Works Published in 2009

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 101 - 120 of 189 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 book

Computer simulation techniques: the definitive introduction!

Raleigh, NC: Harry Perros.

By: H. Perros

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach

Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, 225–230.

By: T. Breaux

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts

PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.

By: J. Maxwell n & A. Anton n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2009 article

Towards Realistic Physical Topology Models for Internet Backbone Networks

2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Optical backbone networks; physical topology; problem formulation; optimization; topology model
Source: Web Of Science
Added: August 6, 2018

2009 article

SecureMR: A Service Integrity Assurance Framework for Map Reduce

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.

By: W. Wei n, J. Du n, T. Yu n & X. Gu n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Identification of bot commands by run-time execution monitoring

25th Annual Computer Security Applications Conference, 321–330.

By: Y. Park n & D. Reeves n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2009 article

HIMA: A Hypervisor-Based Integrity Measurement Agent

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+.

By: A. Azab n, P. Ning n, E. Sezer n & X. Zhang *

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

2009 article

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.

By: A. Yavuz n & P. Ning n

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Applied cryptography; secure audit logging; digital forensics; forward security; signature aggregation
Source: Web Of Science
Added: August 6, 2018

2009 article

Reggae: Automated Test Generation for Programs using Complex Regular Expressions

2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 515–519.

By: N. Li n, T. Xie n, N. Tillmann*, J. Halleux* & W. Schulte*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: test generation; dynamic symbolic execution; string generation
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Mining health models for performance monitoring of services

2009 ieee/acm international conference on automated software engineering, proceedings, 409–420.

By: M. Acharya & V. Kommineni

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Architecture for affective social games

Agents for games and simulations: trends in techniques, concepts and design, 5920, 79–94.

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Alattin: Mining Alternative Patterns for Detecting Neglected Conditions

2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 283–294.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: code search; frequent itemset mining; alternative patterns
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Fast matching for all pairs similarity search

2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 1, 295–300.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

BioDEAL: community generation of biological annotations

BMC Medical Informatics and Decision Making, 9.

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Secure open source collaboration: An empirical study of linus' law

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Business modeling via commitments

Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125.

By: P. Telang & M. Singh 

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments

Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114.

By: J. Thomas & R. Young

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence

2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.

By: C. Kil n, E. Sezer n, A. Azab n, P. Ning n & X. Zhang *

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
author keywords: Remote attestation; dynamic attestation; runtime integrity; system security; trusted computing
Source: Web Of Science
Added: August 6, 2018

2009 article

Fitness-Guided Path Exploration in Dynamic Symbolic Execution

2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 359-+.

By: T. Xie n, N. Tillmann*, J. Halleux* & W. Schulte*

co-author countries: United States of America πŸ‡ΊπŸ‡Έ
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of ScienceΒ© and InCitesΒ© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.