Works Published in 2009

search works

Displaying works 101 - 120 of 189 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 book

Computer simulation techniques: the definitive introduction!

Raleigh, NC: Harry Perros.

By: H. Perros

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Exercising due diligence in legal requirements acquisition: A tool-supported, frame-based approach

Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, 225–230.

By: T. Breaux

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Developing Production Rule Models to Aid in Acquiring Requirements from Legal Texts

PROCEEDINGS OF THE 2009 17TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE, pp. 101–110.

By: J. Maxwell n & A. Anton n

TL;DR: This paper introduces the Production Rule Modeling methodology, and demonstrates this methodology using examples from a production rule model for four sections of the U.S. Heath Insurance Portability and Accountability Act (HIPAA). (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Towards Realistic Physical Topology Models for Internet Backbone Networks

2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42.

author keywords: Optical backbone networks; physical topology; problem formulation; optimization; topology model
TL;DR: The driving forces for service providers to layout fiber links are explored, a polynomial time heuristic algorithm, HINT, is presented, and a new problem formulation is proposed that can accurately emulate the existing optical backbone networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 article

SecureMR: A Service Integrity Assurance Framework for Map Reduce

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.

By: W. Wei n, J. Du n, T. Yu n & X. Gu n

TL;DR: The proposed SecureMR consists of five security components, which provide a set of practical security mechanisms that not only ensure MapReduce service integrity as well as to prevent replay and Denial of Service (DoS) attacks, but also preserve the simplicity, applicability and scalability of Map Reduce. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Identification of bot commands by run-time execution monitoring

25th Annual Computer Security Applications Conference, 321–330.

By: Y. Park n & D. Reeves n

TL;DR: It is found that bots have distinct behavior patterns when they perform pre-programmed bot commands, and commands aiming to achieve the same result have very similar API call behavior in bot variants, even when they are from different bot families. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2009 article

HIMA: A Hypervisor-Based Integrity Measurement Agent

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 461-+.

By: A. Azab n, P. Ning n, E. Sezer n & X. Zhang*

TL;DR: HIMA is presented, a hypervisor-based agent that measures the integrity of Virtual Machines (VMs) running on top of the hypervisor, which provides both capabilities identified above. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems

25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 219–228.

By: A. Yavuz n & P. Ning n

author keywords: Applied cryptography; secure audit logging; digital forensics; forward security; signature aggregation
TL;DR: Blind-Aggregate-Forward logging scheme is proposed, which can produce publicly verifiable forward secure and aggregate signatures with near-zero computational, storage, and communication costs for the loggers, without requiring any online Trusted Third Party (TTP) support. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Reggae: Automated Test Generation for Programs using Complex Regular Expressions

2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 515–519.

By: N. Li n, T. Xie n, N. Tillmann*, J. Halleux* & W. Schulte*

author keywords: test generation; dynamic symbolic execution; string generation
TL;DR: An approach is proposed, named Reggae, to reduce the exploration space of DSE in test generation for programs using complex regular expressions due to large exploration space, which helps a test-generation tool generate test inputs to achieve 79% branch coverage of validators. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Mining health models for performance monitoring of services

2009 ieee/acm international conference on automated software engineering, proceedings, 409–420.

By: M. Acharya & V. Kommineni

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Architecture for affective social games

Agents for games and simulations: trends in techniques, concepts and design, 5920, 79–94.

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Alattin: Mining Alternative Patterns for Detecting Neglected Conditions

2009 IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING, PROCEEDINGS, pp. 283–294.

author keywords: code search; frequent itemset mining; alternative patterns
TL;DR: This work develops a novel approach, called Alattin, that includes a new mining algorithm and a technique for detecting neglected conditions based on the authors' mining algorithm, which helps reduce nearly 28% of false positives among detected violations. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Fast matching for all pairs similarity search

2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), vol 1, 295–300.

TL;DR: This work proposes fast matching technique that uses the sparse nature of real-world data to effectively reduce the size of the search space through a systematic set of tighter filtering conditions and heuristic optimizations. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

BioDEAL: community generation of biological annotations

BMC Medical Informatics and Decision Making, 9.

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Secure open source collaboration: An empirical study of linus' law

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 453–462.

TL;DR: This study examines the security of an open source project in the context of developer collaboration by analyzing version control logs and quantifying notions of Linus' Law as well as the "too many cooks in the kitchen" viewpoint into developer activity metrics. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

False data injection attacks against state estimation in electric power grids

CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, 21–32.

TL;DR: A new class of attacks, called false data injection attacks, against state estimation in electric power grids are presented, showing that an attacker can exploit the configuration of a power system to launch such attacks to successfully introduce arbitrary errors into certain state variables while bypassing existing techniques for bad measurement detection. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Business modeling via commitments

Service-oriented computing: agents, semantics, and engineering, proceedings, 5907, 111–125.

By: P. Telang & M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

Using task-based modeling to generate scaffolding in narrative-guided exploratory learning environments

Artificial intelligence in education - building learnning systems that care: from knowledge representation to affective modelling , 200, 107–114.

By: J. Thomas & R. Young

Source: NC State University Libraries
Added: August 6, 2018

2009 article

Remote Attestation to Dynamic System Properties: Towards Providing Complete System Integrity Evidence

2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 115-+.

By: C. Kil n, E. Sezer n, A. Azab n, P. Ning n & X. Zhang*

author keywords: Remote attestation; dynamic attestation; runtime integrity; system security; trusted computing
TL;DR: A novel remote dynamic attestation system named ReDAS (Remote Dynamic Attestation System) that provides integrity evidence for dynamic system properties that represent the runtime behavior of the attested system and enable an attester to prove its runtime integrity to a remote party. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Fitness-Guided Path Exploration in Dynamic Symbolic Execution

2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), pp. 359-+.

By: T. Xie n, N. Tillmann*, J. Halleux* & W. Schulte*

TL;DR: This work proposes a novel approach called Fitnex, a search strategy that uses state-dependent fitness values (computed through a fitness function) to guide path exploration, and shows that this approach consistently achieves high code coverage faster than existing search strategies. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.