College of Information Sciences and Technology

  • United States

Research Output 1976 2020

2 Citations (Scopus)

Behavioral representation in modeling and simulation: Introduction to CMOT special issue-BRiMS 2009

Kennedy, W. G., Ritter, F. E. & Best, B. J., Oct 7 2010, In : Computational and Mathematical Organization Theory. 16, 3, p. 217-219 3 p.

Research output: Contribution to journalEditorial

Modeling and Simulation
Modeling and simulation
1 Citation (Scopus)

Behavioral representation in modeling and simulation introduction to CMOT special issue-BRiMS 2010

Kennedy, W. G., Ritter, F. E. & Best, B. J., Sep 1 2011, In : Computational and Mathematical Organization Theory. 17, 3, p. 225-228 4 p.

Research output: Contribution to journalEditorial

Cognitive Modeling
Agent-based Modeling
Modeling and Simulation
Agent-based modeling
Modeling and simulation

Behavior and information technology

Sears, A. & Jacko, J. A., May 1 2005, In : Behaviour and Information Technology. 24, 3, p. 159-160 2 p.

Research output: Contribution to journalEditorial

66 Citations (Scopus)

Behavior based software theft detection

Wang, X., Jhi, Y. C., Zhu, S. & Liu, P., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 280-290 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
2 Citations (Scopus)

Behavior decomposition: Aspect-level browser extension clustering and its security implications

Zhao, B. & Liu, P., Dec 2 2013, Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Proceedings. p. 244-264 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8145 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering
Decomposition
Decompose
Safety
Subgraph
16 Citations (Scopus)

Behavior evolution and event-driven growth dynamics in social networks

Qiu, B., Ivanova, K., Yen, J. & Liu, P., Nov 29 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 217-224 8 p. 5590443. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

Behavior representation in modeling and simulation: introduction to CMOT special issue: BRiMS 2013

Kennedy, W. G., St. Amant, R. & Reitter, D., Mar 1 2016, In : Computational and Mathematical Organization Theory. 22, 1, p. 1-3 3 p.

Research output: Contribution to journalArticle

Modeling and Simulation
Modeling and simulation
5 Citations (Scopus)

Behavioural description based web service composition using abstraction and refinement

Kil, H., Nam, W. & Lee, D., Apr 11 2013, In : International Journal of Web and Grid Services. 9, 1, p. 54-81 28 p.

Research output: Contribution to journalArticle

Web services
Chemical analysis
9 Citations (Scopus)

Behind Linus's law: A preliminary analysis of open source software peer review practices in Mozilla and Python

Wang, J. & Carroll, J., Dec 15 2011, Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, CTS 2011. p. 117-124 8 p. 5928673. (Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, CTS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open source software
114 Citations (Scopus)

Being a turker

Martin, D., Hanrahan, B. V., O'Neill, J. & Gupta, N., Jan 1 2014, CSCW 2014 - Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. Association for Computing Machinery, p. 224-235 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stars
Economics
1 Citation (Scopus)

Being networked and being engaged

Jansen, B. J., Sobel, K. & Cook, G., Mar 18 2011, Proceedings of the 2011 iConference: Inspiration, Integrity, and Intrepidity, iConference 2011. p. 130-136 7 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Marketing
Internet
Industry
3 Citations (Scopus)

Beliefs about computing: Contrary evidence from a study of mobile computing use among criminal justice personnel

Tapia, A. & Sawyer, S., Jan 1 2005, Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges - IFIP TC8 WG 8.2 International Working Conference. Springer New York LLC, p. 109-122 14 p. (IFIP Advances in Information and Communication Technology; vol. 185).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile computing
Personnel
Telecommunication networks
Lenses
Communication
2 Citations (Scopus)

BenSOA: A flexible service-oriented architecture for power system asset management

Pham, H. Q., Santhanam, G. R., McCalley, J. D. & Honavar, V. G., Dec 1 2009, 41st North American Power Symposium, NAPS 2009. 5483991. (41st North American Power Symposium, NAPS 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Asset management
Service oriented architecture (SOA)
Decomposition
Monitoring
25 Citations (Scopus)

Better home shopping or new democracy? Evaluating community network outcomes

Carroll, J. M. & Rosson, M. B., Jan 1 2001, p. 372-379. 8 p.

Research output: Contribution to conferencePaper

Internet
Economics
30 Citations (Scopus)

Better Naive Bayes classification for high-precision spam detection

Song, Y., Kołcz, A. & Gilez, C. L., Aug 10 2009, In : Software - Practice and Experience. 39, 11, p. 1003-1024 22 p.

Research output: Contribution to journalArticle

Collaborative filtering
Electronic mail
Learning systems
Classifiers
Agglomeration
47 Citations (Scopus)

Beyond being aware

Carroll, J., Rosson, M. B., Farooq, U. & Xiao, L., Jul 1 2009, In : Information and Organization. 19, 3, p. 162-185 24 p.

Research output: Contribution to journalArticle

Interchanges
interaction
Information systems
community
information system
2 Citations (Scopus)

Beyond errors: Measuring reliability for error-prone interaction devices

Feng, J. & Sears, A. L., Mar 1 2010, In : Behaviour and Information Technology. 29, 2, p. 149-163 15 p.

Research output: Contribution to journalArticle

Self-Help Devices
Equipment and Supplies
Aptitude
Entropy
interaction
1 Citation (Scopus)

Beyond fixing bugs: Case studies of creative collaboration in open source software bug fixing processes

Wang, J. & Carroll, J., Nov 3 2011, C and C 2011 - Proceedings of the 8th ACM Conference on Creativity and Cognition. Association for Computing Machinery, Inc, p. 397-398 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software engineering
Open source software
4 Citations (Scopus)

Beyond harmonization: ICT policymaking in regional economic communities

Maitland, C. F. & Van Gorp, A., Jan 1 2009, In : Information Society. 25, 1, p. 23-37 15 p.

Research output: Contribution to journalArticle

Adaptive systems
System theory
harmonization
Lenses
communication technology

Beyond Leaders and Followers: Understanding Participation Dynamics in Event-Based Social Networks

Chen, J., Wang, X., Beck, J., Wu, C. & Carroll, J. M., Dec 14 2019, In : International Journal of Human-Computer Interaction. 35, 20, p. 1892-1905 14 p.

Research output: Contribution to journalArticle

follower
social network
leader
participation
event
7 Citations (Scopus)

Beyond news contents: The role of social context for fake news detection

Shu, K., Wang, S. & Liu, H., Jan 30 2019, WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, p. 312-320 9 p. (WSDM 2019 - Proceedings of the 12th ACM International Conference on Web Search and Data Mining).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Costs
Experiments
2 Citations (Scopus)
ontology
Ontology
persistence
Towers
communication

Beyond remote control: Exploring natural gesture inputs for smart TV systems

Wu, H., Yang, L., Fu, S. & Zhang, X. L., Jan 1 2019, In : Journal of Ambient Intelligence and Smart Environments. 11, 4, p. 335-354 20 p.

Research output: Contribution to journalArticle

Remote control
Television
Air
2 Citations (Scopus)

Beyond saliency: Assessing visual balance with high-level cues

Kandemir, B., Zhou, Z., Li, J. & Wang, J., Oct 23 2017, Thematic Workshops 2017 - Proceedings of the Thematic Workshops of ACM Multimedia 2017, co-located with MM 2017. Association for Computing Machinery, Inc, p. 26-34 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Saliency
Chemical analysis
Saliency Map
Photography
Linear regression

Beyond SYNCOIN: Informational requirements for the three-block war

Graham, J., Grace, W. R. & Sridhara, A. K., Oct 3 2014, FUSION 2014 - 17th International Conference on Information Fusion. Institute of Electrical and Electronics Engineers Inc., 6916085. (FUSION 2014 - 17th International Conference on Information Fusion).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Military operations
Fusion reactions
Composite materials
Processing

Beyond the individual privacy paradigm: Implications for interpersonal interactions on facebook

Shi, P., Xu, H. & Zhang, C., 2012, 25th Bled eConference - eDependability: Reliable and Trustworthy eStructures, eProcesses, eOperations and eServices for the Future, Proceedings. Bled eCommerce Conference, p. 573-586 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Launching
Paradigm
Interaction
Facebook
Privacy
14 Citations (Scopus)

Beyond the ranked list: User-driven exploration and diversification of social recommendation

Tsai, C. H. & Brusilovsky, P., Mar 5 2018, IUI 2018 - Proceedings of the 23rd International Conference on Intelligent User Interfaces. Association for Computing Machinery, p. 239-250 12 p. (International Conference on Intelligent User Interfaces, Proceedings IUI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
50 Citations (Scopus)

Beyond the trustworthy tweet: A deeper understanding of microblogged data use by disaster response and humanitarian relief organizations

Tapia, A. H., Moore, K. A. & Johnson, N. J., Jan 1 2013, ISCRAM 2013 Conference Proceedings - 10th International Conference on Information Systems for Crisis Response and Management. Karlsruher Institut fur Technologie (KIT), p. 770-779 10 p. (ISCRAM 2013 Conference Proceedings - 10th International Conference on Information Systems for Crisis Response and Management).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Information management
18 Citations (Scopus)

Beyond user-to-user access control for online social networks

Shehab, M., Squicciarini, A. & Ahn, G. J., Dec 8 2008, Information and Communications Security - 10th International Conference, ICICS 2008, Proceedings. p. 174-189 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5308 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access Control
Access control
Social Networks
Attribute
User Profile

Beyond word2vec: Distance-graph tensor factorization for word and document embeddings

Wang, S., Aggarwal, C. & Liu, H., Nov 3 2019, CIKM 2019 - Proceedings of the 28th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 1041-1050 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Methodology
Graph
Sampling
Information visualization
Information retrieval

BICA and Sex Differences: We Need to Understand Potential Sex Differences when Developing Computational Models of Human Behavior

Dancy, C. L. & Ritter, F. E., Jan 1 2015, In : Procedia Computer Science. 71, p. 131-132 2 p.

Research output: Contribution to journalConference article

Experiments
36 Citations (Scopus)

Bidding on the buying funnel for sponsored search and keyword advertising

Jansen, B. J. & Schuster, S., Dec 1 2011, In : Journal of Electronic Commerce Research. 12, 1, p. 1-18 18 p.

Research output: Contribution to journalArticle

Marketing
Search engines
Consumer behavior
Sales
Bidding
1 Citation (Scopus)

Bifurcation and discretization errors in the solution on non-Newtonian flow problems

Vrentas, J. S., Duda, J. L. & Chu, C. H., Jan 1 1986, In : Journal of Non-Newtonian Fluid Mechanics. 21, 3, p. 377-383 7 p.

Research output: Contribution to journalArticle

Non Newtonian flow
Non-Newtonian Flow
Discretization Error
Viscoelasticity
viscoelasticity
7 Downloads (Pure)

Big Data, Data Science, and Civil Rights

Barocas, S., Bradley, E., Honavar, V. & Provost, F., Jun 9 2017, Computing Community Consortium.

Research output: Book/ReportCommissioned report

File
1 Citation (Scopus)

Big data in fashion industry: Color cycle mining from runway data

Wong, M. Y., Zhou, Y. & Xu, H., 2016, AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Color
Industry
Textile industry
Big data
Websites
6 Citations (Scopus)
Shale
Water quality
Groundwater
Methane
shale
4 Citations (Scopus)

Big scholarly data in citeseerx: Information extraction from the web

Ororbia, A. G., Wu, J., Khabsa, M., Williams, K. & Giles, C. L., May 18 2015, WWW 2015 Companion - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 597-602 6 p. (WWW 2015 Companion - Proceedings of the 24th International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent systems
World Wide Web
Large scale systems
Big data
2 Citations (Scopus)

Bi-LSTM-CRF sequence labeling for keyphrase extraction from scholarly documents

Al-Zaidy, R. A., Caragea, C. & Giles, C. L., May 13 2019, The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019. Association for Computing Machinery, Inc, p. 2551-2557 7 p. (The Web Conference 2019 - Proceedings of the World Wide Web Conference, WWW 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labeling
Labels
Semantics
Long short-term memory
5 Citations (Scopus)

BIM: Image matching using biological gene sequence alignment

Kim, H. S., Chang, H. W., Liu, H., Lee, J. & Lee, D., Jan 1 2009, 2009 IEEE International Conference on Image Processing, ICIP 2009 - Proceedings. IEEE Computer Society, p. 205-208 4 p. 5414214. (Proceedings - International Conference on Image Processing, ICIP).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image matching
Image processing
Genes
DNA
Proteins
14 Citations (Scopus)

BIM server requirements to support the energy efficient building lifecycle

Jiang, Y., Ming, J., Wu, D., Yen, J., Mitra, P., Messner, J. I. & Leicht, R., Dec 1 2012, Computing in Civil Engineering - Proceedings of the 2012 ASCE International Conference on Computing in Civil Engineering. p. 365-372 8 p. (Congress on Computing in Civil Engineering, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Data privacy
Computer applications
Security of data
Interoperability
1 Citation (Scopus)

Binary code retrofiting and hardening using SGX

Wang, S., Wang, W., Bao, Q., Wang, P., Wang, X. F. & Wu, D., Nov 3 2017, FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 43-49 7 p. (FEAST 2017 - Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Hardening
Cryptography
Semantics
Data storage equipment
9 Citations (Scopus)

Binary search algorithms with interference cancellation for RFID systems

Zhang, N. & Vojcic, B., Dec 1 2005, MILCOM 2005: Military Communications Conference 2005. 1605802. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2005).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio interference
Radio frequency identification (RFID)
1 Citation (Scopus)

BinCFP: Efficient multi-threaded binary code control flow profiling

Ming, J. & Wu, D., Dec 12 2016, Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016. Institute of Electrical and Electronics Engineers Inc., p. 61-66 6 p. 7781797. (Proceedings - 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation, SCAM 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Binary codes
Flow control
Utility programs
Flow graphs
Reverse engineering
31 Citations (Scopus)

Binding objects to scenarios of use

Carroll, J., Mack, R. L., Robertson, S. P. & Rosson, M. B., Jan 1 1994, In : International Journal of Human - Computer Studies. 41, 1-2, p. 243-276 34 p.

Research output: Contribution to journalArticle

scenario
Human computer interaction
Scaffolds
model analysis
Students

BinSIM: Trace-based semantic binary diffing via system call sliced segment equivalence checking

Ming, J., Xu, D., Jiang, Y. & Wu, D., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 253-270 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Malware

Biological rhythms and technology

Matthews, M., Carroll, E., Abdullah, S., Snyder, J., Kay, M., Choudhury, T., Gay, G. & Kientz, J., Jan 1 2014, CHI EA 2014: One of a ChiNd - Extended Abstracts, 32nd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 123-126 4 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Digital devices
Sun
Productivity
Earth (planet)

Biomarker discovery in inflammatory bowel diseases using network-based feature selection

Abbas, M., Matta, J., Le, T., Bensmail, H., Obafemi-Ajayi, T., Honavar, V. & EL-Manzalawy, Y., Jan 1 2019, In : PloS one. 14, 11, e0225382.

Research output: Contribution to journalArticle

Open Access
inflammatory bowel disease
Biomarkers
Inflammatory Bowel Diseases
Feature extraction
biomarkers
6 Citations (Scopus)

Biometrics-based identifiers for digital identity management

Bhargav-Spantzel, A., Squicciarini, A., Bertino, E., Kong, X. & Zhang, W., Jul 1 2010, IDtrust2010 - Proceedings of the 9th Symposium on Identity and Trust on the Internet. p. 84-96 13 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Singular value decomposition
1 Citation (Scopus)

BioNetwork bench: Database and software for storage, query, and analysis of gene and protein networks

Kohutyuk, O., Towfic, F., Heather West Greenlee, M. & Honavar, V., Nov 22 2012, In : Bioinformatics and Biology Insights. 6, p. 235-246 12 p.

Research output: Contribution to journalReview article

Gene Regulatory Networks
Software
Genes
Databases
Query

Bistable reflection at the nonlinear interface with linear magnetic properties

Galanti, C. B. & Giles, C. L., Jan 29 1985, In : Proceedings of SPIE - The International Society for Optical Engineering. 517, p. 219-225 7 p.

Research output: Contribution to journalArticle

Magnetic Properties
Magnetic properties
Magnetic permeability
magnetic properties
Permeability