Computer Science

College of Engineering

Works Published in 2009

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 121 - 140 of 182 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 article

Shift Hashing for Memory-Constrained Applications

2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, pp. 531–536.

By: S. Deodhar n & A. Tharp n

author keywords: Hashing; Embedded Systems; Real-time Systems; Tridirectional Computed Chaining; Bit Shifting; Data Access Methods; Minimal Response Time
Source: Web Of Science
Added: August 6, 2018

2009 article

Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks

IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+.

By: A. Liu n, P. Ning n & C. Wang*

Source: Web Of Science
Added: August 6, 2018

2009 article

Fault Localization for Firewall Policies

2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.

Source: Web Of Science
Added: August 6, 2018

2009 article

DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks

IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 262–270.

Source: Web Of Science
Added: August 6, 2018

2009 journal article

Commitment-Based Service-Oriented Architecture

COMPUTER, 42(11), 72–79.

By: M. Singh n, A. Chopra* & N. Desai*

Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

Sequence analysis of rice rubi3 promoter gene expression cassettes for improved transgene expression

PLANT SCIENCE, 177(6), 549–556.

author keywords: Exon; GUS; IME; rRNA; rubi3 promoter; Translation
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Reasonableness meets requirements: regulating security and privacy in software

Duke Law Journal, 59(2), 309–342.

By: P. Otto

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

ReFormat: Automatic reverse engineering of encrypted messages

Computer security - esorics 2009, proceedings, 5789, 200–215.

By: Z. Wang, X. Jiang, W. Cui, X. Wang & M. Grace

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

RAPID: Enabling scalable ad-hoc analytics on the semantic web

Semantic web - iswc 2009, proceedings, 5823, 715–730.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2009 journal article

On Bandwidth Tiered Service

IEEE-ACM TRANSACTIONS ON NETWORKING, 17(6), 1780–1793.

By: G. Rouskas n & N. Baradwaj

author keywords: Directional p-median; dynamic programming; optimization; Tiered service
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

MicroRNAs resolve an apparent conflict between annelid systematics and their fossil record

Proceedings of the Royal Society of London. Series B, 276(1677), 4315–4322.

By: E. Sperling, J. Vinther, V. Moy, B. Wheeler, M. Semon, D. Briggs, K. Peterson

Source: NC State University Libraries
Added: August 6, 2018

2009 conference paper

An empirical study of security problem reports in Linux distributions

International symposium on empirical software engineering and, 482–485.

Source: NC State University Libraries
Added: August 6, 2018

2009 article

ScalaTrace: Scalable compression and replay of communication traces for high-performance computing

Noeth, M., Ratn, P., Mueller, F., Schulz, M., & Supinski, B. R. (2009, August). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 69, pp. 696–710.

author keywords: High-performance computing; Scalability; Communication tracing
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On guiding the augmentation of an automated test suite via mutation analysis

EMPIRICAL SOFTWARE ENGINEERING, 14(3), 341–369.

author keywords: Mutation testing; Line coverage; Fault injection; Empirical effectiveness; Test case augmentation; Mutation analysis; Mutation testing tool; Statement coverage; Test adequacy; Web application; Open source; Unit testing
Source: Web Of Science
Added: August 6, 2018

2009 journal article

ON q-SERIES IDENTITIES ARISING FROM LECTURE HALL PARTITIONS

INTERNATIONAL JOURNAL OF NUMBER THEORY, 5(2), 327–337.

By: G. Andrews*, S. Corteel* & C. Savage n

author keywords: Lecture hall partitions; q-analog of Gauss's second theorem
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 article

NCSU's Virtual Computing Lab: A Cloud Computing Solution

Schaffer, H. E., Averitt, S. F., Hoit, M. I., Peeler, A., Sills, E. D., & Vouk, M. A. (2009, July). COMPUTER, Vol. 42, pp. 94–97.

By: H. Schaffer n, S. Averitt n, M. Hoit n, A. Peeler n, E. Sills n & M. Vouk n

Source: Web Of Science
Added: August 6, 2018

2009 article

Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.

author keywords: Validation; Policy Verification; Access Control Policies
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On the Modeling of Honest Players in Reputation Systems

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.

author keywords: reputation; trust; user behavior modeling; collusion-resilient behavior testing
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Minimizing transceivers in optical path networks

JOURNAL OF OPTICAL NETWORKING, 8(5), 454–461.

By: P. Iyer n, R. Dutta n & C. Savage n

Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

Interactive Fault Localization Using Test Information

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 962–974.

author keywords: debugging; fault localization; interactive approach
Source: Web Of Science
Added: August 6, 2018