Works Published in 2010

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Displaying works 1 - 20 of 187 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2010 conference paper

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

Proceedings of the 9th USENIX conference on Operating systems design and implementation, 1–6.

By: W. Enck n, P. Gilbert*, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

co-author countries: Germany 🇩🇪 United Kingdom of Great Britain and Northern Ireland 🇬🇧 Korea (Republic of) 🇰🇷 United States of America 🇺🇸

Event: USENIX Association

Source: ORCID
Added: January 2, 2024

2010 journal article

Not so great expectations: Why application markets haven't failed security

IEEE Security & Privacy, 8(5), 76–78.

By: P. McDaniel & W. Enck

Source: ORCID
Added: January 2, 2024

2010 conference paper

Toward Using Dynamics of Facial Expressions and Gestures for Person Identification

IASTED International Conference on Computational Intelligence. Presented at the IASTED International Conference on Computational Intelligence.

By: E. Patterson & A. Gaweda

Event: IASTED International Conference on Computational Intelligence

Source: NC State University Libraries
Added: August 24, 2023

2010 journal article

Software testing (CS1 & CS2)

Software testing (CS1 & CS2). NC State University, August, 6.

By: S. Heckman

Source: ORCID
Added: July 18, 2023

2010 journal article

Randomized constraint solvers: a comparative study

ISSE, 6(3), 243–253.

co-author countries: Brazil 🇧🇷
Source: ORCID
Added: June 21, 2023

2010 journal article

Assertion Checking in J-Sim Simulation Models of Network Protocols

Simulation, 86(11), 651–673.

Marcelo D'Amorim

Source: ORCID
Added: June 21, 2023

2010 conference paper

Parametric Sensitivity and Scalability of k-Winners-Take-All Networks with a Single State Variable and Infinity-Gain Activation Functions

In L. Zhang, B. L. Lu, & J. Kwok (Eds.), Advances in Neural Networks - ISNN 2010.

By: J. Wang* & Z. Guo*

co-author countries: China 🇨🇳

Ed(s): L. Zhang, B. Lu & J. Kwok

Event: 7th International Symposium on Neural Networks (ISNN) at Shanghai, China

Sources: NC State University Libraries, ORCID
Added: April 21, 2023

2010 article proceedings

A neurodynamic optimization approach to constrained sparsity maximization based on alternative objective functions

Presented at the 2010 International Joint Conference on Neural Networks (IJCNN).

By: Z. Guo* & J. Wang*

co-author countries: China 🇨🇳

Event: 2010 International Joint Conference on Neural Networks (IJCNN)

Sources: Crossref, ORCID
Added: April 1, 2023

2010 conference paper

RoleModel: Towards a formal model of dramatic roles for story generation

Proceedings of the Intelligent Narrative Technologies III Workshop, INT3 '10.

co-author countries: United States of America 🇺🇸

Contributors: S. Chen*, A. Smith*, A. Jhala*, N. Wardrip-Fruin* & M. Mateas*

Source: ORCID
Added: July 14, 2022

2010 conference paper

Reactive planning idioms for multi-scale game AI

Proceedings of the 2010 IEEE Conference on Computational Intelligence and Games, CIG2010, 115–122.

By: B. Weber*, P. Mawhorter*, M. Mateas* & A. Jhala*

co-author countries: United States of America 🇺🇸

Contributors: B. Weber*, P. Mawhorter*, M. Mateas* & A. Jhala*

Source: ORCID
Added: July 14, 2022

2010 conference paper

Preface

Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010. http://www.scopus.com/inward/record.url?eid=2-s2.0-84883114702&partnerID=MN8TOARS

By: G. Michael Youngblood, V. Bulitko, K. Dill, A. Jhala, B. Schwab & M. Riedl

Contributors: G. Michael Youngblood, V. Bulitko, K. Dill, A. Jhala, B. Schwab & M. Riedl

Source: ORCID
Added: July 14, 2022

2010 conference paper

Siren: Towards adaptive serious games for teaching conflict resolution

4th European Conference on Games Based Learning 2010, ECGBL 2010, 412–417. http://www.scopus.com/inward/record.url?eid=2-s2.0-80053103561&partnerID=MN8TOARS

By: G. Yannakakis, J. Togelius, R. Khaled, A. Jhala, K. Karpouzis, A. Paiva, A. Vasalou

Contributors: G. Yannakakis, J. Togelius, R. Khaled, A. Jhala, K. Karpouzis, A. Paiva, A. Vasalou

Source: ORCID
Added: July 14, 2022

2010 conference paper

Applying goal-driven autonomy to starcraft

Proceedings of the 6th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment, AIIDE 2010, 101–106. http://www.scopus.com/inward/record.url?eid=2-s2.0-84867392807&partnerID=MN8TOARS

By: B. Weber, M. Mateas & A. Jhala

Contributors: B. Weber, M. Mateas & A. Jhala

Source: ORCID
Added: July 14, 2022

2010 conference paper

Performance Evaluation of an OBS Network as a TandemNetwork of IPP/M/W/W Nodes

Proceedings of the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM). Presented at the 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM), Wellington, New Zealand.

By: L. Battestilli & H. Perros

Event: 4th Asia-Pacific International Symposium on Advanced Reliability and Maintenance Modelling(APARM) at Wellington, New Zealand on December 2-4, 2010

Source: NC State University Libraries
Added: May 27, 2022

2010 report

The Role of Symbolic, Numeric and Algebraic Computation in Cyber-Enabled Discovery and Innovation (CDI)

In Future Directions of Symbolic Computation Research And Their Applications to the Domain Sciences. University of Rhode Island.

Source: NC State University Libraries
Added: March 26, 2022

2010 journal article

Automatic hint generation for logic proof tutoring using historical data

Journal of Educational Technology & Society, 13(1), 3–12.

By: T. Barnes & J. Stamper

Source: NC State University Libraries
Added: December 25, 2021

2010 chapter

Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks

In F. Massacci, D. Wallach, & N. Zannone (Eds.), Engineering Secure Software and Systems. ESSoS 2010 (pp. 192–200).

co-author countries: United States of America 🇺🇸

Ed(s): F. Massacci, D. Wallach & N. Zannone

Source: Crossref
Added: August 14, 2021

2010 conference paper

Online vs. on-paper exams

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

2010 conference paper

Daily course evaluation with Google forms

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

2010 conference paper

Teaching interactively with Google docs

Proceedings of the 2010 ASEE Annual Conference and Exposition. Presented at the 2010 American Society for Engineering Education Annual Conference and Exposition, Louisville, KY.

By: E. Gehringer

Event: 2010 American Society for Engineering Education Annual Conference and Exposition at Louisville, KY on June 20-23, 2010

Sources: NC State University Libraries, ORCID
Added: March 17, 2021

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.