Follow

Submissions from 2019

Link

A concept map based assessment of free student answers in tutorial dialogues, Nabin Maharjan and Vasile Rus

Towards concept map based free student answer assessment, Nabin Maharjan and Vasile Rus

Link

Generating labels for regression of subjective constructs using triplet embeddings, Karel Mundnich, Brandon M. Booth, Benjamin Girault, and Shrikanth Narayanan

Link

Generating labels for regression of subjective constructs using triplet embeddings, Karel Mundnich, Brandon M. Booth, Benjamin Girault, and Shrikanth Narayanan

A survey on computational intelligence techniques in user identity management, Abhijit Kumar Nag and Dipankar Dasgupta

Link

IcHET: Interactive visualization of cytoplasmic heteroplasmy, Vinhthuy Phan, Diem Trang Pham, Caroline Melton, Adam J. Ramsey, Bernie J. Daigle, and Jennifer R. Mandel

Link

Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives, Subash Poudyal, Zahid Akhtar, Dipankar Dasgupta, and Kishor Datta Gupta

Link

A Framework for Analyzing Ransomware using Machine Learning, Subash Poudyal, Kul Prasad Subedi, and Dipankar Dasgupta

Link

Effect of doping concentration for the properties of Fe doped TiO2thin films applications, R. Rajeswari, D. Venugopal, A. Dhayal Raj, J. Arumugam, S. John Sundaram, and K. Kaviyarasu

Link

Effect of doping concentration for the properties of Fe doped TiO2thin films applications, R. Rajeswari, D. Venugopal, A. Dhayal Raj, J. Arumugam, S. John Sundaram, and K. Kaviyarasu

Link

Standardizing Unstructured Interaction Data in Adaptive Instructional Systems, Vasile Rus, Arthur C. Graesser, Xiangen Hu, and Jody L. Cockroft

Link

A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates, Debanjan Sadhya, Zahid Akhtar, and Dipankar Dasgupta

Link

Peer feedback processes in the game industry, Joseph Seering, Ray Mayol, Erik Harpstead, Tianying Chen, Amy Cook, and Jessica Hammer

Link

Publish-Subscribe communication in building management systems over named data networking, Wentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev, Jeffrey Burke, and Lan Wang

Link

CoRuM: Collaborative runtime monitor framework for application security, Sajjan Shiva and Saikat Das

Link

SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng

Link

Understanding when students are active-in-thinking through modeling-in-context, Zachari Swiecki, Andrew R. Ruis, Dipesh Gautam, Vasile Rus, and David Williamson Shaffer

Link

Amplification with one NP oracle query, Thomas Watson

Link

A ZPPNP[1] lifting theorem, Thomas Watson

Link

DeepWiTraffic: Low cost WiFi-based traffic monitoring system using deep learning, Myounggyu Won, Sayan Sahu, and Kyung Joon Park

Link

New generation model of word vector representation based on CBOW or skip-gram, Zeyu Xiong, Qiangqiang Shen, Yueshan Xiong, Yijie Wang, and Weizi Li

Link

Enabling efficient and geometric range query with access control over encrypted spatial data, Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin

Link

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, and Robert H. Deng

Link

Blockchain-based decentralized trust management in vehicular networks, Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C.M. Leung

Link

Harmonic Circuit Self-Assembly in cTAM Models, Yan Yan, Max Garzon, and Russell Deaton

Link

Self-Assembly of 2-D Resistive Electric Grids, Yan Yan, Max Garzon, and Russell Deaton

Link

Improved logistic regression algorithm based on kernel density estimation for multi-classification with non-equilibrium samples, Yang Yu, Zeyu Xiong, Yueshan Xiong, and Weizi Li

Submissions from 2018

Link

Range-max queries on uncertain data, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri

Link

The future of distributed network research infrastructure, Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, and Prasad Calyam

Link

Crowdsourcing Multi-Objective Recommendation System∗, Eiman Aldahari, Vivek Shandilya, and Sajjan Shiva

Efficient weight learning in high-dimensional untied MLNs, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal

Link

Quantifying security and privacy in Internet of Things solutions, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva

Link

Poster: Towards a collaborative and retrospective understanding of security events with retro-future, Calvin Ardi, John Heidemann, Gina Fisk, Mike Fisk, and Christos Papadopoulos

Link

Pooling word vector representations across models, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, Frank Adrasik, Arthur C. Graesser, and Vasile Rus

Link

Fusing annotations with majority vote triplet embeddings, Brandon M. Booth, Karel Mundnich, and Shrikanth Narayanan

Link

Fusing annotations with majority vote triplet embeddings, Brandon M. Booth, Karel Mundnich, and Shrikanth Narayanan

Link

A Novel Method for Human Bias Correction of Continuous-Time Annotations, Brandon M. Booth, Karel Mundnich, and Shrikanth S. Narayanan

Link

A Novel Method for Human Bias Correction of Continuous-Time Annotations, Brandon M. Booth, Karel Mundnich, and Shrikanth S. Narayanan

Link

An Evaluation of EEG-based Metrics for Engagement Assessment of Distance Learners, Brandon M. Booth, Taylor J. Seamans, and Shrikanth S. Narayanan

Link

An Evaluation of EEG-based Metrics for Engagement Assessment of Distance Learners, Brandon M. Booth, Taylor J. Seamans, and Shrikanth S. Narayanan

Preface, Keith Brawner and Vasile Rus

Link

Report on the 31st international florida artifcial intelligence research society conference (FLAIRS-31), Keith Brawner, Vasile Rus, Roman Barták, and Zdravko Markov

Link

Big data framework for finding patterns in multi-market trading data, Daya Ram Budhathoki, Dipankar Dasgupta, and Pankaj Jain

Link

Thermal Vein Signatures, DNA and EEG Brainprint in Biometric User Authentication, Carlos Cabrera, German Hernández, Luis Fernando Niño, and Dipankar Dasgupta

Link

Android multimedia sharing application over NDN, Damian Coomes, Ashlesh Gawande, Nicholas Gordon, and Lan Wang

Link

Multi-user permission strategy to access sensitive information, Dipankar Dasgupta, Arunava Roy, and Debasis Ghosh

Link

Lightweight NFC protocol for privacy protection in mobile IoT, Kai Fan, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang

Link

TILES audio recorder: An unobtrusive wearable solution to track audio activity, Tiantian Feng, Amrutha Nadarajan, Colin Vaz, Brandon Booth, and Shrikanth Narayanan

Link

TILES audio recorder: An unobtrusive wearable solution to track audio activity, Tiantian Feng, Amrutha Nadarajan, Colin Vaz, Brandon Booth, and Shrikanth Narayanan

Link

Genomic solutions to hospital-acquired bacterial infection identification, Max H. Garzon and Duy T. Pham

Long short term memory based models for negation handling in tutorial dialogues, Dipesh Gautam, Nabin Maharjan, Rajendra Banjade, Lasang Jimba Tamang, and Vasile Rus

Automated speech act categorization of chat utterances in virtual internships, Dipesh Gautam, Nabin Maharjan, Arthur C. Graesser, and Vasile Rus

Link

Effects of Cyber-Attacks on the Energy Storage in a Hybrid Power System, Sagnika Ghosh, Mohd Hasan Ali, and Dipankar Dasgupta

Link

Extension complexity of independent set polytopes, Mika Göös, Rahul Jain, and Thomas Watson

Link

Randomized communication versus partition number, Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson

Link

Deterministic communication vs. Partition number, Mika Göös, Toniann Pitassi, and Thomas Watson

Link

The Landscape of Communication Complexity Classes, Mika Göös, Toniann Pitassi, and Thomas Watson

Link

ElectronixTutor: an intelligent tutoring system with multiple learning resources for electronics, Arthur C. Graesser, Xiangen Hu, Benjamin D. Nye, Kurt VanLehn, Rohit Kumar, and Cristina Heffernan

Link

Smart crowdsourcing based content review system (SCCRS): An approach to improve trustworthiness of online contents, Kishor Datta Gupta, Dipankar Dasgupta, and Sajib Sen

Link

Robust Proximity Search for Balls Using Sublinear Space, Sariel Har-Peled and Nirman Kumar

Link

CodeDeviant: Helping programmers detect edits that accidentally alter program behavior, Austin Z. Henley and Scott D. Fleming

Link

CFar: A tool to increase communication, productivity, and review quality in collaborative code review, Austin Z. Henley, Kivanç Muşlu, Maria Christakis, Scott D. Fleming, and Christian Bird

Link

Examining temporality in document classification, Xiaolei Huang and Michael J. Paul

Learning mixtures of MLNs, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal

Link

APT: A practical tunneling architecture for routing scalability, Dan Jen, Michael Meisel, Daniel Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang

Link

Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning, Naveen Kumar, Deepak Venugopal, Liangfei Qiu, and Subodha Kumar

Link

Faster approximation algorithm for the k-Regret minimizing set and related problems, Nirman Kumar and Stavros Sintos

Link

NDN Construction for Big Science: Lessons Learned from Establishing a Testbed, Huhnkuk Lim, Alexander Ni, Dabin Kim, Young Bae Ko, Susmit Shannigrahi, and Christos Papadopoulos

Link

Automatic Chinese Multiple Choice Question Generation Using Mixed Similarity Strategy, Ming Liu, Vasile Rus, and Li Liu

Link

Automatic Chinese character similarity measurement, Ming Liu, Vasile Rus, Yue Li, Chuqian Sheng, and Li Liu

Link

Estimating urban traffic states using iterative refinement and Wardrop equilibria, Weizi Li, Meilei Jiang, Yaoyu Chen, and Ming C. Lin

Link

Assessing free student answers in tutorial dialogues using LSTM models, Nabin Maharjan, Dipesh Gautam, and Vasile Rus

Link

A Tutorial Markov Analysis of Effective Human Tutorial Sessions, Nabin Maharjan and Vasile Rus

Link

A Tutorial Markov Analysis of Effective Human Tutorial Sessions, Nabin Maharjan and Vasile Rus

Discovering effective tutorial strategies in human tutorial sessions, Nabin Maharjan, Vasile Rus, and Dipesh Gautam

Link

Secure live virtual machine migration through runtime monitors, Ahmed M. Mahfouz, Md Lutfar Rahman, and Sajjan G. Shiva

Link

Educational system based on simulation and intelligent conversation, Nesreen Mejbri, Fathi Essalmi, and Vasile Rus

Link

Tobacco and Antiretrovirals Modulate Transporter, Metabolic Enzyme, and Antioxidant Enzyme Expression and Function in Polarized Macrophages, Ying Mu, Benjamin J. Patters, Narasimha M. Midde, Hui He, Santosh Kumar, and Theodore J. Cory

Link

Automated tunneling over IP land: Run NDN Anywhere, Arthi Padmanabhan, Lan Wang, and Lixia Zhang

Link

Code4Brownies: An active learning solution for teaching programming and problem solving in the classroom, Vinhthuy Phan and Eric Hicks

Link

Secure bootstrapping and access control in NDN-based smart home systems, Lei Pi and Lan Wang

Link

Self-adaptive Evolutionary Algorithm for DNA Codeword Design, Jeisson Prieto, Elizabeth León, and Max H. Garzon

Link

Scalable deep text comprehension for Cancer surveillance on high-performance computing, John X. Qiu, Hong Jun Yoon, Kshitij Srivastava, Thomas P. Watson, J. Blair Christian, and Arvind Ramanathan

Link

Complexity of unordered CNF games, Md Lutfar Rahman and Thomas Watson

Link

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities, Hao Ren, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin

Link

A fuzzy decision support system for multifactor authentication, Arunava Roy and Dipankar Dasgupta

Link

Named data networking strategies for improving large scientific data transfers, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos

Link

Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos

Link

Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos

Link

NDN-SCI for managing large scale genomics data, Susmit Shannigrahi, Chengyu Fan, Christos Papadopoulos, and Alex Feltus

Link

Message from the STEP 2018 Workshop Chairs, Sajjan Shiva, Robin Poston, and Jong Seok Lee

Link

DeepWalking: Enabling Smartphone-Based Walking Speed Estimation Using Deep Learning, Aawesh Shrestha and Myounggyu Won

Link

Anonymous privacy-preserving task matching in crowdsourcing, Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, and Robert H. Deng

Link

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng

Link

On the robust power of morphogenetic systems for time bounded computation, Petr Sosík, Vladimír Smolka, Jan Drastík, Jaroslav Bradík, and Max Garzon

Link

RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta

Link

Forensic analysis of ransomware families using static and dynamic analysis, Kul Prasad Subedi, Daya Ram Budhathoki, and Dipankar Dasgupta

Link

Observation of paramorphic phenomenon and non-tilted orthogonal smectic phases in hydrogen bonded ferroelectric liquid crystals for photonic applications, P. Subhasri, D. Venugopal, R. Jayaprakasam, T. Chitravel, and V. N. Vijayakumar

Link

Observation of paramorphic phenomenon and non-tilted orthogonal smectic phases in hydrogen bonded ferroelectric liquid crystals for photonic applications, P. Subhasri, D. Venugopal, R. Jayaprakasam, T. Chitravel, and V. N. Vijayakumar

Link

Leveraging known genomic variants to improve detection of variants, especially close-by Indels, Nam S. Vo and Vinhthuy Phan