College of Information Sciences and Technology

  • United States

Research Output 1976 2020

3 Citations (Scopus)

An experimental evaluation of the effectiveness of endogenous and exogenous fantasy in computer-based simulation training

Mancuso, V. P., Hamilton, K., Tesler, R., Mohammed, S. & McNeese, M., Jan 1 2013, In : International Journal of Gaming and Computer-Mediated Simulations. 5, 1, p. 50-65 16 p.

Research output: Contribution to journalArticle

Design of experiments
Education
2 Citations (Scopus)

An exploration of design cues for heuristic-based decision-making about information sharing

Peña, J., Rosson, M. B., Ge, J., Jeong, E., Sundar, S. S., Kim, J. & Gambino, A., Jan 1 2018, Transforming Digital Worlds - 13th International Conference, iConference 2018, Proceedings. Chowdhury, G., McLeod, J., Gillet, V. & Willett, P. (eds.). Springer Verlag, p. 677-683 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10766 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information Sharing
Decision making
Decision Making
Heuristics
User interfaces
3 Citations (Scopus)

An exploration of pen tail gestures for interactions

Tian, F., Lu, F., Jiang, Y., Zhang, X., Cao, X., Dai, G. & Wang, H., Jan 1 2013, In : International Journal of Human Computer Studies. 71, 5, p. 551-569 19 p.

Research output: Contribution to journalArticle

interaction
user interface
User interfaces
experiment
interview
4 Citations (Scopus)

An exploration on long-distance communication between left-behind children and their parents in China

Pan, L., Tian, F., Lu, F., Zhang, X., Liu, Y., Feng, W., Dai, G. & Wang, H., Mar 18 2013, CSCW 2013 - Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work. p. 1147-1156 10 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
Mobile phones
3 Citations (Scopus)

An exploratory study of identity and IT career choice for military service members and veterans with disabilities

Trauth, E. M., Graham, K., Joshi, K. D. & Nithithanatchinnapat, B., 2015, 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Information technology
Reentry
Information systems
Education
Personnel
23 Citations (Scopus)

An exploratory study of RFID adoption in the retail sector

Bhattacharya, M., Chu, C. H., Hayya, J. & Mullen, T., Mar 1 2010, In : Operations Management Research. 3, 1, p. 80-89 10 p.

Research output: Contribution to journalArticle

Radio frequency identification (RFID)
Industry
Retail sector
Radio frequency identification
Exploratory study
12 Citations (Scopus)

An exploratory study on mobile banking adoption in Indian metropolitan and urban areas: a scenario-based experiment

Gupta, S., Yun, H., Xu, H. & Kim, H. W., Jan 2 2017, In : Information Technology for Development. 23, 1, p. 127-152 26 p.

Research output: Contribution to journalArticle

banking
metropolitan area
agglomeration area
urban area
scenario
2 Citations (Scopus)

An extended study on addressing defender teamwork while accounting for uncertainty in attacker defender games using iterative Dec-MDPs

Shieh, E., Jiang, A. X., Yadav, A., Varakantham, P. & Tambe, M., Jan 6 2016, In : Multiagent and Grid Systems. 11, 4, p. 189-226 38 p.

Research output: Contribution to journalArticle

Game theory
Multi agent systems
Uncertainty

An eyes and hands model for cognitive architectures to interact with user interfaces

Tehranchi, F. & Ritter, F. E., Jan 1 2017, p. 15-20. 6 p.

Research output: Contribution to conferencePaper

User interfaces
Human computer interaction
Interfaces (computer)
File editors
Hooks
34 Citations (Scopus)

Animal trait ontology: The importance and usefulness of a unified trait vocabulary for animal species

Hughes, L. M., Bao, J., Hu, Z. L., Honavar, V. & Reecy, J. M., Jun 1 2008, In : Journal of animal science. 86, 6, p. 1485-1491 7 p.

Research output: Contribution to journalArticle

Vocabulary
Livestock
United States Department of Agriculture
animals
livestock

An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks

Aiken, W., Kim, H., Ryoo, J. & Rosson, M. B., Oct 29 2018, 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. Deng, R. H., Marsh, S., Nurse, J., Lu, R., Sezer, S., Miller, P., Chen, L., McLaughlin, K. & Ghorbani, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 8514215. (2018 16th Annual Conference on Privacy, Security and Trust, PST 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Evaluation
21 Citations (Scopus)

An improved fuzzy clustering method for cellular manufacturing

Li, J., Chu, C. H., Wang, Y. & Yan, W., Mar 1 2007, In : International Journal of Production Research. 45, 5, p. 1049-1062 14 p.

Research output: Contribution to journalArticle

Cellular manufacturing
Fuzzy clustering
Machine components
Clustering algorithms
4 Citations (Scopus)

An improved fuzzy C-means algorithm for manufacturing cell formation

Li, J., Chu, C. H., Wang, Y. & Yan, W., Dec 31 2002, In : IEEE International Conference on Fuzzy Systems. 2, p. 1505-1510 6 p.

Research output: Contribution to journalConference article

Cell Formation
Fuzzy C-means Algorithm
Cellular manufacturing
Manufacturing
Fuzzy C-means Clustering
15 Citations (Scopus)

An improved neural network for manufacturing cell formation

Chu, C. H., Jan 1 1997, In : Decision Support Systems. 20, 4, p. 279-295 17 p.

Research output: Contribution to journalArticle

Cellular manufacturing
Neural networks
Neurology
Brain
Neural Networks (Computer)
46 Citations (Scopus)

An incremental approach to building a cluster hierarchy

Widyantoro, D. H., Ioerger, T. R. & Yen, J., Dec 1 2002, Proceedings - 2002 IEEE International Conference on Data Mining, ICDM 2002. p. 705-708 4 p. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Clustering algorithms
Lime
12 Citations (Scopus)

An incremental interactive algorithm for regular grammar inference

Parekh, R. & Honavar, V., Jan 1 1996, Grammatical Inference: Learning Syntax from Sentences - 3rd International Colloquium, ICGI-1996, Proceedings. de la Higuera, C. & Miclet, L. (eds.). Springer Verlag, p. 238-249 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1147).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Finite automata
Grammar
Finite State Automata
Query
Strings
27 Citations (Scopus)

An incremental learning algorithm with confidence estimation for automated identification of NDE signals

Polikar, R., Udpa, L., Udpa, S. & Honavar, V., Aug 1 2004, In : IEEE transactions on ultrasonics, ferroelectrics, and frequency control. 51, 8, p. 990-1001 12 p.

Research output: Contribution to journalArticle

Learning algorithms
learning
confidence
classifiers
Classifiers
2 Citations (Scopus)

An in-depth analysis of fuzzy c-means clustering for cellular manufacturing

Li, J., Chu, C. H. & Wang, Y., Dec 1 2008, Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008. p. 42-46 5 p. 4665936. (Proceedings - 5th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cellular manufacturing
Clustering algorithms
Experiments
14 Citations (Scopus)

An in-depth analysis of information markets with aggregate uncertainty

Chen, Y., Mullen, T. & Chu, C. H., Apr 1 2006, In : Electronic Commerce Research. 6, 2, p. 201-221 21 p.

Research output: Contribution to journalArticle

Internet
Uncertainty
Information market
Aggregate uncertainty

An in-depth study of peer influence on collective decision making for multi-party access control

Tyagi, A., Squicciarini, A., Rajtmajer, S. & Griffin, C., Jan 1 2016, Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016. Institute of Electrical and Electronics Engineers Inc., p. 305-314 10 p. (Proceedings - 2016 IEEE 17th International Conference on Information Reuse and Integration, IRI 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Decision making
Peer influence
Social networks
User studies
3 Citations (Scopus)

An information food chain for advanced applications on the WWW

Decker, S., Jannink, J., Melnik, S., Mitra, P., Staab, S., Studer, R. & Wiederhold, G., Jan 1 2000, Research and Advanced Technology for Digital Libraries - 4th European Conference, ECDL 2000, Proceedings. Borbinha, J. & Baker, T. (eds.). Springer Verlag, p. 490-493 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1923).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Food Chain
World Wide Web
Information Processing
19 Citations (Scopus)

An informed model of personal information release in social networking sites

Squicciarini, A. C. & Griffin, C., Dec 1 2012, Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012. p. 636-645 10 p. 6406321. (Proceedings - 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust and 2012 ASE/IEEE International Conference on Social Computing, SocialCom/PASSAT 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
2 Citations (Scopus)

An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes

Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R. & Garneau, C., Apr 21 2015, Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, HotSoS 2015. Association for Computing Machinery, 2746203. (ACM International Conference Proceeding Series; vol. 21-22-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Trace analysis
Experiments
Students
Uncertainty

An integrated conceptual model to incorporate information tasks in workflow models

Purao, S., Maass, W., Storey, V. C., Jansen, B. J. & Reddy, M., Nov 8 2012, Conceptual Modeling - 31st International Conference, ER 2012, Proceedings. p. 487-500 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7532 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrated Model
Conceptual Model
Work Flow
Flow control
Information Flow
1 Citation (Scopus)

An integrated methodology for knowledge and design acquisition

Zaff, B. S. & McNeese, M. D., 1991, IEEE Proceedings of the National Aerospace and Electronics Conference. Publ by IEEE, Vol. 2. p. 779-785 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer aided manufacturing
37 Citations (Scopus)

An integrated theory for improved skill acquisition and retention in the three stages of learning

Kim, J. W., Ritter, F. E. & Koubek, R. J., Jan 1 2013, In : Theoretical Issues in Ergonomics Science. 14, 1, p. 22-37 16 p.

Research output: Contribution to journalReview article

learning
Systems analysis
9 Citations (Scopus)

An integrative approach to information policy research

Trauth, E. M., Mar 1986, In : Telecommunications Policy. 10, 1, p. 41-50 10 p.

Research output: Contribution to journalArticle

information policy
policy analysis
policy development
development policy
privacy
6 Citations (Scopus)

An integrative simulation to study team cognition in emergency crisis management

McNeese, M. D., Mancuso, V. F., McNeese, N. J., Endsley, T. & Forster, P., Jan 1 2014, 2014 International Annual Meeting of the Human Factors and Ergonomics Society, HFES 2014. Human Factors an Ergonomics Society Inc., p. 285-289 5 p. (Proceedings of the Human Factors and Ergonomics Society; vol. 2014-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

cognition
simulation
management
Human engineering
teamwork
2 Citations (Scopus)

An intelligent agent for fault reconnaissance in sensor networks

Shakshuki, E. M., Xing, X. & Sheltami, T. R., Dec 1 2009, iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services. p. 139-146 8 p. (iiWAS2009 - The 11th International Conference on Information Integration and Web-based Applications and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent agents
Sensor nodes
Sensor networks
Hardware
Inference engines
3 Citations (Scopus)

An interactive and interpretable interface for diversity in recommender systems

Tsai, C. H., Mar 7 2017, IUI 2017 - Companion of the 22nd International Conference on Intelligent User Interfaces. Association for Computing Machinery, p. 225-228 4 p. (International Conference on Intelligent User Interfaces, Proceedings IUI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Recommender systems
Visualization
2 Citations (Scopus)

An interactive sensemaking framework for mobile visual analytics

Wu, A., Zhang, X. & Cai, G., Dec 13 2010, VINCI 2010: 3rd Visual Information Communication - International Symposium. 22. (VINCI 2010: 3rd Visual Information Communication - International Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access to Information
Mobile devices
Cues
Visualization
Learning
14 Citations (Scopus)

An intrinsically-motivated schema mechanism to model and simulate emergent cognition

Georgeon, O. L. & Ritter, F. E., May 1 2012, In : Cognitive Systems Research. 15-16, p. 73-92 20 p.

Research output: Contribution to journalArticle

Cognition
Motivation
Learning
Cognitive systems
Drive
1 Citation (Scopus)

An investigation into three visual characteristics of complex scenes that evoke human emotion

Lu, X., Adams, Jr., R., Li, J., Newman, M. G. & Wang, J., Jan 29 2018, 2017 7th International Conference on Affective Computing and Intelligent Interaction, ACII 2017. Institute of Electrical and Electronics Engineers Inc., p. 440-447 8 p. (2017 7th International Conference on Affective Computing and Intelligent Interaction, ACII 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Emotions
Textures
Color
Crowdsourcing
Dancing
1 Citation (Scopus)

An investigation of decision analytic methodologies for stress identification

Deng, Y., Chu, C. H., Si, H., Zhang, Q. & Wu, Z., Sep 2013, In : International Journal on Smart Sensing and Intelligent Systems. 6, 4, p. 1675-1699 25 p.

Research output: Contribution to journalArticle

Principal component analysis
Feature extraction
Information fusion
Sensors
Support vector machines
7 Citations (Scopus)

An investigation of the word-processing software market war in South Korea: A game-theoretic approach

Tan, C. H., Yang, X. & Xu, H., Mar 1 2010, In : Information and Management. 47, 2, p. 96-101 6 p.

Research output: Contribution to journalArticle

Word processing
South Korea
Software
Incumbents
New entrants
78 Citations (Scopus)

An LDA-based community structure discovery approach for large-scale social networks

Haizheng, Z., Baojun, Q., Giles, C. L., Henry C, F. & John, Y., Oct 1 2007, ISI 2007: 2007 IEEE Intelligence and Security Informatics. p. 200-207 8 p. 4258697. (ISI 2007: 2007 IEEE Intelligence and Security Informatics).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social sciences
Computer science
45 Citations (Scopus)

Annotating images and image objects using a hierarchical Dirichlet process model

Yakhnenko, O. & Honavar, V., 2008, Proceedings of the MDM 2008 Workshop - 9th International Workshop on Multimedia Data Mining, Held in Conjunction with the ACM SIGKDD 2008. p. 1-7 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Labels
Labeling
Experiments
26 Citations (Scopus)

An objective trust management framework for mobile ad hoc networks

Li, R., Li, J., Liu, P. & Chen, H. H., Aug 2 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring. p. 56-60 5 p. 4212452. (IEEE Vehicular Technology Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
6 Citations (Scopus)

An object oriented approach to simulating large communication networks

Mikler, A. R., Wong, J. S. K. & Honavar, V., Jan 1 1998, In : Journal of Systems and Software. 40, 2, p. 151-164 14 p.

Research output: Contribution to journalArticle

Telecommunication networks
Simulators
Scheduling
Communication systems
Communication
2 Citations (Scopus)

A node-failure-resilient anonymous communication protocol through commutative path hopping

Li, F., Luo, B., Liu, P. & Chu, C. H., Jun 15 2010, 2010 Proceedings IEEE INFOCOM. 5462114. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Network protocols
Tunnels
Operating costs
Scalability
31 Citations (Scopus)

An online experiment of privacy authorization dialogues for social applications

Wang, N., Grossklags, J. & Xu, H., Mar 18 2013, CSCW 2013 - Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work. p. 261-272 12 p. (Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments

A non-parametric approach to pair-wise dynamic topic correlation detection

Yang, S., Lu, Z. & Giles, C. L., Dec 1 2008, Proceedings - 8th IEEE International Conference on Data Mining, ICDM 2008. p. 1031-1036 6 p. 4781220. (Proceedings - IEEE International Conference on Data Mining, ICDM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
1 Citation (Scopus)

Anonymity preserving techniques in trust negotiations

Ray, I., Bertino, E., Squicciarini, A. C. & Ferrari, E., Jan 1 2006, Privacy Enhancing Technologies - 5th International Workshop, PET 2005, Revised Selected Papers. Springer Verlag, p. 93-109 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3856 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disclosure
Anonymity
Attribute
Policy
Transform
22 Citations (Scopus)

Anonymous proxy re-encryption

Shao, J., Liu, P., Wei, G. & Ling, Y., Jan 1 2012, In : Security and Communication Networks. 5, 5, p. 439-449 11 p.

Research output: Contribution to journalArticle

Cryptography
189 Citations (Scopus)

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Wang, D., He, D., Wang, P. & Chu, C. H., Jul 1 2015, In : IEEE Transactions on Dependable and Secure Computing. 12, 4, p. 428-442 15 p., 6894170.

Research output: Contribution to journalArticle

Authentication
Smart cards
17 Citations (Scopus)

An optimization model of machining process route for low carbon manufacturing

Yi, Q., Li, C., Zhang, X., Liu, F. & Tang, Y., Sep 1 2015, In : International Journal of Advanced Manufacturing Technology. 80, 5-8, p. 1181-1196 16 p.

Research output: Contribution to journalArticle

Machining
Carbon
Planning
Cutting tools
Seats
3 Citations (Scopus)

A note on the Estrada-Hatano communicability algorithm for detecting community structure in complex networks

Michele Rajtmajer, S. & Vukičević, D., Dec 1 2010, In : Applied Mathematics and Computation. 217, 7, p. 3516-3521 6 p.

Research output: Contribution to journalArticle

Community Structure
Complex networks
Complex Networks
Clique
Graph in graph theory
10 Citations (Scopus)

A novel channel-aware attention framework for multi-channel EEG seizure detection via multi-view deep learning

Yuan, Y., Xun, G., Ma, F., Suo, Q., Xue, H., Jia, K. & Zhang, A., Apr 6 2018, 2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018. Institute of Electrical and Electronics Engineers Inc., p. 206-209 4 p. (2018 IEEE EMBS International Conference on Biomedical and Health Informatics, BHI 2018; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electroencephalography
Seizures
Learning
Epilepsy
Scalp
5 Citations (Scopus)

A novel distributed algorithm for redundant reader elimination in RFID networks

Ma, M., Wang, P. & Chu, C. H., Dec 1 2013, 2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013. 6694501. (2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Parallel algorithms
radio
coverage
system development
7 Citations (Scopus)

An Overview of veryIDX - A privacy-preserving digital identity management system for mobile devices

Paci, F., Bertino, E., Kerr, S., Squicciarini, A. & Woo, J., Sep 1 2009, In : Journal of Software. 4, 7, p. 696-706 11 p.

Research output: Contribution to journalArticle

Mobile devices
Bluetooth
Viruses
Authentication
Industry