Research Output per year
Research Output 1976 2020
- 300 - 350 out of 4,188 results
- Type (ascending)
Counting relaxed twig matches in a tree
Lee, D. & Srivastava, D., Dec 1 2004, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2973, p. 88-99 12 p.Research output: Contribution to journal › Article
CPI: Constraints-preserving inlining algorithm for mapping XML DTD to relational schema
Lee, D. & Chu, W. W., Oct 1 2001, In : Data and Knowledge Engineering. 39, 1, p. 3-25 23 p.Research output: Contribution to journal › Article
Crawling Hidden Objects with kNN Queries
Yan, H., Gong, Z., Zhang, N., Huang, T., Zhong, H. & Wei, J., Apr 1 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 4, p. 912-924 13 p., 7335622.Research output: Contribution to journal › Article
Creating a design science of humancomputer interaction
Carroll, J., Jan 1 1993, In : Interacting with Computers. 5, 1, p. 3-12 10 p.Research output: Contribution to journal › Article
Creating effective user interfaces
Sears, A. L. & Lund, A. M., Jul 1 1997, In : IEEE Software. 14, 4, p. 21-24 4 p.Research output: Contribution to journal › Article
Creating names for things
Carroll, J., Jul 1 1981, In : Journal of Psycholinguistic Research. 10, 4, p. 441-455 15 p.Research output: Contribution to journal › Article
Creation of the importance scanning worm using information collected by Botnets
Choi, Y. H., Liu, P. & Seo, S. W., Apr 15 2010, In : Computer Communications. 33, 6, p. 676-688 13 p.Research output: Contribution to journal › Article
Creative analogy and language evolution
Carroll, J., Nov 1 1980, In : Journal of Psycholinguistic Research. 9, 6, p. 595-617 23 p.Research output: Contribution to journal › Article
Creative names for personal files in an interactive computing environment
Carroll, J., Jan 1 1982, In : International Journal of Man-Machine Studies. 16, 4, p. 405-438 34 p.Research output: Contribution to journal › Article
Crisis Management Simulations: Lessons Learned from a Cross-cultural Perspective
Endsley, T., Reep, J., McNeese, M. D. & Forster, P., Jan 1 2015, In : Procedia Manufacturing. 3, p. 3917-3924 8 p.Research output: Contribution to journal › Article
Critical empirical research in IS: An example of gender and the IT workforce
Trauth, E. M. & Howcroft, D., Sep 11 2006, In : Information Technology and People. 19, 3, p. 272-292 21 p.Research output: Contribution to journal › Article
Critical research in information systems: Looking forward, looking back
Kvasny, L. & Richardson, H., Jul 1 2006, In : Information Technology & People. 19, 3, p. 196-202 7 p.Research output: Contribution to journal › Article
Critical skills and knowledge requirements of IS professionals: A joint academic/industry investigation
Lee, D. M. S., Trauth, E. M. & Farwell, D., Sep 1 1995, In : MIS Quarterly: Management Information Systems. 19, 3, p. 313-337 25 p.Research output: Contribution to journal › Article
Crowd counting with limited labeling through submodular frame selection
Zhou, Q., Zhang, J., Che, L., Shan, H. & Wang, J., May 1 2019, In : IEEE Transactions on Intelligent Transportation Systems. 20, 5, p. 1728-1738 11 p., 8360780.Research output: Contribution to journal › Article
CrowdK: Answering top-k queries with crowdsourcing
Lee, J., Lee, D. & Hwang, S. W., Aug 1 2017, In : Information Sciences. 399, p. 98-120 23 p.Research output: Contribution to journal › Article
Crowdsourcing the measurement of interstate conflict
D'Orazio, V., Kenwick, M., Lane, M., Palmer, G. & Reitter, D., Jun 2016, In : PloS one. 11, 6, e0156527.Research output: Contribution to journal › Article
Cultural (RE)production of digital inequality in a US community technology initiative
Kvasny, L., Apr 1 2006, In : Information Communication and Society. 9, 2, p. 160-181 22 p.Research output: Contribution to journal › Article
Cultural appropriations of technical capital: Black women, weblogs, and the digital divide
Brock, A., Kvasny, L. & Hales, K., Nov 1 2010, In : Information Communication and Society. 13, 7, p. 1040-1059 20 p.Research output: Contribution to journal › Article
Cursor caging: Enhancing focus targeting in interactive fisheye views
Song, H. Z., Fu, Y., Zhang, L. & Zhang, X. L., May 1 2013, In : Science China Information Sciences. 56, 5, p. 1-16 16 p.Research output: Contribution to journal › Article
Customer segmentation using online platforms: isolating behavioral and demographic segments for persona creation via aggregated user data
An, J., Kwak, H., Jung, S. G., Salminen, J. & Jansen, B. J., Dec 1 2018, In : Social Network Analysis and Mining. 8, 1, 54.Research output: Contribution to journal › Article
Cyber-human systems of thought and understanding
Fonseca, F. T., Marcinkowski, M. & Davis, C., Apr 1 2019, In : Journal of the Association for Information Science and Technology. 70, 4, p. 402-411 10 p.Research output: Contribution to journal › Article
Cyber insider mission detection for situation awareness
Du, H., Wang, C., Zhang, T., Yang, S. J., Choi, J. & Liu, P., 2015, In : Studies in Computational Intelligence. 563, p. 201-217 17 p.Research output: Contribution to journal › Article
Cybersecurity for digital manufacturing
Wu, D., Ren, A., Zhang, W., Fan, F., Liu, P., Fu, X. & Terpenny, J., Jul 2018, In : Journal of Manufacturing Systems. 48, p. 3-12 10 p.Research output: Contribution to journal › Article
DaisyViz: A model-based user interface toolkit for interactive information visualization systems
Ren, L., Tian, F., Zhang, X. & Zhang, L., Aug 1 2010, In : Journal of Visual Languages and Computing. 21, 4, p. 209-229 21 p.Research output: Contribution to journal › Article
Damage assessment and repair in attack resilient distributed database systems
Liu, P. & Yu, M., Jan 1 2011, In : Computer Standards and Interfaces. 33, 1, p. 96-107 12 p.Research output: Contribution to journal › Article
Data entry for mobile devices: An empirical comparison of novice performance with Jot and Graffiti
Sears, A. & Arora, R., Oct 1 2002, In : Interacting with Computers. 14, 5, p. 413-433 21 p.Research output: Contribution to journal › Article
Data Entry for Mobile Devices Using Soft Keyboards: Understanding the Effects of Keyboard Size and User Tasks
Sears, A. & Zha, Y., Jan 1 2003, In : International Journal of Human-Computer Interaction. 16, 2, p. 163-184 22 p.Research output: Contribution to journal › Article
Data entry on the move: An examination of nomadic speech-based text entry
Price, K. J., Lin, M., Feng, J., Goldman, R., Sears, A. L. & Jacko, J. A., Dec 1 2004, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3196, p. 460-471 12 p.Research output: Contribution to journal › Article
Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense
Lin, J., Yu, W., Zhang, N., Yang, X. & Ge, L., Sep 1 2018, In : IEEE Transactions on Vehicular Technology. 67, 9, p. 8738-8753 16 p., 8375813.Research output: Contribution to journal › Article
Data Mining for Detecting Errors in Dictation Speech Recognition
Zhou, L., Shi, Y., Feng, J. & Sears, A. L., Jan 1 2005, In : IEEE Transactions on Speech and Audio Processing. 13, 5, p. 681-688 8 p.Research output: Contribution to journal › Article
Data mining for network intrusion detection: A comparison of alternative methods
Zhu, D., Premkumar, G., Zhang, X. & Chu, C. H., Sep 1 2001, In : Decision Sciences. 32, 4, p. 635-658 24 p.Research output: Contribution to journal › Article
Decreasing auditory simon effects across reaction time distributions
Xiong, A. & Proctor, R. W., Jan 1 2016, In : Journal of Experimental Psychology: Human Perception and Performance. 42, 1, p. 23-38 16 p.Research output: Contribution to journal › Article
Deep patient similarity learning for personalized healthcare
Suo, Q., Ma, F., Yuan, Y., Huai, M., Zhong, W., Gao, J. & Zhang, A., Jul 1 2018, In : IEEE Transactions on Nanobioscience. 17, 3, p. 219-227 9 p., 8360146.Research output: Contribution to journal › Article
Defeating buffer overflow attacks via virtualization
Tian, D., Xiong, X., Hu, C. & Liu, P., Jan 1 2014, In : Computers and Electrical Engineering. 40, 6, p. 1940-1950 11 p.Research output: Contribution to journal › Article
Defence against packet injection in ad hoc networks
Gu, Q., Liu, P., Chu, C. H. & Zhu, S., Jan 1 2007, In : International Journal of Security and Networks. 2, 1-2, p. 154-169 16 p.Research output: Contribution to journal › Article
Defending return-oriented programming based on virtualization techniques
Jia, X., Wang, R., Jiang, J., Zhang, S. & Liu, P., Jan 1 2013, In : Security and Communication Networks. 6, 10, p. 1236-1249 14 p.Research output: Contribution to journal › Article
Defining a session on web search engines
Jansen, B. J., Spink, A., Blakely, C. & Koshman, S., Apr 1 2007, In : Journal of the American Society for Information Science and Technology. 58, 6, p. 862-871 10 p.Research output: Contribution to journal › Article
Deliberated Evolution: Stalking the View Matcher in Design Space
Carroll, J. & Rosson, M. B., Jan 1 1991, In : Human�Computer Interaction. 6, 3-4, p. 281-318 38 p.Research output: Contribution to journal › Article
Dependency relation based vulnerability analysis of 3G networks: Can it identify unforeseen cascading attacks?
Kotapati, K., Liu, P. & La Porta, T. F., Aug 1 2007, In : Telecommunication Systems. 35, 3-4, p. 99-122 24 p.Research output: Contribution to journal › Article
Deploying for deliverance: The digital divide in municipal wireless networks
Tapia, A. H. & Ortiz, J. A., Jan 1 2008, In : Sociological Focus. 41, 3, p. 256-275 20 p.Research output: Contribution to journal › Article
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data
Ji, S., Wang, T., Chen, J., Li, W., Mittal, P. & Beyah, R., Jul 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 4, p. 594-607 14 p., 7938634.Research output: Contribution to journal › Article
Design and evaluation of awareness mechanisms in CiteSeer
Farooq, U., Ganoe, C. H., Carroll, J., Councill, I. G. & Giles, C. L., Mar 1 2008, In : Information Processing and Management. 44, 2, p. 596-612 17 p.Research output: Contribution to journal › Article
Design and implementation of a shape memory alloy actuated reconfigurable airfoil
Strelec, J. K., Lagoudas, D. C., Khan, M. A. & Yen, J., Jan 1 2003, In : Journal of Intelligent Material Systems and Structures. 14, 4-5, p. 257-273 17 p.Research output: Contribution to journal › Article
Designing claims for reuse in interactive systems design
Sutcliffe, A. G. & Carroll, J., Jan 1 1999, In : International Journal of Human Computer Studies. 50, 3, p. 213-241 29 p.Research output: Contribution to journal › Article
Designing equal participation in informal learning for people with visual impairment
Yuan, C. W., Hanrahan, B. V., Lee, S. & Carroll, J. M., Jan 1 2015, In : Interaction Design and Architecture(s). 27, 1, p. 93-106 14 p.Research output: Contribution to journal › Article
Designing for creativity in computer-supported cooperative work
Farooq, U., Carroll, J. M. & Ganoe, C. H., Jan 1 2008, In : International Journal of e-Collaboration. 4, 4, p. 51-75 25 p.Research output: Contribution to journal › Article
Designing for e-science: Requirements gathering for collaboration in CiteSeer
Farooq, U., Ganoe, C. H., Carroll, J. M. & Giles, C. L., Apr 1 2009, In : International Journal of Human Computer Studies. 67, 4, p. 297-312 16 p.Research output: Contribution to journal › Article
Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings
Eikey, E. V., Murphy, A. R., Reddy, M. C. & Xu, H., Dec 1 2015, In : International Journal of Medical Informatics. 84, 12, p. 1065-1075 11 p.Research output: Contribution to journal › Article
Designing our town: MOOsburg
Carroll, J., Rosson, M. B., Isenhour, P., Ganoe, C., Dunlap, D., Fogarty, J., Schafer, W. & Van Metre, C., Jan 1 2001, In : International Journal of Human Computer Studies. 54, 5, p. 725-751 27 p.Research output: Contribution to journal › Article
Designing Scenarios for Human Action
Carroll, J., Jan 1 1994, In : Performance Improvement Quarterly. 7, 3, p. 64-75 12 p.Research output: Contribution to journal › Article