College of Information Sciences and Technology

  • United States

Research Output 1976 2020

This table is different: A wordnet-based approach to identifying references to document entities

Wilson, S., Black, A. W. & Oberlander, J., Jan 1 2016, Proceedings of the 8th Global WordNet Conference, GWC 2016. Forascu, C., Fellbaum, C., Forascu, C., Vossen, P. & Mititelu, V. B. (eds.). Global WordNet Association, p. 427-435 9 p. (Proceedings of the 8th Global WordNet Conference, GWC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Textbooks
Learning systems
Websites

Third-party subscription in multiparty dialogues for agent teams

Kamali, K., Fan, X. & Yen, J., 2005, Proceedings - 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, IAT'05. Vol. 2005. p. 447-450 4 p. 1565580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Communication
7 Citations (Scopus)

Third-party error detection support mechanisms for dictation speech recognition

Zhou, L., Shi, Y. & Sears, A., Sep 1 2010, In : Interacting with Computers. 22, 5, p. 375-388 14 p.

Research output: Contribution to journalArticle

Error detection
Speech recognition
Error correction
Human computer interaction
62 Citations (Scopus)

Third-party apps on Facebook: Privacy and the illusion of control

Wang, N., Xu, H. & Grossklags, J., Dec 1 2011, Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11. 4. (Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, CHIMIT'11).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Authentication
Interfaces (computer)
11 Citations (Scopus)

Third Eye: A Shopping Assistant for the Visually Impaired

Zientara, P. A., Lee, S., Smith, G. H., Brenner, R., Itti, L., Rosson, M. B., Carroll, J. M., Irick, K. M. & Narayanan, V., Feb 2017, Computer, 50, 2, p. 16-24 9 p.

Research output: Contribution to specialist publicationArticle

Particle accelerators
Cameras
Hardware
27 Citations (Scopus)

Thin cloud detection of all-sky images using Markov random fields

Li, Q., Lu, W., Yang, J. & Wang, J., Jan 1 2012, In : IEEE Geoscience and Remote Sensing Letters. 9, 3, p. 417-421 5 p., 6071030.

Research output: Contribution to journalArticle

Potts model
Imaging systems
Labeling
Labels
Pixels

The Web-active end user

Zang, N. & Rosson, M. B., Dec 1 2010, No Code Required. Elsevier Inc., p. 389-405 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
HTML
Costs
28 Citations (Scopus)

The virtual school: An integrated collaborative environment for the classroom

Isenhour, P. L., Carroll, J. M., Neale, D. C., Rosson, M. B. & Dunlap, D. R., Dec 1 2000, In : Educational Technology and Society. 3, 3, p. 74-86 13 p.

Research output: Contribution to journalArticle

HIgh speed networks
Availability
Students
classroom
school
1 Citation (Scopus)

The Virtual Data Collaboratory

Parashar, M., Honavar, V., Simonet, A., Rodero, I., Ghahramani, F., Agnew, G. & Jantz, R., Jan 1 2019, (Accepted/In press) In : Computing in Science and Engineering.

Research output: Contribution to journalArticle

4 Citations (Scopus)

The V-chip in Canada and the United States: Themes and variations in design and deployment

McDowell, S. D. & Maitland, C., Jan 1 1998, In : Journal of Broadcasting and Electronic Media. 42, 4, p. 401-422 22 p.

Research output: Contribution to journalArticle

Canada
Television receivers
television
Cables
post-Cold War
NATO
future prospect
cold war
peace
1 Citation (Scopus)

The use of ubiquitous computing / computational neuroscience for distributed battlefield management

McNeese, M. D., Dec 1 2001, In : Proceedings of the Human Factors and Ergonomics Society. p. 473-477 5 p.

Research output: Contribution to journalConference article

Ubiquitous computing
neurosciences
cognition
information warfare
management
76 Citations (Scopus)

The use of RFID in healthcare: Benefits and barriers

Yao, W., Chu, C. H. & Li, Z., Sep 15 2010, Proceedings of 2010 IEEE International Conference on RFID-Technology and Applications, RFID-TA 2010. p. 128-134 7 p. 5529874. (Proceedings of 2010 IEEE International Conference on RFID-Technology and Applications, RFID-TA 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Electronic circuit tracking
Identification (control systems)
Health
Costs
5 Citations (Scopus)

The useful interface experience: The role and transformation of usability

Carroll, J. M. & Mentis, H. M., Dec 1 2008, Product Experience. Elsevier Ltd, p. 499-514 16 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Cognitive Science
Cognition
Research Design
History
Research
4 Citations (Scopus)

The US, NATO And military burden-sharing

Forster, P. K. & Cimbala, S. J., Nov 21 2004, Frank Cass. 188 p.

Research output: Book/ReportBook

NATO
Military
gulf war
military intervention
responsibility
4 Citations (Scopus)

The underrepresentation of black males in IT higher education: A conceptual framework for understanding individual differences

Cain, C. C. & Trauth, E. M., Dec 1 2013, 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime. p. 3531-3538 8 p. (19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Education
education
Group
participation
gender
4 Citations (Scopus)

The ubiquitous and increasingly significant status message

Jansen, B. J., Chowdury, A. & Cook, G., May 1 2010, Interactions, 17, 3, p. 15-17 3 p.

Research output: Contribution to specialist publicationArticle

Television
Application programs
Web services
Interfaces (computer)
Industry
5 Citations (Scopus)

The theory-practice gap as generative metaphor

Beck, J. & Ekbia, H. R., Apr 20 2018, CHI 2018 - Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems: Engage with CHI. Association for Computing Machinery, (Conference on Human Factors in Computing Systems - Proceedings; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
1 Citation (Scopus)

The tension between expectations of availability and the reality of availability in hybrid teams: A reflection by a hybrid team of academic practitioners

Ocker, R., Huang, H., Trauth, E. & Purao, S., Oct 15 2007, Virtuality and Virtualization: Proceedings of the International Federation of Information Processing Working Groups 8.2 on Information Systems and Organizations and 9.5 on Virtuality and Society. Crowston, K., Sieber, S. & Wynn, E. (eds.). p. 119-131 13 p. (IFIP International Federation for Information Processing; vol. 236).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Knowledge work
Information and communication technology

The tangled roots of real estate markets, the state, and public education

Kelly, M. G., Jul 3 2018, In : Journal of Educational Administration and History. 50, 3, p. 191-203 13 p.

Research output: Contribution to journalArticle

real estate market
public education
market
educational opportunity
education

The symbiotic relationship of crisis response professionals and enthusiasts as demonstrated by reddit's user-interface over time

LaLone, N., Kropczynski, J. & Tapia, A., Jan 1 2018, Conference Proceedings - 15th International Conference on Information Systems for Crisis Response and Management, ISCRAM 2018. Tomaszewski, B. & Boersma, K. (eds.). Information Systems for Crisis Response and Management, ISCRAM, p. 232-244 13 p. (Proceedings of the International ISCRAM Conference; vol. 2018-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bombing
Theaters
User interfaces
Facings
Agglomeration
108 Citations (Scopus)

The strategy-specific nature of improvement: The Power Law Applies by Strategy Within Task

Delaney, P. F., Reder, L. M., Staszewski, J. J. & Ritter, F. E., Jan 1998, In : Psychological Science. 9, 1, p. 1-7 7 p.

Research output: Contribution to journalArticle

Learning Curve
Learning
Practice (Psychology)
Power (Psychology)
75 Citations (Scopus)

The story picturing engine - A system for automatic text illustration

Joshi, D., Wang, J. & Li, J., Jan 1 2006, In : ACM Transactions on Multimedia Computing, Communications and Applications. 2, 1, p. 68-89 22 p.

Research output: Contribution to journalArticle

Engines
Statistical methods
Reinforcement
Semantics
Experiments
27 Citations (Scopus)

The story picturing engine: Finding elite images to illustrate a story using mutual reinforcement

Joshi, D., Wang, J. Z. & Li, J., Dec 1 2004, MIR'04 - Proceedings of the 6th ACM SIGMM International Workshop on Multimedia Information Retrieval. p. 119-126 8 p. (MIR'04 - Proceedings of the 6th ACM SIGMM International Workshop on Multimedia Information Retrieval).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reinforcement
Engines
Markov processes
Semantics
1 Citation (Scopus)

The stomatal flexoskeleton: How the biomechanics of guard cell walls animate an elastic pressure vessel

Yi, H., Chen, Y., Wang, J. Z., Puri, V. M. & Anderson, C. T., Jan 1 2019, In : Journal of experimental botany. 70, 14, p. 3561-3571 11 p.

Research output: Contribution to journalReview article

guard cells
Biomechanical Phenomena
Cell Wall
cell walls
Pressure
284 Citations (Scopus)

The state of the art in end-user software engineering

Ko, A. J., Abraham, R., Beckwith, L., Blackwell, A., Burnett, M., Erwig, M., Scaffidi, C., Lawrance, J., Lieberman, H., Myers, B., Rosson, M. B., Rothermel, G., Shaw, M. & Wiedenbeck, S., Apr 1 2011, In : ACM Computing Surveys. 43, 3, 21.

Research output: Contribution to journalArticle

Software Engineering
Software engineering
Grading
Integration testing
Self-efficacy
5 Citations (Scopus)

The source of the story: Evaluating the credibility of crisis information sources

Endsley, T., Wu, Y. & Reep, J., Jan 1 2014, ISCRAM 2014 Conference Proceedings - 11th International Conference on Information Systems for Crisis Response and Management. The Pennsylvania State University, p. 160-164 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Disasters
Information systems
Systems analysis
50 Citations (Scopus)
Mobile computing
Law enforcement
World Wide Web
Mobile devices
Lenses
2 Citations (Scopus)

The sociotechnical nature of mobile computing work: Evidence from a study of policing in the united states

Sawyer, S. & Tapia, A., Dec 1 2006, Intelligent Systems for Optical Networks Design: Advancing Techniques. IGI Global, p. 152-171 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

justice
evidence
third generation
law enforcement
9 Citations (Scopus)

The sharing economy: Friend or foe?

Avital, M., Carroll, J. M., Hjalmarsson, A., Levina, N., Malhotra, A. & Sundararajan, A., Jan 1 2015.

Research output: Contribution to conferencePaper

Ecosystems
Sharing
economy
Industry
Ecosystem
56 Citations (Scopus)
Information retrieval
information retrieval
field theory
synergy
examination
2 Citations (Scopus)
Semantics
Communication
2 Citations (Scopus)

The semantics of potential intentions

Fan, X. & Yen, J., 2005, Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference, AAAI-05/IAAI-05. Vol. 1. p. 71-76 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Semantics
9 Citations (Scopus)

The semantics of MALLET - An agent teamwork encoding language

Fan, X., Yen, J., Miller, M. S. & Volz, R. A., Dec 1 2005, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). p. 69-91 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3476 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Team Work
Encoding
Semantics
Specification languages
Operational Semantics
1 Citation (Scopus)

The semantic pixel

Fonseca, F., Davis, C. & Câmara, G., Jan 1 2014, In : Proceedings of the Brazilian Symposium on GeoInformatics. p. 107-117 11 p.

Research output: Contribution to journalConference article

pixel
Pixels
Semantics
semantics
Satellites
15 Citations (Scopus)

The security model of unidirectional proxy re-signature with private re-signature key

Shao, J., Feng, M., Zhu, B., Cao, Z. & Liu, P., Dec 13 2010, Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. p. 216-232 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6168 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Model
Signature
Attack
Signature Scheme
Model
2 Citations (Scopus)

The security-liberty balance: Individuals' attitudes towards internet government surveillance

Xu, H. & Dinev, T., Jan 1 2012, In : Electronic Government. 9, 1, p. 46-63 18 p.

Research output: Contribution to journalArticle

surveillance
Internet
cognitive theory
self-efficacy
Costs
2 Citations (Scopus)

The safety net of aging in place: Understanding how older adults construct, develop, and maintain their social circles

Wang, X., Knearem, T., Gui, F., Gupta, S., Zhu, H., Williams, M. & Carroll, J. M., May 21 2018, Proceedings of the 12th EAI International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth 2018. Association for Computing Machinery, p. 191-200 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aging of materials
Health

The role of working memory in syntactic sentence realization: A modeling & simulation approach

Cole, J. R. & Reitter, D. T., Jun 1 2019, In : Cognitive Systems Research. 55, p. 95-106 12 p.

Research output: Contribution to journalArticle

Syntactics
Short-Term Memory
Data storage equipment
Psycholinguistics
Linguistics
39 Citations (Scopus)

The role of visual search in the design of effective soft keyboards

Sears, A. L., Jacko, J. A., Chu, J. & Moro, F., Dec 1 2001, In : Behaviour and Information Technology. 20, 3, p. 159-166 8 p.

Research output: Contribution to journalArticle

Touch
Telephone
layout
Equipment and Supplies
Experiments
12 Citations (Scopus)

The role of ubiquitous computing in maintaining work-life balance: Perspectives from women in the information technology workforce

Quesenberry, J. L. & Trauth, E. M., Jan 1 2005, Designing Ubiquitous Information Environments: Socio-Technical Issues and Challenges - IFIP TC8 WG 8.2 International Working Conference. Springer New York LLC, p. 43-55 13 p. (IFIP Advances in Information and Communication Technology; vol. 185).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Work-life balance
Ubiquitous computing
Workforce
Placing
63 Citations (Scopus)

The role of theory in gender and information systems research

Trauth, E. M., Oct 1 2013, In : Information and Organization. 23, 4, p. 277-293 17 p.

Research output: Contribution to journalArticle

systems research
information system
Information systems
gender
Information systems research
26 Citations (Scopus)
Information technology
Word processing
Spreadsheets
Curricula
Computer program listings
3 Citations (Scopus)

The role of task space in action control: Evidence from research on instructions

Xiong, A. & Proctor, R. W., Jan 1 2018, Psychology of Learning and Motivation - Advances in Research and Theory. Federmeier, K. D. (ed.). Academic Press Inc., p. 325-364 40 p. (Psychology of Learning and Motivation - Advances in Research and Theory; vol. 69).

Research output: Chapter in Book/Report/Conference proceedingChapter

Computer Security
Privacy
Research
Surveys and Questionnaires
18 Citations (Scopus)

The role of social media in MOOCs: How to use social media to enhance student retention

Zheng, S., Han, K., Rosson, M. B. & Carroll, J., Apr 25 2016, L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale. Association for Computing Machinery, Inc, p. 419-428 10 p. (L@S 2016 - Proceedings of the 3rd 2016 ACM Conference on Learning at Scale).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

social media
Students
instructor
student
facebook
1 Citation (Scopus)

The role of social capital in emergency response

Lee, R., Schafer, W. A., Knoche, A. J. & Carroll, J., Dec 1 2006, Association for Information Systems - 12th Americas Conference On Information Systems, AMCIS 2006. Vol. 3. p. 1574-1581 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

social capital
Information systems
information system
community
Planning
343 Citations (Scopus)

The role of push-pull technology in privacy calculus: The case of location-based services

Xu, H., Teo, H. H., Tan, B. C. Y. & Agarwal, R., Dec 1 2009, In : Journal of Management Information Systems. 26, 3, p. 135-173 39 p.

Research output: Contribution to journalArticle

Location based services
Pull
Privacy
Location-based services
Decision making
3 Citations (Scopus)

The role of metacognition in robust AI systems

Schmill, M. D., Oates, T., Anderson, M. L., Josyula, D., Perlis, D., Wilson, S. & Fults, S., Dec 1 2008, p. 163-170. 8 p.

Research output: Contribution to conferencePaper

Cognitive systems
Brittleness
Recovery
9 Citations (Scopus)

The role of laboratory experiments in HCI: Help, hindrance, or ho-hum? (panel)

Wolf, C. G., Carroll, J., Landauer, T. K., John, B. E. & Whiteside, J., 1989, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 1989. Association for Computing Machinery, p. 265-268 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Human computer interaction
Experiments
15 Citations (Scopus)

The role of information systems research in shaping the future of information privacy

Belanger, F. & Xu, H., Nov 2015, In : Information Systems Journal. 25, 6, p. 573-578 6 p.

Research output: Contribution to journalEditorial

Information systems