Works Published in 2017

search works

Displaying works 81 - 100 of 258 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2017 thesis

A Framework for the Rapid Creation of Quality-Assured Programming Rubrics for New K-12 Computer Science Teachers.

North Carolina State University.

By: V. Catete

Source: ORCID
Added: May 6, 2020

2017 conference paper

Type-based Semantic Optimization for Scalable RDF Graph Pattern Matching

Proceedings of the 26th International Conference on World Wide Web.

Kemafor Ogan

TL;DR: This paper proposes a novel type system for RDF data induced from data and ontologies and a query optimization and evaluation framework for evaluating graph pattern queries using type-based optimizations, which is up to 500X faster than existing approaches. (via Semantic Scholar)
Source: ORCID
Added: May 1, 2020

2017 journal article

QoS-Aware and Reliable Traffic Steering for Service Function Chaining in Mobile Networks

IEEE Journal on Selected Areas in Communications.

Ruozhou Yu

author keywords: Software-defined networking; mobile networks; service function chaining; quality-of-service; reliability
TL;DR: This paper defines and forms the traffic steering problem for service function chaining in mobile networks, which turns out to be $\mathcal {NP}$ -hard, and develops a fast approximation scheme for the problem, and evaluates its performance via extensive simulation experiments. (via Semantic Scholar)
Source: ORCID
Added: March 29, 2020

2017 journal article

Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing

IEEE Journal on Selected Areas in Communications.

Ruozhou Yu

author keywords: Game theory; crowdsourcing; incentive mechanism; false-name proofness; truthfulness
TL;DR: A Truthful Auction with countermeasures against False-name Attacks (TAFA) is designed as an auction-based incentive mechanism for crowdsourcing and it is proved that TAFA is truthful, individually rational, budget-balanced, and computationally efficient. (via Semantic Scholar)
Source: ORCID
Added: March 29, 2020

2017 conference paper

Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers

IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

Ruozhou Yu

TL;DR: This paper formally defines the survivable virtual cluster embedding problem, and proposes a novel algorithm, which computes the most resource-efficient embedding given a tenant request, which is several orders faster than the optimal solution yet able to achieve similar performance. (via Semantic Scholar)
Source: ORCID
Added: March 29, 2020

2017 conference paper

Robust Incentive Tree Design for Mobile Crowdsensing

2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

Ruozhou Yu

author keywords: Crowdsensing; Mobile Networks; Wireless Networks; Incentive Mechanism; Sybil-proofness; Truthfulness
TL;DR: RIT is designed as a Robust Incentive Tree mechanism for mobile crowdsensing which combines the advantages of auctions and incentive trees and it is proved that RIT is truthful and sybil-proof with probability at least H, for any given H in (0,1). (via Semantic Scholar)
Source: ORCID
Added: March 29, 2020

2017 conference paper

An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications

2017 IEEE International Conference on Edge Computing (EDGE).

Ruozhou Yu

author keywords: computing; task distribution; quality-of-service; IoT applications
TL;DR: Simulation results are presented to show the improvement of using this approach on the increase of the number of tasks to be completed in the edge computing network, and the quality of-service (QoS) requirements of the tasks completed in that network are satisfied. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: ORCID
Added: March 29, 2020

2017 journal article

The Critical Network Flow Problem: Migratability and Survivability

IEEE/ACM Transactions on Networking.

Ruozhou Yu

author keywords: Critical network flow; traffic engineering; bandwidth guarantee; flow migration; survivability
TL;DR: A new network abstraction, termed critical network flow, which models the bandwidth requirement of modern Internet applications and services and presents a polynomial-time optimal algorithm for each case, including the basic case with no transient network state considered, the cases with network reconfiguration, and the case with survivability against link failures. (via Semantic Scholar)
Source: ORCID
Added: March 29, 2020

2017 chapter

Adaptively Indistinguishable Garbled Circuits

In Theory of Cryptography (pp. 40–71).

By: Z. Jafargholi*, A. Scafuro n & D. Wichs*

TL;DR: This work shows how to overcome the lower bound on the size of the garbling input and achieve significantly better efficiency under the minimal assumption that one-way functions exist by relaxing the security notion from simulation-based to indistinguishability-based. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Server-Aided Secure Computation with Off-line Parties

In Computer Security – ESORICS 2017 (pp. 103–123).

By: F. Baldimtsi*, D. Papadopoulos*, S. Papadopoulos*, A. Scafuro n & N. Triandopoulos*

TL;DR: A proof-of-concept implementation of two concrete MPC constructions based on 2-party mixed protocols based on garbled circuits that converts inputs under different keys to ones under the same key are provided, validating their efficiency and efficacy in protecting privacy in OSNs. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 journal article

TMAP: Discovering relevant API methods through text mining of API documentation

Journal of Software: Evolution and Process, 29(12), e1845.

By: R. Pandita n, R. Jetley*, S. Sudarsan*, T. Menzies n & L. Williams n

author keywords: API documents; API mappings; text mining
TL;DR: Text mining based approach (TMAP) is proposed to discover relevant API mappings using text mining on the natural language API method descriptions to support software developers in migrating an application from a source API to a target API by automatically discovering relevant method mappings. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: February 24, 2020

2017 chapter

A Comparisons of BKT, RNN and LSTM for Learning Gain Prediction

In Lecture Notes in Computer Science (pp. 536–539).

author keywords: LSTM; RNN; BKT; Learning gain prediction
TL;DR: Interestingly, it is found that RNN can achieve a reasonably accurate prediction of student final learning gains using only the first 40% of the entire training sequence; using the first 70%" of the sequence would produce a result comparable to using the entire sequence. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Source: Crossref
Added: February 24, 2020

2017 chapter

Stimulus Control for Semi-autonomous Computer Canine-Training

In Biomimetic and Biohybrid Systems (pp. 279–290).

By: J. Majikes n, S. Yuschak n, K. Walker n, R. Brugarolas n, S. Mealin n, M. Foster n, A. Bozkurt n, B. Sherman n, D. Roberts n

TL;DR: A semi-autonomous, canine-training system by combining existing research in Applied Behavior Analysis with computer systems consisting of hardware, software, audio, and visual components capable of autonomously training a dog to perform a specific behavior on command. (via Semantic Scholar)
UN Sustainable Development Goal Categories
10. Reduced Inequalities (OpenAlex)
Source: Crossref
Added: February 24, 2020

2017 chapter

Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph

In Financial Cryptography and Data Security (pp. 248–263).

By: S. Ranshous n, C. Joslyn*, S. Kreyling*, K. Nowak*, N. Samatova n, C. West*, S. Winters*

TL;DR: This work identifies distinct statistical properties of exchange addresses related to the acquisition and spending of bitcoin, and builds classification models to learn a set of discriminating features and predicts if an address is owned by an exchange with \(>80\%\) accuracy using purely structural features of the graph. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition

In Data and Applications Security and Privacy XXXI (pp. 142–163).

author keywords: k-skyband query; Differential privacy; Adaptive spatial decomposition
TL;DR: This paper proposes a general technique BBS-Priv, which accepts any differentially private spatial decomposition tree as input and leverages data synthesis to answer \(k\)-skyband queries privately and proposes techniques to generate a k-skyband tree over spatial data that satisfies differential privacy. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Lessons Learned: Visualizing Cyber Situation Awareness in a Network Security Domain

In Theory and Models for Cyber Situation Awareness (pp. 47–65).

By: C. Healey n, L. Hao n & S. Hutchinson*

TL;DR: This chapter discusses lesson learned working with cyber situation awareness and network security domain experts to integrate visualizations into their current workflows, finding a critical set of requirements that a visualization must meet to be considered for use by these domain experts. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Balancing Learning and Engagement in Game-Based Learning Environments with Multi-objective Reinforcement Learning

In Lecture Notes in Computer Science (pp. 323–334).

By: R. Sawyer n, J. Rowe n & J. Lester n

author keywords: Tutorial planning; Multi-objective reinforcement learning; Game-based learning environments; Narrative centered learning
TL;DR: A model-based, linear-scalarized multi-policy algorithm, Convex Hull Value Iteration, is investigated to induce a tutorial planner from a corpus of student interactions with a game-based learning environment for middle school science education, and results indicate that multi-objective reinforcement learning creates policies that are more effective at balancing multiple reward sources than single- objective techniques. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Source: Crossref
Added: February 24, 2020

2017 chapter

Affect Dynamics in Military Trainees Using vMedic: From Engaged Concentration to Boredom to Confusion

In Lecture Notes in Computer Science (pp. 238–249).

By: J. Ocumpaugh*, J. Andres*, R. Baker*, J. DeFalco*, L. Paquette*, J. Rowe n, B. Mott n, J. Lester n ...

TL;DR: An analysis of affect dynamics among learners using vMedic, which teaches combat medicine protocols as part of the military training at West Point, the United States Military Academy, is presented. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Computer-Aided Human Centric Cyber Situation Awareness

In Theory and Models for Cyber Situation Awareness (pp. 3–25).

By: M. Albanese*, N. Cooke*, G. Coty*, D. Hall*, C. Healey n, S. Jajodia*, P. Liu*, M. McNeese* ...

TL;DR: This chapter provides an overview of Cyber Situational Awareness, an emerging research area in the broad field of cyber security, and discusses, at least at a high level, how to gain Cyber Situation Awareness. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2017 chapter

Cost Analysis Comparing HPC Public Versus Private Cloud Computing

In Communications in Computer and Information Science (pp. 294–316).

By: P. Dreher*, D. Nair, E. Sills & M. Vouk*

author keywords: High performance cloud computing; Economic analysis; Public cloud; Private cloud
TL;DR: This paper investigates whether this economic analysis for moving general purpose applications to the public cloud can be extended to more computationally intensive HPC type computations. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.