Works Published in 2016

search works

Displaying works 21 - 40 of 188 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2016 journal article

Güven: estimating trust from communications

Journal of Trust Management, 3(1).

By: A. Kalia n, Z. Zhang* & M. Singh n

TL;DR: Güven incorporates a probabilistic model for trust based on commitment outcomes and shows how to train its parameters for each subject based on the subject’s assessments; the results are promising, though imperfect. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Crossref, NC State University Libraries
Added: September 3, 2020

2016 journal article

Modeling vehicle car-following behavior in congested traffic conditions based on different vehicle combinations

Transportation Letters, 10(5), 280–293.

author keywords: Car-following behavior; vehicle combination; vehicle interaction; cellular automata; freeway traffic flow; congested traffic condition
TL;DR: An improved cellular automaton model in congested traffic conditions that differentiates vehicle combinations to consider both vehicle physical performance and driving behavior difference in car-following behavior is developed. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Crossref
Added: August 28, 2020

2016 chapter

Knowledge-Guided Maximal Clique Enumeration

In Advanced Data Mining and Applications (pp. 604–618).

By: S. Harenberg n, R. Seay n, G. Bello n, R. Chirkova n, P. Doraiswamy* & N. Samatova n

TL;DR: The problem of knowledge-biased clique enumeration is introduced, a query-driven formulation that reduces output space, computation time, and memory usage, and a dynamic state space indexing strategy for efficiently processing multiple queries over the same graph is introduced. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2016 journal article

Distance-adaptive routing and spectrum assignment in rings

IET Networks, 5(3), 64–70.

By: S. Talebi n, I. Katib* & G. Rouskas n

TL;DR: The authors first show that the distance-adaptive routing and spectrum assignment (DA-RSA) problem is a special case of a multiprocessor scheduling problem, and develop a suite of efficient and effective DA-Rsa algorithms for ring networks, that build upon list scheduling concepts. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: February 24, 2020

2016 journal article

Special issue on advances in availability and survivability in optical networks

Optical Switching and Networking, 19, 41.

Sources: Crossref, NC State University Libraries
Added: February 24, 2020

2016 journal article

Assessing Run-time Overhead of Securing Kepler

Procedia Computer Science, 80, 2281–2286.

author keywords: Kepler; security; provenance; data integrity; performance overhead
TL;DR: The Security Analysis Package (SAP) leverages Kepler's Provenance Recorder (PR) to secure data flows from external input-based attacks, from access to unauthorized exter- nal sites, and from data integrity issues. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2016 journal article

Toward a Normative Approach for Forensicability

Symposium and Bootcamp on the Science of Security.

Contributors: L. Williams n, O. Kafali n & M. Singh n

author keywords: Forensic logging; security; sociotechnical systems; requirements; social norms
TL;DR: The goal of this research is to aid software practitioners to implement automated forensic logging by providing a systematic method of using attackers' malicious intentions to decide what needs to be logged. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: December 10, 2019

2016 journal article

Normative Requirements in Sociotechnical Systems

IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW).

Contributors: N. Ajmeri, O. Kafah & M. Singh

author keywords: Norms; privacy; design patterns
Source: ORCID
Added: December 10, 2019

2016 journal article

Deploying a Social Web Graph Over a Semantic Web Framework

Advances in Soft Computing.

Contributors: A. Singh*, S. Upadhyay* & K. Abhishek*

author keywords: Semantic web; Ontology; OWL (Web ontology language); Social web graph; DL (Description logic)
TL;DR: A Social Web Graph over a Semantic Web Framework that organizes information in triples in addition to having the benefits of a graph to make the information more understandable and easily accessible. (via Semantic Scholar)
Source: ORCID
Added: December 10, 2019

2016 journal article

Formal Understanding of Tradeoffs among Liveness and Safety Requirements

IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE WORKSHOPS (REW).

Contributors: N. Ajmeri, O. Kafali & M. Singh

author keywords: Norms; sociotechnical systems; constraint logic programming
Source: ORCID
Added: December 10, 2019

2016 journal article

Expressing and Reasoning about Conflicting Norms in Cybersecurity: Poster

Symposium and Bootcamp on the Science of Security.

Contributors: J. Doyle n, R. Chirkova n, N. Ajmeri n, J. Jiang n & M. Singh n

author keywords: Normative System; Dominance Relation; Norm
TL;DR: This work adopts a notion of conditional, directed norms as a way to capture the standards of correctness for a collaboration by adapting answer-set programming to compute stable sets of norms with respect to their computed conflicts and dominance. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: ORCID
Added: December 10, 2019

2016 journal article

Classifying sanctions and designing a conceptual sanctioning process model for socio-technical systems

The Knowledge Engineering Review, 31(2), 142–166.

By: L. Nardin*, T. Balke-Visser, N. Ajmeri, A. Kalia, J. Sichman & M. Singh*

Contributors: M. Singh*, J. Sichman, A. Kalia, N. Ajmeri, T. Balke-Visser & L. Nardin*

TL;DR: This work proposes a sanction typology that reflects the relevant features of sanctions, and a conceptual sanctioning process model providing a functional structure for sanctioning in STS, and demonstrates its contributions via a motivating scenario from the domain of renewable energy trading. (via Semantic Scholar)
Sources: ORCID, Crossref, NC State University Libraries
Added: December 10, 2019

2016 conference paper

From Social Machines to Social Protocols

Proceedings of the 25th International Conference on World Wide Web - WWW '16. Presented at the the 25th International Conference.

By: A. Chopra* & M. Singh n

Contributors: A. Chopra* & M. Singh n

Event: the 25th International Conference

TL;DR: This paper introduces Interaction-Oriented Software Engineering (IOSE) as a paradigm expressly suited to capturing the social basis of STSs, and reinterpret the classical software engineering principles for the STS setting and shows how IOSE is better suited than traditional software engineering for supporting social processes. (via Semantic Scholar)
Sources: ORCID, Crossref
Added: December 10, 2019

2016 report

Edge offset in drawings of layered graphs with evenly-spaced nodes on each layer

North Carolina State University. Dept. of Computer Science.

By: M. Stallmann

Source: ORCID
Added: December 6, 2019

2016 report

A gentle introduction to matroid algorithmics

North Carolina State University. Dept. of Computer Science.

By: M. Stallmann

Source: ORCID
Added: December 6, 2019

2016 journal article

An Empirical Analysis of the Impact of the Internet Finance on Money Market

Contemporary Economic Management, 38(7), 84–93.

By: P. Wu, Y. Yao & T. Pang

Source: NC State University Libraries
Added: September 8, 2019

2016 chapter

Active Fault Detection in Nonlinear Differential Algebraic Equations II: Using Linearizations

In D. Martin (Ed.), Fault Detection: Methods, Applications and Technology (pp. 29–51). Hauppauge, NY: Nova Publishers.

By: S. Campbell & J. Scott

Ed(s): D. Martin

Source: NC State University Libraries
Added: September 8, 2019

2016 chapter

Active Fault Detection in Nonlinear Differential Algebraic Equations I: General Systems

In D. Martin (Ed.), Fault Detection: Methods, Applications and Technology (pp. 1–27). Hauppauge, NY: Nova Publishers.

By: S. Campbell

Ed(s): D. Martin

Source: NC State University Libraries
Added: September 8, 2019

2016 journal article

RandNLA, Pythons, and the CUR for your data problems: Reporting from G2S3 in Delphi

SIAM News, 49(1), 7–8.

By: S. Gallopoulos, P. Drineas, I. Ipsen & M. Mahoney

Source: NC State University Libraries
Added: July 28, 2019

2016 journal article

An efficient grid lattice algorithm for pricing American-style options

International Journal of Financial Markets and Derivatives, 5(1), 36.

By: Z. Liu n & T. Pang n

TL;DR: This paper develops a computationally feasible and efficient lattice algorithm in pricing American-style options by building a time adjusted grid lattice model and implementing backward induction to price options. (via Semantic Scholar)
Source: Crossref
Added: July 28, 2019

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.