Works Published in 2015

search works

Displaying works 141 - 160 of 299 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2015 conference paper

Service definition semantics for optical services on a choice-based network

2015 International Conference on Optical Network Design and Modeling (ONDM), 98–103.

By: R. Udechukwu n & R. Dutta n

TL;DR: This paper shows how optical switching capabilities may be abstracted as services to enable the automatic composability that is required for such a system. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Securing software application chains in a cloud

2015 2nd International Conference on Information Science and Security (ICISS), 50–53.

By: D. Kim & M. Vouk

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

SDSecurity: A software defined security experimental framework

2015 IEEE International Conference on Communication Workshop, 1871–1876.

By: A. Darabseh*, M. Al-Ayyoub*, Y. Jararweh*, E. Benkhelifa*, M. Vouk n & A. Rindos*

TL;DR: This paper presents a novel experimental framework to provide a novel virtualized testbed environment for SDSec systems and builds on the Mininet simulator, where its core components, the host, switch and the controller, are customized to build the proposed experimental simulation framework for S DSec. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 248–259.

author keywords: Developer questions; human factors; security; static analysis
TL;DR: An exploratory study with novice and experienced software developers equipped with Find Security Bugs and observed their interactions with security vulnerabilities in an open-source system that they had previously contributed to found that they asked questions not only about security vulnerabilities, associated attacks, and fixes, but also questions about the software itself, the social ecosystem that built the software, and related resources and tools. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Quantifying Developers' Adoption of Security Tools

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 260–271.

By: J. Witschey n, O. Zielinska n, A. Welk n, E. Murphy-Hill n, C. Mayhorn n & T. Zimmermann*

author keywords: security; tools; adoption; developers
TL;DR: Developers who perceive security to be important are more likely to use security tools than those who do not, and developers' ability to observe their peers using security tools is the strongest predictor of security tool use. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

LACE2: Better privacy-preserving data sharing for cross project defect prediction

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 1, 801–811.

By: F. Peters*, T. Menzies n & L. Layman*

TL;DR: Previous work with LACE2 is extended which reduces the amount of data shared by using multi-party data sharing and the multi- party approach of Lace2 yields higher privacy than the prior approach without damaging predictive efficacy. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 article

Cost-Efficient and Attack-Resilient Approaches for State Estimation in Power Grids

30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II, pp. 2192–2197.

author keywords: Security attacks; Power grids; State estimation
TL;DR: This paper presents a series of attack-resilient state estimation algorithms for power grids that use the intrinsic relationship among the state variables and the sensor measurements to effectively tolerate malicious sensor readings. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Bespoke Tools: Adapted to the Concepts Developers Know

2015 10TH JOINT MEETING OF THE EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND THE ACM SIGSOFT SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE 2015) PROCEEDINGS, pp. 878–881.

author keywords: adaptive tools; IDE; concept models
TL;DR: This paper proposes the idea of automatically customizing development tools by modeling what a developer knows about software concepts and sketches three such ``bespoke'' tools and describes how development data can be used to infer what adeveloper knows about relevant concepts. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Automated attack surface approximation

2015 10th Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) Proceedings, 1063–1065.

Source: NC State University Libraries
Added: August 6, 2018

2015 article

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, Vol. 1, pp. 303–313.

Event: IEEE

TL;DR: This work introduces AppContext, an approach of static program analysis that extracts the contexts of security-sensitive behaviors to assist app analysis in differentiating between malicious and benign behaviors. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 6, 2018

2015 conference paper

2015 multimodal learning and analytics grand challenge

ICMI'15: Proceedings of the 2015 ACM International Conference on Multimodal Interaction, 525–529.

By: M. Worsley, K. Chiluiza, J. Grafsgaard & X. Ochoa

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

"With most of it being pictures now, I rarely use it": Understanding Twitter's evolving accessibility to blind users

34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, 5506–5516.

By: M. Morris, A. Zolyomi, C. Yao, S. Bahram, J. Bigham & S. Kane

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Spectrum assignment in rings with shortest-path routing: Complexity and approximation algorithms

2015 International Conference on Computing, Networking and Communications (ICNC), 642–647.

TL;DR: It is proved that, under the shortest path assumption, the SA problem can be solved in polynomial time in small rings, and constant-ratio approximation algorithms for large rings are developed. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

GPS tethering for energy conservation

2015 ieee wireless communications and networking conference (wcnc), 1320–1325.

By: Y. Qi n, C. Yu*, Y. Suh* & S. Jang*

TL;DR: GTR does not need an additional protocol and does not disrupt operations of non-GTR clients and can extend smartphones battery usage as much as 19% compared to Ass GPS (A-GPS). (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Virtual Reality in Software Engineering: Affordances, Applications, and Challenges

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 547–550.

By: A. Elliott n, B. Peiris & C. Parnin n

TL;DR: The affordances offered by VR are described, the benefits of VR and software engineering in prototypes for live coding and code review are demonstrated, and future work, open questions, and the challenges of VR are discussed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

Understanding Real World Data Corruptions in Cloud Systems

2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), pp. 116–125.

By: P. Wang n, D. Dean n & X. Gu n

TL;DR: A comprehensive study on 138 real world data corruption incidents reported in Hadoop bug repositories finds the impact of data corruption is not limited to data integrity, and existing data corruption detection schemes are quite insufficient. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 article

The Art and Science of Analyzing Software Data; Quantitative Methods

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, pp. 959–960.

By: T. Menzies n, L. Minku* & F. Peters

TL;DR: This tutorial discusses the following: when local data is scarce, how to adapt data from other organizations to local problems, and when working with data of dubious quality, the show how to prune spurious information. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Securing Scientific Workflows

2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), pp. 95–104.

author keywords: Scientific workflow; Kepler; Vulnerability; Provenance; Cloud
TL;DR: A prototype security enhanced Kepler engine is implemented to demonstrate viability of use of the Kepler provenance module in provision and management of the desired security properties. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

SDStorage: A Software Defined Storage Experimental Framework

2015 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2015), pp. 341–346.

By: A. Darabseh*, M. Al-Ayyoub*, Y. Jararweh*, E. Benkhelifa*, M. Vouk n & A. Rindos*

TL;DR: SDStorage is an experimental framework to provide a novel virtualized test bed environment for SDStore systems and is based on the Mininet Software Defined Network (SDN) Open Flow simulator and is built over of it. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2015 journal article

Resolving Goal Conflicts via Argumentation-Based Analysis of Competing Hypotheses

IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 156–165.

By: P. Murukannaiah n, A. Kalia n, P. Telang* & M. Singh n

Contributors: P. Murukannaiah n, P. Telang*, A. Kalia n & M. Singh n

TL;DR: Arg-ACH systematically captures the trail of a requirements engineer's thought process in resolving conflicts and is superior to ACH with respect to completeness and coverage of belief search; length of belief chaining; ease of use; explicitness of the assumptions made; and repeatability of conclusions across subjects. (via Semantic Scholar)
Sources: NC State University Libraries, ORCID, NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.