Computer Science

College of Engineering

Works Published in 2011

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 161 - 171 of 171 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2011 journal article

Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 8(3), 434–449.

author keywords: Network-level security and protection; intrusion tracing; correlation; stepping stone
Source: Web Of Science
Added: August 6, 2018

2011 journal article

On the parameterized complexity of the Multi-MCT and Multi-MCST problems

JOURNAL OF COMBINATORIAL OPTIMIZATION, 21(2), 151–158.

author keywords: Multi-MCT; Multi-MCST; W-hierarchy; Parameterized complexity; Computational complexity
Source: Web Of Science
Added: August 6, 2018

2011 article

Digital privacy: theory, policies and technologies

Anton, A. I., Breaux, T. D., Gritzalis, S., & Mylopoulos, J. (2011, March). REQUIREMENTS ENGINEERING, Vol. 16, pp. 1–2.

By: A. Anton n, T. Breaux*, S. Gritzalis* & J. Mylopoulos*

Source: Web Of Science
Added: August 6, 2018

2011 journal article

Commitment analysis to operationalize software requirements from privacy policies

Requirements Engineering, 16(1), 33–46.

By: J. Young

author keywords: Requirement; Privacy policy; Compliance; Privacy aware; Commitment; Privilege; Right
Sources: NC State University Libraries, Crossref
Added: August 6, 2018

2011 journal article

A Probabilistic Approach for Maintaining Trust Based on Evidence

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 40, 221–267.

Sources: Web Of Science, ORCID
Added: August 6, 2018

2011 journal article

Trustworthy Service Selection and Composition

ACM Transactions on Autonomous and Adaptive Systems, 6(1), 1–17.

By: C. Hang & M. Singh

author keywords: Algorithms; Experimentation; Trust; probabilistic modeling; service-oriented computing
Sources: Web Of Science, ORCID, Crossref
Added: August 6, 2018

2011 journal article

Transparent runtime parallelization of the R scripting language

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(2), 157–168.

By: J. Li*, X. Ma, S. Yoginath*, G. Kora* & N. Samatova

author keywords: Runtime parallelization; Incremental analysis; Scripting languages
Source: Web Of Science
Added: August 6, 2018

2011 journal article

SeCA: A framework for Secure Channel Assignment in wireless mesh networks

COMPUTER COMMUNICATIONS, 34(4), 567–576.

author keywords: Secure channel assignment; Multi-channel multi-radio; Wireless mesh networks; Relay attack resistance; Misbehavior resistance
Source: Web Of Science
Added: August 6, 2018

2011 journal article

Data-intensive document clustering on graphics processing unit (GPU) clusters

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(2), 211–224.

By: Y. Zhang n, F. Mueller, X. Cui* & T. Potok*

author keywords: High-performance computing; Accelerators; Data-intensive computing
Source: Web Of Science
Added: August 6, 2018

2011 journal article

Coordinating Computation and I/O in Massively Parallel Sequence Search

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 22(4), 529–543.

By: H. Lin*, X. Ma, W. Feng* & N. Samatova

author keywords: Scheduling; parallel I/O; bioinformatics; parallel genomic sequence search; BLAST
Source: Web Of Science
Added: August 6, 2018

2011 journal article

P(2)DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 29(3), 582–594.

By: T. Zhou*, R. Roy, C. Ning n & K. Chakrabarty*

author keywords: Coarse-grained hash; fine-grained hash; privacy; security; Sybil attack; vehicular ad hoc network
Source: Web Of Science
Added: August 6, 2018