Submissions from 2018
A Secure Link State Routing Protocol for NDN, Lan Wang, Vince Lehman, A. K.M. Mahmudul Hoque, Beichuan Zhang, Yingdi Yu, and Lixia Zhang
Communication complexity of statistical distance, Thomas Watson
Communication complexity with small advantage, Thomas Watson
Quadratic simulations of Merlin–Arthur games, Thomas Watson
A review on V2V communication for traffic jam Management, Myounggyu Won
WiParkFind: Finding Empty Parking Slots Using WiFi, Myounggyu Won, Yunfan Zhang, Xiaozhu Jin, and Yongsoon Eun
A blockchain-based reputation system for data credibility assessment in vehicular networks, Zhe Yang, Kan Zheng, Kan Yang, and Victor C.M. Leung
Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage, Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, and Xuemin Sherman Shen
Correlation Constraint Shortest Path over Large MultiRelation Graphs, Xiaofei Zhang and M. Tamer Özsu
TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain, Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, and Dong Zheng
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems, Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, and Xiaodong Lin
Submissions from 2017
Efficient algorithms for k-regret minimizing sets, Pankaj K. Agarwal, Nirman Kumar, Stavros Sintos, and Subhash Suri
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment, Faisal Alsubaei, Abdullah Abuhussein, and Sajjan Shiva
Toward active and unobtrusive engagement assessment of distance learners, Brandon M. Booth, Asem M. Ali, Shrikanth S. Narayanan, Ian Bennett, and Aly A. Farag
Toward active and unobtrusive engagement assessment of distance learners, Brandon M. Booth, Asem M. Ali, Shrikanth S. Narayanan, Ian Bennett, and Aly A. Farag
Privacy-preserving proxy re-encryption with fine-grained access control, Payal Chaudhari, Manik Lal Das, and Dipankar Dasgupta
Automating WiFi Fingerprinting Based on Nano-Scale Unmanned Aerial Vehicles, Appala Chekuri and Myounggyu Won
Anonymous authentication and pseudonym-renewal for VANET in NDN, Muktadir Chowdhury, Ashlesh Gawande, and Lan Wang
Secure information sharing among autonomous vehicles in NDN, Muktadir Chowdhury, Ashlesh Gawande, and Lan Wang
Towards designing technology for classroom role-play, Amy Shannon Cook, Steven P. Dow, and Jessica Hammer
Self-assembled DC resistive circuits with self-controlled voltage-based growth, Russell Deaton, Rojoba Yasmin, Tyler Moore, and Max Garzon
A new direction for biosensing: RF sensors for monitoring cardio-pulmonary function, Ju Gao, Siddharth Baskar, Diyan Teng, Mustafa al'Absi, Santosh Kumar, and Emre Ertin
A new direction for biosensing: RF sensors for monitoring cardio-pulmonary function, Ju Gao, Siddharth Baskar, Diyan Teng, Mustafa al'Absi, Santosh Kumar, and Emre Ertin
Towards a universal genomic positioning system: Phylogenetics and species identification, Max H. Garzon and Sambriddhi Mainali
Towards reliable microarray analysis and design, Max Garzon and Sambriddhi Mainali
Modeling classifiers for virtual internships without participant data, Dipesh Gautam, Zachari Swiecki, David W. Shaffer, Arthur C. Graesser, and Vasile Rus
A look at router geolocation in public and commercial databases, Manaf Gharaibeh, Han Zhang, Anant Shah, Roya Ensafi, Bradley Huffaker, and Christos Papadopoulos
Randomized communication vs. partition number, Mika Göös, T. S. Jayram, Toniann Pitassi, and Thomas Watson
Query-to-communication lifting for PNP, Mika Göös, Pritish Kamath, Toniann Pitassi, and Thomas Watson
Query-to-communication lifting for BPP, Mika Goos, Toniann Pitassi, and Thomas Watson
Distributed genetic algorithm to big data clustering, Mustafa H. Hajeer and Dipankar Dasgupta
Toward principles for the design of navigation affordances in code editors: An empirical investigation, Austin Z. Henley, Scott D. Fleming, and Maria V. Luong
Examining patterns of influenza vaccination in social media, Xiaolei Huang, Michael C. Smith, Michael J. Paul, Dmytro Ryzhkov, Sandra C. Quinn, and David A. Broniatowski
Exploring Timelines of Confirmed Suicide Incidents Through Social Media, Xiaolei Huang, Linzi Xing, Jed R. Brubaker, and Michael J. Paul
Abstraction hierarchy in deep learning neural networks, Roman Ilin, Thomas Watson, and Robert Kozma
Adaptive blocked Gibbs sampling for inference in probabilistic graphical models, Mohammad Maminur Islam, Mohammad Khan Al Farabi, and Deepak Venugopal
PN Ranging Based on Noncommensurate Sampling: Zero-Bias Mitigation Methods, Xiaojun Jin, Ning Zhang, Kan Yang, Xuemin Shen, Zhaobin Xu, and Chaojie Zhang
On the minimum edge size for 2-colorability and realizability of hypergraphs by axis-parallel rectangles, Nirman Kumar
Introduction to part II: Sensors to mHealth markers, Santosh Kumar, James M. Rehg, and Susan A. Murphy
Introduction to part II: Sensors to mHealth markers, Santosh Kumar, James M. Rehg, and Susan A. Murphy
Introduction to part I: MHealth applications and tools, Santosh Kumar, James M. Rehg, and Susan A. Murphy
Introduction to part I: MHealth applications and tools, Santosh Kumar, James M. Rehg, and Susan A. Murphy
Genetic evolution of influenza H9N2 viruses isolated from various hosts in China from 1994 to 2013, Chong Li, Shuoguo Wang, Guoxia Bing, Robert A. Carter, Zejiang Wang, Jinliang Wang, Chenxi Wang, Lan Wang, Gang Wu, Robert G. Webster, Yongqiang Wang, Honglei Sun, Yipeng Sun, Jinhua Liu, and Juan Pu
Joint sensing duty cycle scheduling for heterogeneous coverage guarantee, Kin Sum Liu, Tyler Mayer, Hao Tsung Yang, Esther Arkin, Jie Gao, and Mayank Goswami
Encoding and ranking similar Chinese characters, Ming Liu, Vasile Rus, Qiang Liao, and Li Liu
Automatic Chinese Factual Question Generation, Ming Liu, Vasile Rus, and Li Liu
Citywide Estimation of Traffic Dynamics via Sparse GPS Traces, Weizi Li, Dong Nie, David Wilkie, and Ming C. Lin
City-scale traffic animation using statistical learning and metamodel-based optimization, Weizi Li, David Wolinski, and Ming C. Lin
DT Team at SemEval-2017 Task 1: Semantic Similarity Using Alignments, Sentence-Level Embeddings and Gaussian Mixture Model Output, Nabin Maharjan, Rajendra Banjade, Dipesh Gautam, Lasang J. Tamang, and Vasile Rus
DT Team at SemEval-2017 Task 1: Semantic Similarity Using Alignments, Sentence-Level Embeddings and Gaussian Mixture Model Output, Nabin Maharjan, Rajendra Banjade, Dipesh Gautam, Lasang J. Tamang, and Vasile Rus
Automated assessment of open-ended student answers in tutorial dialogues using Gaussian Mixture Models, Nabin Maharjan, Rajendra Banjade, and Vasile Rus
A functional approach to scanner detection, Robert McAndrew, Manaf Gharaibeh, Haonan Wang, Stephen Hayne, and Christos Papadopoulos
Alterations in cellular pharmacokinetics and pharmacodynamics of elvitegravir in response to ethanol exposure in HIV-1 infected monocytic (U1) cells, Narasimha M. Midde, Namita Sinha, Pradeep B. Lukka, Bernd Meibohm, and Santosh Kumar
Modeling opportunities in mHealth cyber-physical systems, Wendy Nilsen, Emre Ertin, Eric B. Hekler, Santosh Kumar, Insup Lee, Rahul Mangharam, Misha Pavel, James M. Rehg, William Riley, Daniel E. Rivera, and Donna Spruijt-Metz
Modeling opportunities in mHealth cyber-physical systems, Wendy Nilsen, Emre Ertin, Eric B. Hekler, Santosh Kumar, Insup Lee, Rahul Mangharam, Misha Pavel, James M. Rehg, William Riley, Daniel E. Rivera, and Donna Spruijt-Metz
Activity-Aware Sensor Cycling for Human Activity Monitoring in Smart Homes, Homin Park, Seokhyun Hwang, Myounggyu Won, and Taejoon Park
Experimental Study on Low Power Wide Area Networks (LPWAN) for Mobile Internet of Things, Dhaval Patel and Myounggyu Won
An accurate and fast alignment-free method for profiling microbial communities, Diem Trang Pham, Shanshan Gao, and Vinhthuy Phan
mDebugger: Assessing and diagnosing the fidelity and yield of mobile sensor data, Mahbubur M. Rahman, Nasir Ali, Rummana Bari, Nazir Saleheen, Mustafa al'Absi, Emre Ertin, Ashley Kennedy, Kenzie L. Preston, and Santosh Kumar
mDebugger: Assessing and diagnosing the fidelity and yield of mobile sensor data, Mahbubur M. Rahman, Nasir Ali, Rummana Bari, Nazir Saleheen, Mustafa al'Absi, Emre Ertin, Ashley Kennedy, Kenzie L. Preston, and Santosh Kumar
Introduction to part III: Markers to mHealth predictors, James M. Rehg, Susan A. Murphy, and Santosh Kumar
Introduction to part III: Markers to mHealth predictors, James M. Rehg, Susan A. Murphy, and Santosh Kumar
Mobile health: Sensors, analytic methods, and applications, James M. Rehg, Susan A. Murphy, and Santosh Kumar
Mobile health: Sensors, analytic methods, and applications, James M. Rehg, Susan A. Murphy, and Santosh Kumar
Preface, James M. Rehg, Susan A. Murphy, and Santosh Kumar
Preface, James M. Rehg, Susan A. Murphy, and Santosh Kumar
A study on two hint-level policies in conversational intelligent tutoring systems, Vasile Rus, Rajendra Banjade, Nobal Niraula, Elizabeth Gire, and Donald Franceschetti
Markov analysis of students' professional skills in virtual internships, Vasile Rus, Dipesh Gautam, Dale Bowman, Arthur C. Graesser, and David Shaeffer
Dialogue act classification in human-to-human tutorial dialogues, Vasile Rus, Nabin Maharjan, and Rajendra Banjade
An analysis of human tutors' actions in tutorial dialogues, Vasile Rus, Nabin Maharjan, Lasang Jimba Tamang, Michael Yudelson, Susan Berman, and Stephen E. Fancsali
Preface, Vasile Rus and Zdravko Markov
Report on the 30th International Florida Artificial Intelligence Research Society Conference (FLAIRS-30), Vasile Rus, Zdravko Markov, and Ingrid Russell
From markers to interventions: The case of just-in-time stress intervention, Hillol Sarker, Karen Hovsepian, Soujanya Chatterjee, Inbal Nahum-Shani, Susan A. Murphy, Bonnie Spring, Emre Ertin, Mustafa al'Absi, Motohiro Nakajima, and Santosh Kumar
From markers to interventions: The case of just-in-time stress intervention, Hillol Sarker, Karen Hovsepian, Soujanya Chatterjee, Inbal Nahum-Shani, Susan A. Murphy, Bonnie Spring, Emre Ertin, Mustafa al'Absi, Motohiro Nakajima, and Santosh Kumar
Efficient inference for untied MLNs, Somdeb Sarkhel, Deepak Venugopal, Nicholas Ruozzi, and Vibhav Gogate
Privacy and security issues in mobile health: Current research and future directions, Soumitra S. Bhuyan, Hyunmin Kim, Oluwaseyi O. Isehunwa, Naveen Kumar, Jay Bhatt, and David K. Wyant
Near loop-free routing: Increasing path choices with stateful forwarding, Klaus Schneider, Beichuan Zhang, Lan Wang, and Lixia Zhang
Request aggregation, caching, and forwarding strategies for improving large climate data distribution with NDN: A case study, Susmit Shannigrahi, Chengyu Fan, and Christos Papadopoulos
An empirical evaluation of models of programmer navigation, Alka Singh, Austin Z. Henley, Scott D. Fleming, and Maria V. Luong
Morphogenetic and homeostatic self-assembled systems, Petr Sosík, Vladimír Smolka, Jan Drastík, Tyler Moore, and Max Garzon
Security analysis on InfiniBand protocol implementations, Kul Prasad Subedi, Dipankar Dasgupta, and Bo Chen
Using 16S rRNA gene as marker to detect unknown bacteria in microbial communities, Quang Tran, Diem Trang Pham, and Vinhthuy Phan
Geohyperbolic routing and addressing schemes, Ivan Voitalov, Rodrigo Aldecoa, Lan Wang, and Dmitri Krioukov
Communication complexity of statistical distance, Thomas Watson
Adaptive audio classification for smartphone in noisy car environment, Myounggyu Won, Haitham Alsaadan, and Yongsoon Eun
HybridBaro: Mining Driving Routes Using Barometer Sensor of Smartphone, Myounggyu Won, Ashutosh Mishra, and Sang H. Son
Toward Mitigating Phantom Jam Using Vehicle-to-Vehicle Communication, Myounggyu Won, Taejoon Park, and Sang H. Son
WiTraffic: Low-cost and non-intrusive traffic monitoring system using WiFi, Myounggyu Won, Shaohu Zhang, and Sang H. Son
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems, Guowen Xu, Hongwei Li, Chen Tan, Dongxiao Liu, Yuanshun Dai, and Kan Yang
CryptMDB: A practical encrypted MongoDB over big data, Guowen Xu, Yan Ren, Hongwei Li, Dongxiao Liu, Yuanshun Dai, and Kan Yang
Optimal control theory-based epidemic information spreading scheme for mobile social users with energy constraint, Qichao Xu, Zhou Su, and Kan Yang
QoE loss probability based game-theoretic approach for spectrum sharing in heterogeneous networks, Qichao Xu, Zhou Su, Qiyong Zhao, Jiantao Song, Wenxue Shen, and Ying Wang
An Efficient and Fine-Grained Big Data Access Control Scheme with Privacy-Preserving Policy, Kan Yang, Qi Han, Hui Li, Kan Zheng, Zhou Su, and Xuemin Shen
Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms, Kan Yang, Kuan Zhang, Xiaohua Jia, M. Anwar Hasan, and Xuemin (Sherman) Shen
Identifying the Most Valuable Workers in Fog-Assisted Spatial Crowdsourcing, Peng Yang, Ning Zhang, Shan Zhang, Kan Yang, Li Yu, and Xuemin Shen
Security and Privacy in Smart City Applications: Challenges and Solutions, Kuan Zhang, Jianbing Ni, Kan Yang, Xiaohui Liang, Ju Ren, and Xuemin Sherman Shen
Scalable name-based data synchronization for named data networking, Minsheng Zhang, Vince Lehman, and Lan Wang
Distance-Aware Selective Online Query Processing Over Large Distributed Graphs, Xiaofei Zhang and Lei Chen
Similar yet different: Protocol design choices in IS-IS and OSPF, Yu Zhang, Lan Wang, Alexander Afanasyev, and Lixia Zhang
Facilitating ICN deployment with an extended open flow protocol, Piotr Zuraniewski, Niels Van Adrichem, Daan Ravesteijn, Wieger IJntema, Christos Papadopoulos, and Chengyu Fan