Export 4367 results:
Sort by:
Chen, I. R., J. Guo, and F. Bao, "Trust Management for Service Composition in SOA-based Internet of Things Systems", IEEE Wireless Communications and Networking Conference (WCNC 2014), Istanbul, Turkey, 04/2014.
Almohri, H., D. D. Yao, and D. Kafura, "DroidBarrier: Know What is Executing on Your Android", ACM Conference on Data and Application Security and Privacy (CODASPY), San Antonio, TX, ACM, 03/2014.
Almohri, H., D. D. Yao, and D. Kafura, "Process Authentication for High System Assurance", IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 11, no. 2, 03/2014.
Akbar, M., and C. A. Shaffer, "Social Networks in Digital Libraries", Digital Libraries Applications: CBIR, Education, Social Networks, eScience/Simulation, and GIS, vol. 6, issue 1, pp. 1 - 175, 03/2014.
Leal, A., and D. A. Bowman, "3D Sketching and Flexible Input for Surface Design: A Case Study", SBC Journal on Interactive Systems, vol. 5, no. 3, pp. 93-101, 2014.
Vinzamuri, B., Y. Li, and C. K. Reddy, "Active Learning based Survival Regression for Censored Data", In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management(CIKM): ACM, pp. 241–250, 2014.
Mitchell, R., and I. R. Chen, "Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications", IEEE Transactions on Systems, Man and Cybernetics, vol. 44, no. 5, pp. 593 - 604, 2014.
Alhoori, H., R. Furuta, M. Tabet, M. Samaka, and E. A. Fox, "Altmetrics for Country-Level Research Assessment", The Emergence of Digital Libraries-Research and Practices: Springer International Publishing, pp. 59-64, 2014.
Jones, B. D., M. Setareh, N. F. Polys, and F. Bacim, "Application of an Online Interactive Simulation Tool to Teach Engineering Concepts Using 3D Spatial Structures", International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 9, no. 3, 2014.
Hossain, S. M., M. Marwah, A. Shah, L. T. Watson, and N. Ramakrishnan, "AutoLCA: A Framework for Sustainable Redesign and Assessment of Products", ACM Trans. Intell. Syst. Technol., vol. 5, no. 2, New York, NY, USA, ACM, pp. 34:1–34:21, 2014.
Jung, C., S. Lee, E. Raman, and S. Pande, "Automated Memory Leak Detection for Production Use", International Conference on Software Engineering (ICSE), 2014.
Ramakrishnan, N., P. Butler, S. Muthiah, N. Self, R. Khandpur, P. Saraf, W. Wang, J. Cadena, A. Vullikanti, G. Korkmaz, et al., "'Beating the News' with EMBERS: Forecasting Civil Unrest Using Open Source Indicators", Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, ACM, pp. 1799–1808, 2014.
Momtazpour, M., P. Butler, N. Ramakrishnan, S. M. Hossain, M. C. Bozchalui, and R. Sharma, "Charging and Storage Infrastructure Design for Electric Vehicles", ACM Trans. Intell. Syst. Technol., vol. 5, no. 3, New York, NY, USA, ACM, pp. 42:1–42:27, 2014.
Tilevich, E., and Y. - W. Kwon, "Cloud-based execution to improve mobile application energy efficiency", Computer, vol. 47, no. 1: IEEE Computer Society, pp. 75–77, 2014.
Luther, K., A. Pavel, W. Wu, J. - L. Tolentino, M. Agrawala, B. Hartmann, and S. P. Dow, "CrowdCrit: crowdsourcing and aggregating visual design critique", CSCW Companion '14: Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work &\#38; social computing, New York, NY, USA, ACM, pp. 21–24, 2014.
Cranshaw, J. B., K. Luther, P. G. Kelley, and N. Sadeh, "Curated city: capturing individual city guides through social curation", CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York, NY, USA, ACM, pp. 3249–3258, 2014.
Zhang, Y., and A. B. Prakash, "DAVA: Distributing Vaccines over Networks under Prior Information", Proceedings of the 2014 {SIAM} International Conference on Data Mining, Philadelphia, Pennsylvania, USA, April 24-26, 2014, pp. 46–54, 2014.
Keneshloo, Y., J. Cadena, G. Korkmaz, and N. Ramakrishnan, "Detecting and Forecasting Domestic Political Crises: A Graph-based Approach", Proceedings of the 2014 ACM Conference on Web Science, New York, NY, USA, ACM, pp. 192–196, 2014.
Zhang, H., D. D. Yao, and N. Ramakrishnan, "Detection of Stealthy Malware Activities with Traffic Causality and Scalable Triggering Relation Discovery", Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, ACM, pp. 39–50, 2014.