Abstract is missing.
- Panel discussion: Re-use of information and data in energy managementGongzhu Hu, Gongzhu Hu, Gordon K. Lee, Stuart Harvey Rubin, Russell Tatro, Suresh Vadhva. [doi]
- Toward a restriction-centered theory of truth and meaning (RCT)Lotfi A. Zadeh. [doi]
- Big data analytics as a service: Exploring reuse opportunitiesLing Liu. [doi]
- The 2013 IEEE International conference on information reuse and integration: ForwardStuart H. Rubin, Shu-Ching Chen. [doi]
- The future of access control: Attributes, automation and adaptationRavi Sandhu. [doi]
- FIEP: An initial design of a firewall information exchange protocolSandeep Reddy Pedditi, Du Zhang, Chung-E. Wang. 1-5 [doi]
- Predicting susceptibility to social bots on TwitterRandall Wald, Taghi M. Khoshgoftaar, Amri Napolitano, Chris Sumner. 6-13 [doi]
- Simulation-based validation for smart grid environmentsWonkyu Han, Mike Mabey, Gail-Joon Ahn. 14-21 [doi]
- A moving target defense approach for protecting resource-constrained distributed devicesValentina Casola, Alessandra De Benedictis, Massimiliano Albanese. 22-29 [doi]
- Tag-based top-N recommendation using a pairwise topic modelZhengyang Li, Congfu Xu. 30-37 [doi]
- Bayesian model for a multicriteria recommender system with support vector regressionPannawit Samatthiyadikun, Atsuhiro Takasu, Saranya Maneeroj. 38-45 [doi]
- WS-Rec: Web services recommendations using heterogeneous criteriaAnna Cinzia Squicciarini, Barbara Carminati, Sushama Karumanchi. 46-53 [doi]
- Constrained by limited information and recommendation opportunities: An exploration and exploitation problem for recommender systemsSimon Chan. 54-61 [doi]
- Rank correlation analysis of NTCIR-10 RITE-2 Chinese datasets and evaluation metricsChuan-Jie Lin, Cheng-Wei Lee, Cheng-Wei Shih, Wen-Lian Hsu. 62-68 [doi]
- Chinese textual entailment with Wordnet semantic and dependency syntactic analysisChun Tu, Min-Yuh Day. 69-74 [doi]
- Entailment analysis for improving Chinese textual entailment systemShih-Hung Wu, Shan-Shun Yang, Hung-Sheng Chiu, Liang-Pu Chen, Ren-Dar Yang. 75-81 [doi]
- Interest analysis using social interaction content with sentimentsChung-Chi Huang, Lun-Wei Ku. 82-89 [doi]
- Clustering and summarization topics of subject knowledge through analyzing internal links of WikipediaI.-Chin Wu, Chi-Hong Tsai, Yu-Hsuan Lin. 90-96 [doi]
- Solving minimum cut based multi-label classification problem with semi-definite programming methodGuangzhi Qu. 97-104 [doi]
- The importance of performance metrics within wrapper feature selectionRandall Wald, Taghi M. Khoshgoftaar, Amri Napolitano. 105-111 [doi]
- Interpreting random forest models using a feature contribution methodAnna Palczewska, Jan Palczewski, Richard Marchese Robinson, Daniel Neagu. 112-119 [doi]
- Entity disambiguation in tweets leveraging user social profilesSurender Reddy Yerva, Michele Catasta, Gianluca Demartini, Karl Aberer. 120-128 [doi]
- Cross-tenant trust models in cloud computingBo Tang, Ravi Sandhu. 129-136 [doi]
- PEP-side caching: An insider threat portQussai Yaseen, Qutaibah Althebyan, Yaser Jararweh. 137-144 [doi]
- Web-based metadata retrieval tool for fine art and games artworkAdam Aboutaleb, Riham Khalil, David Stockton, Sheona Jackson. 145-152 [doi]
- VFDS: Very fast database sampling systemTeodora Sandra Buda, Thomas Cerqueus, John Murphy, Morten Kristiansen. 153-160 [doi]
- A vision of education in 50 years from now position paper for the special session on education, IEEE IRI 2013June Rosemarie Massoud. 161 [doi]
- The possibilities of using Petri Nets for realization of a universal model of educational processZoltan Balogh, Milan Turcáni, Martin Magdin. 162-169 [doi]
- Geographic clustering of research universities in specialized fields using Microsoft Academic SearchDavid Kaczynski, Gongzhu Hu. 170-174 [doi]
- Autonomy requirements engineeringEmil Vassev, Mike Hinchey. 175-184 [doi]
- Service-oriented middleware for collaborative UAVsNader Mohamed, Jameela Al-Jaroodi. 185-192 [doi]
- Mining reusable software components from object-oriented source code of a set of similar softwareAnas Shatnawi, Abdelhak-Djamel Seriai. 193-200 [doi]
- Detecting distributed software components that will not cause emergent behavior in asynchronous communication styleFatemeh Hendijani Fard, Behrouz H. Far. 201-208 [doi]
- Feature-to-code traceability in a collection of software variants: Combining formal concept analysis and information retrievalHamzeh Eyal Salman, Abdelhak-Djamel Seriai, Christophe Dony. 209-216 [doi]
- A component-based language specific to complex systems modelingThouraya Bouabana-Tebibel, Stuart H. Rubin, Kadaouia Habib, Sofia Mellah, Lynda Allata. 217-224 [doi]
- Comparison of rank-based vs. score-based aggregation for ensemble gene selectionDavid J. Dittman, Taghi M. Khoshgoftaar, Randall Wald, Amri Napolitano. 225-231 [doi]
- Hidden dependencies between class imbalance and difficulty of learning for bioinformatics datasetsRandall Wald, Taghi M. Khoshgoftaar, Alireza Fazelpour, David J. Dittman. 232-238 [doi]
- Radiation therapy simulation and optimization using kinetic polygon modelingDavid Allen, Ovidiu Daescu. 239-246 [doi]
- Automatic extraction of effective rule sets for Obstructive Sleep Apnea detection for a real-time mobile monitoring systemGiovanna Sannino, Ivanoe De Falco, Giuseppe De Pietro. 247-253 [doi]
- Patient response datasets: Challenges and opportunitiesRandall Wald, Taghi M. Khoshgoftaar. 254-261 [doi]
- Improving the accomplishment of a neural network based agent for draughts that operates in a distributed learning environmentLidia B. P. Tomaz, Rita Maria da Silva Julia, Ayres Roberto Araújo Barcelos. 262-269 [doi]
- Optimized retrieval algorithms for personalized content aggregationDan He, Douglass S. Parker. 270-277 [doi]
- About logic-based A.I. systems that must handle incoming symbolic knowledgeÉric Grégoire. 278-284 [doi]
- Extracting and enriching workflows from textPol Schumacher, Mirjam Minor, Eric Schulte-Zurhausen. 285-292 [doi]
- Siphon-based deadlock prevention policy for interorganizational WorkFlow net designLuciane de Fatima Silva, Ligia Maria Soares Passos, Michel dos Santos Soares, Stéphane Julia. 293-300 [doi]
- CRIS - Computational research infrastructure for scienceEduard C. Dragut, Peter Baker, Jia Xu, Muhammad I. Sarfraz, Elisa Bertino, Amgad Madkour, Raghu Agarwal, Ahmed R. Mahmood, Sangchun Han. 301-308 [doi]
- Detecting data exfiltration by integrating information across layersPuneet Sharma, Anupam Joshi, Tim Finin. 309-316 [doi]
- Feature list aggregation approaches for ensemble gene selection on patient response datasetsTaghi M. Khoshgoftaar, Randall Wald, David J. Dittman, Amri Napolitano. 317-324 [doi]
- The use of balance-aware subsampling for bioinformatics datasetsRandall Wald, Taghi M. Khoshgoftaar, Alireza Fazelpour. 325-332 [doi]
- Towards a minimum description length based stopping criterion for semi-supervised time series classificationNurjahan Begum, Bing Hu 0001, Thanawin Rakthanmanon, Eamonn J. Keogh. 333-340 [doi]
- Gene selection stability's dependence on dataset difficultyDavid J. Dittman, Taghi M. Khoshgoftaar, Randall Wald, Amri Napolitano. 341-348 [doi]
- An integrated cloud-based platform for labor monitoring and data analysis in precision agricultureLi Tan, Ronald Haley, Riley Wortman, Yiannis Ampatzidis, Matthew Whiting. 349-356 [doi]
- An automated approach to create, store, and analyze large-scale experimental data in cloudsDeepal Jayasinghe, Josh Kimball, Siddharth Choudhary, Tao Zhu, Calton Pu. 357-364 [doi]
- Cloud-based tasking, collection, processing, exploitation, and disseminationStuart H. Rubin, Gordon K. Lee. 365-371 [doi]
- Efficient live wide area VM migration with IP address change using type II hypervisorSamuel A. Ajila, Omhenimhen Iyamu. 372-379 [doi]
- An automated ontology generation technique for an emergent behavior detection systemBeenish Khurshid, Mohammad Moshirpour, Armin Eberlein, Behrouz H. Far. 380-387 [doi]
- An effective method for optimistic message logging based on group communication linksJinHo Ahn. 388-393 [doi]
- From software product lines to system of systems: Analysis of an evolution pathMarcelo A. Ramos, Paulo Cesar Masiero, Rosana T. V. Braga, Rosângela Aparecida Dellosso Penteado. 394-401 [doi]
- Efficiently integrating MapReduce-based computing into a Hurricane Loss Projection modelFausto Fleites, Steve Cocke, Shu-Ching Chen, Shahid Hamid. 402-407 [doi]
- A new energy efficient cluster-head and backup selection scheme in WSNDavood Izadi, Jemal Abawajy, Sara Ghanavati. 408-415 [doi]
- Filter- and wrapper-based feature selection for predicting user interaction with Twitter botsRandall Wald, Taghi M. Khoshgoftaar, Amri Napolitano. 416-423 [doi]
- A survey of stability analysis of feature subset selection techniquesTaghi M. Khoshgoftaar, Alireza Fazelpour, Huanjing Wang, Randall Wald. 424-431 [doi]
- Probability-based incremental association rule discovery using the normal approximationAraya Ariya, Worapoj Kreesuradej. 432-439 [doi]
- An integrated framework for personalized Internet workflowsChatree Sangpachatanaruk, Taieb Znati. 440-447 [doi]
- A model-based repository of security and dependability patterns for trusted RCESAdel Ziani, Brahim Hamid, Jacob Geisel, Jean-Michel Bruel. 448-457 [doi]
- Porting mobile games in an aspect-oriented way: An industrial case studyTanmay Bhowmik, Vander Alves, Nan Niu. 458-465 [doi]
- The dynamic aspects of product derivation in DSPL: A systematic literature reviewJackson Raniel F. da Silva, Francisco Airton P. da Silva, Leandro M. do Nascimento, Dhiego A. O. Martins, Vinicius C. Garcia. 466-473 [doi]
- A reinforcement learning-based algorithm for deflection routing in optical burst-switched networksSoroush Haeri, Wilson Wang-Kit Thong, Guanrong Chen, Ljiljana Trajkovic. 474-481 [doi]
- Behavioral sequence prediction for evolving data streamSheikh M. Qumruzzaman, Latifur Khan, Bhavani M. Thuraisingham. 482-488 [doi]
- Mining software repositories to acquire software risk knowledgeChing-Pao Chang. 489-496 [doi]
- Author attribution on streaming dataSadi Evren Seker, Khaled Al-Naami, Latifur Khan. 497-503 [doi]
- Learning-based routing in mobile wireless sensor networks: Applying formal modeling and analysisFatemeh Kazemeyni, Olaf Owe, Einar Broch Johnsen, Ilangko Balasingham. 504-511 [doi]
- Giving Alloy a familyRenato Neves, Alexandre Madeira, Manuel A. Martins. 512-519 [doi]
- Creating GUI-based DSL formal toolsRobson Silva, Alexandre Mota, Rodrigo Rizzi Starr. 520-527 [doi]
- Problem decomposition and sub-model reconciliation of control systems in Event-BSanaz Yeganefard, Michael Butler. 528-535 [doi]
- Verifying SystemC with predicate abstraction: A component based approachNesrine Harrath, Bruno Monsuez, Kamel Barkaoui. 536-545 [doi]
- Parse tree based approach for processing XML streamsMohammad Khabbaz, Dirar Assi, Reda Alhajj, Moustafa A. Hammad. 546-553 [doi]
- The FUSE domain-aware approach to user model interoperability: A comparative studyEddie Walsh, Alexander O'Connor, Vincent Wade. 554-561 [doi]
- A fast and compact indexing technique for moving objectsYonghun Park, Ling Liu, Jaesoo Yoo. 562-569 [doi]
- Information reuse in dynamic spectrum accessPrashant Krishnamurthy, Martin B. H. Weiss, David Tipper. 570-577 [doi]
- A Brechó-EcoSys extension to support negotiation in the software ecosystems contextRodrigo Pereira dos Santos, Lucas Rodrigues Tostes, Cláudia Maria Lima Werner. 578-585 [doi]
- Mining features from the object-oriented source code of software variants by combining lexical and structural similarityRa'Fat Al-Msie'deen, Abdelhak-Djamel Seriai, Marianne Huchard, Christelle Urtado, Sylvain Vauttier. 586-593 [doi]
- An approach to develop frameworks from feature modelsMatheus Carvalho Viana, Rosangela Penteado, Antônio Francisco do Prado, Rafael Serapilha Durelli. 594-601 [doi]
- Comparison of the structure and the computational complexity of the inverse difference and Laplacian Pyramids for still image decompositionRoumen Kountchev, Mariofanna G. Milanova, Stuart Harvey Rubin, Roumiana Kountcheva. 602-609 [doi]
- Road segment partitioning towards anomalous trajectory detection for surveillance applicationsMuhammad Aamir Saleem, Waqas Nawaz, Young-Koo Lee, Sungyoung Lee. 610-617 [doi]
- Adaptive association rule mining for web video event classificationChengde Zhang, Xiao Wu, Mei-Ling Shyu, Qiang Peng. 618-625 [doi]
- Spatial-temporal motion information integration for action detection and recognition in non-static backgroundDianting Liu, Mei-Ling Shyu, Guiru Zhao. 626-633 [doi]
- A knowledge-based semantic tool for standard part management in aerospace industryHasan Mert Taymaz, Tansel Özyer, Can Cangelir. 634-642 [doi]
- Simulation study on evacuation from buildingsRobert A. Kosinski, Andrzej Grabowski. 643-647 [doi]
- Low power-energy storage system for energy harvesting applicationsCody Tudor, Eric Sprung, Justin Meyer, Russ Tatro. 648-660 [doi]
- Low power design of a wireless sensor node for indoor monitoringEric Sprung, Cody Tudor, Justin Meyer, Russ Tatro. 661-667 [doi]
- Cultural considerations for designing crossover applications for the visually impairedAbdullah Almurayh, Sudhanshu Semwal. 668-675 [doi]
- Controlling Xen Cloud platform via smart phonesAbdullah Almurayh, Sudhanshu Semwal. 676-683 [doi]
- A comparative study of data mining techniques for credit scoring in bankingShin-Chen Huang, Min-Yuh Day. 684-691 [doi]
- MFWK-Means: Minkowski metric Fuzzy Weighted K-Means for high dimensional data clusteringL. Svetlova, B. Mirkin, H. Lei. 692-699 [doi]
- Big data analysis using Apache HadoopJyoti Nandimath, Ekata Banerjee, Ankur Patil, Pratima Kakade, Saumitra Vaidya. 700-703 [doi]
- A linear filtering theory-based approach for load sheddingLorena Chavarría-Báez, Rosaura Palma-Orozco. 704-707 [doi]
- Reinforcement of trust in DSRFatma Laidoui, Thouraya Bouabana-Tebibel. 708-711 [doi]
- Federated ensemble Kalman filter in no reset mode designMaryam Kazerooni, Faridoon Shabaninia, Mohammad Vaziri, Suresh Vadhva. 712-716 [doi]
- ReadFast: Optimizing structural search relevance for big biomedical textMichael N. Gubanov, Anna Pyayt. 717-719 [doi]
- A real-time classification algorithm for emotion detection using portable EEGSurya Cheemalapati, Michael N. Gubanov, Michael Del Vale, Anna Pyayt. 720-723 [doi]
- Natural image segmentation using morphological mathematics and fuzzy logicVictoria L. Fox, Mariofanna Milanova. 724-727 [doi]
- Understanding environmental influences on performing password-based mobile authenticationSergey Maydebura, Dong Hyun Jeong, Byunggu Yu. 728-731 [doi]
- Distributed ensemble Kalman filter for multisensor applicationMaryam Kazerooni, Faridoon Shabaninia, Mohammad Vaziri, Suresh Vadhva. 732-735 [doi]