issue: Selected papers from The Second International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2008)

Optical Switching and Networking, 6(4), 225–226.

By: B. Mukherjee, S. Subramaniam, A. Jukan, K. Sivalingam & R. Dutta

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2009 conference paper

SigLM: signature-driven load management for cloud computing infrastructures

Iwqos: 2009 ieee 17th international workshop on quality of service, 226–234.

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

ShortPK: A short-term public key scheme for broadcast authentication in sensor networks

ACM Transactions on Sensor Networks, 6(1).

By: R. Wang, W. Du, X. Liu & P. Ning

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Shift hashing for memory-constrained applications

2009 ieee 33rd international computer software and applications conference, vols 1 and 2, 531–536.

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Lightweight remote image management for secure code dissemination in wireless sensor networks

Ieee infocom 2009 - ieee conference on computer communications, vols 1-5, 1242–1250.

By: A. Liu, P. Ning & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Fault localization for firewall policies

2009 28th ieee international symposium on reliable distributed systems, proceedings, 100–106.

By: J. Hwang, T. Xie, F. Chen & A. Liu

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

DiffQ: Practical differential backlog congestion control for wireless networks

Ieee infocom 2009 - ieee conference on computer communications, vols 1-5, 262–270.

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Commitment-based service-oriented architecture

Computer, Vol. 42, pp. 72–79.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2009 journal article

Sequence analysis of rice rubi3 promoter gene expression cassettes for improved transgene expression

Plant Science, 177(6), 549–556.

Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

Reasonableness meets requirements: regulating security and privacy in software

Duke Law Journal, 59(2), 309–342.

By: P. Otto

Source: NC State University Libraries
Added: August 6, 2018