Computer Science

College of Engineering

Works Published in 2006

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2006 report

A Key-Based Adaptive Transactional Memory Executor

(No. TR909). Rochester, NY: Computer Science Dept., University of Rochester.

By: T. Bai, X. Shen, C. Zhang, W. Scherer, C. Ding & M. Scott

Source: NC State University Libraries
Added: February 20, 2021

2006 chapter

Cognitive and Computational Models in Interactive Narratives

In C. Forsythe, M. L. Bernard, & T. E. Goldsmith (Eds.), Cognitive Systems: Human Cognitive Models in Systems Design (pp. 213–235). Mahwah, New Jersey: Lawrence Erlbaum.

By: R. Young

Ed(s): C. Forsythe, M. Bernard & T. Goldsmith

Source: NC State University Libraries
Added: February 12, 2021

2006 report

Waste Not, Want Not: Adaptive Garbage Collection in a Shared Environment

(Technical Report No. TR908). Computer Science Dept., University of Rochester.

By: C. Zhang, K. Kelsey, X. Shen, C. Ding, M. Hertz & M. Ogihara

Source: NC State University Libraries
Added: January 30, 2021

2006 report

Behavior-Oriented Parallelization

(Technical Report No. TR904). Computer Science Dept., University of Rochester.

By: B. Parallelization”, C. Ding, X. Shen, K. Kelsey, C. Tice, R. Huang, C. Zhang

Source: NC State University Libraries
Added: January 30, 2021

2006 report

Accurate Approximation of Locality from Time Distance Histograms

(Technical Report No. TR902). Computer Science Dept., University of Rochester.

By: X. Shen, J. Shaw & B. Meeker

Source: NC State University Libraries
Added: January 30, 2021

2006 report

Locality Approximation Using Time

(Technical Report No. TR901). Computer Science Dept., University of Rochester.

By: X. Shen, J. Shaw, B. Meeker & C. Ding

Source: NC State University Libraries
Added: January 30, 2021

2006 conference paper

Stevens dot patterns for 2D flow visualization

Proceedings of the 3rd symposium on Applied perception in graphics and visualization - APGV '06. Presented at the the 3rd symposium.

By: L. Tateosian, B. Dennis & C. Healey

Event: the 3rd symposium

Sources: Crossref, ORCID
Added: December 11, 2020

2006 chapter

Burst Loss Probabilities in an OBS Network with Dynamic Simultaneous Link Possession

In Advances in Computer Science and Engineering: Texts (pp. 205–225).

By: T. Battestilli & H. Perros

Sources: Crossref, ORCID
Added: September 13, 2020

2006 chapter

Grid Networks and Layer 1 Services

In Grid Networks (pp. 217–252).

By: G. Karmous-Edwards, J. Mambretti, D. Simeonidou, A. Jukan, T. Battestilli, H. Perros, Y. Xin, J. Strand

Sources: Crossref, ORCID
Added: September 13, 2020

2006 chapter

UMN-MapServer: A High-Performance, Interoperable, and Open Source Web Mapping and Geo-spatial Analysis System

In Geographic Information Science (pp. 400–417).

By: R. Vatsavai, S. Shekhar, T. Burk & S. Lime

Sources: Crossref, ORCID
Added: September 10, 2020

2006 chapter

Improving DB2 Performance Expert – A Generic Analysis Framework

In Lecture Notes in Computer Science (pp. 1097–1101).

By: L. Mignet, J. Basak, M. Bhide, P. Roy, S. Roy, V. Sengar, R. Vatsavai, M. Reichert ...

Sources: Crossref, ORCID
Added: September 10, 2020

2006 conference paper

Program-level adaptive memory management

Proceedings of the 2006 international symposium on Memory management - ISMM '06. Presented at the the 2006 international symposium.

By: C. Zhang, K. Kelsey, X. Shen, C. Ding, M. Hertz & M. Ogihara

Event: the 2006 international symposium

Sources: Crossref, ORCID
Added: September 6, 2020

2006 journal article

Just enough learning (of association rules): the TAR2 “Treatment” learner

Artificial Intelligence Review, 25(3), 211–229.

By: T. Menzies & Y. Hu

Source: Crossref
Added: August 28, 2020

2006 chapter

Toward Legal Argument Instruction with Graph Grammars and Collaborative Filtering Techniques

In Intelligent Tutoring Systems (pp. 227–236).

By: N. Pinkwart, V. Aleven, K. Ashley & C. Lynch

Source: Crossref
Added: August 28, 2020

2006 chapter

Privacy Preserving Web-Based Email

In Information Systems Security (pp. 116–131).

By: K. Butler, W. Enck, J. Plasterr, P. Traynor & P. McDaniel

Source: Crossref
Added: August 28, 2020

2006 chapter

Password Exhaustion: Predicting the End of Password Usefulness

In Information Systems Security (pp. 37–55).

By: L. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel, T. Jaeger

Source: Crossref
Added: August 28, 2020

2006 journal article

Gene network shaping of inherent noise spectra

Nature, 439(7076), 608–611.

By: D. Austin, M. Allen, J. McCollum, R. Dar, J. Wilgus, G. Sayler, N. Samatova, C. Cox, M. Simpson

Source: Crossref
Added: August 28, 2020

2006 journal article

Detecting Differential and Correlated Protein Expression in Label-Free Shotgun Proteomics

Journal of Proteome Research, 5(11), 2909–2918.

By: B. Zhang, N. VerBerkmoes, M. Langston, E. Uberbacher, R. Hettich & N. Samatova

Source: Crossref
Added: August 28, 2020

2006 journal article

Robust Estimation of Peptide Abundance Ratios and Rigorous Scoring of Their Variability and Bias in Quantitative Shotgun Proteomics

Analytical Chemistry, 78(20), 7110–7120.

By: C. Pan, G. Kora, D. Tabb, D. Pelletier, W. McDonald, G. Hurst, R. Hettich, N. Samatova

Source: Crossref
Added: August 28, 2020

2006 journal article

ProRata:  A Quantitative Proteomics Program for Accurate Protein Abundance Ratio Estimation with Confidence Interval Evaluation

Analytical Chemistry, 78(20), 7121–7131.

By: C. Pan, G. Kora, W. McDonald, D. Tabb, N. VerBerkmoes, G. Hurst, D. Pelletier, N. Samatova, R. Hettich

Source: Crossref
Added: August 28, 2020