Export 4359 results:
Sort by:
Rathinavel, K., G. Dixit, M. Matarazzo, and C. T. Lu, "SHOPAHOLIC: A Crowd-Sourced Spatio-Temporal Product-Deals Evaluation System", Proceedings of the 5th ACM SIGSPATIAL International Workshop on GeoStreaming (IWGS), Dallas, TX, 11/2014.
Fu, K., Y. C. Lu, and C. T. Lu, "TREADS: A Safe Route Recommender using Social Media Mining and Text Summarization", Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Dallas, TX, 11/2014.
Boedihardjo, A. P., C. - T. Lu, and B. Wang, "A Framework for Exploiting Local Information to Enhance Density Estimation of Data Streams", ACM Transactions on Knowledge Discovery from Data, vol. 9, issue 1, pp. 1 - 38, 10/2014.
Yan, Q., M. Li, F. Chen, T. Jiang, W. Lou, T. Y. Hou, and C. - T. Lu, "SpecMonitor: Toward Efficient Passive Traffic Monitoring for Cognitive Radio Networks", IEEE Transactions on Wireless Communications, vol. 13, issue 10, pp. 5893 - 5905, 10/2014.
Wang, J., and I. R. Chen, "Trust-based Data Fusion Mechanism Design in Cognitive Radio Networks", IEEE CNS 1st International Workshop on Cognitive Radio and Electromagnetic Spectrum Security, San Francisco, CA, 10/2014.
Chen, Y., and E. A. Fox, "Using ACM DL paper metadata as an auxiliary source for building educational collections", International Conference on Digitial Libraries (DL 2014), London, England, 09/2014.
Fox, E. A., "Improving the ETD Landscape", Electronic Theses and Dissertations 2014, Leicester, UK, 07/2014.
Zhang, H., D. D. Yao, and N. Ramakrishnan, "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery", he 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Kyoto, Japan, 06/2014.
Kavanaugh, A. L., S. D. Sheetz, R. Sandoval-Almazan, J. C. Tedesco, and E. A. Fox, "Media use during conflicts: information seeking gratifications & efficacy during 2012 Mexican elections", 15th Annual International Conference on Digital Government Research, Aguascalientes City, Mexico, ACM, pp. 205-214, 06/2014.
Ahuja, A., B. Hanrahan, and M. A. Pérez-Quiñones, "Contextinator: Project-Based Management of Personal Information on the Web", WEBIST - 10th International Conference on Web Information Systems and Technologies, 05/2014.
Chen, I. R., and J. Guo, "Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection", 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), Victoria, Canada, 05/2014.
Chen, I. R., J. Guo, and F. Bao, "Trust Management for Service Composition in SOA-based Internet of Things Systems", IEEE Wireless Communications and Networking Conference (WCNC 2014), Istanbul, Turkey, 04/2014.
Almohri, H., D. D. Yao, and D. Kafura, "DroidBarrier: Know What is Executing on Your Android", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2014.
Almohri, H., D. D. Yao, and D. Kafura, "Process Authentication for High System Assurance", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 11, no. 2, 03/2014.
Akbar, M., and C. A. Shaffer, "Social Networks in Digital Libraries", Digital Libraries Applications: CBIR, Education, Social Networks, eScience/Simulation, and GIS, vol. 6, issue 1, pp. 1 - 175, 03/2014.
Leal, A., and D. A. Bowman, "3D Sketching and Flexible Input for Surface Design: A Case Study", SBC Journal on Interactive Systems, vol. 5, no. 3, pp. 93-101, 2014.