Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2014
Computation of an Equilibrium in Spectrum Markets for Cognitive Radio Networks
IEEE Transactions on Computers (ITCO), Volume 63, Issue 2Pages 304–316https://doi.org/10.1109/TC.2012.211In this paper, we investigate a market equilibrium in multichannel sharing cognitive radio networks (CRNs): it is assumed that every subchannel is orthogonally licensed to a single primary user (PU), and can be shared with multiple secondary users (SUs)...
- research-articleFebruary 2014
Generalized Hypercubes: Edge-Disjoint Hamiltonian Cycles and Gray Codes
IEEE Transactions on Computers (ITCO), Volume 63, Issue 2Pages 375–382https://doi.org/10.1109/TC.2012.192Some new classes of Hamming metric Gray codes over $(Z_p^n)$, where $(p)$ is a prime and $(n)$ is an integer power of 2, are described; then, how these Gray codes can be used to generate the maximum number of edge-disjoint Hamiltonian cycles in an $(n)$-...
- articleJanuary 2014
Retrofitting Security into Network Protocols: The Case of DNSSEC
IEEE Internet Computing (IEEECS_INTERNET), Volume 18, Issue 1Pages 66–71https://doi.org/10.1109/MIC.2014.14DNS Security Extensions (DNSSEC) became standardized more than 15 years ago, but its adoption is still limited. The recent publication of several new, off-path DNS cache-poisoning and wide-scale man-in-the-middle attacks should motivate DNSSEC adoption. ...
- articleJanuary 2014
EPE: An Embedded Personalization Engine for Mobile Users
IEEE Internet Computing (IEEECS_INTERNET), Volume 18, Issue 1Pages 30–37https://doi.org/10.1109/MIC.2013.124The proposed embedded personalization engine (EPE) utilizes valuable in-device usage data for inferring mobile user interests in a privacy-preserving manner. To provide users with personalized services, the proposed approach analyzes both the usage data ...
- articleDecember 2013
Supporting Domain Analysis through Mining and Recommending Features from Online Product Listings
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 12Pages 1736–1752https://doi.org/10.1109/TSE.2013.39Domain analysis is a labor-intensive task in which related software systems are analyzed to discover their common and variable parts. Many software projects include extensive domain analysis activities, intended to jumpstart the requirements process ...
-
- research-articleDecember 2013
When the Cloud Goes Local: The Global Problem with Data Localization
Computer (COMP), Volume 46, Issue 12Pages 54–59https://doi.org/10.1109/MC.2013.402Ongoing efforts to legally define cloud computing and regulate separate parts of the Internet are unlikely to address underlying concerns about data security and privacy. Data localization initiatives, led primarily by European countries, could actually ...
- research-articleOctober 2013
Incremental Learning of Concept Drift from Streaming Imbalanced Data
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 25, Issue 10Pages 2283–2301https://doi.org/10.1109/TKDE.2012.136Learning in nonstationary environments, also known as learning concept drift, is concerned with learning from data whose statistical characteristics change over time. Concept drift is further complicated if the data set is class imbalanced. While these ...
- articleSeptember 2013
Priority-Based Consolidation of Parallel Workloads in the Cloud
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 9Pages 1874–1883https://doi.org/10.1109/TPDS.2012.262The cloud computing paradigm is attracting an increased number of complex applications to run in remote data centers. Many complex applications require parallel processing capabilities. Parallel applications of certain nature often show a decreasing ...
- articleSeptember 2013
Static and Dynamic Structural Correlations in Graphs
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 25, Issue 9Pages 2147–2160https://doi.org/10.1109/TKDE.2012.133Real-life graphs not only contain nodes and edges, but also have events taking place, e.g., product sales in social networks. Among different events, some exhibit strong correlations with the network structure, while others do not. Such structural ...
- articleSeptember 2013
Discrete Elastic Inner Vector Spaces with Application to Time Series and Sequence Mining
IEEE Transactions on Knowledge and Data Engineering (IEEECS_TKDE), Volume 25, Issue 9Pages 2024–2035https://doi.org/10.1109/TKDE.2012.131This paper proposes a framework dedicated to the construction of what we call discrete elastic inner product allowing one to embed sets of nonuniformly sampled multivariate time series or sequences of varying lengths into inner product space structures. ...
- research-articleSeptember 2013
Understanding How Companies Interact with Free Software Communities
IEEE Software (ISFT), Volume 30, Issue 5Pages 38–45https://doi.org/10.1109/MS.2013.95Free, open source software development communities can become large and complex. They can also be a focus of interest for competing companies relying on their outcomes, with employees joining the development and maintenance effort. In those cases, it's ...
- research-articleSeptember 2013
Mining Artful Processes from Knowledge Workers' Emails
IEEE Internet Computing (IEEECS_INTERNET), Volume 17, Issue 5Pages 10–20https://doi.org/10.1109/MIC.2013.60MailOfMine aims at automatically building a set of workflow models--which represent the artful processes behind knowledge workers' activities--on top of a collection of email messages. Such models formalize the unspecified agile processes that knowledge ...
- research-articleSeptember 2013
Optimal-Scaling-Factor Assignment for Patch-wise Image Retargeting
IEEE Computer Graphics and Applications (ICGA), Volume 33, Issue 5Pages 68–78https://doi.org/10.1109/MCG.2012.123Image retargeting adjusts images to arbitrary sizes such that they can be viewed on different displays. Content-aware image retargeting has been receiving increased attention. In particular, researchers have improved a patch-wise scaling method for image ...
- research-articleSeptember 2013
An Empirical Study of a Chinese Online Social Network--Renren
Computer (COMP), Volume 46, Issue 9Pages 78–84https://doi.org/10.1109/MC.2013.1Deeper knowledge of social networks' structure and temporal evolution enhances data mining for both research and education purposes. An empirical analysis of a Chinese social network, Renren, shows that it follows an exponentially truncated power law in ...
- articleAugust 2013
Quantifying the Effect of Code Smells on Maintenance Effort
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 8Pages 1144–1156https://doi.org/10.1109/TSE.2012.89Context: Code smells are assumed to indicate bad design that leads to less maintainable code. However, this assumption has not been investigated in controlled studies with professional software developers. Aim: This paper investigates the relationship ...
- research-articleJuly 2013
How Visualization Layout Relates to Locus of Control and Other Personality Factors
- Caroline Ziemkiewicz,
- Alvitta Ottley,
- R. Jordan Crouser,
- Ashley Rye Yauilla,
- Sara L. Su,
- William Ribarsky,
- Remco Chang
IEEE Transactions on Visualization and Computer Graphics (ITVC), Volume 19, Issue 7Pages 1109–1121https://doi.org/10.1109/TVCG.2012.180Existing research suggests that individual personality differences are correlated with a user's speed and accuracy in solving problems with different types of complex visualization systems. We extend this research by isolating factors in personality ...
- research-articleJuly 2013
Verifying Linearizability via Optimized Refinement Checking
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 7Pages 1018–1039https://doi.org/10.1109/TSE.2012.82Linearizability is an important correctness criterion for implementations of concurrent objects. Automatic checking of linearizability is challenging because it requires checking that: 1) All executions of concurrent operations are serializable, and 2) ...
- research-articleJuly 2013
Amorphous Slicing of Extended Finite State Machines
IEEE Transactions on Software Engineering (ISOF), Volume 39, Issue 7Pages 892–909https://doi.org/10.1109/TSE.2012.72Slicing is useful for many software engineering applications and has been widely studied for three decades, but there has been comparatively little work on slicing extended finite state machines (EFSMs). This paper introduces a set of dependence-based ...
- research-articleJuly 2013
ASAP: Scalable Collision Arbitration for Large RFID Systems
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 7Pages 1277–1288https://doi.org/10.1109/TPDS.2012.64The growing importance of operations such as identification, location sensing, and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFID) systems. Enjoying the low cost of RFID tags, modern RFID systems tend ...
- research-articleJuly 2013
Resisting Web Proxy-Based HTTP Attacks by Temporal and Spatial Locality Behavior
IEEE Transactions on Parallel and Distributed Systems (TPDS), Volume 24, Issue 7Pages 1401–1410https://doi.org/10.1109/TPDS.2012.232A novel server-side defense scheme is proposed to resist the Web proxy-based distributed denial of service attack. The approach utilizes the temporal and spatial locality to extract the behavior features of the proxy-to-server traffic, which makes the ...