Computer Science

College of Engineering

Works Published in 2010

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 101 - 120 of 177 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 conference paper

Multidisciplinary views of business contracts

Service-oriented computing, 6470, 730–730.

By: M. Singh & N. Desai

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Incorporating expectations as a basis for business service selection

Service-oriented computing, 6470, 486–500.

By: A. ElMessiry, X. Gao & M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

From quality to utility: Adaptive service selection framework

Service-oriented computing, 6470, 456–470.

By: C. Hang & M. Singh

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Detecting and Tracking Community Dynamics in Evolutionary Networks

The 10th IEEE International Conference on Data Mining Workshops, 318–327.

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Simplified self-adapting skip lists

Intelligent data engineering and automated learning - ideal 2010, 6283, 126–136.

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

SIP overload control: A backpressure-based approach

Computer Communication Review, 40(4), 399–400.

By: Y. Wang

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

QoS Control for NGN: A Survey of Techniques

JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 18(4), 447–461.

author keywords: IMS; NGN; QoS control; RACF; RACS; Service
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

Mobile data offloading: How much can WiFi deliver?

Computer Communication Review, 40(4), 425–426.

By: K. Lee, I. Rhee, J. Lee, Y. Yi & S. Chong

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Efficiently Certifying Non-Integer Powers

COMPUTATIONAL COMPLEXITY, 19(3), 355–366.

author keywords: Integer roots; integer powers; linear-time algorithm; bit complexity; Chebotarev density theorem
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

Contrabass: Concurrent transmissions without coordination

Computer Communication Review, 40(4), 403–404.

By: S. Yoon

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Global optimization by adapted diffusion

IEEE Transactions on Signal Processing, 58(12), 6119–6125.

By: O. Poliannikov*, E. Zhizhina* & H. Krim

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Feedback-directed page placement for ccNUMA via hardware-generated memory traces

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 70(12), 1204–1219.

By: J. Marathe, V. Thakkar n & F. Mueller

author keywords: Hardware performance monitoring; NUMA; Trace guided optimization; Page placement
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Clustering Methods for Hierarchical Traffic Grooming in Large-Scale Mesh WDM Networks

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2(8), 502–514.

By: B. Chen*, G. Rouskas & R. Dutta

author keywords: Optical networking; Traffic grooming; Network design; Resource provisioning; Hierarchical grooming; Routing; Control plane algorithms; Large networks
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 conference paper

hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

2010 IEEE symposium on security and privacy, 380–395.

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Tightening the Bounds on Feasible Preemptions

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).

By: H. Ramaprasad* & F. Mueller

author keywords: Algorithms; Experimentation; Real-time systems; preemptions; worst-case execution time; timing analysis; data caches; cache-related preemption delay
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Parametric Timing Analysis and Its Application to Dynamic Voltage Scaling

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).

By: S. Mohan n, F. Mueller, M. Root*, W. Hawkins*, C. Healy*, D. Whalley*, E. Vivancos*

author keywords: Algorithms; Experimentation; Real-time systems; worst-case execution time; timing analysis; dynamic voltage scaling
Source: Web Of Science
Added: August 6, 2018

2010 article

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.

By: Y. Liu, P. Ning & H. Dai

author keywords: cognitive radio networks; primary user detection; link signatures
Source: Web Of Science
Added: August 6, 2018

2010 article

Adaptive System Anomaly Prediction for Large-Scale Hosting Infrastructures

PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 173–182.

By: Y. Tan, X. Gu & H. Wang*

author keywords: Anomaly Prediction; Context-aware Prediction Model
Source: Web Of Science
Added: August 6, 2018

2010 journal article

A new framework for GLIF Interdomain Resource Reservation Architecture (GIRRA)

ANNALS OF TELECOMMUNICATIONS, 65(11-12), 723–737.

author keywords: Inter-domain networking; Security; Path computation; GLIF; Middleware
Source: Web Of Science
Added: August 6, 2018

2010 conference paper

A fault-tolerance architecture for kepler-based distributed scientific workflows

Scientific and statistical database management, 6187, 452–460.

By: P. Mouallem, D. Crawl, I. Altintas, M. Vouk & U. Yildiz

Source: NC State University Libraries
Added: August 6, 2018