Biblio

Export 4349 results:
Sort by:
2016
Chen, I. R., F. Bao, and J. Guo, "Trust-based Service Management for Social Internet of Things Systems", IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 6, pp. 684-696, 2016.
Wang, G., X. Zhang, S. Tang, H. Zheng, and B. Y. Zhao, "Unsupervised Clickstream Clustering for User Behavior Analysis", Proc. of SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016.
Wang, G., B. Wang, T. Wang, A. Nika, H. Zheng, and B. Y. Zhao, "Defending against Sybil Devices in Crowdsourced Mapping Services", Proc. of The 14th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2016.
Wang, G., X. Zhang, S. Tang, H. Zheng, and B. Y. Zhao, "Unsupervised Clickstream Clustering for User Behavior Analysis", Proc. of SIGCHI Conference on Human Factors in Computing Systems (CHI), 2016.
2015
Wang, Y., I. R. Chen, and J. H. Cho, "Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks", IEEE 12th International Symposium on Autonomous Decentralized Systems, Taichung, Taiwan, 3/2015.
Wei, S., and B. G. Ryder, "Adaptive Context-sensitive Analysis for JavaScript", European Conference on Object-oriented Programming (ECOOP), Prague, Czech Republic, 2015.
Tran, H., X. Wu, and L. Zhang, "A Bayesian Method for Assigning Ambiguous Bisulfite Short Reads", The 7th International Conference on Bioinformatics and Computational Biology (BICoB-2015), Hawaii, 2015.
Luther, K., N. Hahn, S. P. Dow, and A. Kittur, "Crowdlines: Supporting Synthesis of Diverse Information Sources through Crowdsourced Outlines", AAAI Conference on Human Computation and Crowdsourcing (HCOMP 2015), San Diego, CA, USA, 2015.
Sudalagunta, P. R., C. Sultan, R. K. Kapania, L. T. Watson, and P. Raj, "A novel scheme to accurately compute higher vibration modes using the Ritz method and a two-point BVP solver", 56th AIAA/ASCE/AHS/ASC Structures, Structural Dynamics, and Materials Conf., SciTech 2015, Kissimmee, FL, AIAA, 2015.
Luther, K., A. Kavanaugh, and M. Horning, "Supporting Local News Sharing with Mobile Crowdsourcing and Large Display Technologies", CSCW 2015 Workshop on Information Technology in City Life, Vancouver, Canada, 2015.
Boedihardjo, A. P., C. - T. Lu, and F. Chen, "Fast Adaptive Kernel Density Estimator for Data Streams", Knowledge and Information Systems, vol. 42, issue 2, no. 2, pp. 285 - 317, 2/2015.
Shu, X., D. D. Yao, and B. Ryder, "A Formal Framework for Program Anomaly Detection", 18th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), Kyoto, Japan, 11/2015.
Chen, I. R., R. Mitchell, and J. H. Cho, "On Modeling of Adversary Behavior and Defense for Survivability of Military MANET Applications", 34th IEEE International Conference for Military Communications (MILCOM 2015), Tampa, USA, 10/2015.
Shu, X., D. D. Yao, and N. Ramakrishnan, "Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths", 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS), Denver, Colorado, ACM, 10/2015.
Xu, K., K. Tian, D. D. Yao, and B. Ryder, "Probabilistic Program Modeling for High-Precision Anomaly Classification", 2015 IEEE Computer Security Foundations Symposium (CSF), Verona, Italy, IEEE, 07/2015.
Guo, J., and I. R. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems", 12th IEEE International Conference on Services Computing, New York, 06/2015.
Hanrahan, B., and M. A. Pérez-Quiñones, "Lost in Email: Pulling Users Down a Path of Interaction", Proceedings of the SIGCHI conference on Human factors in computing systems, 05/2015.
Dou, Y., C. Zeng, Y. Yang, and D. D. Yao, "MadeCR: Correlation-based Malware Detection for Cognitive Radio", IEEE Conference on Computer Communications (INFOCOM), Hong Kong, IEEE, 04/2015.