Works Published in 2008

search works

Displaying works 121 - 137 of 137 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2008 journal article

Approximate factorization of multivariate polynomials using singular value decomposition

JOURNAL OF SYMBOLIC COMPUTATION, 43(5), 359–376.

author keywords: multivariate polynomial factorization; approximate factorization; singular value decomposition; numerical algebra; Gauss-Newton optimization
TL;DR: These algorithms are based on a generalization of the differential forms introduced by W. Ruppert and S. Gao to many variables, and use singular value decomposition or structured total least squares approximation and Gauss-Newton optimization to numerically compute the approximate multivariate factors. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 article

A framework for identifying compromised nodes in wireless sensor networks

Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.

By: Q. Zhang n, T. Yu n & P. Ning n

author keywords: algorithms; security; sensor networks; intrusion detection
TL;DR: An application-independent framework for accurately identifying compromised sensor nodes is proposed and an alert reasoning algorithms to identify compromised nodes are developed that are optimal in the sense that it identifies the largest number of compromised nodes without introducing false positives. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 patent

Method of manufacturing gallium nitride based high-electron mobility devices

Washington, DC: U.S. Patent and Trademark Office.

Source: NC State University Libraries
Added: August 6, 2018

2008 patent

Gallium nitride based high-electron mobility devices

Washington, DC: U.S. Patent and Trademark Office.

Source: NC State University Libraries
Added: August 6, 2018

2008 article

Dual-resource TCP/AQM for processing-constrained networks

Shin, M., Chong, S., & Rhee, I. (2008, April). IEEE-ACM TRANSACTIONS ON NETWORKING, Vol. 16, pp. 435–449.

author keywords: CPU capacity; efficiency; fairness; proportional fairness; TCP-AQM; transmission link capacity
TL;DR: A notion of dual-resource proportional fairness is established and an AQM scheme is proposed, called Dual-Resource Queue (DRQ), that can closely approximate proportional fairness for TCP Reno sources with in-network processing requirements. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Coordinating hundreds of cooperative, autonomous vehicles in warehouses

AI Magazine, 29(1), 9–19.

By: P. Wurman, R. D'Andrea & M. Mountz

Source: NC State University Libraries
Added: August 6, 2018

2008 journal article

From pull-down data to protein interaction networks and complexes with biological relevance

BIOINFORMATICS, 24(7), 979–986.

By: B. Zhang n, B. Park n, T. Karpinets n & N. Samatova n

MeSH headings : Algorithms; Biology / methods; Computer Simulation; Databases, Protein; Gene Expression Profiling / methods; Information Storage and Retrieval / methods; Models, Biological; Peptide Mapping / methods; Protein Interaction Mapping / methods; Proteins / chemistry; Proteins / metabolism; Signal Transduction / physiology; Structure-Activity Relationship; Systems Integration
TL;DR: A multi-step but easy-to-follow framework for identifying protein complexes from MS pull-down data assesses interaction affinity between two proteins based on similarity of their co-purification patterns derived from MS data and constructs a protein interaction network by adopting a knowledge-guided threshold selection method. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Phase-type distributions in stochastic automata networks

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 186(3), 1008–1028.

By: I. Sbeity, L. Brenner, B. Plateau & W. Stewart n

author keywords: stochastic automata networks; phase-type distributions
TL;DR: It is shown how phase-type distributions may be incorporated into S ans thereby providing the wherewithal by which arbitrary distributions can be used which in turn leads to an improved ability for more accurately modeling numerous real phenomena. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Scenario support for effective requirements

INFORMATION AND SOFTWARE TECHNOLOGY, 50(3), 198–220.

By: T. Alspaugh* & A. Anton n

author keywords: requirements engineering; scenario analysis; scenario management
TL;DR: Six aspects of scenarios having inherent structure on which automated support may be based, and the results of using such support are discussed, resulting in higher-quality scenarios for better system requirements. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Modeling self-efficacy in intelligent tutoring systems: An inductive approach

USER MODELING AND USER-ADAPTED INTERACTION, 18(1-2), 81–123.

author keywords: affective user modeling; affective student modeling; self-efficacy; intelligent tutoring systems; inductive learning; human-computer interaction
TL;DR: An inductive approach to automatically constructing models of self-efficacy that can be used at runtime to inform pedagogical decisions is investigated, based on two complementary empirical studies. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Bright, low voltage europium doped gallium oxide thin film electroluminescent devices

APPLIED PHYSICS LETTERS, 92(2).

By: P. Wellenius n, A. Suresh n & J. Muth n

UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2008 journal article

peerTalk: A peer-to-peer multiparty voice-over-IP system

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 19(4), 515–528.

author keywords: peer-to-peer streaming; voice-over-IP; adaptive system; service overlay network; quality-of-service; failure resilience
TL;DR: The initial implementation of the peerTalk system demonstrates the feasibility of the approach and shows promising results: peerTalk can outperform existing approaches such as P2P overlay multicast and coupled distributed processing for providing MVolP services. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Visual perception and mixed-initiative interaction for assisted visualization design

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 14(2), 396–411.

By: C. Healey n, S. Kocherlakota*, V. Rao*, R. Mehta* & R. Amant n

author keywords: computer graphics; perception; search; user interfaces; visualization
MeSH headings : Algorithms; Artificial Intelligence; Computer Graphics; Humans; Image Processing, Computer-Assisted; User-Computer Interface; Visual Perception
Source: Web Of Science
Added: August 6, 2018

2008 article

Virtual organizations

IEEE INTERNET COMPUTING, Vol. 12, pp. 10–12.

By: M. Ripeanu*, M. Singh n & S. Vazhkudai*

Contributors: M. Ripeanu*, M. Singh n & S. Vazhkudai*

Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2008 journal article

Incorporating events into cross-organizational business processes

IEEE INTERNET COMPUTING, 12(2), 46–53.

By: P. Chakravarty & M. Singh n

Contributors: P. Chakravarty & M. Singh n

TL;DR: The authors use a business protocol that lets the applicable events and responses vary based on where the process is deployed and the infrastructure and IT applications installed therein to overcome this obstacle. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2008 journal article

Analyzing regulatory rules for privacy and security requirements

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 34(1), 5–20.

By: T. Breaux n & A. Anton n

author keywords: data security and privacy; laws and regulations; compliance; accountability; requirements engineering
TL;DR: The methodology provides statement-level coverage for an entire regulatory document to consistently identify and infer six types of data access constraints, handle complex cross references, resolve ambiguities, and assign required priorities between access rights and obligations to avoid unlawful information disclosures. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Search-based inference of dialect grammars

Soft Computing (Berlin, Germany), 12(1), 51–66.

By: M. Di Penta, P. Lombardi, K. Taneja & L. Troiano

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.