Submissions from 2018
Preface, Keith Brawner and Vasile Rus
Report on the 31st international florida artifcial intelligence research society conference (FLAIRS-31), Keith Brawner, Vasile Rus, Roman Barták, and Zdravko Markov
Big data framework for finding patterns in multi-market trading data, Daya Ram Budhathoki, Dipankar Dasgupta, and Pankaj Jain
Thermal Vein Signatures, DNA and EEG Brainprint in Biometric User Authentication, Carlos Cabrera, German Hernández, Luis Fernando Niño, and Dipankar Dasgupta
Android multimedia sharing application over NDN, Damian Coomes, Ashlesh Gawande, Nicholas Gordon, and Lan Wang
Multi-user permission strategy to access sensitive information, Dipankar Dasgupta, Arunava Roy, and Debasis Ghosh
Lightweight NFC protocol for privacy protection in mobile IoT, Kai Fan, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang
Genomic solutions to hospital-acquired bacterial infection identification, Max H. Garzon and Duy T. Pham
Long short term memory based models for negation handling in tutorial dialogues, Dipesh Gautam, Nabin Maharjan, Rajendra Banjade, Lasang Jimba Tamang, and Vasile Rus
Automated speech act categorization of chat utterances in virtual internships, Dipesh Gautam, Nabin Maharjan, Arthur C. Graesser, and Vasile Rus
Effects of Cyber-Attacks on the Energy Storage in a Hybrid Power System, Sagnika Ghosh, Mohd Hasan Ali, and Dipankar Dasgupta
Extension complexity of independent set polytopes, Mika Göös, Rahul Jain, and Thomas Watson
Randomized communication versus partition number, Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson
Deterministic communication vs. Partition number, Mika Göös, Toniann Pitassi, and Thomas Watson
The Landscape of Communication Complexity Classes, Mika Göös, Toniann Pitassi, and Thomas Watson
ElectronixTutor: an intelligent tutoring system with multiple learning resources for electronics, Arthur C. Graesser, Xiangen Hu, Benjamin D. Nye, Kurt VanLehn, Rohit Kumar, and Cristina Heffernan
Smart crowdsourcing based content review system (SCCRS): An approach to improve trustworthiness of online contents, Kishor Datta Gupta, Dipankar Dasgupta, and Sajib Sen
Robust Proximity Search for Balls Using Sublinear Space, Sariel Har-Peled and Nirman Kumar
CodeDeviant: Helping programmers detect edits that accidentally alter program behavior, Austin Z. Henley and Scott D. Fleming
CFar: A tool to increase communication, productivity, and review quality in collaborative code review, Austin Z. Henley, Kivanç Muşlu, Maria Christakis, Scott D. Fleming, and Christian Bird
Examining temporality in document classification, Xiaolei Huang and Michael J. Paul
Learning mixtures of MLNs, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal
APT: A practical tunneling architecture for routing scalability, Dan Jen, Michael Meisel, Daniel Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang
Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning, Naveen Kumar, Deepak Venugopal, Liangfei Qiu, and Subodha Kumar
Faster approximation algorithm for the k-Regret minimizing set and related problems, Nirman Kumar and Stavros Sintos
NDN Construction for Big Science: Lessons Learned from Establishing a Testbed, Huhnkuk Lim, Alexander Ni, Dabin Kim, Young Bae Ko, Susmit Shannigrahi, and Christos Papadopoulos
Automatic Chinese Multiple Choice Question Generation Using Mixed Similarity Strategy, Ming Liu, Vasile Rus, and Li Liu
Automatic Chinese character similarity measurement, Ming Liu, Vasile Rus, Yue Li, Chuqian Sheng, and Li Liu
Estimating urban traffic states using iterative refinement and Wardrop equilibria, Weizi Li, Meilei Jiang, Yaoyu Chen, and Ming C. Lin
Assessing free student answers in tutorial dialogues using LSTM models, Nabin Maharjan, Dipesh Gautam, and Vasile Rus
Discovering effective tutorial strategies in human tutorial sessions, Nabin Maharjan, Vasile Rus, and Dipesh Gautam
Secure live virtual machine migration through runtime monitors, Ahmed M. Mahfouz, Md Lutfar Rahman, and Sajjan G. Shiva
Educational system based on simulation and intelligent conversation, Nesreen Mejbri, Fathi Essalmi, and Vasile Rus
Tobacco and Antiretrovirals Modulate Transporter, Metabolic Enzyme, and Antioxidant Enzyme Expression and Function in Polarized Macrophages, Ying Mu, Benjamin J. Patters, Narasimha M. Midde, Hui He, Santosh Kumar, and Theodore J. Cory
Automated tunneling over IP land: Run NDN Anywhere, Arthi Padmanabhan, Lan Wang, and Lixia Zhang
Code4Brownies: An active learning solution for teaching programming and problem solving in the classroom, Vinhthuy Phan and Eric Hicks
Secure bootstrapping and access control in NDN-based smart home systems, Lei Pi and Lan Wang
Self-adaptive Evolutionary Algorithm for DNA Codeword Design, Jeisson Prieto, Elizabeth León, and Max H. Garzon
Scalable deep text comprehension for Cancer surveillance on high-performance computing, John X. Qiu, Hong Jun Yoon, Kshitij Srivastava, Thomas P. Watson, J. Blair Christian, and Arvind Ramanathan
Complexity of unordered CNF games, Md Lutfar Rahman and Thomas Watson
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities, Hao Ren, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin
A fuzzy decision support system for multifactor authentication, Arunava Roy and Dipankar Dasgupta
Named data networking strategies for improving large scientific data transfers, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
NDN-SCI for managing large scale genomics data, Susmit Shannigrahi, Chengyu Fan, Christos Papadopoulos, and Alex Feltus
Message from the STEP 2018 Workshop Chairs, Sajjan Shiva, Robin Poston, and Jong Seok Lee
DeepWalking: Enabling Smartphone-Based Walking Speed Estimation Using Deep Learning, Aawesh Shrestha and Myounggyu Won
Anonymous privacy-preserving task matching in crowdsourcing, Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, and Robert H. Deng
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng
On the robust power of morphogenetic systems for time bounded computation, Petr Sosík, Vladimír Smolka, Jan Drastík, Jaroslav Bradík, and Max Garzon
RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta
Forensic analysis of ransomware families using static and dynamic analysis, Kul Prasad Subedi, Daya Ram Budhathoki, and Dipankar Dasgupta
Leveraging known genomic variants to improve detection of variants, especially close-by Indels, Nam S. Vo and Vinhthuy Phan
A Secure Link State Routing Protocol for NDN, Lan Wang, Vince Lehman, A. K.M. Mahmudul Hoque, Beichuan Zhang, Yingdi Yu, and Lixia Zhang
Communication complexity of statistical distance, Thomas Watson
Communication complexity with small advantage, Thomas Watson
Quadratic simulations of Merlin–Arthur games, Thomas Watson
A review on V2V communication for traffic jam Management, Myounggyu Won
WiParkFind: Finding Empty Parking Slots Using WiFi, Myounggyu Won, Yunfan Zhang, Xiaozhu Jin, and Yongsoon Eun
A blockchain-based reputation system for data credibility assessment in vehicular networks, Zhe Yang, Kan Zheng, Kan Yang, and Victor C.M. Leung
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage, Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, and Xuemin Sherman Shen
Correlation Constraint Shortest Path over Large MultiRelation Graphs, Xiaofei Zhang and M. Tamer Özsu
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, and Dong Zheng
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, and Xiaodong Lin
Submissions from 2017
Efficient algorithms for k-regret minimizing sets, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Privacy-preserving proxy re-encryption with fine-grained access control, Payal Chaudhari, Manik Lal Das, and Dipankar Dasgupta
Automating WiFi Fingerprinting Based on Nano-Scale Unmanned Aerial Vehicles, Appala Chekuri and Myounggyu Won
Anonymous authentication and pseudonym-renewal for VANET in NDN, Muktadir Chowdhury, Ashlesh Gawande, and Lan Wang
Secure information sharing among autonomous vehicles in NDN, Muktadir Chowdhury, Ashlesh Gawande, and Lan Wang
Towards designing technology for classroom role-play, Amy Shannon Cook, Steven P. Dow, and Jessica Hammer
Self-assembled DC resistive circuits with self-controlled voltage-based growth, Russell Deaton, Rojoba Yasmin, Tyler Moore, and Max Garzon
Towards a universal genomic positioning system: Phylogenetics and species identification, Max H. Garzon and Sambriddhi Mainali
Towards reliable microarray analysis and design, Max Garzon and Sambriddhi Mainali
Modeling classifiers for virtual internships without participant data, Dipesh Gautam, Zachari Swiecki, David W. Shaffer, Arthur C. Graesser, and Vasile Rus
A look at router geolocation in public and commercial databases, Manaf Gharaibeh, Han Zhang, Anant Shah, Roya Ensafi, Bradley Huffaker, and Christos Papadopoulos
Randomized communication vs. partition number, Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson
Query-to-communication lifting for PNP, Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson
Query-to-communication lifting for BPP, Mika Goos, Toniann Pitassi, and Thomas Watson
Distributed genetic algorithm to big data clustering, Mustafa H. Hajeer and Dipankar Dasgupta
Toward principles for the design of navigation affordances in code editors: An empirical investigation, Austin Z. Henley, Scott D. Fleming, and Maria V. Luong
Examining patterns of influenza vaccination in social media, Xiaolei Huang, Michael C. Smith, Michael J. Paul, Dmytro Ryzhkov, Sandra C. Quinn, and David A. Broniatowski
Exploring Timelines of Confirmed Suicide Incidents Through Social Media, Xiaolei Huang, Linzi Xing, Jed R. Brubaker, and Michael J. Paul
Abstraction hierarchy in deep learning neural networks, Roman Ilin, Thomas Watson, and Robert Kozma
Adaptive blocked Gibbs sampling for inference in probabilistic graphical models, Mohammad Maminur Islam, Mohammad Khan Al Farabi, and Deepak Venugopal
PN Ranging Based on Noncommensurate Sampling: Zero-Bias Mitigation Methods, Xiaojun Jin, Ning Zhang, Kan Yang, Xuemin Shen, Zhaobin Xu, and Chaojie Zhang
On the minimum edge size for 2-colorability and realizability of hypergraphs by axis-parallel rectangles, Nirman Kumar
Genetic evolution of influenza H9N2 viruses isolated from various hosts in China from 1994 to 2013, Chong Li, Shuoguo Wang, Guoxia Bing, Robert A. Carter, Zejiang Wang, Jinliang Wang, Chenxi Wang, Lan Wang, Gang Wu, Robert G. Webster, Yongqiang Wang, Honglei Sun, Yipeng Sun, Jinhua Liu, and Juan Pu
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee, Kin Sum Liu, Tyler Mayer, Hao Tsung Yang, Esther Arkin, Jie Gao, and Mayank Goswami
Encoding and ranking similar Chinese characters, Ming Liu, Vasile Rus, Qiang Liao, and Li Liu
Automatic Chinese Factual Question Generation, Ming Liu, Vasile Rus, and Li Liu
Citywide Estimation of Traffic Dynamics via Sparse GPS Traces, Weizi Li, Dong Nie, David Wilkie, and Ming C. Lin
City-scale traffic animation using statistical learning and metamodel-based optimization, Weizi Li, David Wolinski, and Ming C. Lin
Automated assessment of open-ended student answers in tutorial dialogues using Gaussian Mixture Models, Nabin Maharjan, Rajendra Banjade, and Vasile Rus
A functional approach to scanner detection, Robert McAndrew, Manaf Gharaibeh, Haonan Wang, Stephen Hayne, and Christos Papadopoulos
Alterations in cellular pharmacokinetics and pharmacodynamics of elvitegravir in response to ethanol exposure in HIV-1 infected monocytic (U1) cells, Narasimha M. Midde, Namita Sinha, Pradeep B. Lukka, Bernd Meibohm, and Santosh Kumar
Activity-Aware Sensor Cycling for Human Activity Monitoring in Smart Homes, Homin Park, Seokhyun Hwang, Myounggyu Won, and Taejoon Park
Experimental Study on Low Power Wide Area Networks (LPWAN) for Mobile Internet of Things, Dhaval Patel and Myounggyu Won
An accurate and fast alignment-free method for profiling microbial communities, Diem Trang Pham, Shanshan Gao, and Vinhthuy Phan