College of Engineering
Displaying works 81 - 100 of 169 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 book
Computer simulation techniques: the definitive introduction!
Raleigh, NC: Harry Perros.
2009 conference paper
Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach
Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, 225–230.
2009 article
Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts
PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.
2009 article
Towards Realistic Physical Topology Models for Internet Backbone Networks
2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42.
2009 article
SecureMR: A Service Integrity Assurance Framework for Map Reduce
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.
2009 conference paper
Identification of bot commands by run-time execution monitoring
25th Annual Computer Security Applications Conference, 321–330.
2009 article
HIMA: A Hypervisor-Based Integrity Measurement Agent
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+.
2009 article
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.
2009 article
Reggae: Automated Test Generation for Programs using Complex Regular Expressions
2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 515–519.
2009 conference paper
Mining health models for performance monitoring of services
2009 ieee/acm international conference on automated software engineering, proceedings, 409–420.
2009 conference paper
Architecture for affective social games
Agents for games and simulations: trends in techniques, concepts and design, 5920, 79–94.
2009 article
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 283–294.
2009 conference paper
Fast matching for all pairs similarity search
2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 1, 295–300.
2009 conference paper
BioDEAL: community generation of biological annotations
BMC Medical Informatics and Decision Making, 9.
2009 conference paper
Secure open source collaboration: An empirical study of linus' law
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.
2009 conference paper
False data injection attacks against state estimation in electric power grids
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.
2009 conference paper
Business modeling via commitments
Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125.
2009 conference paper
Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments
Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114.
2009 article
Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.
2009 article
Fitness-Guided Path Exploration in Dynamic Symbolic Execution
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 359-+.