Works Published in 2019

search works

Displaying works 161 - 180 of 222 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2019 article

The Colored Refresh Server for DRAM

2019 IEEE 22ND INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2019), pp. 27–34.

By: X. Pan n & F. Mueller n

TL;DR: This work contributes the “Colored Refresh Server” (CRS), a uniprocessor scheduling paradigm that partitions DRAM in two distinctly colored groups such that refreshes of one color occur in parallel to the execution of real-time tasks of the other color. (via Semantic Scholar)
Source: Web Of Science
Added: November 4, 2019

2019 article

PeakPass: Automating ChIP-Seq Blacklist Creation

BIOINFORMATICS RESEARCH AND APPLICATIONS, ISBRA 2019, Vol. 11490, pp. 232–243.

By: C. Wimberley n & S. Heber n

author keywords: ChIP-seq; Classification; Quality control; Blacklist
TL;DR: PeakPass is described, an efficient method to generate blacklists, and it is demonstrated that blacklists can increase ChIP-Seq data quality and be used for upgrading a blacklist to a new reference genome version. (via Semantic Scholar)
UN Sustainable Development Goal Categories
15. Life on Land (OpenAlex)
Sources: Web Of Science, ORCID
Added: November 4, 2019

2019 journal article

The public and legislative impact of hyperconcentrated topic news

SCIENCE ADVANCES, 5(8).

By: K. Sheshadri n & M. Singh n

MeSH headings : Humans; Newspapers as Topic; Periodicals as Topic / legislation & jurisprudence; Periodicals as Topic / statistics & numerical data
TL;DR: It is shown that specific features of news, such as publishing volume, appear to influence sustained public attention, as measured by annual Google Trends data, and federal legislation, and that federal legislative activity is often foreshadowed by periods of high news volume and similarity between articles. (via Semantic Scholar)
Sources: Web Of Science, ORCID
Added: November 4, 2019

2019 journal article

Ten simple rules for helping newcomers become contributors to open projects

PLOS COMPUTATIONAL BIOLOGY, 15(9).

By: D. Sholler*, I. Steinmacher*, D. Ford n, M. Averick, M. Hoye & G. Wilson*

MeSH headings : Biomedical Research / organization & administration; Computational Biology / organization & administration; Cooperative Behavior; Humans; Leadership
TL;DR: The 10 rules laid out below are based on studies of such communities and on the authors’ experience as members, leaders, and observers and focus on small and medium-sized projects, i.e., ones that have a handful of to a few hundred participants but may not (yet) have any formal legal standing, such as incorporation as a nonprofit. (via Semantic Scholar)
Source: Web Of Science
Added: October 28, 2019

2019 article

FuncyTuner: Auto-tuning Scientific Applications With Per-loop Compilation

PROCEEDINGS OF THE 48TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING (ICPP 2019).

author keywords: per-loop; fine-grained; auto-tuning; ICC; compiler; optimization; profile; OperalP; HPC; scientific simulation
TL;DR: It is demonstrated that a naïve greedy approach to per-region compilation often degrades performance in comparison to the 03 baseline, and a novel per-loop compilation framework, FuncyTuner, is contributed, which employs lightweight profiling to collect per- loop timing information, and then utilizes a space-focusing technique to construct a performant executable. (via Semantic Scholar)
Source: Web Of Science
Added: October 28, 2019

2019 journal article

How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool

IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 45(9), 877–897.

author keywords: Software engineering; human factors; security; software tools; programming environments
TL;DR: The defect resolution process is studied—from the questions developers ask to their strategies for answering them and how future tools can leverage the findings to encourage better strategies. (via Semantic Scholar)
Source: Web Of Science
Added: October 7, 2019

2019 article

TERMINATOR: Better Automated UI Test Case Prioritization

ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 883–894.

By: Z. Yu n, F. Fahid n, T. Menzies n, G. Rothermel n, K. Patrick* & S. Cherian*

author keywords: automated UI testing; test case prioritization; total recall
TL;DR: A novel TCP approach is proposed, that dynamically re-prioritizes the test cases when new failures are detected, by applying and adapting a state of the art framework from the total recall problem. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: October 7, 2019

2019 article

Predicting Breakdowns in Cloud Services (with SPIKE)

ESEC/FSE'2019: PROCEEDINGS OF THE 2019 27TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING, pp. 916–924.

By: J. Chen n, J. Chakraborty n, P. Clark*, K. Haverlock*, S. Cherian* & T. Menzies n

author keywords: Cloud; optimization; data mining; parameter tuning
TL;DR: SPIKE is a data mining tool which can predict upcoming service breakdowns, half an hour into the future, and performed relatively better than other widely-used learning methods (neural nets, random forests, logistic regression). (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: October 7, 2019

2019 journal article

Who's the real expert here? Pedigree's unique bias on trust between human and automated advisers

APPLIED ERGONOMICS, 81.

By: C. Pearson n, M. Geden n & C. Mayhorn n

author keywords: Dual adviser; Decision support system; Reliance; Decision-making; Decision aid; Trust in automation
MeSH headings : Adult; Aged; Automation; Bias; Counseling / methods; Decision Making; Decision Support Techniques; Female; Humans; Male; Man-Machine Systems; Middle Aged; Perception; Professional Competence; Reproducibility of Results; Task Performance and Analysis; Trust; Young Adult
TL;DR: A trust bias towards the human adviser is found, reversed only when there is a far greater pedigree in the automated adviser, and trust is highly predictive of reliance decisions. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: October 7, 2019

2019 article

Unnecessarily Identifiable: Quantifying the fingerprintability of browser extensions due to bloat

WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), pp. 3244–3250.

By: O. Starov*, P. Laperdrix*, A. Kapravelos n & N. Nikiforakis*

TL;DR: To protect users against unnecessary extension fingerprinting due to bloat, the design and implementation of an in-browser mechanism that provides coarse-grained access control for extensions on all websites are described. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: September 30, 2019

2019 conference paper

The Interplay of Emotions and Norms in Multiagent Systems

Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019-August, 371–377.

By: A. Kalia*, N. Ajmeri n, K. Chan*, J. Cho*, S. Adalı* & M. Singh n

Contributors: A. Kalia*, N. Ajmeri n, K. Chan*, J. Cho*, S. Adalı* & M. Singh n

Event: Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}

TL;DR: This work provides a step-wise process to discover two new Dynamic Bayesian models based on maximizing log-likelihood scores with respect to the data and compares them with the baseline models to discover new insights into the relevant relationships. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Crossref, NC State University Libraries, ORCID
Added: September 29, 2019

2019 article

CSLIM: Automated Extraction of loT Functionalities from Legacy C Codebases

ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, pp. 421–426.

By: H. Sim*, A. Paul*, E. Tilevich*, A. Butt* & M. Shahzad n

author keywords: Software Engineering; IoT
TL;DR: This paper presents Cslim, a cross-package function extraction tool for C that extracts programmer-specified functions from a source package and generates new source files for a target package, thereby enabling the reuse of systems software in resource-poor execution environments, such as the IoT devices. (via Semantic Scholar)
Source: Web Of Science
Added: September 23, 2019

2019 journal article

A Coupled Operational Semantics for Goals and Commitments

JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 65, 31–85.

TL;DR: This article provides a combined operational semantics for goals and commitments by relating their respective life cycles as a basis for how these concepts cohere for an individual agent and engender cooperation among agents. (via Semantic Scholar)
Sources: Web Of Science, ORCID, NC State University Libraries
Added: September 16, 2019

2019 journal article

System Statistics Learning-Based IoT Security: Feasibility and Suitability

IEEE Internet of Things Journal, 6(4), 6396–6403.

By: F. Li*, A. Shinde*, Y. Shi*, J. Ye*, X. Li* & W. Song*

Contributors: F. Li*, A. Shinde*, Y. Shi*, J. Ye*, X. Li* & W. Song*

author keywords: Anomaly detection; deep learning; failure and intrusion detection; Internet of Things (IoT); machine learning
TL;DR: It is concluded that relatively simple machine learning models are more suitable for IoT security, and a data-driven anomaly detection method is preferred. (via Semantic Scholar)
Source: ORCID
Added: September 4, 2019

2019 journal article

Enhanced Cyber-Physical Security in Internet of Things Through Energy Auditing

IEEE Internet of Things Journal, 6(3), 5224–5231.

By: F. Li*, Y. Shi*, A. Shinde*, J. Ye* & W. Song*

Contributors: F. Li*, Y. Shi*, A. Shinde*, J. Ye* & W. Song*

author keywords: Cyber and physical attack detection; deep learning (DL); energy audit; Internet of Things (IoT)
TL;DR: This is the first attempt to detect and identify IoT cyber and physical attacks based on energy auditing and analytics-based IoT monitoring mechanism using the energy meter readings and proposes a disaggregation-aggregation architecture. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: ORCID
Added: September 4, 2019

2019 journal article

Deep Dictionary Learning: A PARametric NETwork Approach

IEEE TRANSACTIONS ON IMAGE PROCESSING, 28(10), 4790–4802.

author keywords: Image classification; deep learning; sparse representation
TL;DR: The performance of the proposed hierarchical method increases by adding more layers, which consequently makes this model easier to tune and adapt and shows a remarkably lower fooling rate in the presence of adversarial perturbation. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: August 26, 2019

2019 journal article

Impressionism-Inspired Data Visualizations Are Both Functional and Liked

PSYCHOLOGY OF AESTHETICS CREATIVITY AND THE ARTS, 13(3), 266–276.

By: P. Kozik, L. Tateosian*, C. Healey* & J. Enns

author keywords: aesthetics; impressionism; information visualization
Sources: Web Of Science, ORCID
Added: August 19, 2019

2019 article

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.

By: T. OConnor n, R. Mohamed*, M. Miettinen*, W. Enck n, B. Reaves n & A. Sadeghi*

Event: ACM

TL;DR: HomeSnitch is presented, a building block for enhancing smart home transparency and control by classifying IoT device communication by semantic behavior (e.g., heartbeat, firmware check, motion detection) and the utility of network-level services to classify behaviors of and enforce control on smart home devices. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 19, 2019

2019 article

Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.

Event: ACM

TL;DR: This paper seeks to better understand smart home device security by studying the vendor design decisions surrounding IoT telemetry messaging protocols, specifically, the behaviors taken when an IoT device loses connectivity, and finds that 22 of 24 studied devices suffer from critical design flaws. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 19, 2019

2019 article

Hestia: Simple Least Privilege Network Policies for Smart Homes

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.

By: S. Goutam n, W. Enck n & B. Reaves n

Event: ACM

author keywords: IoT & network security; smart home; least privilege policy
TL;DR: Hestia drastically improves smart home security without complex, unwieldy policies or lengthy learning of device behaviors, and perhaps more importantly, smart home owners need only specify which devices are controllers. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 19, 2019

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.