Computer Science

College of Engineering

Works Published in 2014

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2014 journal article

Comments on: Queueing models for the analysis of communication systems

TOP, 22(2), 458–459.

By: H. Perros

Source: Crossref
Added: August 16, 2021

2014 chapter

Enabling a Package Query Paradigm on the Semantic Web: Model and Algorithms

In A. Hameurlain, J. Küng, & R. Wagner (Eds.), Transactions on Large-Scale Data- and Knowledge-Centered Systems XIII (pp. 1–32).

By: M. Sessoms & K. Anyanwu

Ed(s): A. Hameurlain, J. Küng & R. Wagner

Sources: Crossref, ORCID
Added: April 29, 2021

2014 conference paper

Log Your CRUD: Design Principles for Software Logging Mechanisms

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 5:1–5:10.

By: J. King & L. Williams

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2014 conference paper

Using Templates to Elicit Implied Security Requirements from Functional Requirements - a Controlled Experiment

Proceedings of the 8th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 22:1–22:10.

By: M. Riaz, J. Slankas, J. King & L. Williams

Event: at New York, NY, USA

Source: ORCID
Added: March 17, 2021

2014 journal article

Plans and Planning in Narrative Generation: A Review of Plan-Based Approaches to the Generation of Story, Discourse and Interactivity in Narratives

Sprache Und Datenverarbeitung, 17(1-2), 41–64.

By: R. Young, S. Ware, B. Cassell & J. Robertson

Source: NC State University Libraries
Added: February 12, 2021

2014 book

GIS-based Analysis of Coastal Lidar Time-Series

By: E. Hardin, H. Mitasova, L. Tateosian & M. Overton

Sources: NC State University Libraries, ORCID
Added: February 9, 2021

2014 book

HoTSoS '14 : proceedings of the 2014 Symposium and Bootcamp on the Science of Security (HotSoS) : April 08-09 2014, Raleigh, NC, USA

New York: ACM.

Ed(s): D. Nicol, M. Singh & L. Williams

Source: NC State University Libraries
Added: January 17, 2021

2014 chapter

A Survey of Methods for Improving Review Quality

In Lecture Notes in Computer Science (pp. 92–97).

Source: Crossref
Added: January 5, 2021

2014 chapter

Agile Software Development in Practice

In Lecture Notes in Business Information Processing (pp. 32–45).

By: M. Doyle, L. Williams, M. Cohn & K. Rubin

Source: Crossref
Added: January 5, 2021

2014 chapter

SYRql: A Dataflow Language for Large Scale Processing of RDF Data

In The Semantic Web – ISWC 2014 (pp. 147–163).

By: F. Maali, P. Ravindra, K. Anyanwu & S. Decker

Sources: Crossref, ORCID
Added: November 24, 2020

2014 conference paper

Finding the limit

Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14. Presented at the the 19th international conference.

By: Y. Ding, M. Zhou, Z. Zhao, S. Eisenstat & X. Shen

Event: the 19th international conference

Sources: Crossref, ORCID
Added: September 5, 2020

2014 conference paper

Challenging the "embarrassingly sequential"

Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14. Presented at the the 19th international conference.

By: Z. Zhao, B. Wu & X. Shen

Event: the 19th international conference

Sources: Crossref, ORCID
Added: September 5, 2020

2014 conference paper

Localization of concurrency bugs using shared memory access pairs

Proceedings of the 29th ACM/IEEE international conference on Automated software engineering - ASE '14. Presented at the the 29th ACM/IEEE international conference.

By: W. Wang, Z. Wang, C. Wu, P. Yew, X. Shen, X. Yuan, J. Li, X. Feng, Y. Guan

Event: the 29th ACM/IEEE international conference

Sources: Crossref, ORCID
Added: September 5, 2020

2014 conference paper

SatScore

Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '14 Adjunct. Presented at the the 2014 ACM International Joint Conference.

By: Z. Zhao, M. Zhou & X. Shen

Event: the 2014 ACM International Joint Conference

Sources: Crossref, ORCID
Added: September 5, 2020

2014 chapter

PExy: The Other Side of Exploit Kits

In Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 132–151).

By: G. De Maio, A. Kapravelos, Y. Shoshitaishvili, C. Kruegel & G. Vigna

Source: Crossref
Added: August 28, 2020

2014 journal article

Choose to Change: The West Virginia Early Childhood Obesity Prevention Project

Journal of Nutrition Education and Behavior, 46(4), S197.

By: S. Partington, E. Murphy, E. Bowen, D. Lacombe, G. Piras, L. Cottrell, T. Menzies

Source: Crossref
Added: August 28, 2020

2014 journal article

Special issue on realizing artificial intelligence synergies in software engineering

Software Quality Journal, 22(1), 49–50.

By: T. Menzies & M. Mernik

Source: Crossref
Added: August 28, 2020

2014 chapter

Can Diagrams Predict Essay Grades?

In Intelligent Tutoring Systems (pp. 260–265).

By: C. Lynch, K. Ashley & M. Chi

Source: Crossref
Added: August 28, 2020

2014 chapter

When Is Tutorial Dialogue More Effective Than Step-Based Tutoring?

In Intelligent Tutoring Systems (pp. 210–219).

By: M. Chi, P. Jordan & K. VanLehn

Source: Crossref
Added: August 28, 2020

2014 chapter

Fast Set Intersection through Run-Time Bitmap Construction over PForDelta-Compressed Indexes

In Lecture Notes in Computer Science (pp. 668–679).

By: X. Zou, S. Lakshminarasimhan, D. Boyuka, S. Ranshous, H. Tang, S. Klasky, N. Samatova

Source: Crossref
Added: August 28, 2020