College of Engineering
Displaying works 101 - 120 of 177 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2010 conference paper
Multidisciplinary views of business contracts
Service-oriented computing, 6470, 730–730.
2010 conference paper
Incorporating expectations as a basis for business service selection
Service-oriented computing, 6470, 486–500.
2010 conference paper
From quality to utility: Adaptive service selection framework
Service-oriented computing, 6470, 456–470.
2010 conference paper
Detecting and Tracking Community Dynamics in Evolutionary Networks
The 10th IEEE International Conference on Data Mining Workshops, 318–327.
2010 conference paper
Simplified self-adapting skip lists
Intelligent data engineering and automated learning - ideal 2010, 6283, 126–136.
2010 conference paper
SIP overload control: A backpressure-based approach
Computer Communication Review, 40(4), 399–400.
2010 journal article
QoS Control for NGN: A Survey of Techniques
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 18(4), 447–461.
2010 conference paper
Mobile data offloading: How much can WiFi deliver?
Computer Communication Review, 40(4), 425–426.
2010 journal article
Efficiently Certifying Non-Integer Powers
COMPUTATIONAL COMPLEXITY, 19(3), 355–366.
2010 conference paper
Contrabass: Concurrent transmissions without coordination
Computer Communication Review, 40(4), 403–404.
2010 journal article
Global optimization by adapted diffusion
IEEE Transactions on Signal Processing, 58(12), 6119–6125.
2010 journal article
Feedback-directed page placement for ccNUMA via hardware-generated memory traces
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 70(12), 1204–1219.
2010 journal article
Clustering Methods for Hierarchical Traffic Grooming in Large-Scale Mesh WDM Networks
JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2(8), 502–514.
2010 conference paper
hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
2010 IEEE symposium on security and privacy, 380–395.
2010 journal article
Tightening the Bounds on Feasible Preemptions
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).
2010 journal article
Parametric Timing Analysis and Its Application to Dynamic Voltage Scaling
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).
2010 article
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.
2010 article
Adaptive System Anomaly Prediction for Large-Scale Hosting Infrastructures
PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 173–182.
2010 journal article
A new framework for GLIF Interdomain Resource Reservation Architecture (GIRRA)
ANNALS OF TELECOMMUNICATIONS, 65(11-12), 723–737.
2010 conference paper
A fault-tolerance architecture for kepler-based distributed scientific workflows
Scientific and statistical database management, 6187, 452–460.