Works Published in 2010

search works

Displaying works 121 - 140 of 187 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 journal article

Global optimization by adapted diffusion

IEEE Transactions on Signal Processing, 58(12), 6119–6125.

By: O. Poliannikov*, E. Zhizhina & H. Krim n

TL;DR: The main result is that adapting the diffusion coefficient to the Hamiltonian allows to escape local wide minima and to speed up the convergence of the dynamics to the global minima. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Feedback-directed page placement for ccNUMA via hardware-generated memory traces

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 70(12), 1204–1219.

By: J. Marathe n, V. Thakkar n & F. Mueller n

author keywords: Hardware performance monitoring; NUMA; Trace guided optimization; Page placement
TL;DR: Experiments show that this method, although based on lossy tracing, can efficiently and effectively improve page placement, leading to an average wall-clock execution time saving of over 20% for the tested benchmarks. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Clustering Methods for Hierarchical Traffic Grooming in Large-Scale Mesh WDM Networks

JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2(8), 502–514.

By: B. Chen, G. Rouskas* & R. Dutta*

Contributors: B. Chen, R. Dutta* & G. Rouskas*

author keywords: Optical networking; Traffic grooming; Network design; Resource provisioning; Hierarchical grooming; Routing; Control plane algorithms; Large networks
TL;DR: The grooming-specific factors affecting the selection of clusters are identified, a parameterized clustering algorithm is developed that can achieve a desired trade-off among various goals, and the effectiveness of clustering and hierarchical grooming is demonstrated. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 conference paper

hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity

2010 IEEE symposium on security and privacy, 380–395.

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Tightening the Bounds on Feasible Preemptions

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).

author keywords: Algorithms; Experimentation; Real-time systems; preemptions; worst-case execution time; timing analysis; data caches; cache-related preemption delay
TL;DR: A method to calculate tight upper bounds on the maximum number of possible preemptions for each job of a task and, considering the worst-case placement of these preemption points, derive a much tighter bound on its WCET, showing significant improvements in the bounds derived. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Parametric Timing Analysis and Its Application to Dynamic Voltage Scaling

ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 10(2).

By: S. Mohan n, F. Mueller n, M. Root*, W. Hawkins*, C. Healy*, D. Whalley*, E. Vivancos*

author keywords: Algorithms; Experimentation; Real-time systems; worst-case execution time; timing analysis; dynamic voltage scaling
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2010 article

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, pp. 286–301.

By: Y. Liu n, P. Ning n & H. Dai n

author keywords: cognitive radio networks; primary user detection; link signatures
TL;DR: A novel physical layer authentication technique that enables the helper node to authenticate signals from its associated primary user, and thus does not require any training process is developed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 article

Adaptive System Anomaly Prediction for Large-Scale Hosting Infrastructures

PODC 2010: PROCEEDINGS OF THE 2010 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, pp. 173–182.

By: Y. Tan n, X. Gu n & H. Wang*

author keywords: Anomaly Prediction; Context-aware Prediction Model
TL;DR: This paper proposes a novel context-aware anomaly prediction scheme, called ALERT, to improve prediction accuracy in dynamic hosting infrastructures and shows that ALERT can achieve high prediction accuracy for a range of system anomalies and impose low overhead to the hosting infrastructure. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

A new framework for GLIF Interdomain Resource Reservation Architecture (GIRRA)

ANNALS OF TELECOMMUNICATIONS, 65(11-12), 723–737.

By: G. Karmous-Edwards*, S. Polito*, A. Jukan* & G. Rouskas n

Contributors: A. Jukan*, G. Karmous-Edwards*, S. Polito* & G. Rouskas n

author keywords: Inter-domain networking; Security; Path computation; GLIF; Middleware
TL;DR: A new architectural framework called Global Lambda Integrated Facility (GLIF) Interdomain Resource Reservation Architecture (GIRRA), which focuses on the inter-dependence between different challenges of inter-domain path provision, and it is built around already existing solutions for intra-domain resource provisioning. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 conference paper

A fault-tolerance architecture for kepler-based distributed scientific workflows

Scientific and statistical database management, 6187, 452–460.

By: P. Mouallem, D. Crawl, I. Altintas, M. Vouk & U. Yildiz

Source: NC State University Libraries
Added: August 6, 2018

2010 article

Toward a Visualization of DNA Sequences

ADVANCES IN COMPUTATIONAL BIOLOGY, Vol. 680, pp. 419–435.

By: D. Cox n & A. Tharp*

author keywords: DNA; Visualization; Repeats; Patterns; Sequence Analysis
MeSH headings : Algorithms; Computational Biology; Computer Graphics; DNA / chemistry; DNA / genetics; Entropy; Genomics / statistics & numerical data; Humans; Pattern Recognition, Automated / statistics & numerical data; Pattern Recognition, Visual; Sequence Analysis, DNA / statistics & numerical data; Tandem Repeat Sequences
TL;DR: This paper exploits one of these cues, proximity, to segment DNA into visibly distinct regions and structures and demonstrates how an additional cue, color, can be used to visualize the Shannon entropy associated with different structures. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Tanh cascode cell amplifier - an arbitrary transfer characteristics amplifier

Electronics Letters, 46(22), 1495–1496.

Source: NC State University Libraries
Added: August 6, 2018

2010 article

TanGeoMS: Tangible Geospatial Modeling System

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, Vol. 16, pp. 1605–1612.

By: L. Tateosian n, H. Mitasova n, B. Harmon*, B. Fogleman n, K. Weaver n & R. Harmon*

author keywords: Visualization system; geographic/geospatial visualization; terrain visualization; tangible user interface; collaborative visualization; human-computer interaction
TL;DR: TanGeoMS, a tangible geospatial modeling visualization system that couples a laser scanner, projector, and a flexible physical three-dimensional model with a standard Geospatial information system (GIS) to create a tangible user interface for terrain data, is presented. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 article

Special Issue: Selected Papers from the Third International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2009)

Mukherjee, B., Subramaniam, S., Sivalingam, K., Dutta, R., Datta, D., & Mohan, S. (2010, December). OPTICAL SWITCHING AND NETWORKING, Vol. 7, pp. 139–140.

TL;DR: The motive assembly including a plurality of selectively controllable ultrasonic cyclic motors for moving the warp yarns between upper and lower shed positions, each of which is drivingly connected to one or a group of said Warp yarns. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 journal article

Perturbation-based user-input-validation testing of web applications

JOURNAL OF SYSTEMS AND SOFTWARE, 83(11), 2263–2274.

By: N. Li n, T. Xie n, M. Jin* & C. Liu*

author keywords: Software testing; Web-application testing; User-input-validation testing
TL;DR: The empirical result shows that the proposed approach to generate test inputs for UIV based on the analysis of client-side information is more effective than existing vulnerability scanners in finding semantics-related vulnerabilities of UIV for web applications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2010 article

GeneaQuilts: A System for Exploring Large Genealogies

IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, Vol. 16, pp. 1073–1081.

author keywords: Genealogy visualization; interaction
TL;DR: An interactive genealogy exploration system based on GeneaQuilts, which includes an overview, a timeline, search and filtering components, and a new interaction technique called Bring & Slide that allows fluid navigation in very large genealogies. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2010 journal article

Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems

ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 5(4).

By: Y. Wang* & M. Singh n

Contributors: Y. Wang* & M. Singh n

author keywords: Theory; Algorithms; Application-level trust; evidence-based trust
TL;DR: A mathematically well-formulated approach is developed that naturally supports discounting and combining evidence-based trust reports, enabling robust combination of trust reports from imperfectly trusted sources and establishes a bijection between evidence and trust spaces. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2010 conference paper

Differential capacity p-Cycles: A p-Cycle variant with increased capacity efficiency

Optical Switching and Networking, 7(4), 185–195.

By: P. Jaikumar & R. Dutta

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

DKSM: Subverting virtual machine introspection for fun and profit

2010 29th ieee international symposium on reliable distributed systems srds 2010, 82–91.

By: S. Bahram, X. Jiang, Z. Wang, M. Grace, J. Li, D. Srinivasan, J. Rhee, D. Xu

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

An Architectural Approach to Preventing Code Injection Attacks

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(4), 351–365.

author keywords: Code injection; secure memory architecture
TL;DR: A change to the memory architecture of modern processors is proposed that addresses the code injection problem at its very root by virtually splitting memory into code memory and data memory such that a processor will never be able to fetch injected code for execution. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.