Submissions from 2019
A concept map based assessment of free student answers in tutorial dialogues, Nabin Maharjan and Vasile Rus
Towards concept map based free student answer assessment, Nabin Maharjan and Vasile Rus
Generating labels for regression of subjective constructs using triplet embeddings, Karel Mundnich, Brandon M. Booth, Benjamin Girault, and Shrikanth Narayanan
Generating labels for regression of subjective constructs using triplet embeddings, Karel Mundnich, Brandon M. Booth, Benjamin Girault, and Shrikanth Narayanan
A survey on computational intelligence techniques in user identity management, Abhijit Kumar Nag and Dipankar Dasgupta
IcHET: Interactive visualization of cytoplasmic heteroplasmy, Vinhthuy Phan, Diem Trang Pham, Caroline Melton, Adam J. Ramsey, Bernie J. Daigle, and Jennifer R. Mandel
Malware Analytics: Review of Data Mining, Machine Learning and Big Data Perspectives, Subash Poudyal, Zahid Akhtar, Dipankar Dasgupta, and Kishor Datta Gupta
A Framework for Analyzing Ransomware using Machine Learning, Subash Poudyal, Kul Prasad Subedi, and Dipankar Dasgupta
Effect of doping concentration for the properties of Fe doped TiO2thin films applications, R. Rajeswari, D. Venugopal, A. Dhayal Raj, J. Arumugam, S. John Sundaram, and K. Kaviyarasu
Effect of doping concentration for the properties of Fe doped TiO2thin films applications, R. Rajeswari, D. Venugopal, A. Dhayal Raj, J. Arumugam, S. John Sundaram, and K. Kaviyarasu
Standardizing Unstructured Interaction Data in Adaptive Instructional Systems, Vasile Rus, Arthur C. Graesser, Xiangen Hu, and Jody L. Cockroft
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates, Debanjan Sadhya, Zahid Akhtar, and Dipankar Dasgupta
Peer feedback processes in the game industry, Joseph Seering, Ray Mayol, Erik Harpstead, Tianying Chen, Amy Cook, and Jessica Hammer
Publish-Subscribe communication in building management systems over named data networking, Wentao Shang, Ashlesh Gawande, Minsheng Zhang, Alexander Afanasyev, Jeffrey Burke, and Lan Wang
CoRuM: Collaborative runtime monitor framework for application security, Sajjan Shiva and Saikat Das
SybSub: Privacy-preserving expressive task subscription with sybil detection in crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng
Understanding when students are active-in-thinking through modeling-in-context, Zachari Swiecki, Andrew R. Ruis, Dipesh Gautam, Vasile Rus, and David Williamson Shaffer
Amplification with one NP oracle query, Thomas Watson
A ZPPNP[1] lifting theorem, Thomas Watson
DeepWiTraffic: Low cost WiFi-based traffic monitoring system using deep learning, Myounggyu Won, Sayan Sahu, and Kyung Joon Park
New generation model of word vector representation based on CBOW or skip-gram, Zeyu Xiong, Qiangqiang Shen, Yueshan Xiong, Yijie Wang, and Weizi Li
Enabling efficient and geometric range query with access control over encrypted spatial data, Guowen Xu, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin
Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities, Guowen Xu, Hongwei Li, Hao Ren, Kan Yang, and Robert H. Deng
Blockchain-based decentralized trust management in vehicular networks, Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C.M. Leung
Harmonic Circuit Self-Assembly in cTAM Models, Yan Yan, Max Garzon, and Russell Deaton
Self-Assembly of 2-D Resistive Electric Grids, Yan Yan, Max Garzon, and Russell Deaton
Improved logistic regression algorithm based on kernel density estimation for multi-classification with non-equilibrium samples, Yang Yu, Zeyu Xiong, Yueshan Xiong, and Weizi Li
Submissions from 2018
Range-max queries on uncertain data, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri
The future of distributed network research infrastructure, Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, and Prasad Calyam
Crowdsourcing Multi-Objective Recommendation System∗, Eiman Aldahari, Vivek Shandilya, and Sajjan Shiva
Efficient weight learning in high-dimensional untied MLNs, Khan Mohammad Al Farabi, Somdeb Sarkhel, and Deepak Venugopal
Quantifying security and privacy in Internet of Things solutions, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Poster: Towards a collaborative and retrospective understanding of security events with retro-future, Calvin Ardi, John Heidemann, Gina Fisk, Mike Fisk, and Christos Papadopoulos
Pooling word vector representations across models, Rajendra Banjade, Nabin Maharjan, Dipesh Gautam, Frank Adrasik, Arthur C. Graesser, and Vasile Rus
Fusing annotations with majority vote triplet embeddings, Brandon M. Booth, Karel Mundnich, and Shrikanth Narayanan
Fusing annotations with majority vote triplet embeddings, Brandon M. Booth, Karel Mundnich, and Shrikanth Narayanan
A Novel Method for Human Bias Correction of Continuous-Time Annotations, Brandon M. Booth, Karel Mundnich, and Shrikanth S. Narayanan
A Novel Method for Human Bias Correction of Continuous-Time Annotations, Brandon M. Booth, Karel Mundnich, and Shrikanth S. Narayanan
An Evaluation of EEG-based Metrics for Engagement Assessment of Distance Learners, Brandon M. Booth, Taylor J. Seamans, and Shrikanth S. Narayanan
An Evaluation of EEG-based Metrics for Engagement Assessment of Distance Learners, Brandon M. Booth, Taylor J. Seamans, and Shrikanth S. Narayanan
Preface, Keith Brawner and Vasile Rus
Report on the 31st international florida artifcial intelligence research society conference (FLAIRS-31), Keith Brawner, Vasile Rus, Roman Barták, and Zdravko Markov
Big data framework for finding patterns in multi-market trading data, Daya Ram Budhathoki, Dipankar Dasgupta, and Pankaj Jain
Thermal Vein Signatures, DNA and EEG Brainprint in Biometric User Authentication, Carlos Cabrera, German Hernández, Luis Fernando Niño, and Dipankar Dasgupta
Android multimedia sharing application over NDN, Damian Coomes, Ashlesh Gawande, Nicholas Gordon, and Lan Wang
Multi-user permission strategy to access sensitive information, Dipankar Dasgupta, Arunava Roy, and Debasis Ghosh
Lightweight NFC protocol for privacy protection in mobile IoT, Kai Fan, Chen Zhang, Kan Yang, Hui Li, and Yintang Yang
TILES audio recorder: An unobtrusive wearable solution to track audio activity, Tiantian Feng, Amrutha Nadarajan, Colin Vaz, Brandon Booth, and Shrikanth Narayanan
TILES audio recorder: An unobtrusive wearable solution to track audio activity, Tiantian Feng, Amrutha Nadarajan, Colin Vaz, Brandon Booth, and Shrikanth Narayanan
Genomic solutions to hospital-acquired bacterial infection identification, Max H. Garzon and Duy T. Pham
Long short term memory based models for negation handling in tutorial dialogues, Dipesh Gautam, Nabin Maharjan, Rajendra Banjade, Lasang Jimba Tamang, and Vasile Rus
Automated speech act categorization of chat utterances in virtual internships, Dipesh Gautam, Nabin Maharjan, Arthur C. Graesser, and Vasile Rus
Effects of Cyber-Attacks on the Energy Storage in a Hybrid Power System, Sagnika Ghosh, Mohd Hasan Ali, and Dipankar Dasgupta
Extension complexity of independent set polytopes, Mika Göös, Rahul Jain, and Thomas Watson
Randomized communication versus partition number, Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson
Deterministic communication vs. Partition number, Mika Göös, Toniann Pitassi, and Thomas Watson
The Landscape of Communication Complexity Classes, Mika Göös, Toniann Pitassi, and Thomas Watson
ElectronixTutor: an intelligent tutoring system with multiple learning resources for electronics, Arthur C. Graesser, Xiangen Hu, Benjamin D. Nye, Kurt VanLehn, Rohit Kumar, and Cristina Heffernan
Smart crowdsourcing based content review system (SCCRS): An approach to improve trustworthiness of online contents, Kishor Datta Gupta, Dipankar Dasgupta, and Sajib Sen
Robust Proximity Search for Balls Using Sublinear Space, Sariel Har-Peled and Nirman Kumar
CodeDeviant: Helping programmers detect edits that accidentally alter program behavior, Austin Z. Henley and Scott D. Fleming
CFar: A tool to increase communication, productivity, and review quality in collaborative code review, Austin Z. Henley, Kivanç Muşlu, Maria Christakis, Scott D. Fleming, and Christian Bird
Examining temporality in document classification, Xiaolei Huang and Michael J. Paul
Learning mixtures of MLNs, Mohammad Maminur Islam, Somdeb Sarkhel, and Deepak Venugopal
APT: A practical tunneling architecture for routing scalability, Dan Jen, Michael Meisel, Daniel Massey, Lan Wang, Beichuan Zhang, and Lixia Zhang
Detecting Review Manipulation on Online Platforms with Hierarchical Supervised Learning, Naveen Kumar, Deepak Venugopal, Liangfei Qiu, and Subodha Kumar
Faster approximation algorithm for the k-Regret minimizing set and related problems, Nirman Kumar and Stavros Sintos
NDN Construction for Big Science: Lessons Learned from Establishing a Testbed, Huhnkuk Lim, Alexander Ni, Dabin Kim, Young Bae Ko, Susmit Shannigrahi, and Christos Papadopoulos
Automatic Chinese Multiple Choice Question Generation Using Mixed Similarity Strategy, Ming Liu, Vasile Rus, and Li Liu
Automatic Chinese character similarity measurement, Ming Liu, Vasile Rus, Yue Li, Chuqian Sheng, and Li Liu
Estimating urban traffic states using iterative refinement and Wardrop equilibria, Weizi Li, Meilei Jiang, Yaoyu Chen, and Ming C. Lin
Assessing free student answers in tutorial dialogues using LSTM models, Nabin Maharjan, Dipesh Gautam, and Vasile Rus
A Tutorial Markov Analysis of Effective Human Tutorial Sessions, Nabin Maharjan and Vasile Rus
A Tutorial Markov Analysis of Effective Human Tutorial Sessions, Nabin Maharjan and Vasile Rus
Discovering effective tutorial strategies in human tutorial sessions, Nabin Maharjan, Vasile Rus, and Dipesh Gautam
Secure live virtual machine migration through runtime monitors, Ahmed M. Mahfouz, Md Lutfar Rahman, and Sajjan G. Shiva
Educational system based on simulation and intelligent conversation, Nesreen Mejbri, Fathi Essalmi, and Vasile Rus
Tobacco and Antiretrovirals Modulate Transporter, Metabolic Enzyme, and Antioxidant Enzyme Expression and Function in Polarized Macrophages, Ying Mu, Benjamin J. Patters, Narasimha M. Midde, Hui He, Santosh Kumar, and Theodore J. Cory
Automated tunneling over IP land: Run NDN Anywhere, Arthi Padmanabhan, Lan Wang, and Lixia Zhang
Code4Brownies: An active learning solution for teaching programming and problem solving in the classroom, Vinhthuy Phan and Eric Hicks
Secure bootstrapping and access control in NDN-based smart home systems, Lei Pi and Lan Wang
Self-adaptive Evolutionary Algorithm for DNA Codeword Design, Jeisson Prieto, Elizabeth León, and Max H. Garzon
Scalable deep text comprehension for Cancer surveillance on high-performance computing, John X. Qiu, Hong Jun Yoon, Kshitij Srivastava, Thomas P. Watson, J. Blair Christian, and Arvind Ramanathan
Complexity of unordered CNF games, Md Lutfar Rahman and Thomas Watson
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities, Hao Ren, Hongwei Li, Yuanshun Dai, Kan Yang, and Xiaodong Lin
A fuzzy decision support system for multifactor authentication, Arunava Roy and Dipankar Dasgupta
Named data networking strategies for improving large scientific data transfers, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
Scari: A strategic caching and reservation protocol for ICN, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
NDN-SCI for managing large scale genomics data, Susmit Shannigrahi, Chengyu Fan, Christos Papadopoulos, and Alex Feltus
Message from the STEP 2018 Workshop Chairs, Sajjan Shiva, Robin Poston, and Jong Seok Lee
DeepWalking: Enabling Smartphone-Based Walking Speed Estimation Using Deep Learning, Aawesh Shrestha and Myounggyu Won
Anonymous privacy-preserving task matching in crowdsourcing, Jiangang Shu, Ximeng Liu, Xiaohua Jia, Kan Yang, and Robert H. Deng
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing, Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, and Robert H. Deng
On the robust power of morphogenetic systems for time bounded computation, Petr Sosík, Vladimír Smolka, Jan Drastík, Jaroslav Bradík, and Max Garzon
RDS3: Ransomware defense strategy by using stealthily spare space, Kul Prasad Subedi, Daya Ram Budhathoki, Bo Chen, and Dipankar Dasgupta
Forensic analysis of ransomware families using static and dynamic analysis, Kul Prasad Subedi, Daya Ram Budhathoki, and Dipankar Dasgupta
Observation of paramorphic phenomenon and non-tilted orthogonal smectic phases in hydrogen bonded ferroelectric liquid crystals for photonic applications, P. Subhasri, D. Venugopal, R. Jayaprakasam, T. Chitravel, and V. N. Vijayakumar
Observation of paramorphic phenomenon and non-tilted orthogonal smectic phases in hydrogen bonded ferroelectric liquid crystals for photonic applications, P. Subhasri, D. Venugopal, R. Jayaprakasam, T. Chitravel, and V. N. Vijayakumar
Leveraging known genomic variants to improve detection of variants, especially close-by Indels, Nam S. Vo and Vinhthuy Phan