College of Information Sciences and Technology

  • United States

Research Output

Conference contribution

Approximate rewriting of queries using views

Afrati, F., Chandrachud, M., Chirkova, R. & Mitra, P., Nov 25 2009, Advances in Databases and Information Systems - 13th East European Conference, ADBIS 2009, Proceedings. p. 164-178 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

A practical approach for adaptive data structure layout randomization

Chen, P., Xu, J., Lin, Z., Xu, D., Mao, B. & Liu, P., Jan 1 2015, Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings. Ryan, P. Y. A., Pernul, G. & Weippl, E. (eds.). Springer Verlag, p. 69-89 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

A practice-led account of the conceptual evolution of UX knowledge

Kou, Y. & Gray, C. M., May 2 2019, CHI 2019 - Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract)

Jiang, Y., Zhang, C., Wu, D. & Liu, P., Nov 6 2015, Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015. Institute of Electrical and Electronics Engineers Inc., p. 184-185 2 p. 7322142. (Proceedings - 2015 IEEE International Conference on Software Quality, Reliability and Security-Companion, QRS-C 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A preliminary model of participation

Morgan, J. H., Morgan, G. P., Ritter, F. E. & De Raucourt, V. P., Dec 1 2009, 18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009. p. 128-135 8 p. (18th Annual Conference on Behavior Representation in Modeling and Simulation 2009, BRiMS 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Dec 1 2009, ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference, IDETC/CIE2009. PARTS A AND B ed. p. 1361-1371 11 p. (Proceedings of the ASME Design Engineering Technical Conference; vol. 5, no. PARTS A AND B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

A preliminary study of novice and expert users' decision-making procedures during visual trade space exploration

Wolf, D., Simpson, T. W. & Zhang, X., Jun 25 2010, Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009. PART B ed. p. 1361-1371 11 p. (Proceedings of the ASME International Design Engineering Technical Conferences and Computers and Information in Engineering Conference 2009, DETC2009; vol. 5, no. PART B).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A privacy-preserving approach for Web service selection and provisioning

Squicciarini, A., Carminati, B. & Karumanchi, S., Sep 29 2011, Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011. p. 33-40 8 p. 6009369. (Proceedings - 2011 IEEE 9th International Conference on Web Services, ICWS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Scopus citations

A privacy preserving assertion based policy language for federation systems

Squicciarini, A. C., Hintoglu, A. A., Bertino, E. & Saygin, Y., Aug 24 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 51-60 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A Privacy-Preserving Framework for Rank Inference

Gao, Y., Yan, T. & Zhang, N., Dec 4 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., p. 180-181 2 p. (Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

A provably sound TAL for back-end optimization

Chen, J., Wu, D., Appel, A. W. & Fang, H., 2003, Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI). p. 208-219 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

A proxy server experiment: An indication of the changing nature of the Web

Howard, R. & Jansen, B. J., Jan 1 1998, Proceedings - 7th International Conference on Computer Communications and Networks, ICCCN 1998. Institute of Electrical and Electronics Engineers Inc., p. 646-649 4 p. 998824. (Proceedings - 7th International Conference on Computer Communications and Networks, ICCCN 1998; vol. 1998-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

A query-aware document ranking method for geographic information retrieval

Yu, B. & Cai, G., Dec 1 2007, Proceedings of the 4th ACM Workshop on Geographical Information Retrieval, GIR '07, Co-located with the 16th ACM Conference on Information and Knowledge Management, CIKM 2007. p. 49-54 6 p. 1316962. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

ARBOR: Hang together rather than hang separately in 802.11 WiFi networks

Xing, X., Mishra, S. & Liu, X., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5461908. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Arcana: Enabling private posts on public microblog platforms

Narasimman, A., Wang, Q., Li, F., Lee, D. & Luo, B., Jan 1 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 271-285 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Architecture of a metasearch engine that supports user information needs

Glover, E. J., Lawrence, S., Birmingham, W. P. & Giles, C. L., Dec 1 1999, International Conference on Information and Knowledge Management, Proceedings. ACM, p. 210-216 7 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

53 Scopus citations

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2002, Proceedings - 18th Annual Computer Security Applications Conference, ACSAC 2002. IEEE Computer Society, p. 311-320 10 p. 1176303. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2002-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Scopus citations

Architectures for intrusion tolerant database systems

Liu, P., Jan 1 2003, Foundations of Intrusion Tolerant Systems, OASIS 2003. Lala, J. H. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 3-13 11 p. 1264924. (Foundations of Intrusion Tolerant Systems, OASIS 2003).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

A real options approach to strategic RFID investment decision

Wu, X., Yue, D., Bai, J. & Chu, C. H., Sep 25 2009, 2009 IEEE International Conference on RFID, RFID 2009. p. 314-321 8 p. 4911201

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

ARECA: A highly attack resilient Certification Authority

Jing, J., Liu, P., Feng, D., Xiang, J., Gao, N. & Jingqiang, L., Dec 1 2003, Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with 10th ACM Conference on Computer Communications Security). Liu, P. & Pal, P. (eds.). p. 53-63 11 p. (Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

A regional IT occupational partnership for economic development

Trauth, E. M., Reinert, M. & Zigner, M. C., Dec 1 2007, SIGMIS-CPR 2007 - Proceedings of the 2007 ACM SIGMIS CPR Conference: The Global Information Technology Workforce. p. 112-120 9 p. (SIGMIS-CPR 2007 - Proceedings of the 2007 ACM SIGMIS CPR Conference: The Global Information Technology Workforce).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

A reverse turing test for detecting machine-made texts

Shao, J., Uchendu, A. & Lee, D., Jun 26 2019, WebSci 2019 - Proceedings of the 11th ACM Conference on Web Science. Association for Computing Machinery, Inc, p. 275-279 5 p. (WebSci 2019 - Proceedings of the 11th ACM Conference on Web Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

A review of data mining-based financial fraud detection research

Yue, D., Wu, X., Wang, Y., Li, Y. & Chu, C. H., Dec 1 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007. p. 5514-5517 4 p. 4341127. (2007 International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2007).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

43 Scopus citations

Are women an underserved community in the information technology profession?

Trauth, E. M. & Quesenberry, J. L., 2006, ICIS 2006 Proceedings - Twenty-Seventh International Conference on Information Systems. p. 1757-1770 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

Argument detection in online discussion: A theory based approach

Zhang, G., Purao, S., Zhou, Y. & Xu, H., 2016, AMCIS 2016: Surfing the IT Innovation Wave - 22nd Americas Conference on Information Systems. Association for Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A role-based multiple view approach to distributed geo-collaboration

Convertino, G., Zhao, D., Ganoe, C. H., Carroll, J. M. & Rosson, M. B., Dec 1 2007, Human-Computer Interaction: HCI Intelligent Multimodal Interaction Environments - 12th International Conference, HCI International 2007, Proceedings. PART 4 ed. p. 561-570 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4553 LNCS, no. PART 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

ARSCA: A computer tool for tracing the cognitive processes of cyber-attack analysis

Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R. & Garneau, C., May 14 2015, 2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, CogSIMA 2015. Institute of Electrical and Electronics Engineers Inc., p. 165-171 7 p. 7108193. (2015 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision, CogSIMA 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Articulating common ground in cooperative work: Content and process

Convertino, G., Mentis, H. M., Rosson, M. B., Carroll, J., Slavkovic, A. B. & Ganoe, C. H., Dec 22 2008, 26th Annual CHI Conference on Human Factors in Computing Systems, Conference Proceedings, CHI 2008. p. 1637-1646 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

49 Scopus citations

Artifact as theory-nexus: Hermeneutics meets theory-based design

Carroll, J. M. & Kellogg, W. A., Jan 1 1989, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1989. Association for Computing Machinery, p. 7-14 8 p. (Conference on Human Factors in Computing Systems - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

105 Scopus citations

A safety net: How older adults build and maintain interpersonal relationships

Wang, X., Knearem, T., Gui, F., Gupta, S., Zhu, H., Williams, M. & Carroll, J. M., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, LBW015. (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A scaffolded introduction to dynamic website development for female high school students

Rosson, M. B., Ioujanina, A., Paone, T., Sheasley, G., Sinha, H., Ganoe, C., Carroll, J. & Mahar, J., Dec 1 2009, SIGCSE'09 - Proceedings of the 40th ACM Technical Symposium on Computer Science Education. p. 226-230 5 p. (SIGCSE'09 - Proceedings of the 40th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

ASCOS: An Asymmetric network Structure COntext Similarity measure

Chen, H. H. & Giles, C. L., Jan 1 2013, Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013. Association for Computing Machinery, p. 442-449 8 p. (Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

A semantic importing approach to knowledge reuse from multiple ontologies

Bao, J., Slutzki, G. & Honavar, V., Nov 28 2007, AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference. p. 1304-1309 6 p. (Proceedings of the National Conference on Artificial Intelligence; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

25 Scopus citations

A semi-Markov survivability evaluation model for intrusion tolerant database systems

Wang, A. H., Yan, S. & Liu, P., May 21 2010, ARES 2010 - 5th International Conference on Availability, Reliability, and Security. p. 104-111 8 p. 5438108. (ARES 2010 - 5th International Conference on Availability, Reliability, and Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

A service-oriented architecture for digital libraries

Petinot, Y., Lee Giles, C., Bhatnagar, V., Teregowda, P. B., Han, H. & Councill, I., Dec 1 2004, ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing. Aiello, M., Aoyama, M., Curbera, F. & Papazoglou, M. P. (eds.). p. 263-268 6 p. (ICSOC '04: Proceedings of the Second International Conference on Service Oriented Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

A service-oriented architecture for electric power transmission system asset management

Pathak, J., Li, Y., Honavar, V. & McCalley, J., Dec 1 2007, Service-Oriented Computing ICSOC 2006 - 4th International Conference, Workshops Proceedings. p. 26-37 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4652 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

A short-term prediction model of topic popularity on microblogs

Zhao, J., Wu, W., Zhang, X., Qiang, Y., Liu, T. & Wu, L., Oct 8 2013, Computing and Combinatorics - 19th International Conference, COCOON 2013, Proceedings. p. 759-769 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7936 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

A simple and effective algorithm for R-wave detection using smartphones

Wu, X., Chu, C. H., Yue, D., Kim, J. & Li, S., Jan 1 2014, Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014. IEEE Computer Society, p. 902-905 4 p. 6845767. (Proceedings - 2014 IEEE Workshop on Electronics, Computer and Applications, IWECA 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

A simple baseline for travel time estimation using large-scale trip data

Wang, H., Kuo, Y. H., Kifer, D. & Li, Z., Oct 31 2016, 24th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, ACM SIGSPATIAL GIS 2016. Renz, M., Ali, M., Newsam, S., Renz, M., Ravada, S. & Trajcevski, G. (eds.). Association for Computing Machinery, 61. (GIS: Proceedings of the ACM International Symposium on Advances in Geographic Information Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

22 Scopus citations

A simulated annealing based inexact oracle for wasserstein loss minimization

Ye, J., Wang, J. Z. & Li, J., Jan 1 2017, 34th International Conference on Machine Learning, ICML 2017. International Machine Learning Society (IMLS), p. 6005-6017 13 p. (34th International Conference on Machine Learning, ICML 2017; vol. 8).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

A simulation framework for performance analysis of multi-interface and multi-channel wireless networks in INET/OMNET++

Kim, H., Gu, Q., Yu, M., Zang, W. & Liu, P., Dec 31 2010, Spring Simulation Multiconference 2010, SpringSim'10. 101. (Spring Simulation Multiconference 2010, SpringSim'10).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Ask the instructors: Motivations and challenges of teaching massive open online courses

Zheng, S., Wisniewski, P., Rosson, M. B. & Carroll, J., Feb 27 2016, Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2016. Association for Computing Machinery, p. 206-221 16 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW; vol. 27).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

A socio-cognitive analysis of summer camp outcomes and experiences

Aritajati, C., Rosson, M. B., Pena, J., Cinque, D. & Segura, A., Feb 24 2015, SIGCSE 2015 - Proceedings of the 46th ACM Technical Symposium on Computer Science Education. Alphonce, C., Decker, A., Eiselt, K. & Tims, J. (eds.). Association for Computing Machinery, Inc, p. 581-586 6 p. (SIGCSE 2015 - Proceedings of the 46th ACM Technical Symposium on Computer Science Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

A sparse gaussian processes classification framework for fast tag suggestions

Song, Y., Zhang, L. & Giles, C. L., Dec 1 2008, Proceedings of the 17th ACM Conference on Information and Knowledge Management, CIKM'08. p. 93-102 10 p. (International Conference on Information and Knowledge Management, Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Scopus citations

A sparse support vector machine approach to region-based image categorization

Bi, J., Chen, Y. & Wang, J., Jan 1 2005, Proceedings - 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2005. IEEE Computer Society, p. 1121-1128 8 p. 1467392. (Proceedings - 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2005; vol. I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

50 Scopus citations

Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs

Cao, C., Yuan, L. P., Singhal, A., Liu, P., Sun, X. & Zhu, S., Jan 1 2018, Data and Applications Security and Privacy XXXII - 32nd Annual IFIP WG 11.3 Conference, DBSec 2018, Proceedings. Paraboschi, S. & Kerschbaum, F. (eds.). Springer Verlag, p. 330-348 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10980 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Assessing humanitarian inter-organizational network effectiveness: The case of GlobalSympoNet

Tchouakeu, L. M. N., Maitland, C., Tapia, A. H., Zhao, K. & Bajpai, K., 2010, ISCRAM 2010 - 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Information Systems for Crisis Response and Management, ISCRAM

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Assessing mental health issues on college campuses: Preliminary findings from a pilot study

Tseng, V. W. S., Abdullah, S., Merrill, M., Aung, M. H., Wittleder, F. & Choudhury, T., Sep 12 2016, UbiComp 2016 Adjunct - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing. Association for Computing Machinery, Inc, p. 1200-1208 9 p. (UbiComp 2016 Adjunct - Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Assessing the accuracy of four popular face recognition tools for inferring gender, age, and race

Jung, S. G., An, J., Kwak, H., Salminen, J. & Jansen, B. J., Jan 1 2018, 12th International AAAI Conference on Web and Social Media, ICWSM 2018. AAAI press, p. 624-627 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Assessing the performance of macromolecular sequence classifiers

Caragea, C., Sinapov, J., Honavar, V. & Dobbs, D., Dec 1 2007, Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE. p. 320-326 7 p. 4375583. (Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations