Abstract is missing.
- A Data Driven Approach for the Science of Cyber Security: Challenges and DirectionsBhavani M. Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino. 1-10 [doi]
- A Novel Method for Fraudulent Medicare Claims Detection from Expected Payment Deviations (Application Paper)Richard A. Bauder, Taghi M. Khoshgoftaar. 11-19 [doi]
- Anomaly Detection Techniques for Database Protection Against Insider Threats (Invited Paper)Asmaa Sallam, Qian Xiao, Elisa Bertino, Daren Fadolalkarim. 20-29 [doi]
- Improving the Utility of Anonymized Datasets through Dynamic Evaluation of Generalization HierarchiesVanessa Ayala-Rivera, Thomas Cerqueus, Liam Murphy, Christina Thorpe. 30-39 [doi]
- A Risk-Benefit Driven Architecture for Personal Data Release (Invited Paper)B. C. Singh, Barbara Carminati, Elena Ferrari. 40-49 [doi]
- Reusable Meta-Models for Crowdsourcing Driven Elastic Systems (Invited Paper)Julian Jarrett, M. Brian Blake. 50-57 [doi]
- Modeling Integration and Reuse of Heterogeneous Terminologies in Faceted Browsing SystemsDaniel R. Harris. 58-66 [doi]
- Discover Tipping Users for Cross Network Influencing (Invited Paper)Qianyi Zhan, Jiawei Zhang, Philip S. Yu, Sherry Emery, Junyuan Xie. 67-76 [doi]
- A Machine Learning Approach to Improve the Accuracy of GPS-Based Map-Matching Algorithms (Invited Paper)Mahdi Hashemi, Hassan A. Karimi. 77-86 [doi]
- An Automatic Approach for Discovering and Geocoding Locations in Domain-Specific Web Data (Application Paper)Chris A. Mattmann, Madhav Sharan. 87-93 [doi]
- GeoTeCS: Exploiting Geographical, Temporal, Categorical and Social Aspects for Personalized POI Recommendation (Invited Paper)Ramesh Baral, Dingding Wang, Tao Li, Shu-Ching Chen. 94-101 [doi]
- Predicting Students' Behavioral Patterns in University Networks for Efficient Bandwidth Allocation: A Hybrid Data Mining Method (Application Paper)Elham Akhond Zadeh Noughabi, Behrouz H. Far, Bijan Raahemi. 102-109 [doi]
- Modular Verification of Termination and Execution Time Bounds Using Separation LogicJafar Hamin, Bart Jacobs. 110-117 [doi]
- Modelling Complex Timing Requirements with RefinementGintautas Sulskus, Michael Poppleton, Abdolbaghi Rezazadeh. 118-125 [doi]
- Spekl: A Layered System for Specification Authoring, Sharing, and UsageJohn L. Singleton, Gary T. Leavens. 126-133 [doi]
- A Formal Language for Writing ContractsWilliam M. Farmer, Qian Hu. 134-141 [doi]
- Monitoring Classification Blindspots to Detect Drifts from Unlabeled DataTegjyot Singh Sethi, Mehmed M. Kantardzic, Elaheh Arabmakki. 142-151 [doi]
- Designing a Testing Framework for Transfer Learning Algorithms (Application Paper)Karl R. Weiss, Taghi M. Khoshgoftaar, Oneeb Rehman. 152-159 [doi]
- Cross-Domain Sentiment Analysis: An Empirical InvestigationBrian Heredia, Taghi M. Khoshgoftaar, Joseph D. Prusa, Michael Crawford. 160-165 [doi]
- Classifying Questions into Fine-Grained Categories Using Topic EnrichingZhao Lu, Yu-Ru Lin, Qing Zhang, Mengwei Chen. 166-174 [doi]
- Clustering Web Pages Based on Structure and Style Similarity (Application Paper)Thamme Gowda, Chris A. Mattmann. 175-180 [doi]
- Automatic Label Data Abstraction Based on Information Entropy (Application Paper)Fumiya Kudo, Norihiko Moriwaki, Tomoaki Akitomi, Susumu Serita, Yu Kitano. 181-187 [doi]
- Algorithmic Decision Support for Personalized Education (Invited Paper)Tyler Morrow, Sahra Sedigh Sarvestani, Ali R. Hurson. 188-197 [doi]
- Employing Graph Databases as a Standardization Model towards Addressing HeterogeneityDippy Aggarwal, Karen C. Davis. 198-207 [doi]
- Query-Driven Sampling for Collective Entity ResolutionChristan Earl Grant, Daisy Zhe Wang, Michael L. Wick. 208-217 [doi]
- An Extensible Software Platform for Cloud-Based Decision Support and Automation in Precision AgricultureLi Tan, Hongfei Hou, Qin Zhang. 218-225 [doi]
- Cloud-Based Web Services for Endangered Language Analysis (Invited Paper)Ashik Samad, Kevin Wu, Min Chen. 226-232 [doi]
- Toward Bringing Distributed System Design upon Rigorous FootingMohammed S. Al-Mahfoudh, Ganesh Gopalakrishnan, Ryan Stutsman. 233-240 [doi]
- Support for Model Checking Z SpecificationsMaria Ulfah Siregar. 241-248 [doi]
- BHive: Towards Behaviour-Driven Development Supported by B-MethodJ. Carter, W. B. Gardner. 249-256 [doi]
- Ensemble Classifier for Imbalanced Streaming Data Using Partial LabelingElaheh Arabmakki, Mehmed M. Kantardzic, Tegjyot Singh Sethi. 257-260 [doi]
- Reuse of WiFi Information for Indoor Monitoring of the ElderlyXuan Xie, Hongze Xu, Guang Yang, Zhi-Hong Mao, Wenyan Jia, Mingui Sun. 261-264 [doi]
- Development of Efficient Obstacle Avoidance for a Mobile Robot Using Fuzzy Petri NetsPhilip D. Baldoni, Yilin Yang, Seung-yun Kim. 265-269 [doi]
- Analysis of Soccer Robot Behaviors Using Time Petri NetsDaniel Ponsini, Yilin Yang, Seung-yun Kim. 270-274 [doi]
- Datom Continued: Towards Multi-Objective Optimization of Data Management EntitiesVerena Kantere. 275-282 [doi]
- Intrusion Detection Using a Multiple-Detector Set Artificial Immune SystemJames Brown, Mohd Anwar, Gerry V. Dozier. 283-286 [doi]
- PETRA: Personalized Trust Management Architecture (Application Paper)Hisham Salah, Mohamed Eltoweissy. 287-296 [doi]
- Object-to-Object Relationship-Based Access Control: Model and Multi-Cloud Demonstration (Invited Paper)Tahmina Ahmed, Farhan Patwa, Ravi Sandhu. 297-304 [doi]
- An In-Depth Study of Peer Influence on Collective Decision Making for Multi-party Access Control (Invited Paper)Alpana Tyagi, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Christopher Griffin. 305-314 [doi]
- General Methods for Access Control Policy Verification (Application Paper)Vincent C. Hu, D. Richard Kuhn. 315-323 [doi]
- A Scalable and Automatic Validation Process for Florida Public Hurricane Loss Model (Invited Paper)Haiman Tian, Hsin-Yu Ha, Samira Pouyanfar, Yilin Yan, Sheng Guan, Shu-Ching Chen, Mei-Ling Shyu, Shahid Hamid. 324-331 [doi]
- Integrating Control and Fault-Tolerant Wireless Network Design for Small Modular Nuclear Reactors (Invited Paper)Wenchen Wang, Christopher D'Angelo, Daniel Mossé, Daniel G. Cole. 332-342 [doi]
- Identification of Power Line Outages Based on PMU Measurements and Sparse Overcomplete RepresentationLong Cheng, Chenyu You, Liguo Chen. 343-349 [doi]
- Selective Mapping for Real-Time Video Transport over Wireless LANHongli Luo. 350-354 [doi]
- Generating Headline Candidates for News ArticlesNaoya Okumura, Takao Miura. 355-360 [doi]
- Process Discovery Using Classification Tree Hidden Semi-Markov ModelYihuang Kang, Vladimir Zadorozhny. 361-368 [doi]
- Predicting Cancer Relapse with Clinical Data: A Survey of Current TechniquesAaron N. Richter, Taghi M. Khoshgoftaar. 369-376 [doi]
- Investigating the Variation of Ensemble Size on Bagging-Based Classifier Performance in Imbalanced Bioinformatics DatasetsAlireza Fazelpour, Taghi M. Khoshgoftaar, David J. Dittman, Amri Napolitano. 377-383 [doi]
- An Approach to Ontology Integration for Ontology ReuseEnrico Giacinto Caldarola, Antonio Maria Rinaldi. 384-393 [doi]
- Information Fusion Using Characteristic Linear System in Multi-robot Search and Rescue TaskPei-ju Lee, Vladimir Zadorozhny. 394-400 [doi]
- Bloom Filter Tree for Fast Search and Synchronization of Tree-Structured DataMengyu Wang, Ying Zhu. 401-410 [doi]
- Designing a Better Data Representation for Deep Neural Networks and Text ClassificationJoseph D. Prusa, Taghi M. Khoshgoftaar. 411-416 [doi]
- Data Analytics Using Ontologies of Management Theories: Towards Implementing "From Theory to Practice" (Application Paper)Henry M. Kim, Jackie Ho Nam Cheung, Marek Laskowski, Iryna Gel. 417-422 [doi]
- A Semantically-Enabled SOA Governance Repository (Application Paper)Jan Königsberger, Bernhard Mitschang. 423-432 [doi]
- Statistical Measurement and Analysis on How the Late-Life Function & Disability Instrument Enhances the Frailty Assessment Compared to the National Standards Used on Transcatheter Aortic Valve Patients (Application Paper)Yunkai Liu, A. Kate MacPhedran, Yu Luo. 433-440 [doi]
- Domain Knowledge Assisted Data Processing for Florida Public Hurricane Loss Model (Invited Paper)Yilin Yan, Samira Pouyanfar, Haiman Tian, Sheng Guan, Hsin-Yu Ha, Shu-Ching Chen, Mei-Ling Shyu, Shahid Hamid. 441-447 [doi]
- Rapid Prototyping of a Text Mining Application for Cryptocurrency Market IntelligenceMarek Laskowski, Henry M. Kim. 448-453 [doi]
- Discovering News Frames: Exploring Text, Content, and Concepts in Online News Sources to Address Water Insecurity in the Southwest RegionLoretta H. Cheeks, Tracy L. Stepien, Dara M. Wald. 454-462 [doi]
- A Topic-Independent Hybrid Approach for Sentiment Analysis of Chinese MicroblogPing Han, Shan Li, Yunfei Jia. 463-468 [doi]
- Fast Document Indexing Using Aho-Corasick State MachineRamanpreet Singh, Gurpreet Singh Mohaar. 469-475 [doi]
- Recommender System Framework for Academic Choices: Personality Based Recommendation Engine (PBRE)Muhammad Fahim Uddin, Soumita Banerjee, JeongKyu Lee. 476-483 [doi]
- Comparison of Real-Time, Mobile Data Bus ArchitecturesPaul M. Simon, Scott R. Graham. 484-489 [doi]
- An Event Detection Framework Supported by a Smart Graphical User InterfaceFabio Persia, Sven Helmer. 490-495 [doi]
- Tracked Robot over a Slope Path: Dynamic Stability ControlDaniela D'Auria, Gianluca Ristorto, Gallo Raimondo, Fabrizio Mazzetto. 496-499 [doi]
- Anomaly Detection in Electrical Substation Circuits via Unsupervised Machine LearningAlfonso Valdes, Richard Macwan, Matthew Backes. 500-505 [doi]
- Learning Textual Entailment Classification from a Chinese RITE Dataset Specialized for Linguistic PhenomenaChi-Ting Liu, Shao-Heng Chen, Chuan-Jie Lin. 506-512 [doi]
- A Study on Machine Learning for Imbalanced Datasets with Answer Validation of Question AnsweringMin-Yuh Day, Cheng-Chia Tsai. 513-519 [doi]
- Principle-Based Approach for Semi-Automatic Construction of a Restaurant Question Answering System from Limited DatasetsTing-Hao Yang, Yu-Lun Hsieh, You-Shan Chung, Cheng-Wei Shih, Shih-Hung Liu, Yung-Chun Chang, Wen-Lian Hsu. 520-524 [doi]
- Improving the Selection Error Recognition in a Chinese Grammar Error Detection SystemPo-Lin Chen, Shih-Hung Wu, Liang-Pu Chen, Ping-Che Yang. 525-530 [doi]
- Reusing Software Libraries Using Semantic GraphsAwny Alnusair, Majdi Rawashdeh, Mohammed F. Alhamid, M. Anwar Hossain, Ghulam Muhammad. 531-540 [doi]
- Knowledge Induction Based on Randomization in Case-Based ReasoningThouraya Bouabana-Tebibel, Stuart H. Rubin, Asmaa Chebba, Sofiane Bediar, Syphax Iskounen. 541-548 [doi]
- Semantic Interpretation of Structured Log FilesPiyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi, Tim Finin. 549-555 [doi]
- Semantic Concept Detection Using Weighted Discretization Multiple Correspondence Analysis for Disaster Information ManagementSamira Pouyanfar, Shu-Ching Chen. 556-564 [doi]
- A Computational Model for Dyadic Relationships (Invited Paper)Clio Andris. 565-573 [doi]
- Reusing the NP-Hard Traveling-Salesman Problem to Demonstrate That P~NP (Invited Paper)Stuart H. Rubin, Thouraya Bouabana-Tebibel, Yasmin Hoadjli, Zahira Ghalem. 574-581 [doi]
- Towards Extracting Coherent User Concerns and Their Hierarchical Organization from User ReviewsLigaj Pradhan, Chengcui Zhang, Steven Bethard. 582-590 [doi]
- ARM: Authenticated Approximate Record Matching for Outsourced DatabasesBoxiang Dong, Wendy Hui Wang. 591-600 [doi]
- Enhancing Multimedia Imbalanced Concept Detection Using VIMP in Random ForestsSaad Sadiq, Yilin Yan, Mei-Ling Shyu, Shu-Ching Chen, Hemant Ishwaran. 601-608 [doi]
- Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper)Dae-il Jang, Gail-Joon Ahn, Hyunuk Hwang, Kibom Kim. 609-614 [doi]
- A Classifier Ensemble Framework for Multimedia Big Data ClassificationYilin Yan, Qiusha Zhu, Mei-Ling Shyu, Shu-Ching Chen. 615-622 [doi]
- A Real Case Analytics on Social Network of Opinion SpammersChih-Chien Wang, Min-Yuh Day, Yu-Ruei Lin. 623-630 [doi]
- Mining of Learning Interaction Patterns in MOOCs ForumsK. C. Chu, C. S. Wang, J. H. Kuo. 631-637 [doi]
- A Comparison Between Supervised and Unsupervised Models for Identify a Large Number of CategoriesPatricia Andrade, Marcelo Ladeira, Rommel N. Carvalho. 638-641 [doi]