College of Information Sciences and Technology

  • United States

Research Output 1976 2020

1 Citation (Scopus)

Analyzing Second Screen Based Social Soundtrack of TV Viewers from Diverse Cultural Settings

Mukherjee, P. & Jansen, B. J., Jan 1 2015, Social Computing, Behavioral-Cultural Modeling, and Prediction - 8th International Conference, SBP 2015, Proceedings. Xu, K., Agarwal, N. & Osgood, N. (eds.). Springer Verlag, p. 375-380 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9021).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Television
Social Computing
Analysis of variance (ANOVA)
Broadcast
Social Networks
121 Citations (Scopus)

Analyzing the resilience of complex supply network topologies against random and targeted disruptions

Zhao, K., Kumar, A., Harrison, T. P. & Yen, J., Mar 2011, In : IEEE Systems Journal. 5, 1, p. 28-39 12 p., 2100192.

Research output: Contribution to journalArticle

Topology
Complex networks
Supply chains
Logistics
Managers
13 Citations (Scopus)

Analyzing the social capital value chain in community network interfaces

Chewar, C. M., McCrickard, D. S. & Carroll, J. M., Aug 1 2005, In : Internet Research. 15, 3, p. 262-280 19 p.

Research output: Contribution to journalReview article

value chain
Interfaces (computer)
social capital
community
evaluation
2 Citations (Scopus)

Analyzing the social soundtrack from second screens before, during, and after Real-life events

Mukherjee, P. & Jansen, B. J., Dec 17 2015, 2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2015. Institute of Electrical and Electronics Engineers Inc., 7360591. (2015 IEEE Jordan Conference on Applied Electrical Engineering and Computing Technologies, AEECT 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Conservation
Statistical methods
7 Citations (Scopus)

Analyzing vocabulary intersections of expert annotations and topic models for data practices in privacy policies

Liu, F., Wilson, S., Schaub, F. & Sadeh, N., Jan 1 2016, FS-16-01: Artificial Intelligence for Human-Robot Interaction; FS-16-02: Cognitive Assistance in Government and Public Sector Applications; FS-16-03: Cross-Disciplinary Challenges for Autonomous Systems; FS-16-04: Privacy and Language Technologies; FS-16-05: Shared Autonomy in Research and Practice. AI Access Foundation, p. 264-269 6 p. (AAAI Fall Symposium - Technical Report; vol. FS-16-01 - FS-16-05).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Application programs
Learning systems
Logistics
Websites
4 Citations (Scopus)

An analysis of BIM web service requirements and design to support energy efficient building lifecycle

Jiang, Y., Liu, X., Liu, F., Wu, D. & Anumba, C. J., Apr 29 2016, In : Buildings. 6, 2, 20.

Research output: Contribution to journalArticle

Web services
Computer applications
Electronic data interchange
Application programs
Interfaces (computer)
3 Citations (Scopus)

An analysis of cognitive learning context in MOOC forum messages

Wong, J. S., Pursel, B., Divinsky, A. & Jansen, B. J., May 7 2016, CHI EA 2016: #chi4good - Extended Abstracts, 34th Annual CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, p. 1315-1321 7 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 07-12-May-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taxonomies
Students
Communication
1 Citation (Scopus)

An analysis of conformational changes upon RNA-Protein binding

Sankar, K., Jernigan, R. L., Walia, R. R., Honavar, V. G., Mann, C. M. & Dobbs, D., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, Inc, p. 592-593 2 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

RNA-Binding Proteins
RNA
Proteins
Inborn Genetic Diseases
Protein Binding
33 Citations (Scopus)

An Analysis of MOOC Discussion Forum Interactions from the Most Active Users

Wong, J. S., Pursel, B., Divinsky, A. & Jansen, B. J., Jan 1 2015, Social Computing, Behavioral-Cultural Modeling, and Prediction - 8th International Conference, SBP 2015, Proceedings. Xu, K., Agarwal, N. & Osgood, N. (eds.). Springer Verlag, p. 452-457 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9021).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Students
Communication
Interaction
Vote
Verify
28 Citations (Scopus)

An analysis of multimedia searching on altavista

Jansen, B. J., Spink, A. & Pedersen, J., Nov 7 2003, Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, MIR 2003. Association for Computing Machinery, Inc, p. 186-192 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
Information systems
60 Citations (Scopus)

An analysis of noise in recurrent neural networks: Convergence and generalization

Jim, K. C., Giles, C. L. & Horne, B. G., Dec 1 1996, In : IEEE Transactions on Neural Networks. 7, 6, p. 1424-1438 15 p.

Research output: Contribution to journalArticle

Recurrent neural networks
Recurrent Neural Networks
Term
Grammar
Additive noise

An analysis of searchers' perceptions of sponsored and non-sponsored links using nested design

Ying, Z. & Jansen, B. J., 2007, ASIST 2007 Proceedings of the 70th ASIS and T Annual Meeting - Joining Research and Practice: Social Computing and Information Science. Vol. 44.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
search engine
reputation
evaluation
statistical method
12 Citations (Scopus)

An analysis of the changing demand patterns for information technology professionals

Gallivan, M., Truex, D. P. & Kvasny, L., 2002, Proceedings of the ACM SIGCPR Conference. p. 1-13 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Marketing
Industry
116 Citations (Scopus)

An analysis of web documents retrieved and viewed

Jansen, B. J. & Spink, A., 2003, Proceedings of the International Conference on Internet Computing, IC 03. Arabnia, H. R. & Mun, Y. (eds.). Vol. 1. p. 65-69 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Search engines
World Wide Web
Websites
114 Citations (Scopus)

An analysis of Web searching by European AlltheWeb.com users

Jansen, B. J. & Spink, A., Mar 2005, In : Information Processing and Management. 41, 2, p. 361-381 21 p.

Research output: Contribution to journalArticle

Search engines
search engine
Industry
Information systems
information content
2 Citations (Scopus)

An architecture and key management approach for maintaining privacy in location based group services

Sun, Y., Liu, P., Kermani, P. & La Porta, T. F., Dec 1 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing. Vol. 2005. 1651222

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Location based services
7 Citations (Scopus)

An architecture for creating collaborative semantically capable scientific data sharing infrastructures

Jaiswal, A. R., Giles, C. L., Mitra, P. & Wang, J. Z., Dec 1 2006, CIKM 2006 Workshop - Proceedings of WIDM 2006: Eighth International Workshop on Web Information and Data Management. p. 75-82 8 p. (Proceedings of the Interntational Workshop on Web Information and Data Management).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Metadata
Availability
16 Citations (Scopus)

An architecture for information extraction from figures in digital libraries

Choudhury, S. R. & Giles, C. L., May 18 2015, WWW 2015 Companion - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 667-672 6 p. (WWW 2015 Companion - Proceedings of the 24th International Conference on World Wide Web).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital libraries
Search engines
Metadata
Image processing
Semantics
6 Citations (Scopus)

An architecture for integrating expert systems

Fraser, N. M., Hipel, K. W., Kilgour, D. M., McNeese, M. D. & Snyder, D. E., Sep 1989, In : Decision Support Systems. 5, 3, p. 263-276 14 p.

Research output: Contribution to journalArticle

Expert Systems
Expert systems
Decision support systems
Large scale systems
Decision making
1 Citation (Scopus)

An assessment of accountability policies for Large-Scale distributed computing systems

Lee, W., Squicciarini, A. & Bertino, E., Nov 9 2009, CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies. 39. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Grid computing
Energy management
Distributed computer systems
Computer systems
Experiments
13 Citations (Scopus)

Anatomy of online hate: Developing a taxonomy and machine learning models for identifying and classifying hate in online news media

Salminen, J., Almerekhi, H., Milenković, M., Jung, S. G., An, J., Kwak, H. & Jansen, B. J., Jan 1 2018, 12th International AAAI Conference on Web and Social Media, ICWSM 2018. AAAI press, p. 330-339 10 p. (12th International AAAI Conference on Web and Social Media, ICWSM 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taxonomies
Learning systems
Adaptive boosting
Decision trees
Logistics
2 Citations (Scopus)

An attack-resilient channel assignment MAC protocol

Zang, W., Gu, Q., Yu, M. & Liu, P., Dec 1 2009, NBiS 2009 - 12th International Conference on Network-Based Information Systems. p. 246-253 8 p. 5349918. (NBiS 2009 - 12th International Conference on Network-Based Information Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Wireless networks
Jamming
Interfaces (computer)

An Attention-based Recurrent Neural Networks Framework for Health Data Analysis

Suo, Q., Ma, F., Canino, G., Gao, J., Zhang, A., Gnasso, A., Tradigo, G. & Veltri, P., Jan 1 2018, In : CEUR Workshop Proceedings. 2161

Research output: Contribution to journalConference article

Recurrent neural networks
Health
2 Citations (Scopus)

An automated segmentation method for lung parenchyma image sequences based on fractal geometry and convex hull algorithm

Xiao, X., Zhao, J., Qiang, Y., Wang, H., Xiao, Y., Zhang, X. & Zhang, Y., May 21 2018, In : Applied Sciences (Switzerland). 8, 5, 832.

Research output: Contribution to journalArticle

nodules
Fractals
lungs
fractals
Repair
7 Citations (Scopus)

Android malware development on public malware scanning platforms: A large-scale data-driven study

Huang, H., Zheng, C., Zeng, J., Zhou, W., Zhu, S., Liu, P., Chari, S. & Zhang, C., Jan 1 2016, Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016. Ak, R., Karypis, G., Xia, Y., Hu, X. T., Yu, P. S., Joshi, J., Ungar, L., Liu, L., Sato, A-H., Suzumura, T., Rachuri, S., Govindaraju, R. & Xu, W. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1090-1099 10 p. 7840712. (Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scanning
Websites
Malware
Testing
Industry

Android STAR: An efficient interaction-preserving record-replay system for messenger app usage surveillance

Yuan, L. P., Liu, P. & Zhu, S., Jun 18 2018, WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 248-259 12 p. (WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Computer systems
Personnel
Inspection
Communication
16 Citations (Scopus)

An effective approach to entity resolution problem using Quasi-Clique and its application to digital libraries

On, B. W., Elmacioglu, E., Lee, D., Kang, J. & Pei, J., Dec 1 2006, 6th ACM/IEEE-CS Joint Conference on Digital Libraries 2006: Opening Information Horizons, JCDL '06. p. 51-52 2 p. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Digital libraries
Syntactics
2 Citations (Scopus)

An effective tool for learning the visual effects of rendering algorithms

Wolfe, R. & Sears, A. L., Jan 1 1996, Computer Graphics (ACM), 30, 3, p. 54-55 2 p.

Research output: Contribution to specialist publicationArticle

Students
Computer science

An efficient location encoding method based on hierarchical administrative district

Lee, S., Park, S., Kim, W. C. & Lee, D., Oct 24 2005, In : Lecture Notes in Computer Science. 3588, p. 890-899 10 p.

Research output: Contribution to journalConference article

Moving Objects
Location based services
Encoding
Personal digital assistants
Mobile devices
9 Citations (Scopus)

An efficient location encoding method for moving objects using hierarchical administrative district and road network

Lee, S., Park, S., Kim, W. C. & Lee, D., Feb 1 2007, In : Information Sciences. 177, 3, p. 832-843 12 p.

Research output: Contribution to journalArticle

Location based services
Road Network
Moving Objects
Encoding
Personal digital assistants
7 Citations (Scopus)

An efficient method for constructing personal dataspace

Li, Y., Meng, X. & Kou, Y., Dec 1 2009, 2009 6th Web Information Systems and Applications Conference, WISA 2009. p. 3-8 6 p. 5370611. (2009 6th Web Information Systems and Applications Conference, WISA 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Information management
Experiments
13 Citations (Scopus)

A negotiation model in agent-mediated electronic commerce

Chung, M. & Honavar, V., Jan 1 2000, Proceedings - International Symposium on Multimedia Software Engineering. Institute of Electrical and Electronics Engineers Inc., p. 403-410 8 p. 897242. (Proceedings - International Symposium on Multimedia Software Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic commerce
Computer software reusability
Common object request broker architecture (CORBA)
Transparency
3 Citations (Scopus)

An emotional step toward automated trust detection in crisis social media

Halse, S. E., Tapia, A., Squicciarini, A. & Caragea, C., Feb 1 2018, In : Information Communication and Society. 21, 2, p. 288-305 18 p.

Research output: Contribution to journalArticle

social media
Bombing
emotion
trustworthiness
twitter
1 Citation (Scopus)

An emotional step towards automated trust detection in crisis social media

Halse, S. E., Tapia, A. H., Squicciarini, A. & Caragea, C., Jan 1 2016, ISCRAM 2016 Conference Proceedings - 13th International Conference on Information Systems for Crisis Response and Management. Banuls Silvera, V. A., Tapia, A. H., Antunes, P., Porto de Albuquerque, J. & Moore, K. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (Proceedings of the International ISCRAM Conference; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bombing
Hurricanes
Social media
Emotion
Crisis response
68 Citations (Scopus)

An empirical comparison of use-in-motion evaluation scenarios for mobile computing devices

Barnard, L., Yi, J. S., Jacko, J. A. & Sears, A. L., Apr 1 2005, In : International Journal of Human Computer Studies. 62, 4, p. 487-520 34 p.

Research output: Contribution to journalArticle

Mobile computing
Exercise equipment
scenario
evaluation
Mobile devices
5 Citations (Scopus)

An empirical evaluation of rule extraction from recurrent neural networks

Wang, Q., Zhang, K., Ororbia, A. G., Xing, X., Liu, X. & Giles, C. L., Sep 1 2018, In : Neural Computation. 30, 9, p. 2568-2591 24 p.

Research output: Contribution to journalLetter

Nonlinear Dynamics
Learning
Evaluation
Recurrent Neural Networks
4 Citations (Scopus)

An empirical study of mnemonic sentence-based password generation strategies

Yang, W., Li, N., Chowdhury, O., Xiong, A. & Proctor, R. W., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1216-1229 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

An empirical study of paid listings in product search and purchase

Resnick, M. L. & Jansen, B. J., Dec 1 2005, Proceedings of the Human Factors and Ergonomics Society 49th Annual Meeting, HFES 2005. p. 1429-1433 5 p. (Proceedings of the Human Factors and Ergonomics Society).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information retrieval
Industry
Internet
6 Citations (Scopus)

An empirical study of web personalization assistants: Supporting end-users in web information systems

Kim, K., Carroll, J. & Rosson, M. B., Dec 1 2002, Proceedings - IEEE 2002 Symposia on Human Centric Computing Languages and Environments, HCC 2002. p. 60-62 3 p. 1046347. (Proceedings - IEEE 2002 Symposia on Human Centric Computing Languages and Environments, HCC 2002).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software agents
Information systems
Artificial intelligence
Internet
29 Citations (Scopus)

An empirical study of web vulnerability discovery ecosystems

Zhao, M., Grossklags, J. & Liu, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1105-1117 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Trajectories
Industry
4 Citations (Scopus)

An Empirical Study on the Interaction Capability of Arm Stretching

Tian, F., Lyu, F., Zhang, X. L., Ren, X. & Wang, H., Jul 3 2017, In : International Journal of Human-Computer Interaction. 33, 7, p. 565-575 11 p.

Research output: Contribution to journalArticle

Stretching
Feedback
interaction
popularity
Law
34 Citations (Scopus)

An epidemic model for news spreading on twitter

Abdullah, S. & Wu, X., Dec 1 2011, Proceedings - 2011 23rd IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2011. p. 163-169 7 p. 6103322. (Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Epidemiology
1 Citation (Scopus)

A Neural Architecture for Content as well as Address-based Storage and Recall: Theory and Applications

Chen, C. HSIEN. & Honavar, V., Sep 1 1995, In : Connection Science. 7, 3-4, p. 281-300 20 p.

Research output: Contribution to journalArticle

Data storage equipment
Neural networks
Message passing
Fault tolerance
Processing
21 Citations (Scopus)

A neural-network architecture for syntax analysis

Chen, C. H. & Honavar, V., Dec 1 1999, In : IEEE Transactions on Neural Networks. 10, 1, p. 94-114 21 p.

Research output: Contribution to journalArticle

Network architecture
Neural networks
Processing
Context free grammars
Network components
41 Citations (Scopus)

A neural probabilistic model for context based citation recommendation

Huang, W., Wu, Z., Liang, C., Mitra, P. & Giles, C. L., Jun 1 2015, Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI 2015 and the 27th Innovative Applications of Artificial Intelligence Conference, IAAI 2015. AI Access Foundation, p. 2404-2410 7 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
Multilayer neural networks
Statistical Models
2 Citations (Scopus)

An evolutionary fuzzy multi-objective approach to cell formation

Tsai, C. C., Chu, C. H. & Wu, X., Jan 1 2006, Simulated Evolution and Learning - 6th International Conference, SEAL 2006, Proceedings. Springer Verlag, p. 377-383 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fuzzy Mathematical Programming
Cell Formation
Mathematical programming
Heuristic algorithms
Computational efficiency
2 Citations (Scopus)

An evolutionary game model for the spread of non-cooperative behavior in online social networks

Rajtmajer, S., Griffin, C., Mikesell, D. & Squicciarini, A., Apr 13 2015, 2015 Symposium on Applied Computing, SAC 2015. Shin, D. (ed.). Association for Computing Machinery, p. 1154-1159 6 p. (Proceedings of the ACM Symposium on Applied Computing; vol. 13-17-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
13 Citations (Scopus)

A new decision support model in multi-criteria decision making with intuitionistic fuzzy sets based on risk preferences and criteria reduction

Liu, J., Liu, S. F., Liu, P., Zhou, X. Z. & Zhao, B., Aug 1 2013, In : Journal of the Operational Research Society. 64, 8, p. 1205-1220 16 p.

Research output: Contribution to journalArticle

Fuzzy sets
Decision making
Decision tables
Decision support model
Multicriteria decision-making
1 Citation (Scopus)

A new energy reduction method based on fire probability threshold switch for WSN

Qiang, Y., Chang, X., Zhao, J., Zhang, X. & Yan, X., Feb 27 2014, Proceedings - 2014 10th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2014. Institute of Electrical and Electronics Engineers Inc., p. 30-37 8 p. 7051747. (Proceedings - 2014 10th International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fires
Switches
Sensor nodes
Data communication systems
Logistics
27 Citations (Scopus)

A New Paradigm for is the Educational Implications

Farwell, D. W., Kuramoto, L., Lee, D., Trauth, E. M. & Winslow, C., Jan 1 1992, In : Information Systems Management. 9, 2, p. 7-14 8 p.

Research output: Contribution to journalEditorial

cadre
Information technology
competitiveness
information technology
paradigm