College of Engineering
Displaying works 121 - 140 of 182 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 article
Shift Hashing for Memory-Constrained Applications
2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, pp. 531–536.
2009 article
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+.
2009 article
Fault Localization for Firewall Policies
2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.
2009 article
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 262–270.
2009 journal article
Commitment-Based Service-Oriented Architecture
COMPUTER, 42(11), 72–79.
2009 journal article
Sequence analysis of rice rubi3 promoter gene expression cassettes for improved transgene expression
PLANT SCIENCE, 177(6), 549–556.
2009 journal article
Reasonableness meets requirements: regulating security and privacy in software
Duke Law Journal, 59(2), 309–342.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.
2009 conference paper
RAPID: Enabling scalable ad-hoc analytics on the semantic web
Semantic web - iswc 2009, proceedings, 5823, 715–730.
2009 journal article
On Bandwidth Tiered Service
IEEE-ACM TRANSACTIONS ON NETWORKING, 17(6), 1780–1793.
2009 journal article
MicroRNAs resolve an apparent conflict between annelid systematics and their fossil record
Proceedings of the Royal Society of London. Series B, 276(1677), 4315–4322.
2009 conference paper
An empirical study of security problem reports in Linux distributions
International symposium on empirical software engineering and, 482–485.
2009 article
ScalaTrace: Scalable compression and replay of communication traces for high-performance computing
Noeth, M., Ratn, P., Mueller, F., Schulz, M., & Supinski, B. R. (2009, August). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 69, pp. 696–710.
2009 journal article
On guiding the augmentation of an automated test suite via mutation analysis
EMPIRICAL SOFTWARE ENGINEERING, 14(3), 341–369.
2009 journal article
ON q-SERIES IDENTITIES ARISING FROM LECTURE HALL PARTITIONS
INTERNATIONAL JOURNAL OF NUMBER THEORY, 5(2), 327–337.
2009 article
NCSU's Virtual Computing Lab: A Cloud Computing Solution
Schaffer, H. E., Averitt, S. F., Hoit, M. I., Peeler, A., Sills, E. D., & Vouk, M. A. (2009, July). COMPUTER, Vol. 42, pp. 94–97.
2009 article
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.
2009 journal article
On the Modeling of Honest Players in Reputation Systems
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.
2009 journal article
Minimizing transceivers in optical path networks
JOURNAL OF OPTICAL NETWORKING, 8(5), 454–461.
2009 journal article
Interactive Fault Localization Using Test Information
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 962–974.