College of Engineering
Displaying works 101 - 120 of 182 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 article
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.
2009 article
Reggae: Automated Test Generation for Programs using Complex Regular Expressions
2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 515–519.
2009 conference paper
Mining health models for performance monitoring of services
2009 ieee/acm international conference on automated software engineering, proceedings, 409–420.
2009 conference paper
Architecture for affective social games
Agents for games and simulations: trends in techniques, concepts and design, 5920, 79–94.
2009 article
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 283–294.
2009 conference paper
Fast matching for all pairs similarity search
2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 1, 295–300.
2009 conference paper
BioDEAL: community generation of biological annotations
BMC Medical Informatics and Decision Making, 9.
2009 conference paper
Secure open source collaboration: An empirical study of linus' law
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.
2009 conference paper
False data injection attacks against state estimation in electric power grids
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.
2009 conference paper
Business modeling via commitments
Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125.
2009 conference paper
Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments
Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114.
2009 article
Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.
2009 article
Fitness-Guided Path Exploration in Dynamic Symbolic Execution
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 359-+.
2009 journal article
Should software testers use mutation analysis to augment a test set?
JOURNAL OF SYSTEMS AND SOFTWARE, 82(11), 1819–1832.
2009 journal article
Incommensurate spin correlation driven by frustration in BiCu2PO6
PHYSICAL REVIEW B, 80(18).
2009 journal article
Improving Data Availability for Better Access Performance: A Study on Caching Scientific Data on Distributed Desktop Workstations
JOURNAL OF GRID COMPUTING, 7(4), 419–438.
2009 article
A Tunable Holistic Resiliency Approach for High-Performance Computing Systems
Scott, S. L., Engelmann, C., Vallee, G. R., Naughton, T., Tikotekar, A., Ostrouchov, G., … Varma, J. (2009, April). ACM SIGPLAN NOTICES, Vol. 44, pp. 305–306.
2009 article
Special issue: Selected papers from The Second International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2008)
Mukherjee, B., Subramaniam, S., Jukan, A., Sivalingam, K., & Dutta, R. (2009, December). OPTICAL SWITCHING AND NETWORKING, Vol. 6, pp. 225–226.
2009 conference paper
SigLM: signature-driven load management for cloud computing infrastructures
Iwqos: 2009 ieee 17th international workshop on quality of service, 226–234.
2009 journal article
ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1).