Computer Science

College of Engineering

Works Published in 2013

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 161 - 180 of 220 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2013 journal article

On the Matrix Berlekamp-Massey Algorithm

ACM TRANSACTIONS ON ALGORITHMS, 9(4).

By: E. Kaltofen n & G. Yuhasz n

author keywords: Linear generated sequences; matrix polynomials; minimal generators; vector Berlekamp/Massey algorithm; multivariable linear control
Source: Web Of Science
Added: August 6, 2018

2013 journal article

On the Critical Delays of Mobile Networks Under Levy Walks and Levy Flights

IEEE-ACM TRANSACTIONS ON NETWORKING, 21(5), 1621–1635.

author keywords: Critical delay; delay-capacity tradeoff; human mobility; Levy mobility; network performance scaling
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

Grading by experience points: An example from computer ethics

2013 IEEE Frontiers in Education Conference (FIE). Presented at the 2013 IEEE Frontiers in Education Conference (FIE).

By: E. Gehringer n & B. Peddycord n

Event: 2013 IEEE Frontiers in Education Conference (FIE)

Sources: NC State University Libraries, Crossref, ORCID
Added: August 6, 2018

2013 journal article

Contextualized information-centric home network

Computer Communication Review, 43(4), 461–462.

By: T. Biswas, A. Chakraborti, R. Ravindran, X. Zhang & G. Wang

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

An improved hop-by-hop interest shaper for congestion control in named data networking

Computer Communication Review, 43(4).

By: Y. Wang n, N. Rozhnova*, A. Narayanan*, D. Oran* & I. Rhee n

Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

A community college blended learning classroom experience through Artificial Intelligence in Games

2013 IEEE Frontiers in Education Conference (FIE). Presented at the 2013 IEEE Frontiers in Education Conference (FIE).

Event: 2013 IEEE Frontiers in Education Conference (FIE)

Sources: NC State University Libraries, Crossref, ORCID
Added: August 6, 2018

2013 journal article

The Effects of Career Calling and Perceived Overqualification on Work Outcomes for Primary and Secondary School Teachers

JOURNAL OF CAREER DEVELOPMENT, 40(6), 508–530.

By: E. Lobene n & A. Meade n

author keywords: perceived overqualification; calling; performance; moderation
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Prediction of flow stress in cadmium using constitutive equation and artificial neural network approach

Journal of Materials Engineering and Performance, 22(10), 2982–2989.

By: A. Sarkar & J. Chakravartty

Source: NC State University Libraries
Added: August 6, 2018

2013 article

PARLO: PArallel Run-time Layout Optimization for Scientific Data Explorations with Heterogeneous Access Patterns

PROCEEDINGS OF THE 2013 13TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID 2013), pp. 343–351.

Source: Web Of Science
Added: August 6, 2018

2013 journal article

Norms as a Basis for Governing Sociotechnical Systems

ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 5(1).

By: M. Singh n

author keywords: Algorithms; Design; Governance; sociotechnical systems; adaptation
Sources: Web Of Science, ORCID
Added: August 6, 2018

2013 journal article

Deriving common malware behavior through graph clustering

COMPUTERS & SECURITY, 39, 419–430.

By: Y. Park*, D. Reeves n & M. Stamp*

author keywords: Malware; Dynamic analysis; Graph clustering; Intrusion detection; Virtualization
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Augmented Reality Interfaces

IEEE INTERNET COMPUTING, 17(6), 66–70.

By: M. Singh* & M. Singh n

author keywords: usability; augmented reality; mobile applications; mobile computing; user experience; user interfaces
Sources: Web Of Science, ORCID
Added: August 6, 2018

2013 article

Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time

2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), pp. 174–188.

By: W. Shen n, P. Ning n, X. He n & H. Dai n

author keywords: Wireless; friendly jamming; interference cancellation
Source: Web Of Science
Added: August 6, 2018

2013 conference paper

A vision for SPARQL multi-query optimization on MapReduce

2013 ieee 29th international conference on data engineering workshops (icdew), 25–26.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2013 journal article

A Survey of VBR Video Traffic Models

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 15(4), 1778–1802.

By: S. Tanwir n & H. Perros n

author keywords: VBR video; Video traffic model; H.264
Source: Web Of Science
Added: August 6, 2018

2013 journal article

Vision for TOIT

ACM Transactions on Internet Technology, 12(4).

By: M. Singh n

Sources: ORCID, NC State University Libraries
Added: August 6, 2018

2013 conference paper

VIA - visualizing individual actions to develop a sustainable community culture through cycling

Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, 8028, 316–325.

By: B. Watson, D. Berube, N. Hristov, C. Strohecker, S. Betz, L. Allen, M. Burczyk, A. Howard ...

Source: NC State University Libraries
Added: August 6, 2018

2013 journal article

TOIT administrative updates

ACM Transactions on Internet Technology, 12(4).

By: M. Singh n

Sources: ORCID, NC State University Libraries
Added: August 6, 2018

2013 journal article

Discovery of extreme events-related communities in contrasting groups of physical system networks

DATA MINING AND KNOWLEDGE DISCOVERY, 27(2), 225–258.

By: Z. Chen n, W. Hendrix n, H. Guan*, I. Tetteh n, A. Choudhary*, F. Semazzi n, N. Samatova n

author keywords: Spatio-temporal data mining; Complex network analysis; Community detection; Comparative analysis; Networkmotif detection; Extreme event prediction
Source: Web Of Science
Added: August 6, 2018

2013 journal article

A comparison of the efficiency and effectiveness of vulnerability discovery techniques

INFORMATION AND SOFTWARE TECHNOLOGY, 55(7), 1279–1288.

By: A. Austin n, C. Holmgreen n & L. Williams n

author keywords: Security; Vulnerability; Static analysis; Penetration testing; Black box testing; White box testing
Source: Web Of Science
Added: August 6, 2018