Works Published in 2010

search works

Displaying works 1 - 20 of 187 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 conference paper

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

Proceedings of the 9th USENIX conference on Operating systems design and implementation, 1–6.

By: W. Enck n, P. Gilbert*, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

Event: USENIX Association

TL;DR: TaintDroid is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data and enabling realtime analysis by leveraging Android’s virtualized execution environment. (via Semantic Scholar)
Source: ORCID
Added: January 2, 2024

2010 journal article

Not so great expectations: Why application markets haven't failed security

IEEE Security & Privacy, 8(5), 76–78.

By: P. McDaniel & W. Enck

Source: ORCID
Added: January 2, 2024

2010 conference paper

Toward Using Dynamics of Facial Expressions and Gestures for Person Identification

IASTED International Conference on Computational Intelligence. Presented at the IASTED International Conference on Computational Intelligence.

By: E. Patterson & A. Gaweda

Event: IASTED International Conference on Computational Intelligence

Source: NC State University Libraries
Added: August 24, 2023

2010 journal article

Software testing (CS1 & CS2)

Software testing (CS1 & CS2). NC State University, August, 6.

By: S. Heckman

Source: ORCID
Added: July 18, 2023

2010 journal article

Randomized constraint solvers: a comparative study

ISSE, 6(3), 243–253.

TL;DR: Several randomized solvers are proposed and evaluated to address the complexity of constraints and it is observed that the solvers were complementary, which suggests that one should alternate their use in iterations of a concolic execution driver. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2010 journal article

Assertion Checking in J-Sim Simulation Models of Network Protocols

Simulation, 86(11), 651–673.

Marcelo D'Amorim

TL;DR: This paper develops protocol-specific search heuristics to guide SSE towards finding assertion violations in less time and evaluates the efficiency of the SSE framework by comparing its performance with that of a state-of-the-art model checker for Java programs, namely Java PathFinder. (via Semantic Scholar)
Source: ORCID
Added: June 21, 2023

2010 conference paper

Parametric Sensitivity and Scalability of k-Winners-Take-All Networks with a Single State Variable and Infinity-Gain Activation Functions

In L. Zhang, B. L. Lu, & J. Kwok (Eds.), Advances in Neural Networks - ISNN 2010.

By: J. Wang* & Z. Guo*

Ed(s): L. Zhang, B. Lu & J. Kwok

Event: 7th International Symposium on Neural Networks (ISNN) at Shanghai, China

TL;DR: Experimental results show that the kWTA networks are parametrically robust and dimensionally scalable in terms of problem size and convergence rate. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: April 21, 2023

2010 article proceedings

A neurodynamic optimization approach to constrained sparsity maximization based on alternative objective functions

Presented at the 2010 International Joint Conference on Neural Networks (IJCNN).

By: Z. Guo* & J. Wang*

Event: 2010 International Joint Conference on Neural Networks (IJCNN)

TL;DR: Several alternative objective functions, such as weighted L1 norm, Laplacian, hyperbolic secant, and Gaussian functions, are introduced as approximations of the L0 norm as part of the reformulated constrained minimization problems subject to equality constraints. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: April 1, 2023

2010 conference paper

RoleModel: Towards a formal model of dramatic roles for story generation

Proceedings of the Intelligent Narrative Technologies III Workshop, INT3 '10.

Contributors: S. Chen*, A. Smith*, A. Jhala*, N. Wardrip-Fruin* & M. Mateas*

TL;DR: This paper discusses the basic architecture for the RoleModel approach, demonstrates example output from the system through three use-cases, discusses the authorial expressiveness enabled by a "stageless" abductive logic approach to story generation, and proposes the current and future directions. (via Semantic Scholar)
Source: ORCID
Added: July 14, 2022

2010 conference paper

Reactive planning idioms for multi-scale game AI

Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, CIG2010, 115–122.

By: B. Weber*, P. Mawhorter*, M. Mateas* & A. Jhala*

Contributors: B. Weber*, P. Mawhorter*, M. Mateas* & A. Jhala*

TL;DR: This work advocates reactive planning as a powerful technique for building multi-scale game AI and demonstrates that it enables the specification of complex, real-time agents in a unified agent architecture. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: July 14, 2022

2010 conference paper

Preface

Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010. http://www.scopus.com/inward/record.url?eid=2-s2.0-84883114702&partnerID=MN8TOARS

By: G. Michael Youngblood, V. Bulitko, K. Dill, A. Jhala, B. Schwab & M. Riedl

Contributors: G. Michael Youngblood, V. Bulitko, K. Dill, A. Jhala, B. Schwab & M. Riedl

Source: ORCID
Added: July 14, 2022

2010 conference paper

Siren: Towards adaptive serious games for teaching conflict resolution

4th European Conference on Games Based Learning 2010, ECGBL 2010, 412–417. http://www.scopus.com/inward/record.url?eid=2-s2.0-80053103561&partnerID=MN8TOARS

By: G. Yannakakis, J. Togelius, R. Khaled, A. Jhala, K. Karpouzis, A. Paiva, A. Vasalou

Contributors: G. Yannakakis, J. Togelius, R. Khaled, A. Jhala, K. Karpouzis, A. Paiva, A. Vasalou

Source: ORCID
Added: July 14, 2022

2010 conference paper

Applying goal-driven autonomy to starcraft

Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010, 101–106. http://www.scopus.com/inward/record.url?eid=2-s2.0-84867392807&partnerID=MN8TOARS

By: B. Weber, M. Mateas & A. Jhala

Contributors: B. Weber, M. Mateas & A. Jhala

Source: ORCID
Added: July 14, 2022

2010 conference paper

Performance Evaluation of an OBS Network as a TandemNetwork of IPP/M/W/W Nodes

Proceedings of the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM). Presented at the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM), Wellington, New Zealand.

By: L. Battestilli & H. Perros

Event: 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM) at Wellington, New Zealand on December 2-4, 2010

Source: NC State University Libraries
Added: May 27, 2022

2010 report

The Role of Symbolic, Numeric and Algebraic Computation in Cyber-Enabled Discovery and Innovation (CDI)

In Future Directions of Symbolic Computation Research And Their Applications to the Domain Sciences. University of Rhode Island.

Source: NC State University Libraries
Added: March 26, 2022

2010 journal article

Automatic hint generation for logic proof tutoring using historical data

Journal of Educational Technology & Society, 13(1), 3–12.

By: T. Barnes & J. Stamper

Source: NC State University Libraries
Added: December 25, 2021

2010 chapter

Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks

In F. Massacci, D. Wallach, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2010 (pp. 192–200).

Ed(s): F. Massacci, D. Wallach & N. Zannone

TL;DR: Although no SQL injection vulnerabilities were discovered, the results suggest that security testers who use an iterative, test-driven development process should compose system level rather than unit level tests. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Crossref
Added: August 14, 2021

2010 conference paper

Online vs. on-paper exams

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

2010 conference paper

Daily course evaluation with Google forms

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

2010 conference paper

Teaching interactively with Google docs

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.