Computer Science

College of Engineering

Works Published in 2010

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 161 - 177 of 177 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 journal article

Performance impact of large file transfer on web proxy caching: A case study in a high bandwidth campus network environment

Journal of Communications and Networks, 12(1), 52–66.

By: H. Kim, D. Lee, K. Chon, B. Jang, T. Kwon & Y. Choi

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Object recognition through topo-geometric shape models using error-tolerant subgraph isomorphisms

IEEE Transactions on Image Processing, 19(5), 1191–1200.

By: S. Baloch* & H. Krim

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Classification of curves in 2D and 3D via affine integral signatures

Acta Applicandae Mathematicae, 109(3), 903–937.

Source: NC State University Libraries
Added: August 6, 2018

2010 conference paper

Anonymizing bipartite graph data using safe groupings

VLDB Journal : the International Journal on Very Large Data Bases, 19(1), 115–139.

By: G. Cormode, D. Srivastava, T. Yu & Q. Zhang

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

The play's the thing

IEEE Internet Computing, 14(1), 16–18.

By: R. Young

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Stealthy malware detection and monitoring through VMM-based "Out-of-the-Box" semantic view reconstruction

ACM Transactions on Information and System Security, 13(2).

By: X. Jiang, X. Wang* & D. Xu*

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Internet predictions

IEEE Internet Computing, 14(1), 10–11.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2010 journal article

Individual variation in pheromone response correlates with reproductive traits and brain gene expression in worker honey bees

PLoS One, 5(2).

By: S. Kocher, J. Ayroles, E. Stone & C. Grozinger

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

How internet users' privacy concerns have evolved since 2002

IEEE Security & Privacy Magazine, 8(1), 21–27.

By: A. Anton, J. Earp & J. Young n

Sources: NC State University Libraries, Crossref
Added: August 6, 2018

2010 journal article

Global registration of overlapping images using accumulative image features

Pattern Recognition Letters, 31(2), 112–118.

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Evaluating existing security and privacy requirements for legal compliance

Requirements Engineering, 15(1), 119–137.

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption

Turkish Journal of Electrical Engineering and Computer Sciences, 18(1), 1–21.

By: A. Yavuz, F. Alagoz & E. Anarim

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

A high-throughput de novo sequencing approach for shotgun proteomics using high-resolution tandem mass spectrometry

BMC Bioinformatics, 11.

By: C. Pan, B. Park, W. McDonald, P. Carey, J. Banfield, N. VerBerkmoes, R. Hettich, N. Samatova

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

The effect of marine isoprene emissions on secondary organic aerosol and ozone formation in the coastal United States

Atmospheric Environment, 44(1), 115–121.

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Modelling the appearance and behaviour of urban spaces

Computer Graphics Forum, 29(1), 25–42.

By: C. Vanegas*, D. Aliaga*, P. Wonka*, P. Muller*, P. Waddell* & B. Watson

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

An empirical study on the maintenance of source code clones

Empirical Software Engineering, 15(1), 1–34.

By: S. Thummalapenta, L. Cerulo, L. Aversano & M. Di Penta

Source: NC State University Libraries
Added: August 6, 2018

2010 journal article

Normative multiagent systems: Guest editors' introduction

Logic Journal of the IGPL, 18(1), 1–3.

By: G. Boella*, G. Pigozzi*, M. Singh & H. Verhagen*

Sources: NC State University Libraries, ORCID
Added: August 6, 2018