Filter
Conference contribution

Search results

  • 2009

    Geographical data collection in sensor networks with self-organizing transaction cluster-heads

    Rajgure, N., Platon, E., Borcea, C. & Honiden, S., 2009, 24th Annual ACM Symposium on Applied Computing, SAC 2009. p. 1214-1218 5 p. (Proceedings of the ACM Symposium on Applied Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GRE: Hybrid recommendations for NSDL collections

    Will, T., Srinivasan, A., Bieber, M., Im, I., Oria, V. & Wu, Y. F. B., Nov 30 2009, JCDL'09 - Proceedings of the 2009 ACM/IEEE Joint Conference on Digital Libraries. 1 p. (Proceedings of the ACM/IEEE Joint Conference on Digital Libraries).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Integrated production and delivery scheduling with disjoint windows

    Huo, Y., Leung, J. Y. T. & Wang, X., 2009, Combinatorial Optimization and Applications - Third International Conference, COCOA 2009, Proceedings. p. 471-482 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5573 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Learning-based image representation and method for face recognition

    Liu, Z., Liu, C. & Tao, Q., Dec 16 2009, IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009. 5339012. (IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, BTAS 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Local summarization and multi-level LSH for retrieving multi-variant audio tracks

    Yu, Y., Crucianu, M., Oria, V. & Chen, L., 2009, MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums. p. 341-350 10 p. (MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Managing complex IT security processes with value based measures

    Abercrombie, R. K., Sheldon, F. T. & Mili, A., Jul 20 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. 4925092. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Methodology for evaluating security controls based on key performance indicators and stakeholder mission

    Sheldon, F. T., Abercrombie, R. K. & Mili, A., Apr 3 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755410. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Modeling the evolution of software engineering trends - A bottom up approach

    Rabai, L. B. A., Bai, Y. Z. & Mili, A., Dec 1 2009, ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings. p. 47-54 8 p. (ICSOFT 2009 - 4th International Conference on Software and Data Technologies, Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Network planning for heterogeneous wireless sensor networks in environmental survivability

    Machado, R., Zhang, W. & Wang, G., 2009, ICTAI 2009 - 21st IEEE International Conference on Tools with Artificial Intelligence. p. 814-821 8 p. 5366834. (Proceedings - International Conference on Tools with Artificial Intelligence, ICTAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Node reclamation and replacement for long-lived sensor networks

    Tong, B., Wang, G., Zhang, W. & Wang, C., Nov 20 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009. 5168950. (2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • On-demand node reclamation and replacement for guaranteed area coverage in long-lived sensor networks

    Tong, B., Li, Z., Wang, G. & Zhang, W., 2009, Quality of Service in Heterogeneous Networks - 6th Int. ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2009 and AAA-IDEA 2009, Proceedings. p. 148-166 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 22 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 111-122 12 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    89 Scopus citations
  • Quantifying security threats and their impact

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2009, CSIIRW09: Fifth Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies. 26. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Relational methods in the analysis of while loops: Observations of versatility

    Louhichi, A., Mraihi, O., Jilani, L. L., Bsaies, K. & Mili, A., 2009, Relations and Kleene Algebra in Computer Science - 11th Int. Conference on Relational Methods in Computer Science, RelMiCS 2009 and 6th Int. Conference on Applications of Kleene Algebra, AKA 2009, Proc.. p. 242-259 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Robust face recognition using color information

    Liu, Z. & Liu, C., Sep 14 2009, Advances in Biometrics - Third International Conference, ICB 2009, Proceedings. p. 122-131 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5558 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Vulnerability assessment for cascading failures in electric power systems

    Baldick, R., Chowdhury, B., Dobson, I., Dong, Z., Gou, B., Hawkins, D., Huang, Z., Joung, M., Kim, J., Kirschen, D., Lee, S., Li, F., Li, J., Li, Z., Liu, C. C., Luo, X., Mili, L., Miller, S., Nakayama, M., Papic, M., & 11 othersPodmore, R., Rossmaier, J., Schneider, K., Sun, H., Sun, K., Wang, D., Wu, Z., Yao, L., Zhang, P., Zhang, W. & Zhang, X., 2009, 2009 IEEE/PES Power Systems Conference and Exposition, PSCE 2009. 4839939. (2009 IEEE/PES Power Systems Conference and Exposition, PSCE 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Scopus citations
  • 2010

    Active caching for similarity queries based on shared-neighbor information

    Houle, M. E., Oria, V. & Qasim, U., 2010, CIKM'10 - Proceedings of the 19th International Conference on Information and Knowledge Management and Co-located Workshops. p. 669-678 10 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • A model for analyzing architectural attributes

    Derbel, I., Jilani, L. L. & Mili, A., Jan 1 2010, 2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010. IEEE Computer Society, 5586933. (2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An integrated network of roadside sensors and vehicles for driving safety: Concept, design and experiments

    Qin, H., Li, Z., Wang, Y., Lu, X., Zhang, W. & Wang, G., Sep 15 2010, 2010 IEEE International Conference on Pervasive Computing and Communications, PerCom 2010. p. 79-87 9 p. 5466988. (2010 IEEE International Conference on Pervasive Computing and Communications, PerCom 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Scopus citations
  • Combining multi-probe histogram and order-statistics based LSH for scalable audio content retrieval

    Yu, Y., Crucianu, M., Oria, V. & Damiani, E., Dec 1 2010, MM'10 - Proceedings of the ACM Multimedia 2010 International Conference. p. 381-390 10 p. (MM'10 - Proceedings of the ACM Multimedia 2010 International Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Confidence intervals for quantiles and value-at-risk when applying importance sampling

    Chu, F. & Nakayama, M. K., 2010, Proceedings of the 2010 Winter Simulation Conference, WSC'10. p. 2751-2761 11 p. 5678970. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Confidence intervals for quantiles when applying latin hypercube sampling

    Nakayama, M., Dec 1 2010, Proceedings - 2nd International Conference on Advances in System Simulation, SIMUL 2010. p. 78-81 4 p. 5601893

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Eye detection using color information and a new efficient SVM

    Chen, S. & Liu, C., Dec 27 2010, IEEE 4th International Conference on Biometrics: Theory, Applications and Systems, BTAS 2010. 5634520

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • GDC: Group discovery using co-location traces

    Mardenfeld, S., Boston, D., Pan, S. J., Jones, Q., Iamntichi, A. & Borcea, C., 2010, Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust. p. 641-648 8 p. 5591535. (Proceedings - SocialCom 2010: 2nd IEEE International Conference on Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy, Security, Risk and Trust).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • How wireless power charging technology affects sensor network deployment and routing

    Tong, B., Li, Z., Wang, G. & Zhang, W., 2010, ICDCS 2010 - 2010 International Conference on Distributed Computing Systems. p. 438-447 10 p. 5541663. (Proceedings - International Conference on Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    121 Scopus citations
  • Improving web search results for homonyms by suggesting completions from an ontology

    Tian, T., Geller, J. & Chun, S. A., 2010, Current Trends in Web Engineering - 10th International Conference on Web Engineering, ICWE 2010 Workshops, Revised Selected Papers. p. 175-186 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6385 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • Modeling stakeholder/value dependency through mean failure cost

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852727. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • PARINET: A tunable access method for in-network trajectories

    Popa, I. S., Zeitouni, K., Oria, V., Barth, D. & Vial, S., Jun 1 2010, 26th IEEE International Conference on Data Engineering, ICDE 2010 - Conference Proceedings. p. 177-188 12 p. 5447885. (Proceedings - International Conference on Data Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Pollution attacks and defenses in wireless inter-flow network coding systems

    Dong, J., Curtmola, R., Nita-Rotaru, C. & Yau, D., 2010, 2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010. p. 1-6 6 p. 5507941. (2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Predicting web search hit counts

    Tian, T., Geller, J. & Chun, S. A., 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2010. p. 162-166 5 p. 5616242. (Proceedings - 2010 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2010; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Prometheus: User-controlled P2P social data management for socially-aware applications

    Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C. & Iamnitchi, A., 2010, Middleware 2010 - ACM/IFIP/USENIX 11th International Middleware Conference, Proceedings. p. 212-231 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6452 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    34 Scopus citations
  • Recommender system for MIR research community

    Yu, Y., Oria, V. & Downie, J. S., Aug 5 2010, JCDL'10 - Digital Libraries - 10 Years Past, 10 Years Forward, a 2020 Vision. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Remote data checking for network coding-based distributed storage systems

    Chen, B., Curtmola, R., Ateniese, G. & Burns, R., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    144 Scopus citations
  • Shortest Path Edit Distance for detecting duplicate biological entities

    Rudniy, A., Song, M. & Geller, J., Oct 25 2010, 2010 ACM International Conference on Bioinformatics and Computational Biology, ACM-BCB 2010. p. 442-444 3 p. (2010 ACM International Conference on Bioinformatics and Computational Biology, ACM-BCB 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Software requirements for a system to compute mean failure cost

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852750. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Solar flare forecasting using sunspot-groups classification and photospheric magnetic parameters

    Yuan, Y., Shih, F., Jing, J. & Wang, H., Aug 2010, The Physics of Sun and Star Spots. Choudhary, D. P. & Strassmeier, K. (eds.). S273 ed. p. 446-450 5 p. (Proceedings of the International Astronomical Union; vol. 6, no. S273).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Towards an automated tool for computing loop functions

    Jilani, L. L., Mraihi, O., Louhichi, A. & Mili, A., Jan 1 2010, 2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010. IEEE Computer Society, 5586943. (2010 ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Towards reliable scheduling schemes for long-lived replaceable sensor networks

    Tong, B., Li, Z., Wang, G. & Zhang, W., 2010, 2010 Proceedings IEEE INFOCOM. 5462010. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Tradeoffs between security and communication performance in wireless mesh networks

    Curtmola, R., Dong, J. & Nita-Rotaru, C., Aug 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5535005. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Using invariant functions and invariant relations to compute loop functions

    Labed Jilani, L., Mraihi, O., Louhichi, A., Ghardallou, W. & Mili, A., Jul 23 2010, ICSE 2010 - Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. p. 317-318 2 p. (Proceedings - International Conference on Software Engineering; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    2D geon based generic object recognition

    Yu, X., Oria, V., Gouton, P. & Jomier, G., Dec 29 2011, MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops. p. 1493-1496 4 p. (MM'11 - Proceedings of the 2011 ACM Multimedia Conference and Co-Located Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A conditional Monte Carlo method for estimating the failure probability of a distribution network with random demands

    Blanchet, J., Li, J. & Nakayama, M. K., 2011, Proceedings of the 2011 Winter Simulation Conference, WSC 2011. p. 3832-3843 12 p. 6148075. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Analysis of fusing online and co-presence social networks

    Pan, S. J., Boston, D. J. & Borcea, C., 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011. p. 496-501 6 p. 5766940. (2011 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • A new efficient SVM and its application to real-time accurate eye localization

    Chen, S. & Liu, C., Oct 24 2011, 2011 International Joint Conference on Neural Networks, IJCNN 2011 - Final Program. p. 2520-2527 8 p. 6033547. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Asymptotic properties of kernel density estimators when applying importance sampling

    Nakayama, M. K., 2011, Proceedings of the 2011 Winter Simulation Conference, WSC 2011. p. 556-568 13 p. 6147785. (Proceedings - Winter Simulation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Categorization of camera captured documents based on logo identification

    Edupuganti, V. G., Shih, F. & Kompalli, S., Sep 20 2011, Computer Analysis of Images and Patterns - 14th International Conference, CAIP 2011, Proceedings. PART 2 ed. Vol. 6855 LNCS. p. 130-137 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6855 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Computing preconditions and postconditions of while loops

    Mraihi, O., Ghardallou, W., Louhichi, A., Labed Jilani, L., Bsaies, K. & Mili, A., Sep 19 2011, Theoretical Aspects of Computing, ICTAC 2011 - 8th International Colloquium, Proceedings. p. 173-193 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6916 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Defining and computing a value based cyber-security measure

    Aissa, A. B., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2011, Proceedings of the 2nd Kuwait Conference on e-Services and e-Systems, KCESS'11. 5. (Proceedings of the 2nd Kuwait Conference on e-Services and e-Systems, KCESS'11).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Discriminant analysis of haar features for accurate eye detection

    Chen, S. & Liu, C., 2011, Proceedings of the 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2011. p. 917-923 7 p. (Proceedings of the 2011 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2011; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Efficient storage and temporal query evaluation in hierarchical data archiving systems

    Wang, H., Liu, R., Theodoratos, D. & Wu, X., 2011, Scientific and Statistical Database Management - 23rd International Conference, SSDBM 2011, Proceedings. p. 109-128 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations