Filter
Conference contribution

Search results

  • Conference contribution

    INDUSTRIAL PARTS RECOGNITION AND INSPECTION BY IMAGE MORPHOLOGY.

    Shih, F. Y. & Mitchell, O. R., 1988, Unknown Host Publication Title. IEEE, p. 1764-1766 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • In-situ workflow auto-tuning through combining component models

    Shu, T., Guo, Y., Wozniak, J., Ding, X., Foster, I. & Kurc, T., Feb 17 2021, PPoPP 2021 - Proceedings of the 2021 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming. Association for Computing Machinery, p. 467-468 2 p. (Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPOPP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Integrated production and delivery scheduling with disjoint windows

    Huo, Y., Leung, J. Y. T. & Wang, X., 2009, Combinatorial Optimization and Applications - Third International Conference, COCOA 2009, Proceedings. p. 471-482 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5573 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Integrating communication cost into the utility accrual model for the resource allocation in distributed real-time systems

    Hu, X. & Leung, J. Y. T., 2008, Proceedings - 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2008. p. 217-226 10 p. 4617290. (Proceedings - 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, RTCSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Intelligent Bandwidth Reservation for Big Data Transfer in High-Performance Networks

    Zuo, L., Zhu, M. M., Wu, C. Q. & Hou, A., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8422601. (IEEE International Conference on Communications; vol. 2018-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Intelligent Scheduling for Parallel Jobs in Big Data Processing Systems

    Xu, M., Wu, C. Q., Hou, A. & Wang, Y., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 22-28 7 p. 8685520. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Interactive exploration of composite items

    Amer-Yahia, S. & Roy, S. B., 2018, Advances in Database Technology - EDBT 2018: 21st International Conference on Extending Database Technology, Proceedings. Bohlen, M., Pichler, R., May, N., Rahm, E., Wu, S-H. & Hose, K. (eds.). OpenProceedings.org, p. 513-516 4 p. (Advances in Database Technology - EDBT; vol. 2018-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Interweaving Real-Time Jobs with Energy Harvesting to Maximize Throughput

    Schieber, B., Samineni, B. & Vahidi, S., 2023, WALCOM: Algorithms and Computation - 17th International Conference and Workshops, WALCOM 2023, Proceedings. Lin, C-C., Lin, B. M. & Liotta, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 305-316 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • In-Toto: Providing farm-to-table guarantees for bits and bytes

    Torres-Arias, S., Afzali, H., Kuppusamy, T. K., Curtmola, R. & Cappos, J., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1393-1410 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Keyword pattern graph relaxation for selective result space expansion on linked data

    Dass, A., Aksoy, C., Dimitriou, A. & Theodoratos, D., 2015, Engineering the Web in the Big Data Era - 15th International Conference, ICWE 2015, Proceedings. Frasincar, F., Houben, G-J., Cimiano, P. & Schwabe, D. (eds.). Springer Verlag, p. 287-306 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9114).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • K-means-based feature learning for protein sequence classification

    Melman, P. & Roshan, U. W., 2018, Proceedings of the 10th International Conference on Bioinformatics and Computational Biology, BICOB 2018. Al-Mubaid, H., Eulenstein, O. & Ding, Q. (eds.). The International Society for Computers and Their Applications (ISCA), (Proceedings of the 10th International Conference on Bioinformatics and Computational Biology, BICOB 2018; vol. 2018-March).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Knock, Knock. Who's there? On the security of LG's knock codes

    Samuel, R., Aviv, A. J., Markert, P. & Neamtiu, I., 2020, Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020. USENIX Association, p. 37-60 24 p. (Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Knowledge graph analysis of Russian trolls

    Li, C. Y., Chun, S. A. & Geller, J., 2021, Proceedings of the 10th International Conference on Data Science, Technology and Applications, DATA 2021. Quix, C., Hammoudi, S. & van der Aalst, W. (eds.). SciTePress, p. 335-342 8 p. (Proceedings of the 10th International Conference on Data Science, Technology and Applications, DATA 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Lane recognition for moving vehicles using multiple on-car RFID receiver antennas - Algorithm and its experimental results

    Togashi, H., Borcea, C. & Yamada, S., 2012, 2012 IEEE Intelligent Vehicles Symposium, IV 2012. p. 975-981 7 p. 6232139. (IEEE Intelligent Vehicles Symposium, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • LAS: Logical-Block Affinity Scheduling in Big Data Analytics Systems

    Bao, L., Wu, C. Q., Qi, H., Chen, W., Zhang, X., Han, W., Wei, W., Tail, E., Wang, H., Zhai, J. & Chen, X., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 522-530 9 p. 8486297. (Proceedings - IEEE INFOCOM; vol. 2018-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • LayoutEnhancer: Generating Good Indoor Layouts from Imperfect Data

    Leimer, K., Guerrero, P., Weiss, T. & Musialski, P., Nov 29 2022, Proceedings - SIGGRAPH Asia 2022 Conference Papers. Spencer, S. N. (ed.). Association for Computing Machinery, Inc, 27. (Proceedings - SIGGRAPH Asia 2022 Conference Papers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Scopus citations
  • Leakuidator: Leaky Resource Attacks and Countermeasures

    Zaheri, M. & Curtmola, R., 2021, Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Proceedings. Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H. & Yung, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-163 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 399 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Learning-based offloading of tasks with diverse delay sensitivities for mobile edge computing

    Zhang, T., Chiang, Y. H., Borcea, C. & Ji, Y., Dec 2019, 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9013498. (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Learning K-way D-dimensional discrete embedding for hierarchical data visualization and retrieval

    Liang, X., Min, M. R., Guo, H. & Wang, G., 2019, Proceedings of the 28th International Joint Conference on Artificial Intelligence, IJCAI 2019. Kraus, S. (ed.). International Joint Conferences on Artificial Intelligence, p. 2966-2972 7 p. (IJCAI International Joint Conference on Artificial Intelligence; vol. 2019-August).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog

    Chow, S. S. M., Russell, A., Tang, Q., Yung, M., Zhao, Y. & Zhou, H. S., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 221-251 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Leveraging Double Simulation to Efficiently Evaluate Hybrid Patterns on Data Graphs

    Wu, X., Theodoratos, D., Skoutas, D. & Lan, M., 2020, Web Information Systems Engineering – WISE 2020 - 21st International Conference, Proceedings. Huang, Z., Beek, W., Wang, H., Zhang, Y. & Zhou, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Leveraging homomorphisms and bitmaps to enable the mining of embedded patterns from large data trees

    Wu, X. & Theodoratos, D., 2015, Database Systems for Advanced Applications - 20th International Conference, DASFAA 2015, Proceedings Hanoi, Vietnam, April 20-23, 2015 Proceedings, Part I. Shahabi, C., Cheema, M. A., Renz, M. & Zhou, X. (eds.). Springer Verlag, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9049).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Leveraging Pattern Mining Techniques for Efficient Keyword Search on Data Graphs

    Lu, X., Theodoratos, D. & Dimitriou, A., 2020, Web Information Systems Engineering - WISE 2019 Workshop, Demo, and Tutorial, Revised Selected Papers. U, L. H., Yang, J., Cai, Y., Karlapalem, K., Liu, A. & Huang, X. (eds.). Springer, p. 98-114 17 p. (Communications in Computer and Information Science; vol. 1155 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Leveraging social data for health care behavior analytics

    Ji, X., Cappellari, P., Chun, S. A. & Geller, J., 2015, Engineering the Web in the Big Data Era - 15th International Conference, ICWE 2015, Proceedings. Frasincar, F., Houben, G-J., Cimiano, P. & Schwabe, D. (eds.). Springer Verlag, p. 667-670 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9114).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • LHM: A logic-based hypertext data model for integrating hypertext and information systems

    Wan, J., Bieber, M., Wang, J. T. L. & Ng, P. A., 1995, Proceedings of the 28th Annual Hawaii International Conference on System Sciences, HICSS 1995. IEEE Computer Society, p. 350-359 10 p. 375615. (Proceedings of the Annual Hawaii International Conference on System Sciences; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method

    Houle, M. E., Oria, V., Rohloff, K. R. & Wali, A. M., 2018, Similarity Search and Applications - 11th International Conference, SISAP 2018, Proceedings. Marchand-Maillet, S., Silva, Y. N. & Chávez, E. (eds.). Springer Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Life and Death Decisions by Cyber-Physical Systems

    Brooks, R. R., Zhong, X., Cordone, G., Venayagamoorthy, G. K. & Wu, C., 2016, Signal Processing, Sensor/Information Fusion, and Target Recognition XXV. Kadar, I. (ed.). SPIE, p. xxix-xxxi 984201. (Proceedings of SPIE - The International Society for Optical Engineering; vol. 9842).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LINK: Location verification through immediate neighbors knowledge

    Talasila, M., Curtmola, R. & Borcea, C., 2012, Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers. Springer Verlag, p. 210-223 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 73 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 Scopus citations
  • Local summarization and multi-level LSH for retrieving multi-variant audio tracks

    Yu, Y., Crucianu, M., Oria, V. & Chen, L., 2009, MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums. p. 341-350 10 p. (MM'09 - Proceedings of the 2009 ACM Multimedia Conference, with Co-located Workshops and Symposiums).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    15 Scopus citations
  • M4MM 22: 1st InternationalWorkshop on Methodologies for Multimedia

    Alameda-Pineda, X., Jin, Q., Oria, V. & Toni, L., Oct 10 2022, MM 2022 - Proceedings of the 30th ACM International Conference on Multimedia. Association for Computing Machinery, Inc, p. 7394-7396 3 p. (MM 2022 - Proceedings of the 30th ACM International Conference on Multimedia).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Machine Learning Approach to Detect Fake News, Misinformation in COVID-19 Pandemic

    Bojjireddy, S., Chun, S. A. & Geller, J., Jun 9 2021, Proceedings of the 22nd Annual International Conference on Digital Government Research: Digital Innovations for Public Values: Inclusive Collaboration and Community, DGO 2021. Lee, J., Pereira, G. V. & Hwang, S. (eds.). Association for Computing Machinery, p. 575-578 4 p. 3463762. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • Machine learning based prediction of gliomas with germline mutations obtained from whole exome sequences from TCGA and 1000 Genomes Project

    Aljouie, A., Schatz, M. & Roshan, U., Oct 2019, 2019 3rd International Conference on Intelligent Computing in Data Sciences, ICDS 2019. Angelov, P., Boumhidi, J., Hagras, H., Nfaoui, E. H., Oubenaalla, Y., Loqman, C., Mestari, M. & Mousannif, H. (eds.). Institute of Electrical and Electronics Engineers Inc., 8942246. (2019 3rd International Conference on Intelligent Computing in Data Sciences, ICDS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Making any attribute-based encryption accountable, efficiently

    Lai, J. & Tang, Q., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 527-547 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Making Dynamic Page Coalescing Effective on Virtualized Clouds

    Jia, W., Zhang, J., Shan, J. & Ding, X., May 8 2023, Proceedings of the 18th European Conference on Computer Systems, EuroSys 2023. Association for Computing Machinery, Inc, p. 298-313 16 p. (Proceedings of the 18th European Conference on Computer Systems, EuroSys 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Making Public Key Functional Encryption Function Private, Distributively

    Fan, X. & Tang, Q., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Verlag, p. 218-244 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10770 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Managing complex IT security processes with value based measures

    Abercrombie, R. K., Sheldon, F. T. & Mili, A., 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings. IEEE Computer Society, p. 69-75 7 p. 4925092. (2009 IEEE Symposium on Computational Intelligence in Cyber Security, CICS 2009 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Margin Trader: A Reinforcement Learning Framework for Portfolio Management with Margin and Constraints

    Gu, J., Du, W., Muntasir Rahman, A. M. & Wang, G., Nov 27 2023, ICAIF 2023 - 4th ACM International Conference on AI in Finance. Association for Computing Machinery, Inc, p. 610-618 9 p. (ICAIF 2023 - 4th ACM International Conference on AI in Finance).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Measurement-based performance profiles and dynamics of UDT over dedicated connections

    Liu, Q., Rao, N. S. V., Wu, C. Q., Yun, D., Kettimuthu, R. & Foster, I. T., Dec 14 2016, 2016 IEEE 24th International Conference on Network Protocols, ICNP 2016. IEEE Computer Society, 7784418. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Scopus citations
  • Measuring and avoiding information loss during concept import from a source to a target ontology

    Geller, J., Klein, S. T. & Keloth, V. K., Jan 1 2019, IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management. Dietz, J., Aveiro, D. & Filipe, J. (eds.). SciTePress, p. 442-449 8 p. (IC3K 2019 - Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Measuring reliability as a mean failure cost

    Mili, A. & Sheldon, F., 2007, Proceedings - 10th IEEE International Symposium on High Assurance Systems Engineering, HASE 2007. p. 403-404 2 p. 4404775. (Proceedings of IEEE International Symposium on High Assurance Systems Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Scopus citations
  • Medial axis transformation with single-pixel and connectivity preservation using Euclidean distance computation

    Shih, F. Y. & Pu, C. C., 1990, Proceedings - International Conference on Pattern Recognition. Publ by IEEE, p. 723-725 3 p. (Proceedings - International Conference on Pattern Recognition; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • MEFS: Mobile edge file system for edge-assisted mobile apps

    Scotece, D., Paiker, N. R., Foschini, L., Bellavista, P., Ding, X. & Borcea, C., Jun 2019, 20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019. Institute of Electrical and Electronics Engineers Inc., 8792987. (20th IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Methodology for evaluating security controls based on key performance indicators and stakeholder mission

    Sheldon, F. T., Abercrombie, R. K. & Mili, A., 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755410. (Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Scopus citations
  • Minimizing financial cost of scientific workflows under deadline constraints in multi-cloud environments

    Gao, T., Wang, Y., Wu, C. Q., Li, R., Hou, A. & Xu, M., 2019, Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, p. 114-121 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Minimizing mean flowtime on master-slave machines

    Leung, J. Y. T. & Zhao, H., 2004, Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04. Arabnia, H. R. & Ni, J. (eds.). p. 939-945 7 p. (Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA'04; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Mining Concepts for a COVID Interface Terminology for Annotation of EHRs

    Keloth, V. K., Zhou, S., Lindemann, L., Elhanan, G., Einstein, A. J., Geller, J. & Perl, Y., Dec 10 2020, Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020. Wu, X., Jermaine, C., Xiong, L., Hu, X. T., Kotevska, O., Lu, S., Xu, W., Aluru, S., Zhai, C., Al-Masri, E., Chen, Z. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 3753-3760 8 p. 9377981. (Proceedings - 2020 IEEE International Conference on Big Data, Big Data 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Mix and Match: Markov Chains and Mixing Times for Matching in Rideshare

    Curry, M., Dickerson, J. P., Sankararaman, K. A., Srinivasan, A., Wan, Y. & Xu, P., 2019, Web and Internet Economics - 15th International Conference, WINE 2019, Proceedings. Caragiannis, I., Mirrokni, V. & Nikolova, E. (eds.). Springer, p. 129-141 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11920 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • MobiStore: Achieving availability and load balance in a mobile P2P data store

    Khan, M. A., Yeh, L., Zeitouni, K. & Borcea, C., Jan 28 2015, Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014. Institute of Electrical and Electronics Engineers Inc., p. 171-172 2 p. 7026295. (Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Scopus citations
  • Model-based partial shape recognition using contour curvature and affine transformation

    Shih, F. Y. & Yeh, P., 1990, Proc First Int Conf Syst Integr ICSI 90. Publ by IEEE, p. 294-301 8 p. (Proc First Int Conf Syst Integr ICSI 90).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Modeling a vocabulary in an object-oriented database

    Liu, L. M., Halper, M., Gu, H. & Geller, J., Dec 1 1996, International Conference on Information and Knowledge Management, Proceedings. Barker, K. & Ozsu, M. T. (eds.). p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations