College of Engineering
Displaying works 121 - 140 of 145 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2006 journal article
Pattern avoidance in compositions and multiset permutations
ADVANCES IN APPLIED MATHEMATICS, 36(2), 194–201.
2006 journal article
Nonstationary analysis of circuit-switched communication networks
PERFORMANCE EVALUATION, 63(9-10), 892–909.
2006 article
Memory-efficient Kronecker algorithms with applications to the modelling of parallel systems
Benoit, A., Plateau, B., & Stewart, W. J. (2006, August). FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, Vol. 22, pp. 838–847.
2006 article
LAD: Localization anomaly detection for wireless sensor networks
Du, W., Fang, L., & Peng, N. (2006, July). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 66, pp. 874–886.
2006 journal article
Integrating XML data sources using approximate joins
ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161–207.
2006 journal article
Improved system integration for integrated gasification combined cycle (IGCC) systems
ENVIRONMENTAL SCIENCE & TECHNOLOGY, 40(5), 1693–1699.
2006 journal article
IDGraphs: Intrusion detection and analysis using stream compositing
IEEE COMPUTER GRAPHICS AND APPLICATIONS, 26(2), 28–39.
2006 article
Extralabel use of penicillin in food animals
Payne, M. A., Craigmill, A., Riviere, J. E., & Webb, A. I. (2006, November 1). JAVMA-JOURNAL OF THE AMERICAN VETERINARY MEDICAL ASSOCIATION, Vol. 229, pp. 1401–1403.
2006 book
Extending mechanics to minds: The mechanical foundations of psychology and economics
In Extending Mechanics to Minds: The Mechanical Foundations of Psychology and Economics (Vol. 9780521861977, pp. 1–453).
2006 journal article
Essential communication practices for Extreme Programming in a global software development team
INFORMATION AND SOFTWARE TECHNOLOGY, 48(9), 781–794.
2006 journal article
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
IEEE Transactions on Mobile Computing, 5(10), 1417–1431.
2006 journal article
Security vulnerabilities: From analysis to detection and masking techniques
Proceedings of the IEEE, 94(2), 407–418.
2006 journal article
Secure and resilient clock synchronization in wireless sensor networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 24(2), 395–408.
2006 journal article
Classification of Escherichia coli K-12 ribosome binding sites
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 25(1), 90–97.
2006 journal article
Traffic grooming in WDM ring networks to minimize the maximum electronic port cost.
Optical Switching and Networking, 2(1), 1–18.
2006 journal article
A performance study of an optical burst switched network with dynamic simultaneous link possession
Computer Networks, 50(2), 219–236.
2006 journal article
Providing user models direct access to interfaces: An exploratory study of a simple interface with implications for HRI and HCI
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 36(3), 592–601.
2006 journal article
A* search: An efficient and flexible approach to materialized view selection
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 36(3), 411–425.
2006 chapter
Finding equivalent rewritings in the presence of arithmetic comparisons
In Advances in database technology : EDBT 2006 : 10th International Conference on Extending Database Technology, Munich, Germany, March 26-31, 2006: Proceedings (Lecture notes in computer science; 3896) (Vol. 3896, pp. 942–960).
2006 journal article
A formal methods approach to medical device review
COMPUTER, 39(4), 61-+.