Works Published in 2009

search works

Displaying works 141 - 160 of 189 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2009 journal article

On guiding the augmentation of an automated test suite via mutation analysis

EMPIRICAL SOFTWARE ENGINEERING, 14(3), 341–369.

author keywords: Mutation testing; Line coverage; Fault injection; Empirical effectiveness; Test case augmentation; Mutation analysis; Mutation testing tool; Statement coverage; Test adequacy; Web application; Open source; Unit testing
TL;DR: An empirical study of the use of mutation analysis on two open source projects indicates that a focused effort on increasing mutation score leads to a corresponding increase in line and branch coverage to the point that line coverage, branch coverage and mutation score reach a maximum but leave some types of code structures uncovered. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

ON q-SERIES IDENTITIES ARISING FROM LECTURE HALL PARTITIONS

INTERNATIONAL JOURNAL OF NUMBER THEORY, 5(2), 327–337.

By: G. Andrews*, S. Corteel* & C. Savage n

author keywords: Lecture hall partitions; q-analog of Gauss's second theorem
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 article

NCSU's Virtual Computing Lab: A Cloud Computing Solution

Schaffer, H. E., Averitt, S. F., Hoit, M. I., Peeler, A., Sills, E. D., & Vouk, M. A. (2009, July). COMPUTER, Vol. 42, pp. 94–97.

By: H. Schaffer n, S. Averitt n, M. Hoit n, A. Peeler n, E. Sills n & M. Vouk n

TL;DR: The delivery of many diverse computing services over the Internet, with flexible provisioning, has led to much greater efficiency, substantial cost savings, and many ways to enable and empower end users. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2009 article

Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.

author keywords: Validation; Policy Verification; Access Control Policies
TL;DR: This work develops a novel framework that analyzes policies and detects cases that potentially cause multiple-duty-related security leakage in XACML, and shows that this framework effectively pinpoints potential multiple- Duty- related security leakage for policy authors to inspect. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

On the Modeling of Honest Players in Reputation Systems

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.

author keywords: reputation; trust; user behavior modeling; collusion-resilient behavior testing
TL;DR: A statistical model is built for the transaction histories of honest players that serves as a profiling tool to identify suspicious entities and is combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with the statistical model. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Minimizing transceivers in optical path networks

JOURNAL OF OPTICAL NETWORKING, 8(5), 454–461.

By: P. Iyer n, R. Dutta n & C. Savage n

TL;DR: The traffic grooming problem in unidirectional, WDM path networks is considered with the goal of minimizing the number of transceivers and it is conclusively shown that the problem is NP-hard, even under the restriction of the egress traffic model. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

Interactive Fault Localization Using Test Information

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 962–974.

author keywords: debugging; fault localization; interactive approach
TL;DR: This work proposes an interactive fault-localization framework, combining the benefits of automated approaches and manual debugging, and proposes a naive approach and a robust approach, which can help developers find faults when they make wrong estimation at some checking points. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Compressed ion temperature gradient turbulence in diverted tokamak edge

Chang, C. S., Ku, S., Diamond, P. H., Lin, Z., Parker, S., Hahm, T. S., & Samatova, N. (2009, May). PHYSICS OF PLASMAS, Vol. 16.

By: C. Chang*, S. Ku*, P. Diamond*, Z. Lin*, S. Parker*, T. Hahm*, N. Samatova n

author keywords: plasma boundary layers; plasma density; plasma instability; plasma simulation; plasma toroidal confinement; plasma transport processes; plasma turbulence; Tokamak devices
Source: Web Of Science
Added: August 6, 2018

2009 journal article

An Efficient Data Fusion and Assurance Mechanism using Temporal and Spatial Correlations for Home Automation Networks

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 55(3), 1330–1336.

By: K. Choi*, M. Kim n, K. Chae*, J. Park* & S. Joo*

author keywords: data fusion; assurance; home automation networks; wireless sensor networks
TL;DR: The simulation results show that using both types of correlations is more efficient than just using one type for data fusion in terms of the data transmission amount and accuracy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

Amoeba: A Methodology for Modeling and Evolving Cross-Organizational Business Processes

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 19(2).

By: N. Desai*, A. Chopra n & M. Singh n

Contributors: N. Desai*, A. Chopra n & M. Singh n

author keywords: Design; Business process modeling; requirements evolution; business protocols
TL;DR: Amoeba is described, a methodology for business processes that is based on business protocols that includes guidelines for specifying cross-organizational processes using business protocols, and handling the evolution of requirements via a novel application of protocol composition. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 conference paper

brain MRi T-1-map and T-1-weighted image segmentation in a variational framework

International conference on acoustics speech and signal processing, 417–420.

By: P. Chen n, R. Steen, A. Yezzi* & H. Krim n

TL;DR: A constrained version of Mumford-Shah's segmentation with an information-theoretic point of view is proposed in order to devise a systematic procedure to segment brain MRI data for two modalities of parametric T1-Map and T2-weighted images in both 2-D and 3-D settings. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

The effect of aging on low-fat, reduced-fat, and full-fat Cheddar cheese texture

JOURNAL OF DAIRY SCIENCE, 92(10), 4756–4772.

By: N. Rogers n, M. Drake n, C. Daubert n, D. McMahon*, T. Bletsch n & E. Foegeding n

author keywords: cheese; texture; rheology; low fat
MeSH headings : Cheese / analysis; Chemical Phenomena; Dietary Fats / analysis; Elasticity; Female; Food Handling / methods; Humans; Mechanical Phenomena; Middle Aged; Rheology; Sensation; Time Factors; Viscosity
TL;DR: Investigation of the effects of aging and fat content on the texture of Cheddar cheese, both mechanical and sensory aspects, over a 9-mo aging period found that low-fat cheeses were differentiated from full-fat cheese by being more springy and firm and this difference widened as the cheeses aged. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2009 journal article

QoS-Aware Shared Component Composition for Distributed Stream Processing Systems

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 20(7), 968–982.

By: T. Repantis*, X. Gu n & V. Kalogeraki*

author keywords: Distributed stream processing; component composition; shared processing; QoS; resource management
TL;DR: Experimental results show that Synergy can achieve much better resource utilization and QoS provisioning than previously proposed schemes, by judiciously sharing streams and components during application composition. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 conference paper

Online anomaly prediction for robust cluster systems

Icde: 2009 ieee 25th international conference on data engineering, vols 1-3, 1000–1011.

By: X. Gu n & H. Wang*

TL;DR: This work provides the first stream-based mining algorithm for predicting system anomalies and combines Markov models and Bayesian classification methods to predict when a system anomaly will appear in the foreseeable future and what are the possible anomaly causes. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2009 journal article

DNS Resolution with Renewal Using Piggyback

JOURNAL OF COMMUNICATIONS AND NETWORKS, 11(4), 416–427.

By: B. Jang n, D. Lee*, K. Chon* & H. Kim*

author keywords: Domain name system (DNS); piggyback; renewal; renewal using piggyback (RUP)
TL;DR: This paper proposes a DNS resolution time reduction scheme, named renewal using piggy back (RUP), which refreshes expired cached records by piggybacking them onto solicited DNS queries instead of by issuing additional DNS queries. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 journal article

A discrete-time queueing network model of a hub-based OBS architecture

TELECOMMUNICATION SYSTEMS, 41(3), 173–184.

By: X. Mountrouidou* & H. Perros n

author keywords: Optical Burst Switching; Hub; Queueing network; Burst aggregation; Decomposition algorithm
TL;DR: A novel discrete-time queueing network model of a zero loss hub-based Optical Burst Switched architecture, consisting of multiple input edge nodes and one destination edge node, which provides a tight upper bound as shown by comparing the analytical data to simulation results. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

On the existence of symmetric chain decompositions in a quotient of the Boolean lattice

Jiang, Z., & Savage, C. D. (2009, September 6). DISCRETE MATHEMATICS, Vol. 309, pp. 5278–5283.

By: Z. Jiang* & C. Savage*

author keywords: Symmetric chain decompositions; Necklaces; Quotients of the Boolean lattice
TL;DR: In this note it is described how it suffices to focus on subposets induced by necklaces with periodic block codes, substantially reducing the size of the problem. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

On parameterized complexity of the Multi-MCS problem

THEORETICAL COMPUTER SCIENCE, 410(21-23), 2024–2032.

author keywords: Algorithms; Maximum common subgraph; Parameterized complexity; Linear FPT reduction
TL;DR: The maximum common subgraph problem for multiple graphs (Multi-MCS) inspired by various biological applications such as multiple alignments of gene sequences, protein structures, metabolic pathways, or protein-protein interaction networks is introduced. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

NOVEL SIMILARITY INVARIANT FOR SPACE CURVES USING TURNING ANGLES AND ITS APPLICATION TO OBJECT RECOGNITION

2009 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1- 8, PROCEEDINGS, pp. 1277–1280.

By: D. Aouada n & H. Krim n

author keywords: Space curve; similarity invariant; turning angle; curvature; torsion
TL;DR: This paper presents a new similarity invariant signature for space curves based on the information contained in the turning angles of both the tangent and the binormal vectors at each point on the curve, and defines a Riemannian metric on the space of the invariant. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Multicast Scheduling in Cellular Data Networks

Won, H., Cai, H., Eun, D. Y., Guo, K., Netravali, A., Rhee, I., & Sabnani, K. (2009, September). IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, Vol. 8, pp. 4540–4549.

By: H. Won n, H. Cai n, D. Eun n, K. Guo, A. Netravali, I. Rhee n, K. Sabnani

author keywords: Multicast scheduling; 3G; downlink schedule; optimization; proportional fair; cellular data networks
TL;DR: It is proved that IPF and MPF achieve proportional fairness among groups and among all users in a group inside a cell respectively and that these algorithms achieve good balance between throughput and fairness among users and groups. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.