College of Information Sciences and Technology

  • United States

Research Output 1976 2020

Article
21 Citations (Scopus)

An improved fuzzy clustering method for cellular manufacturing

Li, J., Chu, C. H., Wang, Y. & Yan, W., Mar 1 2007, In : International Journal of Production Research. 45, 5, p. 1049-1062 14 p.

Research output: Contribution to journalArticle

Cellular manufacturing
Fuzzy clustering
Machine components
Clustering algorithms
15 Citations (Scopus)

An improved neural network for manufacturing cell formation

Chu, C. H., Aug 1997, In : Decision Support Systems. 20, 4, p. 279-295 17 p.

Research output: Contribution to journalArticle

Cellular manufacturing
Neural networks
Neurology
Brain
Neural Networks (Computer)
27 Citations (Scopus)

An incremental learning algorithm with confidence estimation for automated identification of NDE signals

Polikar, R., Udpa, L., Udpa, S. & Honavar, V., Aug 1 2004, In : IEEE transactions on ultrasonics, ferroelectrics, and frequency control. 51, 8, p. 990-1001 12 p.

Research output: Contribution to journalArticle

Learning algorithms
learning
confidence
classifiers
Classifiers
14 Citations (Scopus)

An in-depth analysis of information markets with aggregate uncertainty

Chen, Y., Mullen, T. & Chu, C. H., Apr 1 2006, In : Electronic Commerce Research. 6, 2, p. 201-221 21 p.

Research output: Contribution to journalArticle

Internet
Uncertainty
Information market
Aggregate uncertainty
9 Citations (Scopus)

An integrative approach to information policy research

Trauth, E. M., Mar 1986, In : Telecommunications Policy. 10, 1, p. 41-50 10 p.

Research output: Contribution to journalArticle

information policy
policy analysis
policy development
development policy
privacy
16 Citations (Scopus)

An intrinsically-motivated schema mechanism to model and simulate emergent cognition

Georgeon, O. L. & Ritter, F. E., May 1 2012, In : Cognitive Systems Research. 15-16, p. 73-92 20 p.

Research output: Contribution to journalArticle

Cognition
Motivation
Learning
Cognitive systems
Drive
1 Citation (Scopus)

An investigation of decision analytic methodologies for stress identification

Deng, Y., Chu, C. H., Si, H., Zhang, Q. & Wu, Z., Sep 2013, In : International Journal on Smart Sensing and Intelligent Systems. 6, 4, p. 1675-1699 25 p.

Research output: Contribution to journalArticle

Principal component analysis
Feature extraction
Information fusion
Sensors
Support vector machines
7 Citations (Scopus)

An investigation of the word-processing software market war in South Korea: A game-theoretic approach

Tan, C. H., Yang, X. & Xu, H., Mar 1 2010, In : Information and Management. 47, 2, p. 96-101 6 p.

Research output: Contribution to journalArticle

Word processing
South Korea
Software
Incumbents
New entrants
6 Citations (Scopus)

An object oriented approach to simulating large communication networks

Mikler, A. R., Wong, J. S. K. & Honavar, V., Feb 1998, In : Journal of Systems and Software. 40, 2, p. 151-164 14 p.

Research output: Contribution to journalArticle

Telecommunication networks
Simulators
Scheduling
Communication systems
Communication
22 Citations (Scopus)

Anonymous proxy re-encryption

Shao, J., Liu, P., Wei, G. & Ling, Y., Jan 1 2012, In : Security and Communication Networks. 5, 5, p. 439-449 11 p.

Research output: Contribution to journalArticle

Cryptography
196 Citations (Scopus)

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Wang, D., He, D., Wang, P. & Chu, C. H., Jul 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 4, p. 428-442 15 p., 6894170.

Research output: Contribution to journalArticle

Authentication
Smart cards
17 Citations (Scopus)

An optimization model of machining process route for low carbon manufacturing

Yi, Q., Li, C., Zhang, X., Liu, F. & Tang, Y., Sep 1 2015, In : International Journal of Advanced Manufacturing Technology. 80, 5-8, p. 1181-1196 16 p.

Research output: Contribution to journalArticle

Machining
Carbon
Planning
Cutting tools
Seats
3 Citations (Scopus)

A note on the Estrada-Hatano communicability algorithm for detecting community structure in complex networks

Michele Rajtmajer, S. & Vukičević, D., Dec 1 2010, In : Applied Mathematics and Computation. 217, 7, p. 3516-3521 6 p.

Research output: Contribution to journalArticle

Community Structure
Complex networks
Complex Networks
Clique
Graph in graph theory
7 Citations (Scopus)

An Overview of veryIDX - A privacy-preserving digital identity management system for mobile devices

Paci, F., Bertino, E., Kerr, S., Squicciarini, A. & Woo, J., Sep 1 2009, In : Journal of Software. 4, 7, p. 696-706 11 p.

Research output: Contribution to journalArticle

Mobile devices
Bluetooth
Viruses
Authentication
Industry
1 Citation (Scopus)
Risk analysis
graduate
industry
Industry
career
1 Citation (Scopus)

A personal information management scheme using shared labels and implication links

Dubey, G. & Zhang, X., Dec 1 2012, In : Proceedings of the ASIST Annual Meeting. 49, 1

Research output: Contribution to journalArticle

information management
Information management
Labels
fragmentation
management
2 Citations (Scopus)

A policy-centric approach to protecting OS kernel from vulnerable LKMs

Tian, D., Xiong, X., Hu, C. & Liu, P., Jun 2018, In : Software - Practice and Experience. 48, 6, p. 1269-1284 16 p.

Research output: Contribution to journalArticle

Open Access
Static analysis
Computer hardware
Hardware
Data storage equipment
Costs

Applied Cognitive Science Laboratory at the Pennsylvania State University

Inguscio, L. & Ritter, F. E., Jun 2005, In : Cognitive Processing. 6, 2, p. 142-146 5 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Applying software engineering to agent development

Cohen, M. A., Ritter, F. E. & Haynes, S. R., Jan 1 2010, In : AI Magazine. 31, 2, p. 25-44 20 p.

Research output: Contribution to journalArticle

Software engineering
Intelligent agents
Computer software reusability
High level languages
Modems
7 Citations (Scopus)

Applying the permutation test to factorial designs

Mewhort, D. J. K., Johns, B. T. & Kelly, M., May 1 2010, In : Behavior research methods. 42, 2, p. 366-372 7 p.

Research output: Contribution to journalArticle

Open Access
Analysis of Variance
Computational
Experiment
17 Citations (Scopus)

A preliminary model of participation for small groups

Morgan, J. H., Morgan, G. P. & Ritter, F. E., Sep 7 2010, In : Computational and Mathematical Organization Theory. 16, 3, p. 246-270 25 p.

Research output: Contribution to journalArticle

Individual Differences
Reflexivity
Simulation
Model
Costs

A privacy-preserving framework for ranked retrieval model

Yan, T., Gao, Y. & Zhang, N., Dec 1 2019, In : Computational Social Networks. 6, 1, 6.

Research output: Contribution to journalArticle

Open Access
Equivalent sets
Privacy Preserving
Retrieval
Attribute
Privacy
85 Citations (Scopus)

A Proteomic Analysis of Maize Chloroplast Biogenesis

Lonosky, P. M., Zhang, X., Honavar, V. G., Dobbs, D. L., Fu, A. & Rodermel, S. R., Feb 1 2004, In : Plant physiology. 134, 2, p. 560-574 15 p.

Research output: Contribution to journalArticle

Chloroplasts
Proteomics
proteomics
Zea mays
chloroplasts
Robots
Information science
Computer science
Statistical methods
Robotics
34 Citations (Scopus)

A real time fault analysis tool for monitoring operation of transmission line protective relay

Zhang, N. & Kezunovic, M., Mar 1 2007, In : Electric Power Systems Research. 77, 3-4, p. 361-370 10 p.

Research output: Contribution to journalArticle

Relay protection
Electric lines
Monitoring
Electric fault location
Fault detection
2 Citations (Scopus)

A recommender system for component-based applications using machine learning techniques

Fernández-García, A. J., Iribarne, L., Corral, A., Criado, J. & Wang, J. Z., Jan 15 2019, In : Knowledge-Based Systems. 164, p. 68-84 17 p.

Research output: Contribution to journalArticle

Recommender systems
Learning systems
Learning algorithms
Feature extraction
User interfaces
324 Citations (Scopus)

A region-based fuzzy feature matching approach to content-based image retrieval

Chen, Y. & Wang, J. Z., Sep 1 2002, In : IEEE Transactions on Pattern Analysis and Machine Intelligence. 24, 9, p. 1252-1267 16 p.

Research output: Contribution to journalArticle

Feature Matching
Content-based Image Retrieval
Image retrieval
Fuzzy sets
Fuzzy logic
11 Citations (Scopus)

A research agenda for social inclusion in information systems

Trauth, E., May 2017, In : Data Base for Advances in Information Systems. 48, 2, p. 9-20 12 p.

Research output: Contribution to journalArticle

Information systems
Information technology
Social inclusion
Research agenda
Students
10 Citations (Scopus)

Are there enough seats for women at the IT table?

Trauth, E. M., Dec 1 2012, ACM Inroads, 3, 4, p. 49-54 6 p.

Research output: Contribution to specialist publicationArticle

Seats
gender

A review of the twenty-second SOAR workshop

Ritter, F. E. & Councill, I. G., Sep 1 2002, In : AI Magazine. 23, 3, p. 107-109 3 p.

Research output: Contribution to journalArticle

44 Citations (Scopus)

Are your citations clean?

Lee, D., Kang, J., Mitra, P., Giles, C. L. & On, B. W., Dec 1 2007, In : Communications of the ACM. 50, 12, p. 33-38 6 p.

Research output: Contribution to journalArticle

Digital libraries
Data acquisition
69 Citations (Scopus)

Artifacts as psychological theories: The case of human-computer interaction

Carroll, J. M. & Campbell, R. L., Aug 1989, In : Behaviour and Information Technology. 8, 4, p. 247-256 10 p.

Research output: Contribution to journalArticle

Psychological Theory
psychological theory
Human computer interaction
Artifacts
artifact
18 Citations (Scopus)

ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing

Jin, X., Zhang, N. & Das, G., Jul 1 2011, In : Information Systems. 36, 5, p. 859-880 22 p.

Research output: Contribution to journalArticle

Data privacy
4 Citations (Scopus)

A scaffolded introduction to dynamic website development for female high school students

Rosson, M. B., Ioujanina, A., Paone, T., Sheasley, G., Sinha, H., Ganoe, C., Carroll, J. & Mahar, J., Apr 2 2009, In : SIGCSE Bulletin Inroads. 41, 1, p. 226-230 5 p.

Research output: Contribution to journalArticle

Information science
Technical presentations
Computer science
Websites
Students
4 Citations (Scopus)

A scenario-based approach for projecting user requirements for wireless proximal community networks

Horning, M. A., Robinson, H. R. & Carroll, J. M., Jun 1 2014, In : Computers in Human Behavior. 35, p. 413-422 10 p.

Research output: Contribution to journalArticle

Community Networks
Software
Wi-Fi
Economics
Software design
6 Citations (Scopus)
1 Citation (Scopus)

A secure framework for publishing virtual community contracts

Squicciarini, A., Paci, F. & Bertino, E., Jan 1 2006, In : International Journal of Web Based Communities. 2, 2, p. 237-255 19 p.

Research output: Contribution to journalArticle

virtual community
Network protocols
XML
community
integrity
6 Citations (Scopus)

A segmentation method for lung nodule image sequences based on superpixels and density-based spatial clustering of applications with noise

Zhang, W., Zhang, X., Zhao, J., Qiang, Y., Tian, Q. & Tang, X., Sep 2017, In : PloS one. 12, 9, e0184290.

Research output: Contribution to journalArticle

Cluster Analysis
Noise
lungs
Lung
Clustering algorithms
19 Citations (Scopus)

A self-help guide for autonomous systems

Anderson, M. L., Fults, S., Josyula, D. P., Oates, T., Perlis, D., Schmill, M., Wilson, S. & Wright, D., Jun 1 2008, In : AI Magazine. 29, 2, p. 67-76 10 p.

Research output: Contribution to journalArticle

Repair
6 Citations (Scopus)

A semantic authorization model for pervasive healthcare

Li, Z., Chu, C. H. & Yao, W., Feb 2014, In : Journal of Network and Computer Applications. 38, 1, p. 76-87 12 p.

Research output: Contribution to journalArticle

Semantics
Ontology
Semantic Web
Information systems
Specifications
5 Citations (Scopus)

A short-term trend prediction model of topic over Sina Weibo dataset

Zhao, J., Wu, W., Zhang, X., Qiang, Y., Liu, T. & Wu, L., Jan 1 2014, In : Journal of Combinatorial Optimization. 28, 3, p. 613-625 13 p.

Research output: Contribution to journalArticle

Prediction Model
Prediction
Social Networks
Forecast
China
5 Citations (Scopus)

A Simple Baseline for Travel Time Estimation using Large-scale Trip Data

Wang, H., Tang, X., Kuo, Y. H., Kifer, D. & Li, Z., Jan 1 2019, In : ACM Transactions on Intelligent Systems and Technology. 10, 2, a19.

Research output: Contribution to journalArticle

Travel Time
Travel time
Baseline
Trajectories
Trajectory
2 Citations (Scopus)
Taxonomies
taxonomy
Syntactics
predictive model
research results
47 Citations (Scopus)

A software fault tree approach to requirements analysis of an intrusion detection system

Helmer, G., Wong, J., Slagell, M., Honavar, V., Miller, L. & Lutz, R., Jan 1 2002, In : Requirements Engineering. 7, 4, p. 207-220 14 p.

Research output: Contribution to journalArticle

Intrusion detection
Software agents
Mobile agents
2 Citations (Scopus)

Assessing changes in groundwater chemistry in landscapes with more than 100 years of oil and gas development

Wen, T., Agarwal, A., Xue, L., Chen, A., Herman, A., Li, Z. & Brantley, S. L., Feb 2019, In : Environmental Science: Processes and Impacts. 21, 2, p. 384-396 13 p.

Research output: Contribution to journalArticle

Natural Gas
Groundwater
Oils
Oil and Gas Fields
Gases
48 Citations (Scopus)

Assessing the certainty of locations produced by an address geocoding system

Davis, C. A. & Fonseca, F. T., Mar 1 2007, In : GeoInformatica. 11, 1, p. 103-129 27 p.

Research output: Contribution to journalArticle

Geographic information systems
Telephone
Geographical Information System
Statistical methods
Information systems
3 Citations (Scopus)

Assessing the effects of data selection and representation on the development of reliable E. coli sigma 70 promoter region predictors

Abbas, M. M., Mohie-Eldin, M. M. & El-Manzalawy, Y., Mar 24 2015, In : PloS one. 10, 3

Research output: Contribution to journalArticle

Open Access
Genetic Promoter Regions
Escherichia coli
promoter regions
Classifiers
Transcriptional Regulatory Elements
2 Citations (Scopus)

Assessing timebanking use and coordination: implications for service exchange tools

Yuan, C. W., Hanrahan, B. V. & Carroll, J. M., Apr 1 2019, In : Information Technology and People. 32, 2, p. 344-363 20 p.

Research output: Contribution to journalArticle

participation
acceptance
currency
community
mediation
77 Citations (Scopus)

Assessment of user affective and belief states for interface adaptation: Application to an Air Force pilot task

Hudlicka, E. & McNeese, M. D., Feb 11 2002, In : User Modeling and User-Adapted Interaction. 12, 1, p. 1-47 47 p.

Research output: Contribution to journalArticle

air force
Graphical user interfaces
Instrument displays
Air
performance

Associating searching on search engines to subsequent searching on sites

Ortiz-Cordova, A. & Jansen, B. J., Apr 1 2016, In : International Journal of Information Systems in the Service Sector. 8, 2, p. 30-43 14 p.

Research output: Contribution to journalArticle

Search engines
Websites
Search engine
Industry
Query