Submissions from 2024
Sensational Stories: The Role of Narrative Characteristics in Distinguishing Real and Fake News and Predicting Their Spread, Anne Hamby, Hongmin Kim, and Francesca Spezzano
An Empirical Analysis of Intervention Strategies’ Effectiveness for Countering Misinformation Amplification by Recommendation Algorithms, Royal Pathak and Francesca Spezzano
PINN-CHK: Physics-Informed Neural Network for High-Fidelity Prediction of Early-Age Cement Hydration Kinetics, Md Asif Rahman, Tianjie Zhang, and Yang Lu
A Data-Centric Strategy to Improve Performance of Automatic Pavement Defects Detection, Tianjie Zhang, Donglei Wang, and Yang Lu
Benchmark Study on a Novel Online Dataset for Standard Evaluation of Deep Learning-Based Pavement Cracks Classification Models, Tianjie Zhang, Donglei Wang, and Yang Lu
Submissions from 2023
Minimally Comparing Relational Abstract Domains, Kenny Ballou and Elena Sherman
Artificial Intelligence Based Analysis of Nanoindentation Load–Displacement Data Using a Genetic Algorithm, Abraham Burleigh, Miu Lun Lau, Megan Burrill, Daniel T. Olive, Jonathan G. Gigax, Nan Li, Tarik A. Saleh, Frederique Pellemoine, Sujit Bidhar, Min Long, Kavin Ammigan, and Jeff Terry
Janus: Toward Preventing Counterfeits in Supply Chains Utilizing a Multi-Quorum Blockchain, Vika Crossland, Connor Dellwo, Golam Bashar, and Gaby G. Dagher
Exploring Transformers as Compact, Data-Efficient Language Models, Clayton Fields and Casey Kennington
Tiny Language Models Enriched with Multimodal Knowledge from Multiplex Networks, Clayton Fields, Osama Natouf, Andrew McMains, Catherine Henry, and Casey Kennington
Evaluating Digital Creativity Support for Children: A Systematic Literature Review, Marte Hoff Hagen, Daniela Soares Cruzes, Letizia Jaccheri, and Jerry Alan Fails
Ethics of Emerging Communication and Collaboration Technologies for Children, Juan Pablo Hourcade, Elizabeth Bonsignore, Tamara Clegg, Flannery Currin, Jerry A. Fails, Georgie Qiao Jin, Summer R. Schmuecker, and Lana Yarosh
Spatiotemporal Prediction of Microstructure Evolution with Predictive Recurrent Neural Network, Amir Abbas Kazemzadeh Farizhandi and Mahmood Mamivand
Materials Characterization: Can Artificial Intelligence Be Used to Address Reproducibility Challenges?, Miu Lun Lau, Abraham Burleigh, Jeff Terry, and Min Long
Evaluation of Adsorption and Mechanical Strength of 13X Zeolite Mixtures with Phyllosilicate Binders Using Molecular Dynamics Simulation and Positron Annihilation Spectroscopy, Miu Lun Lau, Nathan Linton, Jagoda Urban-Klaehn, Donna Post Guillen, and Min Long
A Novel Method to Enable Transfer Learning of Structural Graph Representations, Janet Layne and Edoardo Serra
PRISM: A Blockchain-Enabled Reputation-Based Consensus for Enhancing Scientific Workflow Provenance, Matthew Miller, Skarlet Williams, Gaby G. Dagher, and Min Long
In-Vitro Validated Methods for Encoding Digital Data in Deoxyribonucleic Acid (DNA), Golam Md Mortuza, Jorge Guerrero, Shoshanna Llewellyn, Michael D. Tobiason, George D. Dickinson, William L. Hughes, Reza Zadegan, and Tim Andersen
Ensuring Trustworthy Neural Network Training via Blockchain, Edgar Navarro, Kyle J. Standing, Gaby G. Dagher, and Tim Andersen
The X-Ray Variation of M81* Resolved by Chandra and NuSTAR, Shu Niu, Fu-Guo Xie, Q. Daniel Wang, Li Ji, Feng Yuan, and Min Long
Understanding the Contribution of Recommendation Algorithms on Misinformation Recommendation and Misinformation Dissemination on Social Networks, Royal Pathak, Francesca Spezzano, and Maria Soledad Pera
Generation of DNA Oligomers with Similar Chemical Kinetics via In-Silico Optimization, Michael Tobiason, Bernard Yurke, and William L. Hughes
HEGrid: A High Efficient Multi-Channel Radio Astronomical Data Gridding Framework in Heterogeneous Computing Environments, Hao Wang, Ce Yu, Jian Xiao, Shanjiang Tang, Min Long, and Ming Zhu
Machine Learning-Enabled Regional Multi-Hazards Risk Assessment Considering Social Vulnerability, Tianjie Zhang, Donglei Wang, and Yang Lu
RheologyNet: A Physics-Informed Neural Network Solution to Evaluate the Thixotropic Properties of Cementitious Materials, Tianjie Zhang, Donglei Wang, and Yang Lu
Polyhedral Specification and Code Generation of Sparse Tensor Contraction with Co-Iteration, Tuowen Zhao, Tobi Popoola, Mary Wolcott Wolcott Hall, Catherine Mills Olschanowsky, and Michelle Mills Strout
Users Meet Clarifying Questions: Toward a Better Understanding of User Interactions for Search Clarification, Jie Zou, Mohammad Aliannejadi, Evangelos Kanoulas, Maria Soledad Pera, and Yiqun Liu
Submissions from 2022
Automatic Transformation of Natural to Unified Modeling Language: A Systematic Review, Sharif Ahmed, Arif Ahmed, and Nasir U. Eisty
The Effect of Prolonged Exposure to Online Education on a Classroom Search Companion, Mohammad Aliannejadi, Theo Huibers, Monica Landoni, Emiliana Murgia, and Maria Soledad Pera
Supercalifragilisticexpialidocious: Why Using the “Right” Readability Formula in Children’s Web Search Matters, Garrett Allen, Ashlee Milton, Katherine Landau Wright, Jerry Alan Fails, Casey Kennington, and Maria Soledad Pera
Incremental Transitive Closure for Zonal Abstract Domain, Kenny Ballou and Elena Sherman
ACCORD: A Scalable Multileader Consensus Protocol for Healthcare Blockchain, Golam Dastoger Bashar, Joshua Holmes, and Gaby G. Dagher
The Geometrical Shapes of Violence: Predicting and Explaining Terrorist Operations Through Graph Embeddings, Gian Maria Campedelli, Janet Layne, Jack Herzoff, and Edoardo Serra
KidSpell: Making a Difference in Spellchecking for Children, Brody Downs, Maria Soledad Pera, Katherine Landau Wright, Casey Kennington, and Jerry Alan Fails
Developers Perception of Peer Code Review in Research Software Development, Nasir U. Eisty and Jeffrey C. Carver
Testing Research Software: A Survey, Nasir U. Eisty and Jeffrey C. Carver
Fairness in Information Access Systems, Michael D. Ekstrand, Anubrata Das, Robin Burke, and Fernando Diaz
Pushing Boundaries of Co-Design by Going Online: Lessons Learned and Reflections from Three Perspectives, Jerry Alan Fails, Dhanush Kumar Ratakonda, Nitzan Koren, Salma Elsayed-Ali, Elizabeth Bonsignore, and Jason Yip
Processing Time, Temperature, and Initial Chemical Composition Prediction from Materials Microstructure by Deep Network for Multiple Inputs and Fused Data, Amir Abbas Kazemzadeh Farizhandi and Mahmood Mamivand
Understanding the Security Implication of Aborting Virtual Machine Live Migration, Xing Gao, Jidong Xiao, Haining Wang, and Angelos Stavrou
Incremental Unit Networks for Distributed, Symbolic Multimodal Processing and Representation, Mir Tahsin Imtiaz and Casey Kennington
Random Processes with High Variance Produce Scale Free Networks, Josh Johnston and Tim Andersen
Deep Learning Approach for Chemistry and Processing History Prediction from Materials Microstructure, Amir Abbas Kazemzadeh Farizhandi, Omar Betancourt, and Mahmood Mamivand
Spoken Language Interaction with Robots: Recommendations for Future Research, Casey Kennington
Understanding Intention for Machine Theory of Mind: A Position Paper, Casey Kennington
Software Engineering Approaches for TinyML Based IoT Embedded Vision: A Systematic Literature Review, Shashank Bangalore Lakshman and Nasir U. Eisty
Have a Clue!: The Effect of Visual Cues on Children’s Search Behavior in the Classroom, Monica Landoni, Mohammad Aliannejadi, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
Ethical Implications for Children’s Use of Search Tools in an Educational Setting, Monica Landoni, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
Machine Learning Methods for Generating High Dimensional Discrete Datasets, Giuseppe Manco, Ettore Ritacco, Antonino Rullo, Domenico Saccà, and Edoardo Serra
An Ontology-Based Framework for Formal Verification of Safety and Security Properties of Control Logics, Ramesh Neupane and Hoda Mehrpouyan
Measuring Fairness in Ranked Results: An Analytical and Empirical Comparison, Amifa Raj and Michael D. Ekstrand
“Pictures are Easier to Remember Than Spellings!”: Designing and Evaluating KidsPic: A Graphical Image-Based Authentication Mechanism, Dhanush Kumar Ratakonda, Hoda Mehrpouyan, and Jerry Alan Fails
Techniques for Managing Polyhedral Dataflow Graphs, Ravi Shankar, Aaron Orenstein, Anna Rift, Tobi Popoola, MacDonald Lowe, Shuai Yang, T. Dylan Mikesell, and Catherine Olschanowsky
Characterizing and Predicting Fake News Spreaders in Social Networks, Anu Shrestha and Francesca Spezzano
The Multisided Complexity of Fairness in Recommender Systems, Nasim Sonboli, Robin Burke, Michael Ekstrand, and Rishabh Mehrotra
Drones, Virtual Reality, and Modeling: Communicating Catastrophic Dam Failure, H. R. Spero, I. Vazquez-Lopez, K. Miller, R. Joshaghani, S. Cutchin, and J. Enterkine
Disinformation in Open Online Media: 4th Multidisciplinary International Symposium, MISDOOM 2022, Boise, ID, USA, October 11-12, 2022, Proceedings, Francesca Spezzano, Adriana Amaral, Davide Ceolin, Lisa Fazio, and Edoardo Serra
Hierarchical Structure of YSO Clusters in the W40 and Serpens South Region: Group Extraction and Comparison with Fractal Clusters, Jia Sun, Robert A. Gutermuth, Hongchi Wang, Shuinai Zhang, and Min Long
VigilRx: A Scalable and Interoperable Prescription Management System Using Blockchain, Alixandra Taylor, Austin Kugler, Praneeth Babu Marella, and Gaby G. Dagher
Symbol and Communicative Grounding Through Object Permanence with a Mobile Robot, Josue Torres-Fonseca, Catherine Henry, and Casey Kennington
QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data, Boyang Wang, Yantian Hou, and Ming Li
Submissions from 2021
The Impact of User Demographics and Task Types on Cross-App Mobile Search, Mohammad Aliannejadi, Fabio Crestani, Theo Huibers, Monica Landoni, Emiliana Murgia, and Maria Soledad Pera
Children's Perspective on How Emojis Help Them to Recognise Relevant Results: Do Actions Speak Louder Than Words?, Mohammad Aliannejadi, Monica Angela Landoni, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
BiGBERT: Classifying Educational Web Resources for Kindergarten-12th Grades, Garrett Allen, Brody Downs, Aprajita Shukla, Casey Kennington, Jerry Alan Fails, Katherine Landau Wright, and Maria Soledad Pera
Engage!: Co-Designing Search Engine Result Pages to Foster Interactions, Garrett Allen, Ben Peterson, Dhanush Kumar Ratakonda, Mostofa Najmus Sakib, Jerry Alan Fails, Casey Kennington, Katherine Landau Wright, and Maria Soledad Pera
Detecting Botnet Nodes via Structural Node Representation Learning, Justin Carpenter, Janet Layne, Edoardo Serra, and Alfredo Cuzzocrea
A Network Analysis of Twitter Interactions by Members of the U.S. Congress, Joshua M. Chamberlain, Francesca Spezzano, Jaclyn J. Kettler, and Bogdan Dit
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection, Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, and Angelos Stavrou
Data Storage in Cellular DNA: Contextualizing Diverse Encoding Schemes, Gaby G. Dagher, Anthony P. Machado, Eddie C. Davis, Thomas Green, John Martin, and Matthew Ferguson
Identifying Malicious Users in the Offshore Leaks Networks via Structural Node Representation Learning, Brian Daley, Edoardo Serra, and Alfredo Cuzzocrea
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities, Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, and Ehab Al-Shaer
An Alternative Approach to Nucleic Acid Memory, George D. Dickinson, Golam Md Mortuza, William Clay, Luca Piantanida, Christopher M. Green, Chad Watson, Eric J. Hayden, Tim Andersen, Wan Kuang, Elton Graugnard, Reza Zadegan, and William L. Hughes
Diffusion: Analysis of Many-to-Many Transactions in Bitcoin, Dylan Eck, Adam Torek, Steven Cutchin, and Gaby G. Dagher
Exploring Author Gender in Book Rating and Recommendation, Michael D. Ekstrand and Daniel Kluver
Distributing Participation in Design: Addressing Challenges of a Global Pandemic, Jerry Alan Fails
Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability, Jeffrey Fairbanks, Andres Orbe, Christine Patterson, Janet Layne, Edoardo Serra, and Marion Scheepers
Network Security Situation Prediction Method Based on Support Vector Machine Optimized by Artificial Bee Colony Algorithms, Gang, Ruey-Shun Chen, Yeh-Cheng Chen, and Jyh-Haw Yeh
VAULT: A Scalable Blockchain-Based Protocol for Secure Data Access and Collaboration, Justin S. Gazsi, Sajia Zafreen, Gaby G. Dagher, and Min Long
A Multi-Perspective Approach for the Analysis of Complex Business Processes Behavior, Antonella Guzzo, Mikel Joaristi, Antonino Rullo, and Edoardo Serra
Vertical Union Algorithm of Concept Lattice Based on Grade, Haixia, Linlin Tang, and Jyh-Haw Yeh
IR for Children 2000-2020: Where are We Now?, Theo Huibers, Monica Landoni, Emiliana Murgia, and Maria Soledad Pera
Statistical Inference: The Missing Piece of RecSys Experiment Reliability Discourse, Ngozi Ihemelandu and Michael D. Ekstrand
SIR-GN: A Fast Structural Iterative Representation Learning Approach for Graph Nodes, Mikel Joaristi and Edoardo Serra
Are You Influenced?: Modeling the Diffusion of Fake News in Social Media, Abishai Joy, Anu Shrestha, and Francesca Spezzano
Enriching Language Models with Visually-Grounded Word Vectors and the Lancaster Sensorimotor Norms, Casey Kennington
Spellchecking for Children in Web Search: A Natural Language Interface Case-Study, Casey Kennington, Jerry Alan Fails, Katherine Landau Wright, and Maria Soledad Pera
Incremental Unit Networks for Multimodal, Fine-Grained Information State Representation, Casey Kennington and David Schlangen
Estimation of Fair Ranking Metrics with Incomplete Judgments, Ömer Kırnap, Fernando Diaz, Asia Biega, Michael Ekstrand, Ben Carterette, and Emine Yilmaz
Right Way, Right Time: Towards a Better Comprehension of Young Students’ Needs When Looking for Relevant Search Results, Monica Landoni, Mohammad Aliannejadi, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
Somewhere Over the Rainbow: Exploring the Sense for Relevance in Children, Monica Landoni, Theo Huibers, Emiliana Murgia, Mohammad Aliannejadi, and Maria Soledad Pera
5th KidRec Workshop: Search and Recommendation Technology Through the Lens of a Teacher, Monica Landoni, Theo Huibers, Maria Soledad Pera, and Jerry Alan Fails
Detection of Radio Frequency Interference Using an Improved Generative Adversarial Network, Z. Li, C. Yu, J. Xiao, M. Long, and C. Cui
Analysis of Extended X-Ray Absorption Fine Structure (EXAFS) Data Using Artificial Intelligence Techniques, Jeff Long, Miu Lun Lau, Jiateng Sun, Chang Xu, Bryan Hendricks, Julia Kise, Mrinalini Lnu, Sanchayni Bagade, Shail Shah, Priyanka Makhijani, Adithya Karantha, Travis Boltz, Max Oellien, Matthew Adas, Shlomo Argamon, Min, and Donna Post Guillen
Hierarchical Mapping for Crosslingual Word Embedding Alignment, Ion Madrazo Azpiazu and Maria Soledad Pera
The Role of Steps and Game Elements in Gamified Fitness Tracker Apps: A Systematic Review, Aatish Neupane, Derek Hansen, Jerry Alan Fails, and Anud Sharma
Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach, A. K. M. Nuhil Mehdy and Hoda Mehrpouyan
IoT Security and Safety Testing Toolkits for Water Distribution Systems, Sean O'Toole, Cameron Sewell, and Hoda Mehrpouyan
An Object-Oriented Interface to the Sparse Polyhedral Library, Tobi Popoola, Ravi Shankar, Anna Rift, Shivani Singh, Eddie C. Davis, Michelle Mills Strout, and Catherine Olschanowsky
Android Malware Identification and Polymorphic Evolution via Graph Representation Learning, Miguel Quebrado, Edoardo Serra, and Alfredo Cuzzocrea
Raising Algorithm Bias Awareness Among Computer Science Students Through Library and Computer Science Instruction, Shalini Ramachandran, Steven Matthew Cutchin, and Sheree Fu
In-Game Social Interactions to Facilitate ESL Students' Morphological Awareness, Language and Literacy Skills, Yolanda A. Rankin, Sana Tibi, Casey Kennington, and Na-Eun Han
Evaluating Attribution Methods in Machine Learning Interpretability, Qudrat E. Alahy Ratul, Edoardo Serra, and Alfredo Cuzzocrea
A Few Shot Transfer Learning Approach Identifying Private Images with Fast User Personalization, Edoardo Serra, Sujeet Ayyapureddi, Qudrat E. Alahy Ratul, and Anna C. Squicciarini
An Effective and Efficient Graph Representation Learning Approach for Big Graphs, Edoardo Serra, Mikel Joaristi, Alfredo Cuzzocrea, Selim Soufargi, and Carson K. Leung
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases, Ning Shen, Jyh-Haw Yeh, Hung-Min Sun, and Chien-Ming Chen
An Analysis of People’s Reasoning for Sharing Real and Fake News, Anu Shrestha and Francesca Spezzano
Textual Characteristics of News Title and Body to Detect Fake News: A Reproducibility Study, Anu Shrestha and Francesca Spezzano
An Empirical Analysis of Collaborative Recommender Systems Robustness to Shilling Attacks, Anu Shrestha, Francesca Spezzano, and Maria Soledad Pera
Modeling Misinformation Diffusion in Social Media: Beyond Network Properties, Francesca Spezzano
Using Service-Learning in Graduate Curriculum to Address Teenagers' Vulnerability to Web Misinformation, Francesca Spezzano
That's Fake News!: Reliability of News When Provided Title, Image, Source Bias & Full Article, Francesca Spezzano, Anu Shrestha, Jerry Alan Fails, and Brian W. Stone
BullyNet: Unmasking Cyberbullies on Social Networks, Aparna Sankaran Srinath, Hannah Johnson, Gaby G. Dagher, and Min Long
An Analysis on Pixel Redundancy Structure in Equirectangular Images, I. Vazquez and S. Cutchin
Elastic and Thermodynamic Properties of Cerium-Doped Yttrium Aluminum Garnets, Vitaliy G., Nian Wei, Miu Lun Lau, Sue M. Ennaceur, Albert Migliori, Hongwu Xu, Min Long, and Xiaofeng Guo
cuTS: Scaling Subgraph Isomorphism on Distributed Multi-GPU Systems Using Trie Based Data Structure, Lizhi Xiang, Arif Khan, Edoardo Serra, Mahantesh Halappanavar, and Aravind Sukumaran-Rajam
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds, Jidong Xiao, Lei Lu, Hai Huang, and Haining Wang
Accelerating the Lagrangian Particle Tracking of Residence Time Distributions and Source Water Mixing Towards Large Scales, Chen Yang, You-Kuan Zhang, Xiuyu Liang, Catherine Olschanowsky, Xiaofan Yang, and Reed Maxwell
A Coprocessor-Based Introspection Framework via Intel Management Engine, Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, and Guojun Wang
Submissions from 2020
Say It with Emojis: Co-Designing Relevance Cues for Searching in the Classroom, Mohammad Aliannejadi, Monica Landoni, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
An Analysis of Transfer Learning Methods for Multilingual Readability Assessment, Ion Madrazo Azpiazu and Maria Soledad Pera
Evaluating and Improving Child-Directed Automatic Speech Recognition, Eric Booth, Jake Carns, Casey Kennington, and Nader Rafla
PAClab: A Program Analysis Collaboratory, Rebecca Brunner, Robert Dyer, Maria Paquin, and Elena Sherman
PIE: A Data-Driven Payoff Inference Engine for Strategic Security Applications, Haipeng Chen, Mohammad T. Hajiaghayi, Sarit Kraus, Anshul Sawant, Edoardo Serra, V. S. Subrahmanian, and Yanhai Xiong
Thermal Evolutions and Resulting Microstructural Changes in Kerogen-Rich Marcellus Shale, Cody B. Cockreham, Xianghui Zhang, Miu Lun Lau, Min Long, Xiaofeng Guo, Hongwu Xu, and Di Wu
SecDM: Privacy-Preserving Data Outsourcing Framework with Differential Privacy, Gaby G. Dagher, Benjamin C. M. Fung, Noman Mohammed, and Jeremy Clark
Evaluating Stochastic Rankings with Expected Exposure, Fernando Diaz, Bhaskar Mitra, Michael D. Ekstrand, Asia J. Biega, and Ben Carterette
KidSpell: A Child-Oriented, Rule-Based, Phonetic Spellchecker, Brody Downs, Oghenemaro Anuyah, Aprajita Shukla, Jerry Alan Fails, Maria Soledad Pera, Katherine Wright, and Casey Kennington
Guiding the Selection of Child Spellchecker Suggestions Using Audio and Visual Cues, Brody Downs, Aprajita Shukla, Mikey Krentz, Maria Soledad Pera, Katherine Landau Wright, Casey Kennington, and Jerry Alan Fails
Prediction of Fatality Crashes with Multilayer Perceptron of Crash Record Information System Datasets, Thanh Hung Duong, Fengxiang Qiao, Jyh-Haw Yeh, and Yunpeng Zhang
LensKit for Python: Next-Generation Software for Recommender Systems Experiments, Michael D. Ekstrand
Enhancing Classroom Instruction with Online News, Michael D. Ekstrand, Katherine Landau Wright, and Maria Soledad Pera
Designing a Portable Museum Display of Native American Stone Projectile Points (Arrowheads) to Ensure Accessibility and Tactile Quality, Cheryl K. Fogle-Hatch, Joe Nicoli, and Donald Winiecki
Defect-Free Plastic Deformation Through Dimensionality Reduction and Self-Annihilation of Topological Defects in Crystalline Solids, Yipeng Gao, Yongfeng Zhang, Larry K. Aagesen, Jianguo Yu, Min Long, and Yunzhi Wang
Using PageRank to Uncover Patterns in Search Behavior Induced by the Bit Flip Operator, Thomas M. Green and Timothy L. Andersen
Variance: Secure Two-Party Protocol for Efficient Asset Comparison in Bitcoin, Joshua Holmes and Gaby G. Dagher
Perspective on Coarse-Graining, Cognitive Load, and Materials Simulation, Eric Jankowski, Nealee Ellyson, Jenny W. Fothergill, Michael M. Henry, Mitchell H. Leibowitz, Evan D. Miller, Mone't Alberts, Jamie D. Guevara, Chris D. Jones, Mia Klopfenstein, Kendra K. Noneman, Rachel Singleton, and Matthew L. Jones
Evaluating the Benefits of Team-Based Learning in a Systems Programming Class, Alark Joshi, Marissa Schmidt, Shane Panter, and Amit Jain
Detecting Undisclosed Paid Editing in Wikipedia, Nikesh Joshi, Francesca Spezzano, Mayson Green, and Elijah Hill
rrSDS: Towards a Robot-Ready Spoken Dialogue System, Casey Kennington, Daniele Moro, Lucas Marchand, Jake Carns, and David McNeill
vSwitchGuard: Defending OpenFlow Switches Against Saturation Attacks, Samer Y. Khamaiseh, Edoardo Serra, and Dianxiang Xu
An Innovative Framework for Supporting Remote Sensing in Image Processing Systems via Deep Transfer Learning, Oxana Korzh, Ashish Sharma, Mikel Joaristi, Edoardo Serra, and Alfredo Cuzzocrea
We’ve Only Just Begun: Children Searching in the Classroom, Monica Landoni, Theo Huibers, Emiliana Murgia, and Maria Soledad Pera
You've Got a Friend in Me: Children and Search Agents, Monica Landoni, Emiliana Murgia, Theo Huibers, and Maria Soledad Pera
Inside Out: Exploring the Emotional Side of Search Engines in the Classroom, Monica Landoni, Maria Soledad Pera, Emiliana Murgia, and Theo Huibers
Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid, Xiao-Cong Liang, Tsu-Yang Wu, Yu-Qi Lee, Chien-Ming Chen, and Jyh-Haw Yeh
A Sparse Tensor Benchmark Suite for CPUs and GPUs, Jiajia Li, Mahesh Lakshminarasimhan, Xiaolong Wu, Ang Li, Catherine Olschanowsky, and Kevin Barker
Is Cross‐Lingual Readability Assessment Possible?, Ion Madrazo Azpiazu and Maria Soledad Pera
Learning Word Groundings from Humans Facilitated by Robot Emotional Displays, David McNeill and Casey Kennington
A Ranking Strategy to Promote Resources Supporting the Classroom Environment, Ashlee Milton, Oghenemaro Anuyah, Lawrence Spear, Katherine Landau Wright, and Maria Soledad Pera
“Don’t Judge a Book by Its Cover”: Exploring Book Traits Children Favor, Ashlee Milton, Levesson Batista, Garrett Allen, Siqi Gao, Yiu-Kai D. Ng, and Maria Soledad Pera
What Snippets Feel: Depression, Search, and Snippets, Ashlee Milton and Maria Soledad Pera
Semantics with Feeling: Emotions for Abstract Embedding, Affect for Concrete Grounding, Daniele Moro, Gerardo Caracas, David McNeill, and Casey Kennington
A User-Centric and Sentiment Aware Privacy-Disclosure Detection Framework Based on Multi-Input Neural Network, A. K. M. Nuhil Mehdy and Hoda Mehrpouyan
Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel Randomization, Yanjun Pan, Yantian Hou, Ming Li, Ryan M. Gerdes, Kai Zeng, Md. A. Towfiq, and Bedri A. Cetiner
Top-κ User-Specified Preferred Answers in Massive Graph Databases, Noseong Park, Andrea Pugliese, Edoardo Serra, and V. S. Subrahmanian
An Operational Resilience Metric for Modern Power Distribution Systems, Tyler Phillips, Timothy McJunkin, Craig Rieger, John Gardner, and Hoda Mehrpouyan
Scalable Workflow-Driven Hydrologic Analysis in HydroFrame, Shweta Purawat, Cathie Olschanowsky, Laura E. Condon, Reed Maxwell, and Ilkay Altintas
A Framework for the Multi-Modal Analysis of Novel Behavior in Business Processes, Antonino Rullo, Antonella Guzzo, Edoardo Serra, and Erika Tirrito
FALCON: Framework for Anomaly Detection in Industrial Control Systems, Subin Sapkota, A.K.M. Nuhil Mehdy, Stephen Reese, and Hoda Mehrpouyan
Large-Scale Sparse Structural Node Representation, Edoardo Serra, Mikel Joaristi, and Alfredo Cuzzocrea
DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-Based Systems, Edoardo Serra, Anu Shrestha, Francesca Spezzano, and Anna Squicciarini
Multi-Modal Social and Psycho-Linguistic Embedding via Recurrent Neural Networks to Identify Depressed Users in Online Forums, Anu Shrestha, Edoardo Serra, and Francesca Spezzano
Multi-Modal Analysis of Misleading Political News, Anu Shrestha, Francesca Spezzano, and Indhumathi Gurunathan
Detecting Fake News Spreaders in Social Networks via Linguistic and Personality Features: Notebook for PAN at CLEF 2020, Anu Shrestha, Francesca Spezzano, and Abishai Joy
How Do People Decide Political News Credibility?, Francesca Spezzano and Don Winiecki
Estimating Error and Bias in Offline Evaluation Results, Mucun Tian and Michael D. Ekstrand
Recurrent Neural Network Properties and Their Verification with Monte Carlo Techniques, Dmitri Vengertsev and Elena Sherman
Validating Bad Entity Ranking in the Panama Papers via Open-Source Intelligence, Donald Winiecki, Katherine Kappelman, Bryant Hay, Mikel Joaristi, Edoardo Serra, and Francesca Spezzano
Performance Optimization of Non-Equilibrium Ionization Simulations from MapReduce and GPU Acceleration, Jian Xiao, Min Long, Ce Yu, Xin Zhou, and Li Ji
ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform, Yi Xie, Joshua Holmes, and Gaby G. Dagher
Understanding the Manipulation on Recommender Systems Through Web Injection, Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, and Sushil Jajodia
KShot: Live Kernel Patching with SMM and SGX, Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhengyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, and Guojun Wang
Submissions from 2019
Workload-Aware Task Placement in Edge-Assisted Human Re-Identification, Anil Acharya, Yantian Hou, Ying Mao, Min Xian, and Jiawei Yuan
Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy, Anil Acharya, Yantian Hou, Ying Mao, and Jiawei Yuan
A Study of the Multiple Sign-In Feature in Web Applications, Marwan Albahar, Xing Gao, Gaby Dagher, Daiping Liu, Fengwei Zhang, and Jidong Xiao
Using Structured Knowledge and Traditional Word Embeddings to Generate Concept Representations in the Educational Domain, Oghenemaro Anuyah, Ion Madrazo Azpiazu, and Maria Soledad Pera
An Empirical Analysis of Search Engines’ Response to Web Search Queries Associated with the Classroom Setting, Oghenemaro Anuyah, Ashlee Milton, Michael Green, and Maria Soledad Pera
Editing Behavior Analysis for Predicting Active and Inactive Users in Wikipedia, Harish Arelli, Francesca Spezzano, and Anu Shrestha
Contextualizing Consensus Protocols in Blockchain: A Short Survey, Golam Bashar, Graham Hill, Subroto Singha, Praneeth Marella, Gaby G. Dagher, and Jidong Xiao
Using the Loop Chain Abstraction to Schedule Across Loops in Existing Code, Ian J. Bertolacci, Michelle Mills Strout, Jordan Riley, Stephen M. J. Guzik, Eddie C. Davis, and Catherine Olschanowsky
"Anon What What?": Children's Understanding of the Language of Privacy, Stacy Black, Rezvan Joshaghani, Dhanush Kumar Ratakonda, Hoda Mehrpouyan, and Jerry Alan Fails
Deviant: A Mutation Testing Tool for Solidity Smart Contracts, Patrick Chapman, Dianxiang Xu, Lin Deng, and Yin Xiong
A Structured Grid Solver with Polyhedral+Dataflow Representation, Eddie C. Davis, Catherine R. M. Olschanowsky, and Brian Van Straalen
Searching for Spellcheckers: What Kids Want, What Kids Need, Brody Downs, Tyler French, Katherine Landau Wright, Maria Soledad Pera, Casey Kennington, and Jerry Alan Fails
Fairness and Discrimination in Recommendation and Retrieval, Michael D. Ekstrand, Robin Burke, and Fernando Diaz
Recommender Systems Notation, Michael D. Ekstrand and Joseph A. Konstan
Child-Computer Interaction SIG: Designing for Refugee Children, Jerry Alan Fails
Pushing the Boundaries of Participatory Design, Jerry Alan Fails
Pushing the Boundaries of Participatory Design with Children with Special Needs, Jerry Alan Fails
Query Formulation Assistance for Kids: What is Available, When to Help & What Kids Want, Jerry Alan Fails, Maria Soledad Pera, Oghenemaro Anuyah, Casey Kennington, Katherine Landau Wright, and William Bigirimana
Panel: Broadening the Discussion of Ethics in the Interaction Design and Children Community, Christopher Frauenberger, Monica Landoni, Jerry Alan Fails, Janet C. Read, Alissa N. Antle, and Pauline Gourlet
Estimating Node Indirect Interaction Duration to Enhance Link Prediction, Laxmi Amulya Gundala and Francesca Spezzano
3rd KidRec Workshop: What Does Good Look Like?, Theo Huibers, Jerry Alan Fails, Natalia Kucirkova, Monica Landoni, Emiliana Murgia, and Maria Soledad Pera
The Computer Science Professional's Hatchery, Amit Jain, Noah Salzman, and Donald Winiecki
RIBS: Risky Blind-Spots for Attack Classification Models, Mikel Joaristi, Arthur Putnam, Alfredo Cuzzocrea, and Edoardo Serra
Detecting Suspicious Entities in Offshore Leaks Networks, Mikel Joaristi, Edoardo Serra, and Francesca Spezzano
Formal Specification and Verification of User-Centric Privacy Policies for Ubiquitous Systems, Rezvan Joshaghani, Stacy Black, Elena Sherman, and Hoda Mehrpouyan
A Sustainable Model for High-School Teacher Preparation in Computer Science, Alark Joshi, Amit Jain, Ernie Covelli, Jyh-Haw Yeh, and Tim Andersen
SQUID: A Scalable System for Querying, Updating and Indexing Dynamic Graph Databases, Akshay Kansal and Francesca Spezzano
Detecting Saturation Attacks in SDN via Machine Learning, Samer Khamaiseh, Edoardo Serra, Zhiyuan Li, and Dianxiang Xu
Privacy-Preserving Genomic Data Publishing via Differentially-Private Suffix Tree, Tanya Khatri, Gaby G. Dagher, and Yantian Hou
Design Resilience of Demand Response Systems Utilizing Locally Communicating Thermostatically Controlled Loads, Jason Kuwada, Hoda Mehrpouyan, and John F. Gardner
Sonny, Cerca!: Evaluating the Impact of Using a Vocal Assistant to Search at School, Monica Landoni, Davide Matteri, Emiliana Murgia, Theo Huibers, and Maria Soledad Pera
Predicting Human Interpretations of Affect and Valence in a Social Robot, David McNeill and Casey Kennington
Privacy Disclosures Detection in Natural-Language Text Through Linguistically-Motivated Artificial Neural Networks, Nuhil Mehdy, Casey Kennington, and Hoda Mehrpouyan
Here, There, and Everywhere: Building a Scaffolding for Children’s Learning Through Recommendations, Ashlee Milton, Emiliana Murgia, Monica Landoni, Theo Huibers, and Maria Soledad Pera
Sparse Computation Data Dependence Simplification for Efficient Compiler-Generated Inspectors, Mahdi Soltan Mohammadi, Tomofumi Yuki, Kazem Cheshmi, Eddie C. Davis, Mary Wolcott Hall, Maryam Mehri Dehnavi, Payal Nandy, Catherine Olschanowsky, Anand Venkat, and Michelle Mills Strout
The Seven Layers of Complexity of Recommender Systems for Children in Educational Contexts, Emiliana Murgia, Monica Landoni, Theo Huibers, Jerry Alan Fails, and Maria Soledad Pera
With a Little Help from My Friends: Use of Recommendations at School, Maria Soledad Pera, Emiliana Murgia, Monica Landoni, and Theo Huibers
A Covert System Identification Attack on Constant Setpoint Control Systems, Tyler Phillips, Hoda Mehrpouyan, John Gardner, and Stephen J. Reese
Framework for Detecting Control Command Injection Attacks on Industrial Control Systems (ICS), Farhad Rasapour, Edoardo Serra, and Hoda Mehrpouyan
“My Name is My Password:” Understanding Children’s Authentication Practices, Dhanush Kumar Ratakonda, Tyler French, and Jerry Alan Fails
Optimal Placement of Security Resources for the Internet of Things, Antonio Rullo, Edoardo Serra, Elisa Bertino, and Jorge Lobo
Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A Review, Antonio Rullo, Edoardo Serra, and Jorge Lobo
Number of Minimal Hypergraph Transversals and Complexity of IFM with Infrequency: High in Theory, but Often Not so Much in Practice!, Domenico Saccà and Edoardo Serra
Extending Inverse Frequent Itemsets Mining to Generate Realistic Datasets: Complexity, Accuracy and Emerging Applications, Domenico Saccá, Edoardo Serra, and Antonio Rullo
Assessing Community in an Undergraduate Computer Science Program Using Social Network Analysis, Noah Salzman, Don Winiecki, and Amit Jain
Investigating the Social and Temporal Aspects of Children’s Physical Activity Games, Ankita Samariya, Jerry Alan Fails, and Derek Hansen
KidLED: A Colorful Approach to Children's Activity Awareness, Ankita Samariya, Anud Sharma, Margiawan Fitriani, Tucker Ferguson, and Jerry Alan Fails
AdaptLidarTools: A Full-Waveform Lidar Processing Suite, Ravi Shankar, Nayani Ilangakoon, Aaron Orenstein, Floriana Ciaglia, Nancy F. Glenn, and Catherine Olschanowsky
Accurate String Constraints Solution Counting with Weighted Automata, Elena Sherman and Andrew Harris
Detecting Depressed Users in Online Forums, Anu Shrestha and Francesca Spezzano
Online Misinformation: From the Deceiver to the Victim, Anu Shrestha and Francesca Spezzano
Detecting Pages to Protect in Wikipedia Across Multiple Languages, Francesca Spezzano, Kelsey Suyehira, and Laxmi Amulya Gundala
PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud, Yifan Tian, Jiawei Yuan, and Yantian Hou
Edge-Assisted CNN Inference Over Encrypted Data for Internet of Things, Yifan Tian, Jiawei Yuan, Shucheng Yu, Yantian Hou, and Houbing Song
Forensic Analysis of Bitcoin Transactions, Yan Wu, Anthony Luo, and Dianxiang Xu
Flexibly and Securely Shape Your Data Disclosed to Others, Qingqing Xie, Yantian Hou, Ke Cheng, Gaby G. Dagher, Liangmin Wang, and Shucheng Yu
Undergraduate Research Experience in Cybersecurity for Underrepresented Students and Students with Limited Research Opportunities, Dazhi Yang, Dianxiang Xu, Jyh-Haw Yeh, and Yibo Fan
FlowCon: Elastic Flow Configuration for Containerized Deep Learning Applications, Wenjia Zheng, Michael Tynes, Henry Gorelick, Ying Mao, Long Cheng, and Yantian Hou
Nighthawk: Transparent System Introspection from Ring -3, Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, and Guojun Wang
Submissions from 2018
SafePath: Differentially-Private Publishing of Passenger Trajectories in Transportation Systems, Khalil Al-Hussaeni, Benjamin C. M. Fung, Farkhund Iqbal, Gaby G. Dagher, and Eun G. Park
Network Slicing to Improve Multicasting in HPC Clusters, Izzat Alsmadi, Abdallah Khreishah, and Dianxiang Xu
Investigating Query Formulation Assistance for Children, Oghenemaro Anuyah, Maria Soledad Pera, and Jerry Alan Fails
Extending OpenMP to Facilitate Loop Optimization, Ian Bertolacci, Michelle Mills Strout, Bronis R. de Supinski, Thomas R. W. Scogland, Eddie C. Davis, and Catherine Olschanowsky
Hybrid Adversarial Defense: Merging Honeypots and Traditional Security Methods, Tanmoy Chakraborty, Sushil Jajodia, Noseong Park, Andrea Pugliese, Edoardo Serra, and V. S. Subrahmanian
Secure Similar Sequence Query on Outsourced Genomic Data, Ke Cheng, Yantian Hou, and Liangmin Wang
BroncoVote: Secure Voting System Using Ethereum’s Blockchain, Gaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, and Jordan Mohler
Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology, Gaby G. Dagher, Jordan Mohler, Matea Milojkovic, and Praneeth Babu Marella
Transforming Loop Chains via Macro Dataflow Graphs, Eddie C. Davis, Michelle Mills Strout, and Catherine Olschanowsky
From Recommendation to Curation: When the System Becomes Your Personal Docent, Nevena Dragovic, Ion Madrazo Azpiazu, and Maria Soledad Pera
The LKPY Package for Recommender Systems Experiments, Michael D. Ekstrand
Retrieving and Recommending for the Classroom: Stakeholders, Objectives, Resources, and Users, Michael D. Ekstrand, Ion Madrazo Azpiazu, Katherine Landau Wright, and Maria Soledad Pera
Exploring Author Gender in Book Rating and Recommendation, Michael D. Ekstrand, Mucun Tian, Mohammed R. Imran Kazi, Hoda Mehrpouyan, and Daniel Kluver
Child-Computer Interaction, Ubiquitous Technologies, and Big Data, Jerry Alan Fails
International and Interdisciplinary Perspectives on Children & Recommender Systems (KidRec), Jerry Alan Fails, Maria Soledad Pera, Natalia Kucirkova, and Franca Garzotto
Ethics in Interaction Design and Children: A Panel and Community Dialogue, Christopher Frauenberger, Alissa N. Antle, Monica Landoni, Janet C. Read, and Jerry Alan Fails
A Framework for Predicting Links Between Indirectly Interacting Nodes, Laxmi Amulya Gundala and Francesca Spezzano
Placing Objects in Gesture Space: Toward Incremental Interpretation of Multimodal Spatial Descriptions, Ting Han, Casey Kennington, and David Schlangen
Inferring Bad Entities Through the Panama Papers Network, Mikel Joaristi, Edoardo Serra, and Francesca Spezzano
Reflecting on the Impact of a Course on Inclusive Strategies for Teaching Computer Science, Alark Joshi and Amit Jain
2nd FATREC Workshop: Responsible Recommendation, Toshihiro Kamishima, Pierre-Nicolas Schwab, and Michael D. Ekstrand
Model-Based Testing of Obligatory ABAC Systems, Samer Khamaiseh, Patrick Chapman, and Dianxiang Xu
SPIDR: Small-Molecule Peptide-Influenced Drug Repurposing, Matthew D. King, Thomas Long, Daniel L. Pfalmer, Timothy L. Andersen, and Owen M. McDougal
Rating-Based Collaborative Filtering: Algorithms and Evaluation, Daniel Kluver, Michael D. Ekstrand, and Joseph A. Konstan
Convolutional Neural Network Ensemble Fine-Tuning for Extended Transfer Learning, Oxana Korzh, Mikel Joaristi, and Edoardo Serra
Estimation of Remote Sensing Imagery Atmospheric Conditions Using Deep Learning and Image Classification, Oxana Korzh and Edoardo Serra
GenVote: Blockchain-Based Customizable and Secure Voting Platform, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler, and Gaby Dagher
The Sparse Polyhedral Framework: Composing Compiler-Generated Inspector–Executor Code, Michelle Mills Strout, Mary Hall, and Catherine Olschanowsky
Recommending Social-Interactive Games for Adults with Autism Spectrum Disorders (ASD), Yiu-Kai Ng and Maria Soledad Pera
On the Throughput Limit of Multi-Hop Wireless Networks with Reconfigurable Antennas, Yanjun Pan, Ming Li, Neng Fan, and Yantian Hou
Recommending Books to Be Exchanged Online in the Absence of Wish Lists, Maria Soledad Pera and Yiu-Kai Ng
Predicting Perceived Age: Both Language Ability and Appearance are Important, Sarah Plane, Ariel Marvasti, Tyler Egan, and Casey Kennington
Misusing Sensory Channel to Attack Industrial Control Systems, Farhad Rasapour and Hoda Mehrpouyan
Inverse Tree-OLAP: Definition, Complexity and First Solution, Domenico Saccà, Edoardo Serra, and Alfredo Cuzzocrea
The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution, Domenico Saccà, Edoardo Serra, and Alfredo Cuzzocrea
A Crowdsourcing Semi-Supervised LSTM Training Approach to Identify Novel Items in Emerging Artificial Intelligent Environments, Edoardo Serra, Haritha Akella, and Alfredo Cuzzocrea
Unknown Landscape Identification with CNN Transfer Learning, Edoardo Serra, Ashish Sharma, Mikel Joaristi, and Oxana Korzh
Redesigning Soot’s Data-Flow Analysis Framework for Abstract Interpretation, Elena Sherman
Structurally Defined Conditional Data-Flow Static Analysis, Elena Sherman and Matthew B. Dwyer
Software Engineering Collaboratories (SEClabs) and Collaboratories as a Service (CaaS), Elena Sherman and Robert Dyer
Model Checking of Security Properties in Industrial Control Systems (ICS), Roshan Shrestha, Hoda Mehrpouyan, and Dianxiang Xu
XPA: An Open Source IDE for XACML Policies, Roshan Shrestha, Shuai Peng, Turner Lehmbecker, and Dianxiang Xu
Conservation by Voltage Reduction Using a Single-Phase Residential Static VAR Compensator, John P. Stubban, Said Ahmed-Zaid, and M. Kamran Latif
A Shoulder Surfing Resistant Graphical Authentication System, Hung-Min Sun, Shiuan-Tung Chen, Jyh-Haw Yeh, and Chia-Yun Cheng
Monte Carlo Estimates of Evaluation Metric Error and Bias: Work in Progress, Mucun Tian and Michael D. Ekstrand
Compression of 16K Video for Mobile VR Playback Over 4K Streams, I. Vazquez and S. Cutchin
Infusing Inclusion, Diversity, and Social Justice into the Undergraduate Computer Science Curriculum at Boise State University, Donald Winiecki, Noah Salzman, Timothy Andersen, Amit Jain, and Dianxiang Xu
Analysis and Prediction of Endorsement-Based Skill Assessment in LinkedIn, Yan Wu, Nitish Dhakal, Dianxiang Xu, and Jin-Hee Cho
Automated Coverage-Based Testing of XACML Policies, Dianxiang Xu, Roshan Shrestha, and Ning Shen
Statistical Unigram Analysis for Source Code Repository, Weifeng Xu, Dianxiang Xu, Abdulrahman Alatawi, Omar El Ariss, and Yunkai Liu
A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption, Jyh-Haw Yeh, Srisarguru Sridhar, Gaby G. Dagher, Hung-Min Sun, Ning Shen, and Kathleen Dakota White
Submissions from 2017
Who Will Stop Contributing?: Predicting Inactive Editors in Wikipedia, Harish Arelli and Francesca Spezzano
Online Searching and Learning: YUM and Other Search Tools for Children and Teachers, Ion Madrazo Azpiazu, Nevena Dragovic, Maria Soledad Pera, and Jerry Alan Fails
Amake: Cached Builds of Top-Level Targets, Jim Buffenbarger
Recommender Response to Diversity and Popularity Bias in User Profiles, Sushma Channamsetty and Michael D. Ekstrand
Development of an Intelligent Equipment Lock Management System with RFID Technology, Yeh-Cheng Chen, C. N. Chu, H. M. Sun, Jyh-Haw Yeh, Ruey-Shun Chen, and Chorng-Shiuh Koong
Predicting Friendship Strength for Privacy Preserving: A Case Study on Facebook, Nitish Dhakal, Francesca Spezzano, and Dianxiang Xu
Exploiting Reviews to Generate Personalized and Justified Recommendations to Guide Users’ Selections, Nevena Dragovic and Maria Soledad Pera
Sturgeon and the Cool Kids: Problems with Random Decoys for Top-N Recommender Evaluation, Michael D. Ekstrand and Vaibhav Mahant
FATREC Workshop on Responsible Recommendation Proceedings, Michael Ekstrand and Amit Sharma
The NECST Program - Networking and Engaging in Computer Science and Information Technology Program, Jerry Alan Fails
KidRec: Children & Recommender Systems: Workshop Co-Located with ACM Conference on Recommender Systems (RecSys 2017), Jerry Alan Fails, Maria Soledad Pera, Franca Garzotto, and Mirko Gelsomini
Silence, Please!: Interrupting In-Car Phone Conversations, Soledad López Gambino, Casey Kennington, and David Schlangen
Spam Users Identification in Wikipedia via Editing Behavior, Thomas Green and Francesca Spezzano
UBR: A Book Search — Recommender Hybrid, Jason Hall and Maria Soledad Pera
EDOS: Edge Assisted Offloading System for Mobile Devices, Hank H. Harvey, Ying Mao, Yantian Hou, and Bo Sheng
Game Theoretical Analysis of Coexistence in MIMO-Empowered Cognitive Radio Networks, Yantian Hou, Ming Li, and Dejun Yang
Throughput Optimization in Multi-Hop Wireless Networks with Reconfigurable Antennas, Yantian Hou, Ming Li, and Kai Zeng
COMS: Customer Oriented Migration Service, Kai Huang, Xing Gao, Fengwei Zhang, and Jidong Xiao
Panel: Influencing Culture and Curriculum Via Revolution, Amit Jain
A Probabilistic Logic of Cyber Deception, Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, and V. S. Subrahmanian
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine, Sushil Jajodia, Noseong Park, Edoardo Serra, and V. S. Subrahmanian
A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies, Rezvan Joshaghani and Hoda Mehrpouyan
A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases, Akshay Kansal and Francesca Spezzano
Temporal Alignment Using the Incremental Unit Framework, Casey Kennington, Ting Han, and David Schlangen
A Graphical Digital Personal Assistant That Grounds and Learns Autonomously, Casey Kennington and Aprajita Shukla
Software Security Testing via Misuse Case Modeling, Samer Khamaisech and Dianxiang Xu
Stacking Approach for CNN Transfer Learning Ensemble for Remote Sensing Imagery, Oxana Korzh, Gregory Cook, Timothy Andersen, and Edoardo Serra
Key Selection for Multilevel Indices of Large-Scale Service Repositories, Wen Kuang, Yan Wu, and Lu Liu
Analysis on the Security and Use of Password Managers, Carlos Luevanos, John Elizarraras, Khai Hirschi, and Jyh-Haw Yeh
Mining Twitter Features for Event Summarization and Rating, Deepa Mallela, Dirk Ahlers, and Maria Soledad Pera
Measuring Personality for Automatic Elicitation of Privacy Preferences, Hoda Mehrpouyan, Ion Madrazo Azpiazu, and Maria Soledad Pera
A Novel Efficient Index Model and Modified Chord Protocol for Decentralized Service Repositories, Dejun Miao, Rongyan Xu, Lu Liu, Yan Wu, Paul Comerford, and Zhao Xu
Using Online Data Sources to Make Query Suggestions for Children, Maria Soledad Pera and Yiu-Kai Ng
A Game of Things: Strategic Allocation of Security Resources for IoT, Antonino Rullo, Daniele Midi, Edoardo Serra, and Elisa Bertino
Pareto Optimal Security Resource Allocation for Internet of Things, Antonino Rullo, Daniele Midi, Edoardo Serra, and Elisa Bertino
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios, Antonino Rullo, Edoardo Serra, Elisa Bertino, and Jorge Lobo
Shortfall-Based Optimal Security Provisioning for Internet of Things, Antonino Rullo, Edoardo Serra, Elisa Bertino, and Jorge Lobo
Evaluating the Privacy Implications of Frequent Itemset Disclosure, Edoardo Serra, Jaideep Vaidya, Haritha Akella, and Ashish Sharma
Ensuring the Integrity of Wikipedia: A Data Science Approach, Francesca Spezzano
Improved Supervised Classification of Accelerometry Data to Distinguish Behaviors of Soaring Birds, Maitreyi Sur and Srisarguru Sridhar
A Coding Scheme for Nucleic Acid Memory (NAM), Kelsey Suyehira, Simon Llewellyn, Reza M. Zadegan, William L. Hughes, and Tim Andersen
CAPIA: Cloud Assisted Privacy-Preserving Image Annotation, Yifan Tian, Yantian Hou, and Jiawei Yuan
Measurement of Source Code Readability Using Word Concreteness and Memory Retention of Variable Names, Weifeng Xu, Dianxiang Xu, and Lin Deng
Statistical Unigram Analysis for Source Code Repository, Weifeng Xu, Dianxiang Xu, Omar El Ariss, Yunkai Liu, and Abdulrahman Alatawi
A Novel Multilevel Index Model for Distributed Service Repositories, Zhao Xu, Yan Wu, Dejun Miao, and Lu Liu
A Secure Homomorphic Encryption Algorithm Over Integers for Data Privacy Protection in Clouds, Jyh-Haw Yeh
Submissions from 2016
Interaction-Based Reputation Model in Online Social Networks, Izzat Alsmadi, Dianxiang Xu, and Jin-Hee Cho
Finding, Understanding and Learning: Making Information Discovery Tasks Useful for Children and Teachers, Ion Madrazo Azpiazu, Nevena Dragovic, and Maria Soledad Pera
Identifying and Scheduling Loop Chains Using Directives, Ian J. Bertolacci, Michelle Mills Strout, Stephen Guzik, Jordan Riley, and Catherine Olschanowsky
Comparing Encrypted Strings, Jim Buffenbarger
Privacy and Social Capital in Online Social Networks, Jin-Hee Cho, Izzat Alsmadi, and Dianxiang Xu
View Dependent Tone Mapping of HDR Panoramas for Head Mounted Displays, Steve Cutchin and Yuan Li
Synchronized Shared Scene Viewing in Mixed VR Devices in Support of Group Collaboration, Steve Cutchin and Iker Vazquez
Configuring and Assembling Information Retrieval Based Solutions for Software Engineering Tasks, Bogdan Dit
Anything Fun Going On?: A Simple Wizard to Avoid the Cold-Start Problem for Event Recommenders, Stacey Donohue, Nevena Dragovic, and Maria Soledad Pera
"Is Sven Seven?": A Search Intent Module for Children, Nevena Dragovic, Ion Madrazo Azpiazu, and Maria Soledad Pera
Genre Prediction to Inform the Recommendation Process, Nevena Dragovic and Maria Soledad Pera
Behaviorism is Not Enough: Better Recommendations Through Listening to Users, Michael D. Ekstrand and Martijn C. Willemsen
Conformance Testing of Balana: An Open Source Implementation of the XACML3.0 Standard, Sung-Ju Fan Chiang, Daniel W. Chen, and Dianxiang Xu
Making Wireless Body Area Networks Robust Under Cross-Technology Interference, Yantian Hou, Ming Li, and Shucheng Yu
Using Temporal Probabilistic Logic for Optimal Monitoring of Security Events with Limited Resources, Sushil Jajodia, Noseong Park, Edoardo Serra, and V. S. Subrahmanian
Evaluating the Impact of Social Media in Detecting Health-Violating Restaurants, Mikel Joaristi, Edoardo Serra, and Francesca Spezzano
Diffusion Centrality: A Paradigm to Maximize Spread in Social Networks, Chanhyun Kang, Sarit Kraus, Cristian Molinaro, Francesca Spezzano, and V. S. Subrahmanian
Ensemble Models for Data-Driven Prediction of Malware Infections, Chanhyun Kang, Noseong Park, B. Adita Prakash, Edoardo Serra, and V. S. Subrahmanian
Computational Exploration of a Protein Receptor Binding Space with Student Proposed Peptide Ligands, Matthew D. King, Paul Phillips, Matthew W. Turner, Michael Katz, Sarah Lew, Sarah Bradburn, Tim Andersen, and Owen M. McDougal
Metric Logic Program Explanations for Complex Separator Functions, Srijan Kumar, Edoardo Serra, Francesca Spezzano, and V. S. Subrahmanian
Edge Weight Prediction in Weighted Signed Networks, Srijan Kumar, Francesca Spezzano, V. S. Subrahmanian, and Christos Faloutsos
Analysis of Healthcare Workflows in Accordance with Access Control Policies, Sandeep Lakaraju, DianXiang Xu, and Yong Wang
RVLBPNN: A Workload Forecasting Model for Smart Cloud Computing, Yao Lu, John Panneerselvam, Lu Liu, and Yan Wu
“One Size Doesn’t Fit All": Helping Users Find Events from Multiple Perspectives, Sean MacLachlan, Stacey Donohue, Nevena Dragovic, and Maria Soledad Pera
An Experiment-Based Methodology to Understand the Dynamics of Group Decision Making, Susan G. Mason, Don Holley, Aaron Wells, Amit Jain, Thomas Wuerzer, and Alark Joshi
Complex Engineered Systems Design Verification Based on Assume-Guarantee Reasoning, Hoda Mehrpouyan, Dimitra Giannakopoulou, Guillaume Brat, Irem Y. Tumer, and Chris Hoyle
A Validated Software Application to Measure Fiber Organization in Soft Tissue, Erica E. Morrill, Azamat N. Tulepbergenov, Christina J. Stender, Roshani Lamichhane, Raquel J. Brown, and Trevor J. Lujan
Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms, Annibale Panichella, Bogdan Dit, Rocco Oliveto, Massimiliano Di Penta, Denys Poshyvanyk, and Andrea De Lucia
Strategic Security Resource Allocation for Internet of Things, Antonino Rullo, Daniele Midi, Edoardo Serra, and Elisa Bertino
Multi-Sorted Inverse Frequent Itemsets Mining: On-Going Research, Domenico Saccà, Edoardo Serra, and Antonio Piccolo
ChoiceGAPs: Competitive Diffusion as a Massive Multi-Player Game in Social Networks, Edoardo Serra, Francesca Spezzano, and V. S. Subrahmanian
DePP: A System for Detecting Pages to Protect in Wikipedia, Kelsey Suyehira and Francesca Spezzano
Synchronized Scene Views in Mixed Virtual Reality for Guided Viewing, Iker Vazquez and Steve Cutchin
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code, Jidong Xiao, Lei Lu, Haining Wang, and Xiaoyun Zhu
Towards Automatic Repair of Access Control Policies, Dianxiang Xu and Shuai Peng
Automated Fault Localization of XACML Policies, DianXiang Xu, Zhenyu Wang, Shuai Peng, and Ning Sheng
Automated Integration Testing Using Logical Contracts, Dianxiang Xu, Weifeng Xu, Manghui Tu, Ning Shen, William Chu, and Chih-Hung Chang
Performance Analysis of Multilevel Indices for Service Repositories, Wei Xu, Yan Wu, and Lu Liu
Submissions from 2015
Vulnerability Assessments: A Case Study of Jordanian Universities, Mohammed Akour and Izzat Alsmadi
Evaluation of Spam Impact on Arabic Websites Popularity, Mohammed N. Al-Kabi, Izzat M. Alsmadi, and Heider A. Wahsheh
A Novel Root Based Arabic Stemmer, Mohammed N. Al-Kabi, Saif A. Kazakzeh, Belal M. Abu Ata, Saif A. Al-Rababah, and Izzat M. Alsmadi
Clustering and Classification of Email Contents, Izzat Alsmadi and Ikdam Alhami
Model-Based Testing of SDN Firewalls: A Case Study, Izzat Alsmadi, Milson Munakami, and Dianxiang Xu
Security of Software Defined Networks: A Survey, Izzat Alsmadi and Dianxiang Xu
Building an Islamic Financial Information System Based on Policy Managements, Izzat Alsmadi and Mohammad Zarour
Rethinking User Interfaces for Feature Location, Fabian Beck, Bogdan Dit, Jaleo Velasco-Madden, Daniel Weiskopf, and Denys Poshyvanyk
Excitonic AND Logic Gates on DNA Brick Nanobreadboards, Brittany L. Cannon, Donald L. Kellis, Paul H. Davis, Jeunghoon Lee, Wan Kuang, William L. Hughes, Elton Graugnard, Bernard Yurke, and William Knowlton
Mobile Agents Modelling Using UML, Feras Ahmad Hanandeh, Izzat Alsmadi, Majdi Yousef Al-Shannag, and Essam Al-Daoud
Arabic Sentiment Polarity Identification Using a Hybrid Approach, Rawan T. Khasawneh, Heider A. Wahsheh, Izzat M. Alsmadi, and Mohammed N. Al-Kabi
Minimizing the Size of Path Conditions Using Convex Polyhedra Abstract Domain, Justin Lloyd and Elena Sherman
GAMPMS: Genetic Algorithm Managed Peptide Mutant Screening, Thomas Long, Owen M. McDougal, and Tim Andersen
Event Recommendation Using Twitter Activity, Axel Magnuson, Vijay Dialani, and Deepa Mallela
Scheduling Instruction Effects for a Statically Pipelined Processor, F. Rasapour, G. Cook, and G.-R. Uh
An Immersed Boundary Geometric Preprocessor for Arbitrarily Complex Terrain and Geometry, Inanc Senocak, Micah Sandusky, Rey DeLeon, Derek Wade, Kyle Felzien, and Marianna Budnikova
Suggesting Simple and Comprehensive Queries to Elementary-Grade Children, Meher T. Shaikh, Maria Soledad Pera, and Yiu-Kai Ng
Exploiting Domain and Program Structure to Synthesize Efficient and Precise Data Flow Analyses (T), Elena Sherman and Matthew B. Dwyer
Deciding Type-Based Partial-Order Constraints for Path-Sensitive Analysis, Elena Sherman, Brady J. Garvin, and Matthew B. Dwyer
Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition Nets, Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, and Yves Le Traon
Fault-Based Testing of Combining Algorithms in XACML 3.0 Policies, Dianxiang Xu, Ning Sheng, and Yunpeng Zhang
Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies, Dianxiang Xu, Ning Shen, and Yunpeng Zhang
An Automated Test Generation Technique for Software Quality Assurance, Dianxiang Xu, Weifeng Xu, Michael Kent, Lijo Thomas, and Linzhang Wang
Formalizing Semantic Differences Between Combining Algorithms in XACML 3.0 Policies, Dianxiang Xu, Yunpeng Zhang, and Ning Shen
A Probabilistic Homomorphic Encryption Algorithm Over Integers: Protecting Data Privacy in Clouds, Jyh-Haw Yeh
Submissions from 2014
MQVC: Measuring Quranic Verses Similarity and Sura Classification Using N-Gram, Mohammed Akour, Izzat Alsmadi, and Iyad Alazzam
Collaboration Networks of Levantine Biomedical Researchers, Bassam Arkok, Mahmoud Al-Ayyoub, Yaser Jararweh, Izzat Alsmadi, and Elhadj Benkhelifa
Design of a Flexible Component Gathering Algorithm for Converting Cell-based Models to Graph Representations for Use in Evolutionary Search, Marianna Budnikova, Jeffrey W. Habig, Daniel Lobo, Nicolas Cornia, MIchael Levin, and Tim Andersen
Visualization of Off-Screen Data on Tablets Using Context-Providing Bar Graphs and Scatter Plots, Peter S. Games and Alark Joshi
Evaluation of String Constraint Solvers in the Context of Symbolic Execution, Scott Kausler and Elena Sherman
User-Defined Backtracking Criteria for Symbolic Execution, Scott Kausler and Elena Sherman
Social Network Analysis: A Means to Discovering the Tipping Point in Gaining Cooperation?, Susan Mason, Don Holley, Aaron Wells, Alark Joshi, Amit Jain, and Thomas Wuerzer
Homology Modeling and Molecular Docking for the Science Curriculum, Owen M. McDougal, Nic Cornia, Chris Mallory, Julia Thom Oxford, and Tim Andersen
High Precision and High Yield Fabrication of Dense Nanoparticle Arrays onto DNA Origami at Statistically Independent Binding Sites, Sadao Takabayashi, William P. Klein, Craig Onodera, Blake Rapp, Juan Flores-Estrada, Elias Lindau, Lejmarc Snowball, Joseph T. Sam, Jennifer E. Padilla, Jeunghoon Lee, William B. Knowlton, Elton Graugnard, Bernard Yurke, Wan Kuang, and William L. Hughes
Effectiveness of Automated Function Testing with Petri Nets: A Series of Controlled Experiments, Dianxiang Xu and Ning Shen
Automated Generation of Integration Test Sequences from Logical Contracts, Dianxiang Xu, Weifeng Xu, and Manghui Tu
Specification and Analysis of Attribute-Based Access Control Policies: An Overview, Dianxiang Xu and Yunpeng Zhang
Rule-Based Test Input Generation from Bytecode, Weifeng Xu, Tao Ding, and Dianxiang Xu
The Insecurity of Two Proxy Signcryption Schemes: Proxy Credential Forgery Attack and How to Prevent It, Jyh-Haw Yeh
P2P Email Encryption by An Identity-Based One-Way Group Key Agreement Protocol, Jyh-Haw Yeh, Fiona Zeng, and Thomas Long
The Evaluation of the Public Opinion - A Case Study: MERS-CoV Infection Virus in KSA, Anis Zarrad, Abdulaziz Aljaloud, and Izzat Alsmadi
Submissions from 2013
Adding Automatic Dependency Processing to Makefile-Based Build Systems with Amake, Jim Buffenbarger
DockoMatic 2.0: High Throughput Inverse Virtual Screening and Homology Modeling, Casey Bullock, Nic Cornia, Reed Jacob, Andrew Remm, Thomas Peavey, Ken Weekes, Chris Mallory, Julia T. Oxford, Owen M. McDougal, and Timothy L. Andersen
Improving Processor Efficiency by Statically Pipelining Instructions, Ian Finlayson, Brandon Davis, Peter Gavin, Gang-Ryung Uh, David Whalley, Magnus Själander, and Gary Tyson
Safeguarding Forensic DNA Reference Samples with Nullomer Barcodes, Jayita Goswami, Michael C. Davis, Tim Andersen, Abdelkrim Alileche, and Greg Hampikian
Enhanced DNA Sensing via Catalytic Aggregation of Gold Nanoparticles, Herbert M. Huttanus, Elton Graugnard, Bernard Yurke, William B. Knowlton, Wan Kuang, William L. Hughes, and Jeunghoon Lee
Multi-Level Parallelism for Incompressible Flow Computations on GPU Clusters, Dana A. Jacobsen and Inanc Senocak
Multiscaffold DNA Origami Nanoparticle Waveguides, William P. Klein, Charles N. Schmidt, Blake Rapp, Sadao Takabayashi, William B. Knowlton, Jeunghoon Lee, Bernard Yurke, William L. Hughes, Elton Graugnard, and Wan Kuang
Magnetomechanical Four-State Memory, Chad S. Watson, Courtney Hollar, Kimball Anderson, William B. Knowlton, and Peter Müllner
Submissions from 2012
Transformation Volume Strain in Ni-Mn-Ga Thin Films, I. R. Aseguinolaza, I. Reyes-Salazar, A. V. Svalov, K. Wilson, W. B. Knowlton, P. Müllner, J. M. Barandiárn, E. Villa, and V. A. Chernenko
Using Online Assessment and Practice to Achieve Better Retention and Placement in Precalculus and Calculus, Alex Feldman, Doug Bullock, and Janet Callahan
An Overview of Static Pipelining, Ian Finlayson, Gang-Ryung Uh, David Whalley, and Gary Tyson
RSVP: Remote Sensing Visualization Platform for Data Fusion, Vanessa Gertman, Peter Olsoy, Nancy Glenn, and Alark Joshi
DNA-Controlled Excitonic Switches, Elton Graugnard, Donald L. Kellis, Hieu Bui, Stephanie Barnes, Wan Kuang, Jeunghoon Lee, William L. Hughes, William Knowlton, and Bernard Yurke
Accessible High-Throughput Virtual Screening Molecular Docking Software for Students and Educators, Reed B. Jacob, Tim Andersen, and Owen M. McDougal
Visualizing Disease Incidence in the Context of Socioeconomic Factors, Jared Shenson and Alark Joshi
Auto(mobile): Mobile Visual Interfaces for the Road, Frederik Wiehr, Vidya Setlur, and Alark Joshi
Submissions from 2011
Proving the Efficacy of Complementary Inputs for Multilayer Neural Networks, T. L. Andersen
Improving Low Power Processor Efficiency with Static Pipelining, Ian Finlayson, Gang-Ryung Uh, David Whalley, and Gary Tyson
DockoMatic: Automated Peptide Analog Creation for High Throughput Virtual Screening, Reed B. Jacob, Casey W. Bullock, Tim Andersen, and Owen M. McDougal
Unified Framework for Development, Deployment and Robust Testing of Neuroimaging Algorithms, Alark Joshi, Dustin Scheinost, Hirohito Okuda, Dominique Belhachemi, Isabella Murphy, Lawrence H. Staib, and Xenophon Papademetris
Reliable Sensor-to-Sink Data Transfer with Duty Cycles for Wireless Sensor Networks, Sirisha Medidi, Vamsi Krishna Venkata Naga Nandanavanam, and Muralidhar Medidi
How Can We Help Faculty Balance Between Teaching and Scholarly Activities?, Cheryl Schrader, Seung Youn Chyung, William L. Hughes, Kotaro Sasaki, Teresa Cole, and John N. Chiasson
Cryogenic to Room Temperature Effects of NBTI in High-k PMOS Devices, Richard G. Southwick III, Shem T. Purnell, Carey M. Rappaport, Blake Rapp, Ryan J. Thompson, Shane K. Pugmire, Ben Kaczer, Tibor Grasser, and William B. Knowlton
An Interactive Simulation Tool for Complex Multilayer Dielectric Devices, Richard G. Southwick III, Aaron Sup, Amit Jain, and William B. Knowlton
A Physical Model of the Temperature Dependence of the Current Through SiO2/HfO2 Stacks, L. Vandelli, A. Padovani, L. Larcher, Richard G. Southwick III, William Knowlton, and Gennadi Bersuker
Extending Page Segmentation Algorithms for Mixed-Layout Document Processing, Amy Winder, Tim Andersen, and Elisa Barney Smith
Submissions from 2010
Programmable Periodicity of Quantum Dot Arrays with DNA Origami Nanotubes, Hieu Bui, Craig Onodera, Carson Kidwell, YerPeng Tan, Elton Graugnard, Wan Kuang, Jeunghoon Lee, William B. Knowlton, Bernard Yurke, and William L. Hughes
DockoMatic - Automated Ligand Creation and Docking, Casey W. Bullock, Reed B. Jacob, Owen M. McDougal, Greg Hampikian, and Tim Andersen
Recent Advances in High Density Area Array Interconnect Bonding for 3D Integration, J. M. Lannon, J.; C. Gregory; M. Lueck; A. Huffman; D. Temple; Amy J. Moll; and William B. Knowlton
Transformation Twinning of Ni–Mn–Ga Characterized with Temperature-Controlled Atomic Force Microscopy, Matthew Reinhold, Chad Watson, William Knowlton, and Peter Müllner
Limitations of Poole–Frenkel Conduction in Bilayer HfO2/SiO2 MOS Devices, Richard G. Southwick III, Justin Reed, Christopher Buu, Ross Butler, Gennadi Bersuker, and William B. Knowlton
Modeling Temperature Dependency (6-400K) of the Leakage Current Through the SiO2/High-K Stacks, L. Vandelli, A. Padovani, L. Larcher, Richard G. Southwick III, William B. Knowlton, and Gennadi Bersuker
Energy-Efficient k-Coverage for Wireless Sensor Networks with Variable Sensing Radii, Jiong Wang, Sirisha Medidi, and Muralidhar Medidi
2x1D Image Registration and Comparison, Geng Zheng, Elisa H. Barney Smith, Nader Rafla, and Tim Andersen
Submissions from 2009
Chip-Scale Nanophotonic Chemical and Biological Sensors Using CMOS Process, Lincoln Bollschweiler, Alex English, R. Jacob Baker, Wan Kuang, Zi-Chang Chang, Ming-Hsiung Shih, and William Knowlton
Enhanced Transmission in Plasmonic Crystals: Interactions of Cavity Resonance and Surface Mode, Wan Kuang, A. English, Z. C. Chang, Min-Hsiung Shih, William B. Knowlton, Jeunghoon Lee, William L. Hughes, and Bernard Yurke
Information Systems Development: Towards a Service Provision Society, George A. Papadopoulos, Gregory Wojtkowski, and Wita Wojtkowski
Characterizing Twin Structure and Magnetic Domain Structure of Ni-Mn-Ga Through Atomic Force Microscopy, Matthew Reinhold, William B. Knowlton, and Peter Müllner
Deformation Twinning in Ni–Mn–Ga Micropillars with 10M Martensite, M. Reinhold, D. Kiener, William B. Knowlton, G. Dehm, and Peter Müllner
On the Thermal Activation of Negative Bias Temperature Instability, Richard G. Southwick III, William B. Knowlton, Ben Kaczer, and Tibor Grasser
Efficient Construction of Perpendicular Vectors Without Branching, Michael M. Stark
Fast and Stable Conformal Mapping Between a Disc and a Square, Michael M. Stark
Enforcing Non-Hierarchical Access Policies by Hierarchical Key Assignment Schemes, Jyh-haw Yeh
Characterization of Collagenous Matrix Assembly in a Chondrocyte Model System, Sorcha Yingst, Kaci Bloxham, Lisa R. Warner, Raquel J. Brown, Jennifer Cole, Linda Kenoyer, William B. Knowlton, and Julia T. Oxford
Submissions from 2008
Training, Constraints, and High-Cycle Magneto-Mechanical Properties of Ni-Mn-Ga Magnetic Shape-Memory Alloys, Markus Chmielus, V. A. Chernenko, William B. Knowlton, G. Kostorz, and Peter Müllner
Impact of Single pMOSFET Dielectric Degradation on NAND Circuit Performance, D. Estrada, M. L. Ogas, R. G. Southwick III, P. M. Price, R. J. Baker, and W. B. Knowlton
Hardware/Software Codesign in a Compact Ion Mobility Spectrometer Sensor Systemfor Subsurface Contaminant Detection, Sin Ming Loo, Jonathan P. Cole, and Molly M. Gribb
Nanomechanics and Magnetic Structure of Orthorhombic Ni–Mn–Ga Martensite, Peter Müllner, Z. Clark, Linda Kenoyer, William B. Knowlton, and G. Kostorz
Submissions from 2007
Preprocessing Strategy for Effective Modulo Scheduling on Multi-Issue Digital Signal Processors, Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, and Yunheung Paek
On the Room Temperature Ferromagnetism of Zn1-xCrxO Thin Films Deposited by Reactive Co-Sputtering, K. M. Reddy, R. Benson, J. Hays, Aaron Thurber, M. H. Engelhard, V. Shutthanandan, R. Hanson, W. B. Knowlton, and A. Punnoose
Analyzing Dynamic Binary Instrumentation Overhead, Gang-Ryung Uh, Robert Cohn, Bharadwaj Yadavalli, Ramesh Peri, and Ravi Ayyagari
Submissions from 2006
Partitioning of the Degradation Space for OCR Training, Elisa H. Barney Smith and Tim Andersen
Instruction Re-Selection for Iterative Modulo Scheduling on High Performance Multi-Issue DSPs, Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, and Yunheung Paek
Stacked Dual Oxide MOS Energy Band Diagram Visual Representation Program, R. G. Southwick III and W. B. Knowlton
Submissions from 2005
Text Degradations and OCR Training, Elisa H. Barney Smith and Tim Andersen
A Study of Style Effects on OCR Errors in the MEDLINE Database, Penny Garrison, Diane Davis, Tim Andersen, and Elisa Barney Smith
Submissions from 2004
Code Optimizations for a VLIW-Style Network Processing Unit, Jinhwan Kim, Yunheung Paek, and Gang-Ryung Uh
Tuning the WCET of Embedded Applications, Wankang Zhao, Prasad Kulkarni, David Whalley, Christopher Healy, Frank Mueller, and Gang-Ryung Uh
Submissions from 2003
Features for Neural Net Based Region Identification of Newspaper Documents, Tim Andersen and Wei Zhang
Branch Elimination via Multi-Variable Condition Merging, William Kreahling, David Whalley, Mark Bailey, Xin Yuan, Gang-Ryung Uh, and Robert van Engelen
A System Model for Mobile Commerce, Chung-Wei Lee, Wen-Chen Hu, and Jyh-haw Yeh
Using Artificial Neural Networks to Identify Headings in Newspaper Documents, Wei Zhang and Tim Andersen
Submissions from 2002
Polymer Thickness Effects on Bosch Etch Profiles, C. J. D. Craigie, T. Sheehan, V. N. Johnson, S. L. Burkett, Amy J. Moll, and W. B. Knowlton
Experience with a Retargetable Compiler for a Commercial Network Processor, Jinhwan Kim, Sungjoon Jung, Yunheung Paek, and Gang-Ryung Uh
What Do You Do with a B.S. in Materials Science and Engineering?, Amy J. Moll and W. B. Knowlton
Efficient and Effective Branch Reordering Using Profile Data, Minghui Yang, Gang-Ryung Uh, and David B. Whalley
Submissions from 2001
Undergraduate Research Opportunities in Microelectronics at Boise State University, S. Burkett, J. Lusth, D. Russell, W. B. Knowlton, and S. Parke
Materials Science and Engineering at Boise State University: Responding to an Industrial Need, Amy J. Moll, William B. Knowlton, David E. Bunnell, and Susan L. Burkett
Submissions from 1999
A Branching/Merging Strategy for Parallel Software Development, Jim Buffenbarger and Kirk Gruell
Submissions from 1996
Interface Translation for Reuse of Assembly-Language Modules in a Two-Language Environment, James R. Buffenbarger
A Software Tool for Maintaining File and Macro Build Dependencies, Jim Buffenbarger
Submissions from 1995
Syntactic Software Merging, Jim Buffenbarger
Parallel Search in Matrices with Sorted Columns, Amit Jain