Abstract is missing.
- Discovering Opinion Changes in Online Reviews via Learning Fine-Grained SentimentsZihang Liu, Yu-Ru Lin, Maoquan Wang, Zhao Lu. 1-10 [doi]
- Business Process Tasks-Assignment and Resource Allocation in Crowdsourcing ContextKahina Bessai, François Charoy. 11-18 [doi]
- Why Is It Difficult for Welfare Recipients to Return to Work? A Case Study through a Collaborative Online CommunitySurya Nepal, Cécile Paris. 19-28 [doi]
- Social-PPM: Personal Experience Sharing and RecommendationAnne H. H. Ngu, Shawn Fang, Helen Paik. 29-36 [doi]
- An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy MachineSmriti Bhatt, Farhan Patwa, Ravi S. Sandhu. 37-45 [doi]
- A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud ComputingHarsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk. 46-53 [doi]
- Capturing Policies for Fine-Grained Access Control on Mobile DevicesPrajit Kumar Das, Anupam Joshi, Tim Finin. 54-63 [doi]
- An Administrative Model for Collaborative Management of ABAC Systems and Its Security AnalysisSadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. 64-73 [doi]
- RahasNym: Pseudonymous Identity Management System for Protecting against LinkabilityHasini Gunasinghe, Elisa Bertino. 74-85 [doi]
- Big Data Privacy Risk: Connecting Many Large Data SetsStar Ying, Tyrone Grandison. 86-91 [doi]
- Collaborative Differentially Private Outlier Detection for Categorical DataHafiz Salman Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam. 92-101 [doi]
- Brain Computer Interface (BCI) Applications: Privacy Threats and CountermeasuresHassan Takabi, Anuj Bhalotiya, Manar Alohaly. 102-111 [doi]
- Towards a Science for Adaptive Defense: Revisit Server ProtectionZhisheng Hu, Ping Chen, Yang Lu, Minghui Zhu, Peng Liu 0005. 112-121 [doi]
- Smart Moving Target Defense for Linux Container ResiliencyMohamed Azab, Bassem Mokhtar, Amr S. Abed, Mohamed Eltoweissy. 122-130 [doi]
- QL-SimP: Query Language for Secure Interoperable Multi-Granular Provenance FrameworkAmani Abu Jabal, Elisa Bertino. 131-138 [doi]
- Software Security Professionals: Expertise IndicatorsMortada Al-Banna, Boualem Benatallah, Moshe Chai Barukh. 139-148 [doi]
- Modeling Data-Plane Power Consumption of Future Internet ArchitecturesChen Chen, David Barrera, Adrian Perrig. 149-158 [doi]
- The Flip-Flop SLA Negotiation Strategy Using Concession Extrapolation and 3D Utility FunctionWaheed Aslam Ghumman, Alexander Schill, Jörg Lässig. 159-168 [doi]
- A Programming Language and System for Heterogeneous Cloud of ThingsRobert Wenger, Xiru Zhu, Jayanth Krishnamurthy, Muthucumaru Maheswaran. 169-177 [doi]
- Information Fusion Architecture for Variable-Load Scheduling in a Cloud-Assisted CPSBrijesh Kashyap Chejerla, Sanjay Madria. 178-187 [doi]
- On the Imminent Advent of Botnet Powered CrackingJega Anish Dev. 188-195 [doi]
- Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium LibraryFadi Mohsen, Mohamed Shehab. 196-205 [doi]
- Invited Paper: A Model of Paradoxical Privacy Behavior in Online UsersChristopher Griffin, Sarah Michele Rajtmajer, Anna Cinzia Squicciarini. 206-211 [doi]
- Differentially Private Distributed Data AnalysisHassan Takabi, Samir Koppikar, Saman Taghavi Zargar. 212-218 [doi]
- Collaborative Scientific Workflow Composition as a Service: An Infrastructure Supporting Collaborative Data Analytics Workflow Design and ManagementJia Zhang, Qihao Bao, Xiaoyi Duan, Shiyong Lu, Lijun Xue, Runyu Shi, Pingbo Tang. 219-228 [doi]
- Statistical Verification of Process Conformance Based on Log Equality TestHyerim Bae, Sung-Hyun Sim, Yulim Choi, Ling Liu. 229-235 [doi]
- A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware SystemsAnand Tripathi. 236-245 [doi]
- Application of Bloom Filter for Duplicate URL Detection in a Web CrawlerAveksha Kapoor, Vinay Arora. 246-255 [doi]
- TweetRipple: Understanding Your Twitter Audience and the Impact of Your TweetsAmanda Dennett, Surya Nepal, Cécile Paris, Bella Robinson. 256-265 [doi]
- Measuring Quality of Collaboratively Edited Documents: The Case of WikipediaQuang-Vinh Dang, Claudia-Lavinia Ignat. 266-275 [doi]
- Gathering High Quality Information on Landslides from Twitter by Relevance Ranking of Users and TweetsAibek Musaev, Qixuan Hou. 276-284 [doi]
- Integrating Multiple Data Sources to Enhance Sentiment PredictionBrian Heredia, Taghi M. Khoshgoftaar, Joseph D. Prusa, Michael Crawford. 285-291 [doi]
- Constructing the Three Graphs for the Large-Scale Heterogeneous Information SystemBing Li. 292-303 [doi]
- Compacted Bloom FilterNegar Mosharraf, Anura P. Jayasumana, Indrakshi Ray. 304-311 [doi]
- Information Diffusion Analysis of Rumor Dynamics over a Social-Interaction Based ModelDe Wang, Aibek Musaev, Calton Pu. 312-320 [doi]
- Feature-Based Adaptation and Its ImplementationAnne Marie Amja, Abdel Obaid, Hafedh Mili, Zahi Jarir. 321-328 [doi]
- Detecting Discrimination in a Black-Box ClassifierYasmeen Alufaisan, Murat Kantarcioglu, Yan Zhou. 329-338 [doi]
- Inferred Awareness to Support Mixed-Activity CollaborationPrasun Dewan. 339-348 [doi]
- Differentiating Non-Isomorphic Graphlets for Graph AnalyticsJohn Calvin Alumbaugh, Qinghua Li, Vincent C. Hu. 349-356 [doi]
- The Roles of Information Seeking Dynamics in Sustaining the Community ParticipationXidao Wen, Di Lu, Yu-Ru Lin, Claudia López. 357-362 [doi]
- DLSAS: Distributed Large-Scale Anti-Spam Framework for Decentralized Online Social NetworksAmira Soliman, Sarunas Girdzijauskas. 363-372 [doi]
- Distributed Large-Scale Data Collection in Online Social NetworksHariton Efstathiades, Demetris Antoniades, George Pallis, Marios D. Dikaiakos. 373-380 [doi]
- Trip Route Planning for Bicycle-Sharing SystemsJiawei Zhang, Philip S. Yu. 381-390 [doi]
- CyanoTRACKER: A Citizen Science Project for Reporting Harmful Algal BloomsMichael D. Scott, Lakshmish Ramaswamy, Victor Lawson. 391-397 [doi]
- Can a Government Use Social Media to Support Disadvantaged Citizens?Cécile Paris, Surya Nepal. 398-407 [doi]
- Towards Automated Threat Intelligence FusionAjay Modi, Zhibo Sun, Anupam Panwar, Tejas Khairnar, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Paul Black. 408-416 [doi]
- Enabling Attribute Based Encryption as an Internet ServiceRunhua Xu, James B. D. Joshi. 417-425 [doi]
- Characteristics and Requirements of Big Data Analytics ApplicationsJameela Al-Jaroodi, Nader Mohamed. 426-432 [doi]
- Knowledge Graph-Based Query Rewriting in a Relational Data Harmonization FrameworkNeda Abolhassani, Teresa Tung, Karthik Gomadam, Lakshmish Ramaswamy. 433-438 [doi]
- Image-Based Seed GenerationNader Nassar, Li-Chiou Chen. 439-444 [doi]
- TrustZone Explained: Architectural Features and Use CasesBernard Ngabonziza, Daniel Martin, Anna Bailey, Haehyun Cho, Sarah Martin. 445-451 [doi]
- Cloud Security: A Review of Current Issues and Proposed SolutionsNapoleon C. Paxton. 452-455 [doi]
- Using Biased Social Samples for Disaster Response: Extended AbstractFred Morstatter. 456-457 [doi]
- Monitoring Collective Attention During DisastersXingsheng He, Yu-Ru Lin. 458-462 [doi]
- "Our Hearts Go Out": Social Support and Gratitude after DisasterKimberly Glasgow, Clay Fink, Jessica Vitak, Yla R. Tausczik. 463-469 [doi]
- Data Driven Approaches to Define Acute Care Referral Regions and ResourcesDavid J. Wallace. 470-473 [doi]
- Little Data, Big Stories: Taking the Pulse of Large-Scaled Events on TwitterPatrick M. Dudas, Samantha Weirman, Christopher Griffin. 474-482 [doi]
- Social Safety Guard Based on Internet of ThingsJae-geun Moon, Jin-Seong Kim, Im Y. Jung, Su-an Eom. 483-485 [doi]
- Using the Social Network Internet of Things to Mitigate Public Mass ShootingsIrena Gao. 486-489 [doi]
- Crowdsourcing-Based Disaster Management Using Fog Computing in Internet of Things ParadigmAshish Rauniyar, Paal Engelstad, Boning Feng, Do Van Thanh. 490-494 [doi]
- Tracking Disaster Response and Relief Following the 2015 Nepal EarthquakeYue Su, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, James Joshi. 495-499 [doi]
- Probing Construct Validity in Data-Driven Disaster AnalysisWen-Ting Chung, Yu-Ru Lin. 500-501 [doi]
- Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System DesignMartin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser. 502-505 [doi]
- Using Transfer Learning to Identify Privacy Leaks in TweetsSaul Ricardo Medrano Castillo, Zhiyuan Chen. 506-513 [doi]
- Privacy Settings Recommender for Online Social NetworkDavide Alberto Albertini, Barbara Carminati, Elena Ferrari. 514-521 [doi]
- Towards Measuring Knowledge Exposure in Online Social NetworksAmirreza Masoumzadeh, Andrew Cortese. 522-529 [doi]
- Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research AgendaAsma Alshehri, Ravi S. Sandhu. 530-538 [doi]
- If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy PoliciesManar Alohaly, Hassan Takabi. 539-545 [doi]
- The Listening Patterns to System Events by Benign and Malicious Android AppsFadi Mohsen, Mohamed Shehab. 546-553 [doi]
- A Dynamic Privacy Aware Access Control Model for Location Based ServicesLeila Karimi, Balaji Palanisamy, James Joshi. 554-557 [doi]