Export 4367 results:
Sort by:
Mitchell, R., and I. R. Chen, "Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems", IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 1, pp. 16-30, 2015.
Alqadah, F., C. K. Reddy, J. Hu, and H. F. Alqadah, "Biclustering neighborhood-based collaborative filtering method for top-n recommender systems", Knowledge and Information Systems (KAIS), vol. 44, no. 2: Springer, pp. 475–491, 2015.
Feng, W., K. Krommydas, and L. Zhang, "CentroidBLAST: A Cluster- Based Approach to Sequence Search", The 7th International Conference on Bioinformatics and Com- putational Biology (BICoB-2015), Hawaii, 2015.
Liu, Q., C. Jung, D. Lee, and D. Tiwari, "Clover: Compiler Directed Lightweight Soft Error Resilience", ACM SIGPLAN/SIGBED Conference on Languages, Compilers, Tools and Theory for Embedded Systems (LCTES), 2015.
Li, Y., B. Vinzamuri, and C. K. Reddy, "Constrained Elastic Net based Knowledge Transfer for Healthcare Information Exchange", Data Mining and Knowledge Discovery (DMKD), vol. 29, no. 4, pp. 1094–1112, 2015.
Kamal, T., K. R. Bisset, A. R. Butt, and M. V. Marathe, "Cost Estimation of Parallel Constrained Producer-Consumer Algorithms", 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP), Turku, Finland, March 4-6, 2015, pp. 86–93, 2015.
Wang, G., T. Wang, B. Wang, D. Sambasivan, Z. Zhang, H. Zheng, and B. Y. Zhao, "Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms", Proc. of the 18th ACM Conference on Computer Supported Cooperative Work {&} Social Computing (CSCW), 2015.
Kwon, Y. - W., and E. Tilevich, "Facilitating the Implementation of Adaptive Cloud Offloading to Improve the Energy Efficiency of Mobile Applications", Proceedings of the 2th ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft 2015): ACM, 2015.
Shu, X., J. Zhang, D. D. Yao, and W. - C. Feng, "Fast Detection of Transformed Data Leaks", IEEE Transactions on Information Forensics & Security (TIFS), 2015.
Polys, N. F., B. Knapp, M. Bock, C. Lidwin, D. Webster, N. Waggoner, and I. Bukvic, "Fusality: an open framework for cross-platform mirror world installations", International Conference on 3D Web Technology (Web3D '15), Heraklion, GR, ACM, pp. 171-179, 2015.
Kotov, A., V. Rakesh, E. Agichtein, and C. K. Reddy, "Geographical Latent Variable Models for Microblog Retrieval", in Advances in Information Retrieval - 37th European Conference on IR Research (ECIR), Vienna, Austria., pp. 635–647, 2015.
Alaeddini, A., K. Yang, P. Reeves, and C. K. Reddy, "A hybrid prediction model for no-shows and cancellations of outpatient appointments", IIE Transactions on Healthcare Systems Engineering, vol. 5, no. 1, pp. 14–32, 2015.
Cheng, Y., A. Gupta, and A. R. Butt, "An in-memory object caching framework with adaptive load balancing", Proceedings of the Tenth European Conference on Computer Systems - EuroSys '15, Bordeaux, France, ACM Press, pp. 1 - 16, 2015.
Chen, W., and L. Zhang, "The pattern of DNA cleavage intensity around indels", Scientific reports, vol. 5: Nature Publishing Group, 2015.
Zhou, X., Z. Zhang, G. Wang, X. Yu, B. Y. Zhao, and H. Zheng, "Practical Conflict Graphs in the Wild", IEEE/ACM Trans. Netw. (TON), vol. 23, no. 3, pp. 824–835, 2015.