Works Published in 2015

search works

Displaying works 161 - 180 of 299 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2015 conference paper

Providing task isolation via TLB coloring

21st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2015), 3–13.

By: S. Panchamukhi n & F. Mueller n

TL;DR: This work design and implement a new heap allocator that guarantees the TLB set, which will hold a particular page translation on a uniprocessor of a contemporary architecture, based on the concept of page coloring, a software TLB partitioning method. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Parallel In Situ Detection of Connected Components in Adaptive Mesh Refinement Data

2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING, pp. 302–312.

By: X. Zou n, K. Wu*, D. Boyuka n, D. Martin*, S. Byna*, H. Tang n, K. Bansal n, T. Ligocki*, H. Johansen*, N. Samatova n

TL;DR: The first connected component detection methodology for structured AMR that is applicable in a parallel, in situ context is presented, incorporating an multi-phase AMR-aware communication pattern that synchronizes connectivity information across the AMR hierarchy. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Modeling analytics as knowledge work: Computing meets organizational psychology

Proceedings - International Conference on Research Challenges in Information Science, 2015-June(June), 382–387.

By: G. Yuan n, N. Ajmeri n, C. Allred n, P. Telang*, M. Wilson n & M. Singh n

Contributors: G. Yuan n, N. Ajmeri n, C. Allred n, P. Telang*, M. Wilson n & M. Singh n

Event: at United States

TL;DR: This paper exploits knowledge from organizational psychology to develop a computational organizational model that provides a framework to understand the impact of organizational level variables and worker characteristics on workflow performance, providing a view to create justifiable interventions to improve performance. (via Semantic Scholar)
Sources: NC State University Libraries, ORCID, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Improving Error Notification Comprehension in IDEs by Supporting Developer Self-Explanations

Proceedings 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 293–294.

By: T. Barik

Source: NC State University Libraries
Added: August 6, 2018

2015 article

Evaluation of Memory Access Arbitration Algorithm on Tilera's TILEPro64 platform

2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), pp. 1154–1159.

By: M. Shekhar*, H. Ramaprasad* & F. Mueller n

TL;DR: This paper implements and evaluates variants of an arbitration policy for memory access requests over a Network-on-Chip platform, namely Tilera's TilePro64 platform, and evaluates its application in real-time embedded systems. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: August 6, 2018

2015 article

Enron's Spreadsheets and Related Emails: A Dataset and Analysis

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 7–16.

TL;DR: An analysis of a new dataset, extracted from the Enron email archive, containing over 15,000 spreadsheets used within the Enrock Corporation, shows that the spreadsheets are substantially more smelly than the EUSES corpus, especially in terms of long calculation chains. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science)
Source: Web Of Science
Added: August 6, 2018

2015 conference paper

Enhancing security of Hadoop in a public cloud

2015 6th International Conference on Information and Communication Systems (ICICS), 38–43.

By: X. Yu n, P. Ning n & M. Vouk n

TL;DR: A security enhancement for a public cloud-based Hadoop is developed, named SEHadoop, to improve the compromise resilience through enhancing isolation among Hadooper components and enforcing least access privilege for Hadoops processes. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

Decision Tree Learning for Fraud Detection in Consumer Energy Consumption

2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), pp. 1175–1179.

By: C. Cody n, V. Ford* & A. Siraj*

author keywords: fraud detection; decision trees; smart meter data
TL;DR: This research reports on a novel application of decision tree learning technique to profile normal energy consumption behavior allowing for the detection of potentially fraudulent activity. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2015 article

Data Mining Methods and Cost Estimation Models Why is it so hard to infuse new ideas?

2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOP (ASEW), pp. 5–9.

By: J. Hihn* & T. Menzies n

author keywords: software; cost estimation; effort estimation; data mining; technology infusion
TL;DR: The underlying causes of the problems in the infusion of software costing models into NASA are suggested to be rooted in the fact that the different players have fundamental differences in mental models, vocabulary and objectives. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Commit Bubbles

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 631–634.

By: T. Barik n, K. Lubick n & E. Murphy-Hill n

TL;DR: This contribution is a fragment-oriented concept called Commit Bubbles that will allow developers to construct systematic commit histories that adhere to version control best practices with less cognitive effort, and in a way that integrates with their as-needed coding workflows. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

CS/SE Instructors Can Improve Student Writing without Reducing Class Time Devoted to Technical Content: Experimental Results

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 455–464.

By: P. Anderson*, S. Heckman n, M. Vouk n, D. Wright n, M. Carter n, J. Burge*, G. Gannod*

author keywords: communication across the curriculum; software engineering education; black box test plans
TL;DR: Students in the treatment sections outperformed students in the control sections on writing for five of nine criteria on rubrics for evaluating the plans and on the raters' holistic impression of the students' technical and communication abilities from the perspectives of a manager and a tester. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Actionable = Cluster plus Contrast?

2015 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOP (ASEW), pp. 14–17.

author keywords: Prediction; planning; instance-based reasoning; model-based reasoning; data mining; software engineering
TL;DR: This paper explores two approaches for learning minimal, yet effective, changes to software project artifacts. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

A study of interactive code annotation for access control vulnerabilities

Proceedings 2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC), 73–77.

By: T. Thomas*, B. Chu*, H. Lipford*, J. Smith n & E. Murphy-Hill n

TL;DR: This paper evaluated whether developers could indicate access control logic using interactive annotation and understand the vulnerabilities reported as a result and provided design guidance for improving the interaction and communication of such security tools with developers. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 article

A Security Practices Evaluation Framework

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 2, pp. 935–938.

By: P. Morrison n

author keywords: Security; Quality; Measurement Frameworks; Software Development Lifecycle
TL;DR: The Security Practices Evaluation Framework (SP-EF) is defined, a measurement framework for software development security practices that supports evidence-based practice selection and is evaluated on historical data and industrial projects. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2015 article

A Scalable Complex Pattern Mining Framework for Global Settlement Mapping

2015 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2015, pp. 514–521.

By: R. Vatsavai n

author keywords: Very High-resolution Images; Multiple Instance Learning; Settlement Mapping; Complex Object Based Image Analysis
TL;DR: This paper extends the Gaussian Multiple Instance (GMIL) learning by simplifying the model assumptions and shows that this method is computationally more efficient while maintaining similar accuracy as the GMIL algorithm. (via Semantic Scholar)
UN Sustainable Development Goal Categories
13. Climate Action (Web of Science)
15. Life on Land (Web of Science)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

1st International Workshop on Big Data Software Engineering (BIGDSE 2015)

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 2, pp. 965–966.

By: L. Baresi*, T. Menzies n, A. Metzger* & T. Zimmermann*

author keywords: Big data; software engineering; software analytics
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Towards a practical indoor location matching system using 4G LTE PHY layer information

2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM workshops), 284–287.

By: N. Poosamani n & I. Rhee n

TL;DR: Physical (PHY) layer information from 4G cellular network signals such as Reference Signal Received Power (RSRP) and Reference Signal received Quality (RSRQ) are used to logically predict user location to show promise for improvements in current indoor localization systems using cellular signals. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Spectrum assignment in mesh elastic optical networks

24th international conference on computer communications and networks icccn 2015.

By: M. Fayez*, I. Katib*, G. Rouskas n & H. Faheem*

TL;DR: It is shown that spectrum assignment in networks of general topology is a special case of scheduling multiprocessor tasks on dedicated processors, and efficient and effective algorithms for mesh and chain networks that build upon list scheduling concepts are developed. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 conference paper

Spectral estimation in highly transient data

2015 23rd european signal processing conference (eusipco), 1721–1725.

By: S. Emrani n & H. Krim n

TL;DR: A new framework for estimating different frequencies in piece-wise periodic signals with time varying amplitude and phase is proposed through a 3-dimensional delay embedding of the introduced model, which constructs a union of intersecting planes where each plane corresponds to one frequency. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

STARS computing corps: Enhancing engagement of women and underrepresented students in computing

2015 Research in Equity and Sustained Participation in Engineering, Computing, and Technology (RESPECT).

By: J. Payton*, T. Barnes n, K. Buch*, A. Rorrer* & H. Zuo*

TL;DR: Results of the study show that there are many benefits for undergraduate computing students who engage in STARS projects across a variety of STARS institutions, including academic, career, and personal benefits, with students that are underrepresented in computing benefiting more than others. (via Semantic Scholar)
UN Sustainable Development Goal Categories
5. Gender Equality (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.