College of Information Sciences and Technology

  • United States

Research Output 1976 2020

Article
2 Citations (Scopus)
XML
Counting
Query
Tree Structure
Selectivity
40 Citations (Scopus)

CPI: Constraints-preserving inlining algorithm for mapping XML DTD to relational schema

Lee, D. & Chu, W. W., Oct 1 2001, In : Data and Knowledge Engineering. 39, 1, p. 3-25 23 p.

Research output: Contribution to journalArticle

Relational database
World Wide Web
Extensible markup language
Query
1 Citation (Scopus)

Crawling Hidden Objects with kNN Queries

Yan, H., Gong, Z., Zhang, N., Huang, T., Zhong, H. & Wei, J., Apr 1 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 4, p. 912-924 13 p., 7335622.

Research output: Contribution to journalArticle

Location based services
Websites
World Wide Web
Experiments
12 Citations (Scopus)

Creating a design science of humancomputer interaction

Carroll, J., Jan 1 1993, In : Interacting with Computers. 5, 1, p. 3-12 10 p.

Research output: Contribution to journalArticle

Computer science
6 Citations (Scopus)

Creating effective user interfaces

Sears, A. L. & Lund, A. M., Jul 1 1997, In : IEEE Software. 14, 4, p. 21-24 4 p.

Research output: Contribution to journalArticle

User interfaces
Software engineering
Specifications
8 Citations (Scopus)

Creating names for things

Carroll, J., Jul 1 1981, In : Journal of Psycholinguistic Research. 10, 4, p. 441-455 15 p.

Research output: Contribution to journalArticle

Names
content analysis
rating
Entity
Referent
1 Citation (Scopus)

Creation of the importance scanning worm using information collected by Botnets

Choi, Y. H., Liu, P. & Seo, S. W., Apr 15 2010, In : Computer Communications. 33, 6, p. 676-688 13 p.

Research output: Contribution to journalArticle

Internet
Scanning
Sampling
Botnet
Analytical models
4 Citations (Scopus)

Creative analogy and language evolution

Carroll, J., Nov 1 1980, In : Journal of Psycholinguistic Research. 9, 6, p. 595-617 23 p.

Research output: Contribution to journalArticle

language acquisition
Language
language
evidence
Evolution of Language
23 Citations (Scopus)

Creative names for personal files in an interactive computing environment

Carroll, J., Jan 1 1982, In : International Journal of Man-Machine Studies. 16, 4, p. 405-438 34 p.

Research output: Contribution to journalArticle

Research laboratories
exegesis
Personal computers
Aristotle
PC
1 Citation (Scopus)

Crisis Management Simulations: Lessons Learned from a Cross-cultural Perspective

Endsley, T., Reep, J., McNeese, M. D. & Forster, P., Jan 1 2015, In : Procedia Manufacturing. 3, p. 3917-3924 8 p.

Research output: Contribution to journalArticle

Information technology
Decision making
Experiments
49 Citations (Scopus)

Critical empirical research in IS: An example of gender and the IT workforce

Trauth, E. M. & Howcroft, D., Sep 11 2006, In : Information Technology and People. 19, 3, p. 272-292 21 p.

Research output: Contribution to journalArticle

empirical research
gender
research project
Lenses
systems research
26 Citations (Scopus)

Critical research in information systems: Looking forward, looking back

Kvasny, L. & Richardson, H., Jul 1 2006, In : Information Technology & People. 19, 3, p. 196-202 7 p.

Research output: Contribution to journalArticle

information system
Information systems
systems research
reflexivity
methodology
537 Citations (Scopus)

Critical skills and knowledge requirements of IS professionals: A joint academic/industry investigation

Lee, D. M. S., Trauth, E. M. & Farwell, D., Sep 1 1995, In : MIS Quarterly: Management Information Systems. 19, 3, p. 313-337 25 p.

Research output: Contribution to journalArticle

Information systems
Industry
Curricula
Managers
Reengineering
2 Citations (Scopus)

Crowd counting with limited labeling through submodular frame selection

Zhou, Q., Zhang, J., Che, L., Shan, H. & Wang, J., May 1 2019, In : IEEE Transactions on Intelligent Transportation Systems. 20, 5, p. 1728-1738 11 p., 8360780.

Research output: Contribution to journalArticle

Airports
Labeling
Redundancy
Planning
Experiments
9 Citations (Scopus)

CrowdK: Answering top-k queries with crowdsourcing

Lee, J., Lee, D. & Hwang, S. W., Aug 1 2017, In : Information Sciences. 399, p. 98-120 23 p.

Research output: Contribution to journalArticle

Query
Costs
Latency
Dynamic programming
Range of data
2 Citations (Scopus)

Crowdsourcing the measurement of interstate conflict

D'Orazio, V., Kenwick, M., Lane, M., Palmer, G. & Reitter, D., Jun 2016, In : PloS one. 11, 6, e0156527.

Research output: Contribution to journalArticle

Crowdsourcing
Dissent and Disputes
Costs
Costs and Cost Analysis
methodology
77 Citations (Scopus)

Cultural (RE)production of digital inequality in a US community technology initiative

Kvasny, L., Apr 1 2006, In : Information Communication and Society. 9, 2, p. 160-181 22 p.

Research output: Contribution to journalArticle

communication technology
information technology
community
Communication
resources
29 Citations (Scopus)

Cultural appropriations of technical capital: Black women, weblogs, and the digital divide

Brock, A., Kvasny, L. & Hales, K., Nov 1 2010, In : Information Communication and Society. 13, 7, p. 1040-1059 20 p.

Research output: Contribution to journalArticle

digital divide
weblog
conversation
beauty
Communication
1 Citation (Scopus)

Cursor caging: Enhancing focus targeting in interactive fisheye views

Song, H. Z., Fu, Y., Zhang, L. & Zhang, X. L., May 1 2013, In : Science China Information Sciences. 56, 5, p. 1-16 16 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Customer segmentation using online platforms: isolating behavioral and demographic segments for persona creation via aggregated user data

An, J., Kwak, H., Jung, S. G., Salminen, J. & Jansen, B. J., Dec 1 2018, In : Social Network Analysis and Mining. 8, 1, 54.

Research output: Contribution to journalArticle

Factorization
customer
segmentation
social media
present
3 Citations (Scopus)

Cyber-human systems of thought and understanding

Fonseca, F. T., Marcinkowski, M. & Davis, C., Apr 1 2019, In : Journal of the Association for Information Science and Technology. 70, 4, p. 402-411 10 p.

Research output: Contribution to journalArticle

Geographic information systems
Pixels
Semantics
Big data
science
3 Citations (Scopus)

Cyber insider mission detection for situation awareness

Du, H., Wang, C., Zhang, T., Yang, S. J., Choi, J. & Liu, P., 2015, In : Studies in Computational Intelligence. 563, p. 201-217 17 p.

Research output: Contribution to journalArticle

Software agents
Fuzzy rules
Electric fuses
Hidden Markov models
Learning systems
5 Citations (Scopus)

Cybersecurity for digital manufacturing

Wu, D., Ren, A., Zhang, W., Fan, F., Liu, P., Fu, X. & Terpenny, J., Jul 2018, In : Journal of Manufacturing Systems. 48, p. 3-12 10 p.

Research output: Contribution to journalArticle

Cloud computing
Ethernet
Artificial intelligence
Wireless networks
Robots
20 Citations (Scopus)

DaisyViz: A model-based user interface toolkit for interactive information visualization systems

Ren, L., Tian, F., Zhang, X. & Zhang, L., Aug 1 2010, In : Journal of Visual Languages and Computing. 21, 4, p. 209-229 21 p.

Research output: Contribution to journalArticle

User interfaces
Visualization
Data structures
Data visualization
User Interface
9 Citations (Scopus)

Damage assessment and repair in attack resilient distributed database systems

Liu, P. & Yu, M., Jan 1 2011, In : Computer Standards and Interfaces. 33, 1, p. 96-107 12 p.

Research output: Contribution to journalArticle

Distributed database systems
damages
Repair
system of objectives
transaction
29 Citations (Scopus)

Data entry for mobile devices: An empirical comparison of novice performance with Jot and Graffiti

Sears, A. & Arora, R., Oct 1 2002, In : Interacting with Computers. 14, 5, p. 413-433 21 p.

Research output: Contribution to journalArticle

Mobile devices
Data acquisition
Gesture recognition
44 Citations (Scopus)
Mobile devices
Data acquisition
Touch screens
Mobile computing
Personal digital assistants
5 Citations (Scopus)

Data entry on the move: An examination of nomadic speech-based text entry

Price, K. J., Lin, M., Feng, J., Goldman, R., Sears, A. L. & Jacko, J. A., Dec 1 2004, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3196, p. 460-471 12 p.

Research output: Contribution to journalArticle

Text Entry
Speech recognition
Error Rate
Data acquisition
Automatic Speech Recognition
7 Citations (Scopus)

Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense

Lin, J., Yu, W., Zhang, N., Yang, X. & Ge, L., Sep 1 2018, In : IEEE Transactions on Vehicular Technology. 67, 9, p. 8738-8753 16 p., 8375813.

Research output: Contribution to journalArticle

Data Integrity
Physical Modeling
Traffic congestion
System Modeling
Guidance
13 Citations (Scopus)

Data Mining for Detecting Errors in Dictation Speech Recognition

Zhou, L., Shi, Y., Feng, J. & Sears, A. L., Jan 1 2005, In : IEEE Transactions on Speech and Audio Processing. 13, 5, p. 681-688 8 p.

Research output: Contribution to journalArticle

data mining
Error detection
speech recognition
Speech recognition
Data mining
77 Citations (Scopus)

Data mining for network intrusion detection: A comparison of alternative methods

Zhu, D., Premkumar, G., Zhang, X. & Chu, C. H., Sep 1 2001, In : Decision Sciences. 32, 4, p. 635-658 24 p.

Research output: Contribution to journalArticle

Intrusion detection
Data mining
Network security
Design of experiments
Statistical methods
13 Citations (Scopus)

Decreasing auditory simon effects across reaction time distributions

Xiong, A. & Proctor, R. W., Jan 1 2016, In : Journal of Experimental Psychology: Human Perception and Performance. 42, 1, p. 23-38 16 p.

Research output: Contribution to journalArticle

Reaction Time
Hearing
Activation
Auditory Stimuli
Interference
7 Citations (Scopus)

Deep patient similarity learning for personalized healthcare

Suo, Q., Ma, F., Yuan, Y., Huai, M., Zhong, W., Gao, J. & Zhang, A., Jul 1 2018, In : IEEE Transactions on Nanobioscience. 17, 3, p. 219-227 9 p., 8360146.

Research output: Contribution to journalArticle

Health
Learning
Delivery of Health Care
Neural networks
Entropy
4 Citations (Scopus)

Defeating buffer overflow attacks via virtualization

Tian, D., Xiong, X., Hu, C. & Liu, P., Jan 1 2014, In : Computers and Electrical Engineering. 40, 6, p. 1940-1950 11 p.

Research output: Contribution to journalArticle

Data storage equipment
Experiments
Virtualization
Virtual machine
11 Citations (Scopus)

Defence against packet injection in ad hoc networks

Gu, Q., Liu, P., Chu, C. H. & Zhu, S., Jan 1 2007, In : International Journal of Security and Networks. 2, 1-2, p. 154-169 16 p.

Research output: Contribution to journalArticle

Ad hoc networks
Network protocols
Authentication
Network security
Wireless ad hoc networks
6 Citations (Scopus)

Defending return-oriented programming based on virtualization techniques

Jia, X., Wang, R., Jiang, J., Zhang, S. & Liu, P., Jan 1 2013, In : Security and Communication Networks. 6, 10, p. 1236-1249 14 p.

Research output: Contribution to journalArticle

Computer programming
Industry
Virtualization
107 Citations (Scopus)

Defining a session on web search engines

Jansen, B. J., Spink, A., Blakely, C. & Koshman, S., Apr 1 2007, In : Journal of the American Society for Information Science and Technology. 58, 6, p. 862-871 10 p.

Research output: Contribution to journalArticle

Internet protocols
Search engines
search engine
Internet
interaction
58 Citations (Scopus)

Deliberated Evolution: Stalking the View Matcher in Design Space

Carroll, J. & Rosson, M. B., Jan 1 1991, In : Human�Computer Interaction. 6, 3-4, p. 281-318 38 p.

Research output: Contribution to journalArticle

Stalking
Artifacts
Psychology
Human computer interaction
Psychological Theory
2 Citations (Scopus)

Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?

Kotapati, K., Liu, P. & La Porta, T. F., Aug 1 2007, In : Telecommunication Systems. 35, 3-4, p. 99-122 24 p.

Research output: Contribution to journalArticle

Specifications
Telecommunication networks
Telecommunication
3 Citations (Scopus)

Deploying for deliverance: The digital divide in municipal wireless networks

Tapia, A. H. & Ortiz, J. A., Jan 1 2008, In : Sociological Focus. 41, 3, p. 256-275 20 p.

Research output: Contribution to journalArticle

digital divide
information technology
discourse analysis
municipality
ethnicity
3 Citations (Scopus)

De-SAG: On the De-Anonymization of Structure-Attribute Graph Data

Ji, S., Wang, T., Chen, J., Li, W., Mittal, P. & Beyah, R., Jul 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 4, p. 594-607 14 p., 7938634.

Research output: Contribution to journalArticle

Experiments
13 Citations (Scopus)

Design and evaluation of awareness mechanisms in CiteSeer

Farooq, U., Ganoe, C. H., Carroll, J., Councill, I. G. & Giles, C. L., Mar 1 2008, In : Information Processing and Management. 44, 2, p. 596-612 17 p.

Research output: Contribution to journalArticle

Digital libraries
Computer supported cooperative work
Information science
Hinges
Human computer interaction
116 Citations (Scopus)

Design and implementation of a shape memory alloy actuated reconfigurable airfoil

Strelec, J. K., Lagoudas, D. C., Khan, M. A. & Yen, J., Jan 1 2003, In : Journal of Intelligent Material Systems and Structures. 14, 4-5, p. 257-273 17 p.

Research output: Contribution to journalArticle

Shape memory effect
Airfoils
Wire
Wind tunnels
Aerodynamics
56 Citations (Scopus)

Designing claims for reuse in interactive systems design

Sutcliffe, A. G. & Carroll, J., Jan 1 1999, In : International Journal of Human Computer Studies. 50, 3, p. 213-241 29 p.

Research output: Contribution to journalArticle

artifact
Systems analysis
Human computer interaction
evaluation
3 Citations (Scopus)

Designing equal participation in informal learning for people with visual impairment

Yuan, C. W., Hanrahan, B. V., Lee, S. & Carroll, J. M., Jan 1 2015, In : Interaction Design and Architecture(s). 27, 1, p. 93-106 14 p.

Research output: Contribution to journalArticle

visual impairment
informal learning
Vision Disorders
Education
Learning
10 Citations (Scopus)

Designing for creativity in computer-supported cooperative work

Farooq, U., Carroll, J. M. & Ganoe, C. H., Jan 1 2008, In : International Journal of e-Collaboration. 4, 4, p. 51-75 25 p.

Research output: Contribution to journalArticle

Computer supported cooperative work
Trajectories
Planning
20 Citations (Scopus)

Designing for e-science: Requirements gathering for collaboration in CiteSeer

Farooq, U., Ganoe, C. H., Carroll, J. M. & Giles, C. L., Apr 1 2009, In : International Journal of Human Computer Studies. 67, 4, p. 297-312 16 p.

Research output: Contribution to journalArticle

Digital libraries
scientific activity
Information science
Search engines
science
6 Citations (Scopus)

Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings

Eikey, E. V., Murphy, A. R., Reddy, M. C. & Xu, H., Dec 1 2015, In : International Journal of Medical Informatics. 84, 12, p. 1065-1075 11 p.

Research output: Contribution to journalArticle

Privacy
Electronic Health Records
Hospital Units
Workflow
Interviews
28 Citations (Scopus)

Designing our town: MOOsburg

Carroll, J., Rosson, M. B., Isenhour, P., Ganoe, C., Dunlap, D., Fogarty, J., Schafer, W. & Van Metre, C., Jan 1 2001, In : International Journal of Human Computer Studies. 54, 5, p. 725-751 27 p.

Research output: Contribution to journalArticle

Web browsers
Museums
Navigation
town
community
4 Citations (Scopus)

Designing Scenarios for Human Action

Carroll, J., Jan 1 1994, In : Performance Improvement Quarterly. 7, 3, p. 64-75 12 p.

Research output: Contribution to journalArticle

scenario
multimedia
artifact
information system
interaction