Works Published in 2012

search works

Displaying works 141 - 160 of 202 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2012 journal article

An Analytical Model for the Node Degree in Wireless Ad Hoc Networks

WIRELESS PERSONAL COMMUNICATIONS, 66(2), 291–306.

author keywords: Ad hoc networks; Shadow fading; Link probability; Maximum node degree; Node degree distribution
TL;DR: A novel mathematical model is introduced to derive analytical expressions in the presence of radio channel fading that reveals that the node degree distribution follows a binomial distribution regardless of the initial distribution of nodes’ location. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Validating Software Metrics: A Spectrum of Philosophies

ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 21(4).

author keywords: Measurement; Theory; Software metrics; validation criterion; systematic literature review
TL;DR: The objective of this article is to guide researchers in making sound contributions to the field of software engineering metrics by providing a practical summary of the metrics validation criteria found in the academic literature. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

ScalaTrace: Tracing, analysis and modeling of HPC codes at scale

Applied parallel and scientific computing, pt ii, 7134, 410–418.

By: F. Mueller, X. Wu, M. Schulz, B. Supinski & T. Gamblin

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Probing the QCD critical point with relativistic heavy-ion collisions

Central European Journal of Physics, 10(6), 1278–1281.

By: S. Bass*, H. Petersen*, C. Quammen*, H. Canary*, C. Healey n & R. Taylor*

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

On the path to sustainable, scalable, and energy-efficient data analytics: Challenges, promises, and future directions

2012 International Green Computing Conference (IGCC).

TL;DR: This paper proposes a number of future directions that could be pursued on the path to sustainable data analytics at scale, including transformative approaches to efficient data reduction, analytics-driven query processing, scalable analytical kernels, approximate analytics, among others. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

On the Relationship of Steady States of Continuous and Discrete Models Arising from Biology

BULLETIN OF MATHEMATICAL BIOLOGY, 74(12), 2779–2792.

By: A. Veliz-Cuba*, J. Arthur n, L. Hochstetler*, V. Klomps* & E. Korpi*

author keywords: Steady state; Fixed point; Discrete model; Continuous model
MeSH headings : Mathematical Concepts; Models, Biological; Nonlinear Dynamics
TL;DR: It is shown that under some conditions there is a bijection between the steady states of continuous and discrete models arising from biological systems. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2012 article

ISOBAR Preconditioner for Effective and High-throughput Lossless Data Compression

2012 IEEE 28TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), pp. 138–149.

By: E. Schendel n, Y. Jin n, N. Shah n, J. Chen*, C. Chang*, S. Ku*, S. Ethier*, S. Klasky* ...

TL;DR: The In-Situ Orthogonal Byte Aggregate Reduction Compression (ISOBAR-compression) methodology is introduced as a preconditioner of loss less compression to identify and optimize the compression efficiency and throughput of hard-to-compress datasets. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

AntiLiar: Defending against cheating attacks in mesh based streaming

2012 IEEE 12th international conference on peer-to-peer computing (p2p), 115–125.

By: J. So n & D. Reeves n

TL;DR: Experimental results demonstrate that AntiLiar minimizes required costs, and improves service quality over alternatives in the face of cheating attacks. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 article

ScalaBenchGen: Auto-Generation of Communication Benchmarks Traces

2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 1250–1260.

TL;DR: Sc Scala Trace is utilized, a loss less and scalable framework to trace communication operations and execution time while abstracting away the computations of an MPI application, and generated source code of benchmarks preserves both the communication patterns and the wall clock-time behavior of the original application. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

STOCHASTIC DATA CLUSTERING

SIAM JOURNAL ON MATRIX ANALYSIS AND APPLICATIONS, 33(4), 1214–1236.

By: C. Meyer* & C. Wessell

author keywords: cluster analysis; Markov chains; Simon-Ando theory
TL;DR: A technique for using the evolution of the system to tell us about its initial structure is developed, and this technique is used to develop an algorithm that takes the varied solutions from multiple data clustering algorithms to arrive at a singleData clustering solution. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 article

PREPARE: Predictive Performance Anomaly Prevention for Virtualized Cloud Systems

2012 IEEE 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 285–294.

By: Y. Tan n, H. Nguyen n, Z. Shen n, X. Gu n, C. Venkatramani* & D. Rajan*

author keywords: performance anomaly prevention; online anomaly prediction; cloud computing
TL;DR: PREPARE integrates online anomaly prediction, learning-based cause inference, and predictive prevention actuation to minimize the performance anomaly penalty without human intervention. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (Web of Science; OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

NSDMiner: Automated discovery of network service dependencies

2012 Proceedings IEEE infocom, 2507–2515.

By: A. Natarajan n, P. Ning n, Y. Liu n, S. Jajodia* & S. Hutchinson*

TL;DR: This paper proposes a suite of novel techniques and develops a new tool named NSDMiner (which stands for Mining for Network Service Dependencies) to automatically discover the dependencies between network services from passively collected network traffic, which outperforms the two best existing solutions significantly. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 article

Multi-level Layout Optimization for Efficient Spatio-temporal Queries on ISABELA-compressed Data

2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS), pp. 873–884.

TL;DR: This work presents a parallel query-processing engine that can handle both range queries and queries with spatio-temporal constraints, on B-spline compressed data with user-controlled accuracy, and shows it to be efficient with respect to storage, computation, and I/O compared to existing database technologies optimized for query processing on scientific data. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Mining Business Contracts for Service Exceptions

IEEE TRANSACTIONS ON SERVICES COMPUTING, 5(3), 333–344.

By: X. Gao n, M. Singh n & P. Mehra

Contributors: X. Gao n, M. Singh n & P. Mehra

author keywords: Contract analysis; service exceptions; text mining
TL;DR: This work describes a simple but effective unsupervised information extraction approach and tool, Contract Miner, for discovering service exceptions at the phrase level from a large contract repository, and produces promising results in terms of precision and recall when evaluated over a corpus of manually annotated contracts. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: August 6, 2018

2012 article

Low ContentionMapping of Real-Time Tasks onto a TilePro 64 Core Processor

2012 IEEE 18TH REAL-TIME AND EMBEDDED TECHNOLOGY AND APPLICATIONS SYMPOSIUM (RTAS), pp. 131–140.

By: C. Zimmer n & F. Mueller n

TL;DR: This is the first work to consider IPC for worst-case time frames to simplify analysis and to measure the impact on actual hardware for NoC-based real-time multi core systems. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2012 conference paper

Leveraging multiple mechanisms for information propagation

Advanced agent technology, 7068, 1–2.

By: A. Wicker & J. Doyle

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Jump-start cloud: Efficient deployment framework for large-scale cloud applications

Concurrency and Computation-Practice & Experience, 24(17), 2120–2137.

By: X. Wu, Z. Shen, R. Wu & Y. Lin

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

IntroLib: Efficient and transparent library call introspection for malware forensics

DIGITAL INVESTIGATION, 9, S13–S23.

By: Z. Deng*, D. Xu*, X. Zhang* & X. Jiang n

author keywords: Malware forensics; Library call introspection; Virtualization; Dynamic analysis; Performance
TL;DR: IntroLib is a practical tool that traces user-level library calls made by malware with low overhead and high transparency, based on hardware virtualization and resides outside of the guest virtual machine where the malware runs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Human Activity as a Manifold-Valued Random Process

IEEE TRANSACTIONS ON IMAGE PROCESSING, 21(8), 3416–3428.

author keywords: Activity recognition; parallel transport; shape manifold; stationary incremental process; stochastic development
MeSH headings : Actigraphy / methods; Algorithms; Artificial Intelligence; Computer Simulation; Data Interpretation, Statistical; Humans; Image Interpretation, Computer-Assisted / methods; Models, Biological; Models, Statistical; Motor Activity / physiology; Reproducibility of Results; Sensitivity and Specificity; Whole Body Imaging / methods
TL;DR: This work effectively bridges the nonlinear modeling of human activity on a nonlinear space, with the classic stochastic modeling in a Euclidean space, and thereby provides a foundation for a more effective and accurate analysis of the non linear feature space of activity models. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2012 journal article

First step towards automatic correction of firewall policy faults

ACM Transactions on Autonomous and Adaptive Systems, 7(2).

By: F. Chen, A. Liu, J. Hwang & T. Xie

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.