Abstract is missing.
- IEEE IRI 2014 keynote speech (I): The information principleLotfi A. Zadeh, Calton Pu, Gio Wiederhold, Tao Zhang, Sandeep Gopisetty. [doi]
- IEEE IRI 2014 invited industry talks (I): Managing shared information in multi-tenant service provider applicationsHeiko Ludwig, Nathalie Baracaldo, Nish Parikh, Tanvir Ahmed, Rajesh Subramanyan. [doi]
- IEEE IRI 2014 panel: Panel discussion: IRI in educationJune Rosemarie Massoud. [doi]
- IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power gridZbigniew Kalbarczyk, Errin W. Fulp. [doi]
- IEEE IRI 2014 tutorial: Big data management and miningLatifur R. Khan, Mohamed Azab. [doi]
- Detecting and resolving inconsistencies in firewallsDu Zhang, Lavanya Jujjavarapu, Meiliu Lu. 1-7 [doi]
- Stream computing for large-scale, multi-channel cyber threat analyticsDouglas Lee Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Venema, Ting Wang. 8-15 [doi]
- Policy-driven security management for fog computing: Preliminary framework and a case studyClinton D'Souza, Gail-Joon Ahn, Marthony Taguinod. 16-23 [doi]
- Deploying malware detection software for smart phonesNathan McDaniel, Bhavani M. Thuraisingham, Latifur Khan. 24-27 [doi]
- Test logic reuse through unit test patterns a test automation framework for software product linesGlauco Silva Neves, Patricia Vilain. 28-35 [doi]
- From requirements to software design: An automated solution for packaging software classesYasaman Amannejad, Mohammad Moshirpour, Behrouz Homayoun Far, Reda Alhajj. 36-43 [doi]
- Ontology-based user requirements decomposition for component selection for highly available systemsMahin Abbasipour, Margarete Sackmann, Ferhat Khendek, Maria Toeroe. 44-51 [doi]
- Specification-based testing with buchi automata: Transition coverage criteria and property refinementLi Tan, Bolong Zeng. 52-61 [doi]
- Consumer-centric protection for online social networksRaja Naeem Akram, Ryan K. L. Ko, Tsz Fung Law. 62-67 [doi]
- A study of clickjacking worm propagation in online social networksMohammad Reza Faghani, Uyen T. Nguyen. 68-73 [doi]
- Detecting unintentional information leakage in social media news commentsInbal Yahav, David G. Schwartz, Gahl Silverman. 74-79 [doi]
- A framework for comparing early warning systems across domains: A step toward a data-integrated public health EWSHenry M. Kim, Marek Laskowski, Seyed Moghadas, Amirehsan Sajad, Maaz Asif. 80-86 [doi]
- Much more to it: The relation between facebook usage and self-esteemMontathar Faraon, Mauri Kaipainen. 87-92 [doi]
- Text classification for automatic detection of alcohol use-related tweets: A feasibility studyYin Aphinyanaphongs, Bisakha Ray, Alexander R. Statnikov, Paul Krebs. 93-97 [doi]
- Towards chronic emergency response communities for anaphylaxisDavid G. Schwartz, Abdelouahab Bellou, Luis Garcia-Castrillo, Antonella Muraro, Nikolaos G. Papadopoulos. 98-103 [doi]
- Leveraging online social media for capturing observations of daily living and ecological momentary assessmentMohd Anwar. 104-108 [doi]
- Detect phishing by checking content consistencyYi-Shin Chen, Yi-Hsuan Yu, Huei-Sin Liu, Pang-Chieh Wang. 109-119 [doi]
- DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoringSaman Taghavi Zargar, James B. D. Joshi, David Tipper. 120-129 [doi]
- Access control reinforcement over searchable encryptionAbdellah Kaci, Thouraya Bouabana-Tebibel. 130-137 [doi]
- LEAF: A privacy-conscious social network-based intervention tool for IPV survivorsBalaji Palanisamy, Sheldon Sensenig, James B. D. Joshi, Rose Constantino. 138-146 [doi]
- Uncertainty reasoning for the "big data" semantic webLoukia Karanikola, Isambo Karali, Sally I. McClean. 147-154 [doi]
- Semantics management for big networksBassem Mokhtar, Mohamed Eltoweissy. 155-162 [doi]
- Cloud-based monitoring and analysis of yield efficiency in precision farmingLi Tan, Riley Wortman. 163-170 [doi]
- SMOPD-C: An autonomous vertical partitioning technique for distributed databases on cluster computersLiangzhe Li, Le Gruenwald. 171-178 [doi]
- Argumentation schemes for the reuse of argumentation information in collaborative risk managementRuan C. B. Pozzebon, Luís A. Lima Silva, Lisandra M. Fontoura, John A. Campbell. 179-186 [doi]
- SOA-GovMM: A meta model for a comprehensive SOA governance repositoryJan Konigsberger, Stefan Silcher, Bernhard Mitschang. 187-194 [doi]
- Towards facilities to introduce solutions for MDE in development environments with reusable assetsFabio Paulo Basso, Cláudia Maria Lima Werner, Toacy C. Oliveira. 195-202 [doi]
- Extracting control-flow from textPol Schumacher, Mirjam Minor. 203-210 [doi]
- Towards model driven crowdsourcing: First experiments, methodology and transformationSamyr Vale. 211-218 [doi]
- Toward inferring the age of Twitter users with their use of nonstandard abbreviations and lexiconNathaniel Moseley, Cecilia Ovesdotter Alm, Manjeet Rege. 219-226 [doi]
- Extracting top-k most influential nodes by activity analysisMyungcheol Doo, Ling Liu. 227-236 [doi]
- Detection of implied scenarios in multiagent systems with clustering agents' communicationsFatemeh Hendijani Fard, Behrouz H. Far. 237-244 [doi]
- A value-oriented specification for weak sequencing validationThouraya Bouabana-Tebibel, Stuart H. Rubin. 245-252 [doi]
- Optimizing online spatial data analysis with sequential query patternsChunqiu Zeng, Hongtai Li, Huibo Wang, Yudong Guang, Chang Liu, Tao Li, Mingjin Zhang, Shu-Ching Chen, Naphtali Rishe. 253-260 [doi]
- Extending automated intelligence systems via graph database: A case study of the "Meth Hunter"Mark Blair, Yunkai Liu, Theresa M. Vitolo. 261-268 [doi]
- Mapping specifications for ranked hierarchical trees in data integration systemsSarfaraz Soomro, Andréa Matsunaga, Jose A. B. Fortes. 269-276 [doi]
- How ranker and learner choice affects classification performance on noisy bioinformatics dataAhmad Abu Shanab, Taghi M. Khoshgoftaar, Randall Wald, Amri Napolitano. 277-282 [doi]
- Analyzing Alzheimer's disease gene expression dataset using clustering and association rule miningBenoit Le Queau, M. Omair Shafiq, Reda Alhajj. 283-290 [doi]
- Towards a technology roadmap for big data applications in the healthcare domainSonja Zillner, Heiner Oberkampf, Claudia Bretschneider, Amrapali Zaveri, Werner Faix, Sabrina B. Neururer. 291-296 [doi]
- The effect of noise level and distribution on classification of easy gene microarray dataRandall Wald, Taghi M. Khoshgoftaar, Ahmad Abu Shanab. 297-302 [doi]
- Improving the random forest algorithm by randomly varying the size of the bootstrap samplesMd. Nasim Adnan. 303-308 [doi]
- Stability of filter- and wrapper-based software metric selection techniquesHuanjing Wang, Taghi M. Khoshgoftaar, Amri Napolitano. 309-314 [doi]
- Classification performance of three approaches for combining data sampling and gene selection on bioinformatics dataTaghi M. Khoshgoftaar, Alireza Fazelpour, David J. Dittman, Amri Napolitano. 315-321 [doi]
- Data-oriented intelligent transportation systemsHamdy Ibrahim, Behrouz H. Far. 322-329 [doi]
- Any-time knowledge revisionÉric Grégoire. 330-337 [doi]
- A method for text-line segmentation for unconstrained Arabic and Persian handwritten text imageReza Shakoori. 338-344 [doi]
- Particle swarm optimization protocol for clustering in wireless sensor networks: A realistic approachRiham S. Elhabyan, Mustapha C. E. Yagoub. 345-350 [doi]
- 2 suite - Towards a tool suite for supporting knowledge management in situation awareness systemsAndrea Salfinger, Daniel Neidhart, Werner Retschitzegger, Wieland Schwinger, Stefan Mitsch. 351-360 [doi]
- Age semantics based state space computation of time Petri netsAbdelli Abdelkrim. 361-368 [doi]
- Ensuring that your dart will hit the mark: An introduction to dart contractsPatrice Chalin. 369-377 [doi]
- Towards ray optics formalization of optical imaging systemsUmair Siddique, Sofiène Tahar. 378-385 [doi]
- Time properties verification of UML/MARTE real-time systemsAymen Louati, Kamel Barkaoui, Chadlia Jerad. 386-393 [doi]
- Advancing WSN physical security adopting TPM-based architecturesMario Barbareschi, Ermanno Battista, Antonino Mazzeo, Sridhar Venkatesan. 394-399 [doi]
- A hardware accelerator for data classification within the sensing infrastructureMario Barbareschi, Ermanno Battista, Nicola Mazzocca, Sridhar Venkatesan. 400-405 [doi]
- Investigating the feasibility of LEAP+ in ZigBee specificationMohammad Rezaeirad, Sahar Mazloom, Muhammad Aamir Iqbal, Dmitri D. Perkins, Magdy A. Bayoumi. 406-412 [doi]
- A cluster-based key management framework for resource constraint networksMohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Dmitri D. Perkins, Magdy A. Bayoumi. 413-419 [doi]
- Using incremental clustering technique in collaborative filtering data updateXiwei Wang, Jun Zhang. 420-427 [doi]
- Improving software quality estimation by combining feature selection strategies with sampled ensemble learningTaghi M. Khoshgoftaar, Kehan Gao, Amei Napolitano. 428-433 [doi]
- Evaluating distance measures and times series clustering for temporal patterns retrievalSidahmed Benabderrahmane, Rene Quiniou, Thomas Guyet. 434-441 [doi]
- Analyzing immediate correlations between names and pop culture of North America in the 21st centuryAbra Gurnett, Robin Besson, M. Omair Shafiq, Reda Alhajj. 442-449 [doi]
- On the unification of access control and data servicesDavid F. Ferraiolo, Serban I. Gavrila, Wayne A. Jansen. 450-457 [doi]
- Real-time anomaly detection over VMware performance data using stormMohiuddin Solaimani, Latifur Khan, Bhavani M. Thuraisingham. 458-465 [doi]
- A secure two-party password-authenticated key exchange protocolMaryam Saeed, Hadi Shahriar Shahhoseini, Ali Mackvandi, Mohammad Reza Rezaeinezhad, Mansour Naddafiun, Mohammad Zare Bidoki. 466-474 [doi]
- Reachability in hierarchical machinesOmer Nguena-Timo, Alexandre Petrenko, Arnaud Dury, S. Ramesh. 475-482 [doi]
- Formalization and analysis of timed BPELImed Eddine Chama, Nabil Belala, Djamel-Eddine Saïdouni. 483-491 [doi]
- Paradigm integration in a specification courseManuel A. Martins, Alexandre Madeira, Luís Soares Barbosa, Renato Neves. 492-499 [doi]
- A CEGAR approach for the reachability analysis of PLC-controlled chemical plantsJohanna Nellen, Erika Ábrahám. 500-507 [doi]
- Next-generation technologies for preventing accidental death of children trapped in parked vehiclesVittoria Aiello, Parnian Najafi Borazjani, Ermanno Battista, Massimiliano Albanese. 508-513 [doi]
- Automatic evaluation of medical doctors' performances while using a cricothyrotomy simulatorDaniela D'Auria, Fabio Persia. 514-519 [doi]
- A peer-to-peer network architecture for emerging applicationsKhondkar R. Islam. 520-524 [doi]
- Caruso: Interactive headphones for a dynamic 3D audio application in the cultural heritage contextDaniela D'Auria, Dario Di Mauro, Davide Maria Calandra, Francesco Cutugno. 525-528 [doi]
- Finding the most evident co-clusters on web log dataset using frequent super-sequence miningXinran Yu, Turgay Korkmaz. 529-536 [doi]
- Data integration and clustering for real time crash predictionElahe Paikari, Mohammad Moshirpour, Reda Alhajj, Behrouz H. Far. 537-544 [doi]
- Leveraging the web for automating tag expansion for low-content itemsAyush Singhal, Jaideep Srivastava. 545-552 [doi]
- iSRD: Spam review detection with imbalanced data distributionsHamzah Al Najada, Xingquan Zhu. 553-560 [doi]
- Utilizing concept correlations for effective imbalanced data classificationYilin Yan, Yang Liu, Mei-Ling Shyu, Min Chen. 561-568 [doi]
- Towards a refactoring catalogue for knowledge discovery metamodelRafael Serapilha Durelli, Daniel S. M. Santibáñez, Márcio Eduardo Delamaro, Valter Vieira de Camargo. 569-576 [doi]
- A mapping study on architecture-driven modernizationRafael Serapilha Durelli, Daniel S. M. Santibáñez, Bruno Marinho Santos, Raphael Rodrigues Honda, Márcio Eduardo Delamaro, Nicolas Anquetil, Valter Vieira de Camargo. 577-584 [doi]
- Generating textual storyline to improve situation awareness in disaster managementWubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie. 585-592 [doi]
- A bipartite-graph based approach for disaster susceptibility comparisons among citiesWubai Zhou, Chao Shen, Tao Li, Shu-Ching Chen, Ning Xie, Jinpeng Wei. 593-599 [doi]
- Word segmentation refinement by Wikipedia for textual entailmentChuan-Jie Lin, Yu-Cheng Tu. 600-606 [doi]
- Analysis of identifying linguistic phenomena for recognizing inference in textMin-Yuh Day, Ya-Jung Wang. 607-612 [doi]
- Sense decomposition from E-HowNet for word similarity measurementCheng-Wei Shih, Yu-Lun Hsieh, Wen-Lian Hsu. 613-618 [doi]
- Peer review in online forums: Classifying feedback-sentimentGreg Harris, Anand V. Panangadan, Viktor K. Prasanna. 619-626 [doi]
- Mining the user clusters on Facebook fan pages based on topic and sentiment analysisKuan-Cheng Lin, Shih-Hung Wu, Liang-Pu Chen, Tsun Ku, Gwo-Dong Chen. 627-632 [doi]
- Sniper: A framework for detecting attack attempts to open source web applications at the run timeAbdullah Almurayh. 633-638 [doi]
- CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defenseMohamed Azab, Mohamed Eltoweissy. 639-645 [doi]
- The evolution of network based cybersecurity norms: An analytical narrativeAtin Basuchoudhary, Nazli Choucri. 646-653 [doi]
- Language independent analysis and classification of discussion threads in Coursera MOOC forumsLorenzo A. Rossi, Omprakash Gnawali. 654-661 [doi]
- Automatically predicting the helpfulness of online reviewsYadong Zhang, Du Zhang. 662-668 [doi]
- A hidden treasure? Evaluating and extending latent methods for link-based classificationAaron Fleming, Luke K. McDowell, Zane Markel. 669-676 [doi]
- Interpreting medical tables as linked data for generating meta-analysis reportsVarish Mulwad, Tim Finin, Anupam Joshi. 677-686 [doi]
- Understanding implicit and explicit interface tools to perform visual analytics tasksDong Hyun Jeong, Soo-Yeon Ji, Tera Greensmith, Byunggu Yu, Remco Chang. 687-694 [doi]
- The power of fear: Facial emotion analysis of CEOs to forecast firm performanceYanjia Sun, Ali N. Akansu, James E. Cicon. 695-702 [doi]
- Designing a two-level monitoring method to detect network abnormal behaviorsSoo-Yeon Ji, Seonho Choi, Dong Hyun Jeong. 703-709 [doi]
- A proximity measure for link prediction in social user-item networksChun-Hao Fu, Cheng-Shang Chang, Duan-Shin Lee. 710-717 [doi]
- Outlier detection based on k-neighborhood MSTQingsheng Zhu, Xiaogang Fan, Ji Feng. 718-724 [doi]
- An ensemble classification approach for handling spatio-temporal drifts in partially labeled data streamsTegjyot Singh Sethi, Mehmed Kantardzic, Elaheh Arabmakki, Hanqing Hu. 725-732 [doi]
- Understanding co-evolution in large multi-relational social networksAyush Singhal, Atanu Roy, Jaideep Srivastava. 733-740 [doi]
- A sketch-based conceptual level data integration methodologyLoredana Caruccio, Vincenzo Deufemia, Giuseppe Polese. 741-748 [doi]
- DataGopher: Context-based search for research datasetsAyush Singhal, Ravindra Kasturi, Jaideep Srivastava. 749-756 [doi]
- Rolling window time series prediction using MapReduceLei Li, Farzad Noorian, Duncan J. M. Moss, Philip H. W. Leong. 757-764 [doi]
- Correlation-based re-ranking for semantic concept detectionHsin-Yu Ha, Fausto Fleites, Shu-Ching Chen, Min Chen. 765-770 [doi]
- Timed sequential pattern mining based on confidence in accumulated intervalsChichang Jou, Huan-Jyh Shyur, Chih-Yu Yen. 771-778 [doi]
- RLS-A reduced labeled samples approach for streaming imbalanced data with concept driftElaheh Arabmakki, Mehmed Kantardzic, Tegjyot Singh Sethi. 779-786 [doi]
- UFOM: Unified fuzzy ontology matchingYinuo Zhang, Anand V. Panangadan, Viktor K. Prasanna. 787-794 [doi]
- Applying pareto ant colony optimization to solve bi-objective forest transportation planning problemsPengpeng Lin, Jun Zhang, Marco A. Contreras. 795-802 [doi]
- Extending modern SAT solvers for models enumerationSaïd Jabbour, Jerry Lonlac, Lakhdar Sais, Yakoub Salhi. 803-810 [doi]
- Detecting geo-spatial weather clusters using dynamic heuristic subspacesSuman Deb Roy, Gilad Lotan. 811-818 [doi]
- Bayesian updating for time series missing data discovery and uncertainty estimation (TSMDDUE)Sara Aghakhani, Reda Alhajj, Philip Chang. 819-822 [doi]
- UML activity diagram to event-B: A model transformation approach based on the institution theoryAmine Achouri, Leila Jemni Ben Ayed. 823-829 [doi]
- A semantic multi-modal information retrieval approach based on linked data to multimedia convergent environmentsNatasha Correia Queiroz Lino, Clauirton de Albuquerque Siebra, Manoel A. L. Amaro. 830-834 [doi]
- Rotation invariant face recognition surveyGabriel Castaneda Oscos, Taghi M. Khoshgoftaar, Randall Wald. 835-840 [doi]
- Using document space for relational searchRichard Drake, Ken Q. Pu. 841-844 [doi]
- An extension to the data-driven ontology evaluationHlomani Hlomani, Deborah A. Stacey. 845-849 [doi]
- Using feature selection and classification to build effective and efficient firewallsRandall Wald, Flavio Villanustre, Taghi M. Khoshgoftaar, Richard Zuech, Jarvis Robinson, Edin Muharemagic. 850-854 [doi]
- Tire-road friction estimation utilizing smartphonesMichael Jaynes, Ram Dantu. 855-858 [doi]
- Who wrote this paper? Learning for authorship de-identification using stylometric featuressJose Hurtado, Napat Taweewitchakreeya, Xingquan Zhu. 859-862 [doi]
- Automatically classifying and interpreting polar datasets with Apache TikaAnn B. Burgess, Chris A. Mattmann. 863-867 [doi]
- Kalman-filter algorithm and PMUs for state estimation of distribution networksFaridoon Shabaninia, Mohammad Vaziri, M. Amini, Mahyar Zarghami, S. Vadhava. 868-873 [doi]
- Reuse and integration of healthcare information for subjects in a clinical trial for treatment of recurrent respiratory papillomatosisAnatoly D. Goldstein. 874-879 [doi]