College of Information Sciences and Technology

  • United States

Research Output 1976 2020

20 Citations (Scopus)

Twitter mining for disaster response: A domain adaptation approach

Li, H., Guevara, N., Herndon, N., Caragea, D., Neppalli, K., Caragea, C., Squicciarini, A. & Tapia, A. H., Jan 1 2015, ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management. Palen, L. A., Comes, T., Buscher, M., Hughes, A. L. & Palen, L. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (ISCRAM 2015 Conference Proceedings - 12th International Conference on Information Systems for Crisis Response and Management; vol. 2015-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Classifiers
Supervised learning
Disaster
Twitter
41 Citations (Scopus)

Twitter as a lifeline: Human-annotated Twitter corpora for NLP of crisis-related messages

Imran, M., Mitra, P. & Castillo, C., Jan 1 2016, Proceedings of the 10th International Conference on Language Resources and Evaluation, LREC 2016. Calzolari, N., Choukri, K., Mazo, H., Moreno, A., Declerck, T., Goggi, S., Grobelnik, M., Odijk, J., Piperidis, S., Maegaard, B. & Mariani, J. (eds.). European Language Resources Association (ELRA), p. 1638-1643 6 p. (Proceedings of the 10th International Conference on Language Resources and Evaluation, LREC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

twitter
social media
learning
disaster
natural disaster
4 Citations (Scopus)

Twenty years of applying grounded theory in information systems: A coding method, useful theory generation method, or an orthodox positivist method of data analysis?

Bryant, T., Hughes, J., Myers, M. D., Trauth, E. & Urquhart, C., Jan 1 2004, Inf. Systems Research: Relevant Theory and Informed Practice - IFIP TC8/WG8.2 20th Year Retrospective: Relevant Theory and Informed Practice-Looking Forward from a 20-Year Perspective on IS Res.. Springer New York LLC, p. 649-651 3 p. (IFIP Advances in Information and Communication Technology; vol. 143).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information systems

Tweetsight: Enhancing financial analysts' social media use

Varanasi, R. A., Hanrahan, B. V., Wahid, S. & Carroll, J. M., Jul 28 2017, 8th International Conference on Social Media and Society: Social Media for Good or Evil, #SMSociety 2017. Association for Computing Machinery, 3097308. (ACM International Conference Proceeding Series; vol. Part F129683).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gages
Economics
Industry
34 Citations (Scopus)

Tweets are forever: A large-scale quantitative analysis of deleted tweets

Almuhimedi, H., Wilson, S., Liu, B., Sadeh, N. & Acquisti, A., Mar 21 2013, CSCW 2013 - Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work. p. 897-907 11 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
3 Citations (Scopus)

Tweet factors influencing trust and usefulness during both man-made and natural disasters

Halse, S. E., Tapia, A. H., Squicciarini, A. & Caragea, C., Jan 1 2016, ISCRAM 2016 Conference Proceedings - 13th International Conference on Information Systems for Crisis Response and Management. Porto de Albuquerque, J., Moore, K. A., Antunes, P., Tapia, A. H. & Banuls Silvera, V. A. (eds.). Information Systems for Crisis Response and Management, ISCRAM, (Proceedings of the International ISCRAM Conference; vol. 0).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Bombing
Hurricanes
Man-made disasters
Usefulness

Turn to the self in human-computer interaction: Care of the self in negotiating the human-technology relationship

Kou, Y., Gui, X., Chen, Y. & Nardi, B., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Artificial intelligence

Turning Points: Motivating Intergenerational Families to Engage on Sustainable Health Information Sharing

Sandbulte, J., Beck, J., Choe, E. K. & Carroll, J., Jan 1 2019, Information in Contemporary Society - 14th International Conference, iConference 2019, Proceedings. Nardi, B., Taylor, N. G., Christian-Lamb, C. & Martin, M. H. (eds.). Springer Verlag, p. 741-753 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11420 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turning Point
Information Sharing
Health
Moment
Family
50 Citations (Scopus)

Turk-life in India

Gupta, N., Martin, D., Hanrahan, B. V. & O'Neill, J., Nov 9 2014, GROUP 2014 - Proceedings of the 18th ACM International Conference on Supporting Group Work. Association for Computing Machinery, p. 1-11 11 p. (Proceedings of the International ACM SIGGROUP Conference on Supporting Group Work).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

23 Citations (Scopus)

Turking in a Global Labour Market

Martin, D., O’Neill, J., Gupta, N. & Hanrahan, B. V., Feb 1 2016, In : Computer Supported Cooperative Work: CSCW: An International Journal. 25, 1, p. 39-77 39 p.

Research output: Contribution to journalArticle

Personnel
16 Citations (Scopus)

Turk bench: Rendering the market for turkers

Hanrahan, B. V., K.willamowski, J., Swaminathan, S. & Martin, D. B., Apr 18 2015, CHI 2015 - Proceedings of the 33rd Annual CHI Conference on Human Factors in Computing Systems: Crossings. Association for Computing Machinery, p. 1613-1616 4 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2015-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Personnel
Visualization
Crowdsourcing
2 Citations (Scopus)

Turing obfuscation

Wang, Y., Wang, S., Wang, P. & Wu, D., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Ghorbani, A., Lin, X., Ren, K., Zhu, S. & Zhang, A. (eds.). Springer Verlag, p. 225-244 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turing machines
Flow control
Reverse engineering
Flow graphs
Machine components
13 Citations (Scopus)

Turing equivalence of neural networks with second order connection weights

Sun, G. Z., Chen, H. H., Lee, Y. C. & Giles, C. L., Jan 1 1992, Proceedings. IJCNN - International Joint Conference on Neural Networks. Anon (ed.). Publ by IEEE, p. 357-362 6 p. (Proceedings. IJCNN - International Joint Conference on Neural Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Turing machines
Neurons
Neural networks
Recurrent neural networks
17 Citations (Scopus)

Turbo-charging hidden database samplers with overflowing queries and skew reduction

Dasgupta, A., Zhang, N. & Das, G., May 20 2010, Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings. p. 51-62 12 p. (Advances in Database Technology - EDBT 2010 - 13th International Conference on Extending Database Technology, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sampling
Experiments
16 Citations (Scopus)

Tuning on-air signatures for balancing performance and confidentiality

Zheng, B., Lee, W. C., Liu, P., Lee, D. L. & Ding, X., Dec 1 2009, In : IEEE Transactions on Knowledge and Data Engineering. 21, 12, p. 1783-1797 15 p., 4775897.

Research output: Contribution to journalArticle

Tuning
Air
185 Citations (Scopus)

Trust-χ: A peer-to-peer framework for trust establishment

Bertino, E., Ferrari, E. & Squicciarini, A., Jul 1 2004, In : IEEE Transactions on Knowledge and Data Engineering. 16, 7, p. 827-842 16 p.

Research output: Contribution to journalArticle

Open systems
XML
Internet
Specifications
4 Citations (Scopus)
XML
Specifications
System Architecture
Specification
Framework
27 Citations (Scopus)

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Processing
Internet of things
10 Citations (Scopus)

TrustRank: A Cold-Start tolerant recommender system

Zou, H., Gong, Z., Zhang, N., Zhao, W. & Guo, J., Feb 17 2015, In : Enterprise Information Systems. 9, 2, p. 117-138 22 p.

Research output: Contribution to journalArticle

Recommender systems
Information filtering
World Wide Web
Processing
3 Citations (Scopus)
Open systems
XML
Internet
Open Systems
Prior Knowledge
2 Citations (Scopus)

Trust negotiations with customizable anonymity

Squicciarini, A. C., Barghav-Spantzel, A., Bertino, E., Ferrari, E. & Ray, I., Jan 1 2006, Proceedings - 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2006 Workshops Proceedings). IEEE Computer Society, p. 69-72 4 p. 4053206. (Proceedings - 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2006 Workshops Proceedings)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

54 Citations (Scopus)

Trust negotiations: Concepts, systems, and languages

Bertino, E., Ferrari, E. & Squicciarini, A., Jul 1 2004, In : Computing in Science and Engineering. 6, 4, p. 27-34 8 p.

Research output: Contribution to journalArticle

Open systems
Internet
51 Citations (Scopus)

Trust negotiation in identity management

Bhargav-Spantzel, A., Squicciarini, A. & Bertino, E., Mar 1 2007, In : IEEE Security and Privacy. 5, 2, p. 55-63 9 p.

Research output: Contribution to journalReview article

management
Access control
Information services
service provider
Authentication

Trust it or not: Effects of machine-learningwarnings in helping individuals mitigate misinformation

Seo, H., Xiong, A. & Lee, D., Jun 26 2019, WebSci 2019 - Proceedings of the 11th ACM Conference on Web Science. Association for Computing Machinery, Inc, p. 265-274 10 p. (WebSci 2019 - Proceedings of the 11th ACM Conference on Web Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Experiments
3 Citations (Scopus)

Trust in the social computing: The case of Peer-to-Peer (P2P) file sharing networks

Xu, H., Dinev, T., Wang, H. & Parks, R., Dec 1 2009, 15th Americas Conference on Information Systems 2009, AMCIS 2009. p. 3823-3833 11 p. (15th Americas Conference on Information Systems 2009, AMCIS 2009; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

internet community
autonomy
industry
knowledge
community
11 Citations (Scopus)

Trust establishment in the formation of Virtual Organizations

Squicciarini, A., Paci, F. & Bertino, E., Jan 1 2011, In : Computer Standards and Interfaces. 33, 1, p. 13-23 11 p.

Research output: Contribution to journalArticle

trustworthiness
Industry
Concretes
paradigm
scenario
5 Citations (Scopus)

Trust establishment in the formation of virtual organizations

Squicciarini, A., Paci, F. & Bertino, E., Sep 1 2008, Proceedings of the 2008 - IEEE 24th International Conference on Data Engineering Workshop, ICDE'08. p. 454-461 8 p. 4498360. (Proceedings - International Conference on Data Engineering).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Industry
Concretes
1 Citation (Scopus)

Trusted Recovery

Yu, M., Liu, P., Zang, W. & Jajodia, S., Dec 1 2007, Secure Data Management in Decentralized Systems. Yu, T. & Jajodia, S. (eds.). p. 59-94 36 p. (Advances in Information Security; vol. 33).

Research output: Chapter in Book/Report/Conference proceedingChapter

Recovery
28 Citations (Scopus)

Trust-based secure information sharing between federal government agencies

Liu, P. & Chetal, A., Feb 1 2005, In : Journal of the American Society for Information Science and Technology. 56, 3, p. 283-298 16 p.

Research output: Contribution to journalArticle

government agency
Federal Government
Network protocols
Terrorism
XML
5 Citations (Scopus)

TRIPPER: Rule learning using taxonomies

Vasile, F., Silvescu, A., Kang, D. K. & Honavar, V., Jul 14 2006, Advances in Knowledge Discovery and Data Mining - 10th Pacific-Asia Conference, PAKDD 2006, Proceedings. p. 55-59 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3918 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Rule Induction
Rule Learning
Taxonomies
Taxonomy
Learning algorithms
1 Citation (Scopus)

TRIPPER: Rule learning using taxonomies

Vasile, F., Silvescu, A., Kang, D. K. & Honavar, V., Dec 1 2005, AAAI Workshop - Technical Report. p. 20-27 8 p. (AAAI Workshop - Technical Report; vol. WS-05-04).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Taxonomies
Learning algorithms
Classifiers
Experiments
14 Citations (Scopus)

Triple Jeopardy: Race, Gender and Class Politics of Women in Technology

Kvasny, L., Oct 17 2003, Proceedings of the ACM SIGMIS CPR Conference. Trauth, E. & Trauth, E. (eds.). p. 111-115 5 p. (Proceedings of the ACM SIGMIS CPR Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
information technology
politics
gender
profession
29 Citations (Scopus)

Trees with maximal second Zagreb index and prescribed number of vertices of the given degree

Vukičević, D., Rajtmajer, S. & Trinajstić, N., Jul 10 2008, In : Match. 60, 1, p. 65-70 6 p.

Research output: Contribution to journalArticle

Zagreb Index
Edge-connectivity
Time Constant
Directly proportional
Molecules
30 Citations (Scopus)

Treenetviz: Revealing patterns of networks over tree structures

Gou, L. & Zhang, X. L., Nov 16 2011, In : IEEE Transactions on Visualization and Computer Graphics. 17, 12, p. 2449-2458 10 p., 6065012.

Research output: Contribution to journalArticle

Visualization
Agglomeration
Experiments
5 Citations (Scopus)

Transportability from multiple environments with limited experiments

Bareinboim, E., Lee, S., Honavar, V. & Pearl, J., Jan 1 2013, In : Advances in Neural Information Processing Systems.

Research output: Contribution to journalConference article

Experiments
97 Citations (Scopus)

Transmission line boundary protection using wavelet transform and neural network

Zhang, N. & Kezunovic, M., Apr 1 2007, In : IEEE Transactions on Power Delivery. 22, 2, p. 859-869 11 p.

Research output: Contribution to journalArticle

Wavelet transforms
Electric lines
Neural networks
Multiresolution analysis
Electric potential
7 Citations (Scopus)

Translingual obfuscation

Wang, P., Wang, S., Ming, J., Jiang, Y. & Wu, D., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 128-144 17 p. 7467351. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Logic programming
Computer programming languages
Reverse engineering
Flow control
Engineers
2 Citations (Scopus)

Transient based relay testing: A new scope and methodology

Zhang, N., Song, H. & Kezunovic, M., Dec 1 2006, 2006 IEEE Mediterranean Electrotechnical Conference, MELECON 2006 - Circuits and Systems for Signal Processing, lnformation and Communication Technologies, and Power Sources and Systems. p. 1110-1113 4 p. 1653294. (Proceedings of the Mediterranean Electrotechnical Conference - MELECON; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Acceptance tests
Testing
149 Citations (Scopus)

Training Wheels in a User Interface

Carroll, J. M. & Carrithers, C., Aug 1 1984, In : Communications of the ACM. 27, 8, p. 800-806 7 p.

Research output: Contribution to journalArticle

User interfaces
Wheels

Training the next generation analyst using red cell analytics

Graham, M. N. & Graham, J. L., Jan 1 2016, Next-Generation Analyst IV. Broome, B. D., Hanratty, T. P., Llinas, J. & Hall, D. L. (eds.). SPIE, 98510D. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9851).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

students
education
Cells
Students
intelligence
1 Citation (Scopus)

Training recurrent neural networks with temporal input encodings

Omlin, C. W., Giles, C. L., Horne, B. G., Leerink, L. R. & Lin, T., 1994, IEEE International Conference on Neural Networks - Conference Proceedings. IEEE, Vol. 2. p. 1267-1272 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recurrent neural networks
Neurons
Finite automata
5 Citations (Scopus)

Training data collection system for a learning-based photographic aesthetic quality inference engine

Orendovici, R. & Wang, J., Dec 1 2010, MM'10 - Proceedings of the ACM Multimedia 2010 International Conference. p. 1575-1578 4 p. (MM'10 - Proceedings of the ACM Multimedia 2010 International Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Inference engines
8 Citations (Scopus)

Trackmeornot: Enabling flexible control on web tracking

Meng, W., Lee, B., Xing, X. & Lee, W., Jan 1 2016, 25th International World Wide Web Conference, WWW 2016. International World Wide Web Conferences Steering Committee, p. 99-109 11 p. (25th International World Wide Web Conference, WWW 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chromium
32 Citations (Scopus)

Tracking mental well-being: Balancing rich sensing and patient needs

Matthews, M., Abdullah, S., Gay, G. & Choudhury, T., Jan 1 2014, Computer, 47, 4, p. 36-43 8 p.

Research output: Contribution to specialist publicationArticle

Alarm systems
Health
8 Citations (Scopus)

Tracking changes in user interests with a few relevance judgments

Widyantoro, D. H., Ioerger, T. R. & Yen, J., 2003, CIKM 2003: Proceedings of the Twelfth ACM International Conference on Information and Knowledge Management. Frieder, O., Hammer, J., Qureshi, S. & Seligman, L. (eds.). p. 548-551 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Relevance judgments
Information filtering
Data clustering
Feedback mechanism
Persistence
5 Citations (Scopus)

Tracking anonymous sinks in wireless sensor networks

Shakshuki, E. M., Sheltami, T. R., Kang, N. & Xing, X., Oct 5 2009, Proceedings - 2009 International Conference on Advanced Information Networking and Applications, AINA 2009. p. 510-516 7 p. 5076241. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless sensor networks
Experiments
5 Citations (Scopus)

Traceable and automatic compliance of privacy policies in federated digital identity management

Squicciarini, A., Bhargav-Spantzel, A., Czeskis, A. & Bertino, E., Dec 1 2006, Privacy Enhancing Technologies - 6th International Workshop, PET 2006, Revised Selected Papers. p. 78-98 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4258 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identity Management
Compliance
Privacy
Attribute
Accountability
5 Citations (Scopus)

TRACE: Zero-down-time database damage tracking, quarantine, and cleansing with negligible run-time overhead

Bai, K., Yu, M. & Liu, P., Dec 8 2008, Computer Security - ESORICS 2008 - 13th European Symposium on Research in Computer Security, Proceedings. p. 161-176 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5283 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quarantine
Damage
Zero
Transactions
Requirements
5 Citations (Scopus)

To what degree can log data profile a web searcher?

Jansen, B., Zhang, M., Booth, D., Park, D., Zhang, Y., Kathuria, A. & Bonner, P., Dec 1 2009, In : Proceedings of the ASIST Annual Meeting. 46

Research output: Contribution to journalArticle

1 Citation (Scopus)

Toward unified cognitive theory: The path is well worn and the trenches are deep

Carroll, J., Jan 1 1992, In : Behavioral and Brain Sciences. 15, 3, 1 p.

Research output: Contribution to journalArticle

cognitive theory
Cognitive Theory
Trench