Operations Research

College of Engineering

Works Published in 2017

copy embed code
Copy Embed Code Experiment

You can embed this resource into your own website. To do so, either use the code generated by us, or use the link and tweak the rest to your preferences. Copy the respective code or link below.

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2017 journal article

Genetic architecture of natural variation underlying adult foraging behavior that is essential for survival of Drosophila melanogaster

Genome Biology and Evolution, 9(5), 1357–1369.

By: Y. Lee, Q. Yang, W. Chi, S. Turkson, W. Du, C. Kemkemer, Z. Zeng, M. Long, X. Zhuang

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

An augmented IIM & preconditioning technique for jump embedded boundary conditions

An augmented IIM & preconditioning technique for jump embedded boundary conditions. International Journal of Numerical Analysis and Modeling, 14(4-5), 712–729.

By: P. Angot & Z. Li

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

A novel framework for software defined based secure storage systems

Simulation Modelling Practice and Theory, 77, 407–423.

By: A. Darabseh, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa, M. Vouk & A. Rindos

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Hybrid optimization and Bayesian inference techniques for a non-smooth radiation detection problem

International Journal for Numerical Methods in Engineering, 111(10), 955–982.

By: R. Ştefănescu, K. Schmidt, J. Hite, R. Smith & J. Mattingly

Sources: NC State University Libraries, Crossref, ORCID
Added: August 6, 2018

2017 journal article

Bayesian estimation of principal components for functional data

Bayesian Analysis, 12(2), 311–333.

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Using an AHP-ISM based method to study the vulnerability factors of urban rail transit system

Sustainability, 9(6).

By: L. Song, Q. Li, G. List, Y. Deng & P. Lu

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Efficient Bayesian estimation and uncertainty quantification in ordinary differential equation models

Bernoulli, 23(4B), 3537–3570.

By: P. Bhaumik & S. Ghosal

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Centrally controlled mass data offloading using vehicular traffic

IEEE Transactions on Network and Service Management, 14(2), 401–415.

By: B. Baron, P. Spathis, H. Rivano, M. Amorim, Y. Viniotis & M. Ammar

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Best L1 approximation of Heaviside-type functions from Chebyshev and weak-Chebyshev spaces

Numerical Algorithms, 75(3), 827–843.

By: L. Gajny, O. Gibaru, E. Nyiri & S. Fang

Sources: NC State University Libraries, ORCID, Crossref
Added: August 6, 2018

2017 journal article

Adaptive subdomain modeling: A multi-analysis technique for ocean circulation models

Ocean Modelling, 115, 86–104.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2017 journal article

Adaptive filtering for hidden node detection and tracking in networks

Chaos (Woodbury, N.Y.), 27(7).

By: F. Hamilton, B. Setzer, S. Chavez, H. Tran & A. Lloyd

Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

A comparison of IoT application layer protocols through a smart parking implementation

Proceedings of the 2017 20th conference on innovations in clouds, internet and networks (icin), 331–336.

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Successive linear approximation methods for leak detection in water distribution systems

Journal of Water Resources Planning and Management, 143(8).

By: A. Berglund, V. Areti, D. Brill & G. Mahinthakumar

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Sharing Policies in Multiuser Privacy Scenarios: Incorporating Context, Preferences, and Arguments in Decision Making

ACM Transactions on Computer-Human Interaction, 24(1).

By: R. Fogues, P. Murukannaiah, J. Such & M. Singh

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2017 journal article

Continuous Authentication and Authorization for the Internet of Things

IEEE Internet Computing, 21(2), 86–90.

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2017 journal article

Time-based switching control of genetic regulatory networks: toward sequential drug intake for cancer therapy

Cancer Informatics, 16.

By: W. Oduola, X. Li, C. Duan, L. Qian, F. Wu & E. Dougherty

Source: NC State University Libraries
Added: August 6, 2018

2017 article

Risk management consideration in the bioeconomy

Biofuels, Bioproducts & Biorefining: BIOFPR, Vol. 11, pp. 549–566.

By: C. Assis, R. Gonzalez, S. Kelley, H. Jameel, T. Bilek, J. Daystar, R. Handfield, J. Golden ...

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2017 journal article

On distance-adaptive routing and spectrum assignment in mesh elastic optical networks

Journal of Optical Communications and Networking, 9(5), 456–465.

Source: NC State University Libraries
Added: August 6, 2018

2017 journal article

Mixed-integer linear programming approach for scheduling repetitive projects with time-cost trade-off consideration

Journal of Computing in Civil Engineering, 31(3).

By: X. Zou, S. Fang, Y. Huang & L. Zhang

Sources: NC State University Libraries, ORCID
Added: August 6, 2018

2017 journal article

Bayesian quantile regression using random B-spline series prior

Computational Statistics & Data Analysis, 109, 121–143.

By: P. Das & S. Ghosal

Source: NC State University Libraries
Added: August 6, 2018