Filter
Conference contribution

Search results

  • 2013

    A bootstrapping approach for developing a cyber-security ontology using textbook index terms

    Wali, A., Chun, S. A. & Geller, J., 2013, Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013. p. 569-576 8 p. 6657291. (Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • ACME+: An ADL for Quantitative Analysis of Quality Attributes

    Derbel, I., Jilani, L. L. & Mili, A., Jan 1 2013, Evaluation of Novel Approaches to Software Engineering - 8th International Conference, ENASE 2013, Revised Selected Papers. Springer Verlag, p. 16-32 17 p. (Communications in Computer and Information Science; vol. 417 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • ACME+ for software architecture analysis

    Derbel, I., Jilani, L. L. & Mili, A., Nov 11 2013, ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies. p. 429-437 9 p. (ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A new bag of words LBP (BoWL) descriptor for scene image classification

    Banerji, S., Sinha, A. & Liu, C., Sep 26 2013, Computer Analysis of Images and Patterns - 15th International Conference, CAIP 2013, Proceedings. PART 1 ed. p. 490-497 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8047 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Architecture level prediction of software quality attributes

    Derbel, I., Jilani, L. L. & Mili, A., Nov 11 2013, ENASE 2013 - Proceedings of the 8th International Conference on Evaluation of Novel Approaches to Software Engineering. p. 15-24 10 p. (ENASE 2013 - Proceedings of the 8th International Conference on Evaluation of Novel Approaches to Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Confidence intervals for quantiles with standardized time series

    Calvin, J. M. & Nakayama, M. K., 2013, Proceedings of the 2013 Winter Simulation Conference - Simulation: Making Decisions in a Complex World, WSC 2013. p. 601-612 12 p. 6721454. (Proceedings of the 2013 Winter Simulation Conference - Simulation: Making Decisions in a Complex World, WSC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Evaluating the hardware performance of a million-bit multiplier

    Doröz, Y., Öztürk, E. & Sunar, B., Dec 16 2013, Proceedings - 16th Euromicro Conference on Digital System Design, DSD 2013. p. 955-962 8 p. 6628381. (Proceedings - 16th Euromicro Conference on Digital System Design, DSD 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • Failure impact analysis of key management in AMI using cybernomic situational assessment (CSA)

    Abercrombie, R. K., Sheldon, F. T., Hauser, K. R., Lantz, M. W. & Mili, A., 2013, 8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013. 19. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • HaarHOG: Improving the HOG descriptor for image classification

    Banerji, S., Sinha, A. & Liu, C., Dec 1 2013, Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013. p. 4276-4281 6 p. 6722482. (Proceedings - 2013 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Identifying problematic concepts in SNOMED CT using a lexical approach

    Agrawal, A., Perl, Y. & Elhanan, G., Jan 1 2013, MEDINFO 2013 - Proceedings of the 14th World Congress on Medical and Health Informatics. 1-2 ed. IOS Press, p. 773-777 5 p. (Studies in Health Technology and Informatics; vol. 192, no. 1-2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Improving location reliability in crowd sensed data with minimal efforts

    Talasila, M., Curtmola, R. & Borcea, C., 2013, Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013. 6549016. (Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Monitoring public health concerns using twitter sentiment classifications

    Ji, X., Chun, S. A. & Geller, J., 2013, Proceedings - 2013 IEEE International Conference on Healthcare Informatics, ICHI 2013. p. 335-344 10 p. 6680494. (Proceedings - 2013 IEEE International Conference on Healthcare Informatics, ICHI 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    57 Scopus citations
  • PoWER - Prediction of workload for energy efficient relocation of virtual machines

    Qazi, K., Li, Y. & Sohn, A., 2013, Proceedings of the 4th Annual Symposium on Cloud Computing, SoCC 2013. Association for Computing Machinery, 31. (Proceedings of the 4th Annual Symposium on Cloud Computing, SoCC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Risk assessment methodology based on the NISTIR 7628 guidelines

    Abercrombie, R. K., Sheldon, F. T., Hauser, K. R., Lantz, M. W. & Mili, A., Apr 3 2013, Proceedings of the 46th Annual Hawaii International Conference on System Sciences, HICSS 2013. p. 1802-1811 10 p. 6480058. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Route caching in DTNs interconnected by infrastructure

    Haque, M. E., Hassan, Y. K., Aziz, A., Borcea, C. & Yamada, S., 2013, 2013 Australasian Telecommunication Networks and Applications Conference, ATNAC 2013. IEEE Computer Society, p. 77-82 6 p. 6705360. (2013 Australasian Telecommunication Networks and Applications Conference, ATNAC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Social infobuttons: Integrating open health data with social data using semantic technology

    Ji, X., Chun, S. A. & Geller, J., Jan 1 2013, Proceedings of the 5th Workshop on Semantic Web Information Management, SWIM 2013. Association for Computing Machinery, 6. (Proceedings of the 5th Workshop on Semantic Web Information Management, SWIM 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Towards self-repairing replication-based storage systems using untrusted clouds

    Chen, B. & Curtmola, R., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 377-388 12 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • XReason: A semantic approach that reasons with patterns to answer XML keyword queries

    Aksoy, C., Dimitriou, A., Theodoratos, D. & Wu, X., Dec 1 2013, Database Systems for Advanced Applications - 18th International Conference, DASFAA 2013, Proceedings. PART 1 ed. p. 299-314 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7825 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2014

    Accelerating NTRU based homomorphic encryption using GPUs

    Dai, W., Doroz, Y. & Sunar, B., Feb 11 2014, 2014 IEEE High Performance Extreme Computing Conference, HPEC 2014. Institute of Electrical and Electronics Engineers Inc., 7041001. (2014 IEEE High Performance Extreme Computing Conference, HPEC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • A collaborative filtering approach to assess individual condition risk based on patients' social network data

    Ji, X., Chun, S. A. & Geller, J., Sep 20 2014, ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics. Association for Computing Machinery, p. 639-640 2 p. (ACM BCB 2014 - 5th ACM Conference on Bioinformatics, Computational Biology, and Health Informatics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • A Framework to Recommend Interventions for 30-Day Heart Failure Readmission Risk

    Liu, R., Zolfaghar, K., Chin, S. C., Roy, S. B. & Teredesai, A., Jan 1 2014, Proceedings - 14th IEEE International Conference on Data Mining, ICDM 2014. Kumar, R., Toivonen, H., Pei, J., Zhexue Huang, J. & Wu, X. (eds.). January ed. Institute of Electrical and Electronics Engineers Inc., p. 911-916 6 p. 7023422. (Proceedings - IEEE International Conference on Data Mining, ICDM; vol. 2015-January, no. January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • A hybrid approach to developing a cyber security ontology

    Geller, J., Ae Chun, S. & Wali, A., 2014, DATA 2014 - Proceedings of 3rd International Conference on Data Management Technologies and Applications. Helfert, M., Holzinger, A., Belo, O. & Francalanci, C. (eds.). SciTePress, p. 377-384 8 p. (DATA 2014 - Proceedings of 3rd International Conference on Data Management Technologies and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • A new locally linear KNN method with an improved marginal Fisher analysis for image classification

    Liu, Q. & Liu, C., Dec 23 2014, IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics. Institute of Electrical and Electronics Engineers Inc., 6996288. (IJCB 2014 - 2014 IEEE/IAPR International Joint Conference on Biometrics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • ARPP: An augmented reality 3D ping-pong game system on Android mobile platform

    Gao, X., Tian, J., Liang, X. & Wang, G., 2014, 2014 23rd Wireless and Optical Communication Conference, WOCC 2014. IEEE Computer Society, 6839917. (2014 23rd Wireless and Optical Communication Conference, WOCC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Automated quantitative attributes prediction from architectural description language

    Derbel, I., Jilani, L. L. & Mili, A., 2014, ICSOFT-PT 2014 - Proceedings of the 9th International Conference on Software Paradigm Trends. Holzinger, A., Cardoso, J., Cardoso, J., Cordeiro, J., Cordeiro, J., van Sinderen, M. & Mellor, S. (eds.). SciTePress, p. 87-94 8 p. (ICSOFT-PT 2014 - Proceedings of the 9th International Conference on Software Paradigm Trends).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bandwidth efficient PIR from NTRU

    Doröz, Y., Sunar, B. & Hammouri, G., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 195-207 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Clustering query results to support keyword search on tree data

    Aksoy, C., Dass, A., Theodoratos, D. & Wu, X., Jan 1 2014, Web-Age Information Management - 15th International Conference, WAIM 2014, Proceedings. Springer Verlag, p. 213-224 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8485 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Efficient algorithms for similarity search in axis-aligned subspaces

    Houle, M. E., Ma, X., Oria, V. & Sun, J., 2014, Similarity Search and Applications - 7th International Conference, SISAP 2014, Proceedings. Traina, A. J. M., Traina, C. & Cordeiro, R. L. F. (eds.). Springer Verlag, p. 1-12 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • GDM: DevicE MEMORY MANAGEMENT for GPGPU computing

    Wang, K., Ding, X., Lee, R., Zhang, X. & Kato, S., 2014, SIGMETRICS 2014 - Proceedings of the 2014 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems. Association for Computing Machinery, p. 533-545 13 p. (SIGMETRICS 2014 - Proceedings of the 2014 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Gleaner: Mitigating the blocked-waiter wakeup problem for virtualized multicore applications

    Ding, X., Gibbons, P. B., Kozuch, M. A. & Shan, J., 2014, Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014. USENIX Association, p. 73-84 12 p. (Proceedings of the 2014 USENIX Annual Technical Conference, USENIX ATC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Scopus citations
  • Harnessing memory page distribution for network-efficient live migration

    Qazi, K., Li, Y. & Sohn, A., Mar 9 2014, Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014. Institute of Electrical and Electronics Engineers Inc., p. 264-267 4 p. 7056750. (Proceedings - 16th IEEE International Conference on High Performance Computing and Communications, HPCC 2014, 11th IEEE International Conference on Embedded Software and Systems, ICESS 2014 and 6th International Symposium on Cyberspace Safety and Security, CSS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved shortest path edit distance for synonyms identification

    Rudniy, A., Song, M. & Geller, J., Jan 1 2014, Proceedings of the 6th International Conference on Bioinformatics and Computational Biology, BICOB 2014. International Society for Computers and Their Applications, p. 97-102 6 p. (Proceedings of the 6th International Conference on Bioinformatics and Computational Biology, BICOB 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On faults and faulty programs

    Mili, A., Frias, M. F. & Jaoua, A., 2014, Relational and Algebraic Methods in Computer Science - 14th International Conference, RAMiCS 2014, Proceedings. Springer Verlag, p. 191-207 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8428 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Parallel bounded verification of alloy models by tranScoping

    Rosner, N., Pombo, C. G. L., Aguirre, N., Jaoua, A., Mili, A. & Frias, M. F., 2014, Verified Software: Theories, Tools, Experiments - 5th International Conference, VSTTE 2013, Revised Selected Papers. Cohen, E., Rybalchenko, A. & Rybalchenko, A. (eds.). Springer Verlag, p. 88-107 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Poster: Detection of transportation mode based on smartphones for reducing distracted driving

    Gao, X., Tian, J. & Wang, G., Sep 7 2014, MobiCom 2014 - Proceedings of the 20th Annual. Association for Computing Machinery, p. 355-357 3 p. (Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Quantifying availability in SCADA environments using the cyber security metric MFC

    Aissa, A. B., Rabai, L. B. A., Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2014, Proceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014. Association for Computing Machinery, p. 81-84 4 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Quantifying the impact of unavailability in cyber-physical environments

    Ben Aissa, A., Abercrombie, R. K., Sheldon, F. T. & Mili, A., Jan 16 2014, IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings. Institute of Electrical and Electronics Engineers Inc., 7013364. (IEEE SSCI 2014: 2014 IEEE Symposium Series on Computational Intelligence - CICS 2014: 2014 IEEE Symposium on Computational Intelligence in Cyber Security, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Quantile estimation when applying conditional Monte Carlo

    Nakayama, M. K., 2014, SIMULTECH 2014 - Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications. Obaidat, M. S., Kacprzyk, J. & Oren, T. (eds.). SciTePress, (SIMULTECH 2014 - Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Scene image classification using a wigner-based Local Binary Patterns descriptor

    Sinha, A., Banerji, S. & Liu, C., Sep 3 2014, Proceedings of the International Joint Conference on Neural Networks. Institute of Electrical and Electronics Engineers Inc., p. 1614-1621 8 p. 6889660. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Slide localization in video sequence by using a rapid and suitable segmentation in marginal space

    Rajgure, S., Oria, V. & Gouton, P., Mar 3 2014, Proceedings of SPIE-IS and T Electronic Imaging - Color Imaging XIX: Displaying, Processing, Hardcopy, and Applications. 90150F. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Top-k parametrized boost

    Turki, T., Ihsan, M., Turki, N., Zhang, J., Roshan, U. & Wei, Z., 2014, Mining Intelligence and Knowledge Exploration - 2nd International Conference, MIKE 2014, Proceedings. Prasath, R., O’Reilly, P. & Kathirvalavakumar, T. (eds.). Springer Verlag, p. 91-98 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8891).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Toward practical homomorphic evaluation of block ciphers using prince

    Doröz, Y., Shahverdi, A., Eisenbarth, T. & Sunar, B., 2014, Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN and WAHC 2014, Revised Selected Papers. Brenner, M., Smith, M., Böhme, R. & Moore, T. (eds.). Springer Verlag, p. 208-220 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8438).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • User behavior based automatical navigation system on Android platform

    Tian, J., Wang, G., Gao, X. & Shi, K., Jan 1 2014, 2014 23rd Wireless and Optical Communication Conference, WOCC 2014. IEEE Computer Society, 6839916. (2014 23rd Wireless and Optical Communication Conference, WOCC 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Weighted maximum variance dimensionality reduction

    Turki, T. & Roshan, U., 2014, Pattern Recognition - 6th Mexican Conference, MCPR 2014, Proceedings. Springer Verlag, p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8495 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Workload prediction of virtual machines for harnessing data center resources

    Qazi, K., Li, Y. & Sohn, A., Dec 3 2014, Proceedings - 2014 IEEE 7th International Conference on Cloud Computing, CLOUD 2014. Kesselman, C. (ed.). IEEE Computer Society, p. 522-529 8 p. 6973782. (IEEE International Conference on Cloud Computing, CLOUD).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • 2015

    Accelerating ltv based homomorphic encryption in reconfigurable hardware

    Doröz, Y., Öztürk, E., Savaş, E. & Sunar, B., 2015, Cryptographic Hardware and Embedded Systems - 17th International Workshop, CHES 2015, Proceedings. Güneysu, T. & Handschuh, H. (eds.). Springer Verlag, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9293).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Advance bandwidth scheduling in software-defined networks

    Dharam, P., Wu, C. Q. & Rao, N. S. V., Jan 1 2015, 2015 IEEE Global Communications Conference, GLOBECOM 2015. Institute of Electrical and Electronics Engineers Inc., 7416950. (2015 IEEE Global Communications Conference, GLOBECOM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • A framework for extending contact opportunities in Delay-and Disruption-Tolerant Networks

    Yasmeen, F., Huda, N., Nguyen, U. T., Yamada, S. & Borcea, C., Sep 8 2015, 2015 IEEE International Conference on Communication Workshop, ICCW 2015. Institute of Electrical and Electronics Engineers Inc., p. 1551-1556 6 p. 7247400. (2015 IEEE International Conference on Communication Workshop, ICCW 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Algorithmic detection of inconsistent modeling among SNOMED CT concepts by combining lexical and structural indicators

    Agrawal, A., Perl, Y., Ochs, C. & Elhanan, G., Dec 16 2015, Proceedings - 2015 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2015. Schapranow, L. M., Zhou, J., Hu, X. T., Ma, B., Rajasekaran, S., Miyano, S., Yoo, I., Pierce, B., Shehu, A., Gombar, V. K., Chen, B., Pai, V. & Huan, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 476-483 8 p. 7359731. (Proceedings - 2015 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing

    Talasila, M., Curtmola, R. & Borcea, C., Jan 28 2015, Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014. Institute of Electrical and Electronics Engineers Inc., p. 65-74 10 p. 7026279. (Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations